Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.12.2006.296.2
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-296-2)
Summary:The remote host is missing an update for the 'firefox, mozilla-firefox' package(s) announced via the USN-296-2 advisory.
Description:Summary:
The remote host is missing an update for the 'firefox, mozilla-firefox' package(s) announced via the USN-296-2 advisory.

Vulnerability Insight:
USN-296-1 fixed several vulnerabilities in Firefox for the Ubuntu 6.06
LTS release. This update provides the corresponding fixes for Ubuntu
5.04 and Ubuntu 5.10.

For reference, these are the details of the original USN:

Jonas Sicking discovered that under some circumstances persisted XUL
attributes are associated with the wrong URL. A malicious web site
could exploit this to execute arbitrary code with the privileges of
the user. (MFSA 2006-35, CVE-2006-2775)

Paul Nickerson discovered that content-defined setters on an object
prototype were getting called by privileged UI code. It was
demonstrated that this could be exploited to run arbitrary web script
with full user privileges (MFSA 2006-37, CVE-2006-2776). A similar
attack was discovered by moz_bug_r_a4 that leveraged SelectionObject
notifications that were called in privileged context. (MFSA 2006-43,
CVE-2006-2777)

Mikolaj Habryn discovered a buffer overflow in the crypto.signText()
function. By tricking a user to visit a site with an SSL certificate
with specially crafted optional Certificate Authority name
arguments, this could potentially be exploited to execute arbitrary
code with the user's privileges. (MFSA 2006-38, CVE-2006-2778)

The Mozilla developer team discovered several bugs that lead to
crashes with memory corruption. These might be exploitable by
malicious web sites to execute arbitrary code with the privileges of
the user. (MFSA 2006-32, CVE-2006-2779, CVE-2006-2780, CVE-2006-2788)

Chuck McAuley reported that the fix for CVE-2006-1729 (file stealing
by changing input type) was not sufficient to prevent all variants of
exploitation. (MFSA 2006-41, CVE-2006-2782)

Masatoshi Kimura found a way to bypass web input sanitizers which
filter out JavaScript. By inserting 'Unicode Byte-order-Mark (BOM)'
characters into the HTML code (e. g. ''), these filters
might not recognize the tags anymore, however, Firefox would still
execute them since BOM markers are filtered out before processing the
page. (MFSA 2006-42, CVE-2006-2783)

Paul Nickerson noticed that the fix for CVE-2005-0752 (JavaScript
privilege escalation on the plugins page) was not sufficient to
prevent all variants of exploitation. (MFSA 2006-36, CVE-2006-2784)

Paul Nickerson demonstrated that if an attacker could convince a user
to right-click on a broken image and choose 'View Image' from the
context menu then he could get JavaScript to run on a site of the
attacker's choosing. This could be used to steal login cookies or
other confidential information from the target site. (MFSA 2006-34,
CVE-2006-2785)

Kazuho Oku discovered various ways to perform HTTP response smuggling
when used with certain proxy servers. Due to different interpretation
of nonstandard HTTP headers in Firefox and the proxy server, a
malicious web site can exploit this to send back two responses to one
request. The ... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'firefox, mozilla-firefox' package(s) on Ubuntu 5.04, Ubuntu 5.10.

Solution:
Please install the updated package(s).

CVSS Score:
9.3

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2006-2775
BugTraq ID: 18228
http://www.securityfocus.com/bid/18228
Bugtraq: 20060602 rPSA-2006-0091-1 firefox thunderbird (Google Search)
http://www.securityfocus.com/archive/1/435795/100/0/threaded
Cert/CC Advisory: TA06-153A
http://www.us-cert.gov/cas/techalerts/TA06-153A.html
CERT/CC vulnerability note: VU#243153
http://www.kb.cert.org/vuls/id/243153
Debian Security Information: DSA-1118 (Google Search)
http://www.debian.org/security/2006/dsa-1118
Debian Security Information: DSA-1120 (Google Search)
http://www.debian.org/security/2006/dsa-1120
Debian Security Information: DSA-1134 (Google Search)
http://www.debian.org/security/2006/dsa-1134
http://www.gentoo.org/security/en/glsa/glsa-200606-12.xml
http://www.gentoo.org/security/en/glsa/glsa-200606-21.xml
HPdes Security Advisory: HPSBUX02153
http://www.securityfocus.com/archive/1/446658/100/200/threaded
HPdes Security Advisory: HPSBUX02156
http://www.securityfocus.com/archive/1/446657/100/200/threaded
HPdes Security Advisory: SSRT061181
HPdes Security Advisory: SSRT061236
http://www.mandriva.com/security/advisories?name=MDKSA-2006:143
http://www.mandriva.com/security/advisories?name=MDKSA-2006:145
http://www.mandriva.com/security/advisories?name=MDKSA-2006:146
http://securitytracker.com/id?1016202
http://securitytracker.com/id?1016214
http://secunia.com/advisories/20376
http://secunia.com/advisories/20382
http://secunia.com/advisories/20561
http://secunia.com/advisories/20709
http://secunia.com/advisories/21176
http://secunia.com/advisories/21178
http://secunia.com/advisories/21183
http://secunia.com/advisories/21188
http://secunia.com/advisories/21210
http://secunia.com/advisories/21324
http://secunia.com/advisories/21532
http://secunia.com/advisories/21607
http://secunia.com/advisories/22065
http://secunia.com/advisories/22066
SuSE Security Announcement: SUSE-SA:2006:035 (Google Search)
http://www.novell.com/linux/security/advisories/2006_35_mozilla.html
https://usn.ubuntu.com/296-1/
https://usn.ubuntu.com/296-2/
https://usn.ubuntu.com/297-1/
https://usn.ubuntu.com/297-3/
https://usn.ubuntu.com/323-1/
http://www.vupen.com/english/advisories/2006/2106
http://www.vupen.com/english/advisories/2006/3748
http://www.vupen.com/english/advisories/2006/3749
http://www.vupen.com/english/advisories/2008/0083
XForce ISS Database: mozilla-xul-code-execution(26846)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26846
Common Vulnerability Exposure (CVE) ID: CVE-2006-2776
CERT/CC vulnerability note: VU#575969
http://www.kb.cert.org/vuls/id/575969
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9849
http://www.redhat.com/support/errata/RHSA-2006-0578.html
http://www.redhat.com/support/errata/RHSA-2006-0594.html
RedHat Security Advisories: RHSA-2006:0609
http://rhn.redhat.com/errata/RHSA-2006-0609.html
http://www.redhat.com/support/errata/RHSA-2006-0610.html
http://www.redhat.com/support/errata/RHSA-2006-0611.html
http://secunia.com/advisories/21134
http://secunia.com/advisories/21269
http://secunia.com/advisories/21270
http://secunia.com/advisories/21336
http://secunia.com/advisories/21631
http://secunia.com/advisories/24108
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102800-1
http://www.vupen.com/english/advisories/2007/0573
XForce ISS Database: mozilla-contentdefined-code-execution(26848)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26848
Common Vulnerability Exposure (CVE) ID: CVE-2006-2777
CERT/CC vulnerability note: VU#237257
http://www.kb.cert.org/vuls/id/237257
http://secunia.com/advisories/20394
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102763-1
http://www.vupen.com/english/advisories/2007/0058
XForce ISS Database: mozilla-nsiselectionprivate-code-execution(26853)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26853
Common Vulnerability Exposure (CVE) ID: CVE-2006-2778
CERT/CC vulnerability note: VU#421529
http://www.kb.cert.org/vuls/id/421529
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9703
XForce ISS Database: mozilla-crypto-signtext-bo(26849)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26849
Common Vulnerability Exposure (CVE) ID: CVE-2006-2779
CERT/CC vulnerability note: VU#466673
http://www.kb.cert.org/vuls/id/466673
Debian Security Information: DSA-1159 (Google Search)
http://www.debian.org/security/2006/dsa-1159
Debian Security Information: DSA-1160 (Google Search)
http://www.debian.org/security/2006/dsa-1160
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9762
http://secunia.com/advisories/21634
http://secunia.com/advisories/21654
http://secunia.com/advisories/27216
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102943-1
http://sunsolve.sun.com/search/document.do?assetkey=1-66-200387-1
http://www.vupen.com/english/advisories/2007/3488
XForce ISS Database: mozilla-browserengine-memory-corruption(26843)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26843
Common Vulnerability Exposure (CVE) ID: CVE-2006-2780
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11305
Common Vulnerability Exposure (CVE) ID: CVE-2006-2782
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10429
XForce ISS Database: mozilla-firefox-textbox-file-access(26851)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26851
Common Vulnerability Exposure (CVE) ID: CVE-2006-2783
http://lists.apple.com/archives/security-announce/2008//Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10772
http://secunia.com/advisories/31074
http://secunia.com/advisories/35379
http://www.vupen.com/english/advisories/2008/2094/references
http://www.vupen.com/english/advisories/2009/1522
XForce ISS Database: mozilla-bom-utf8-xss(26852)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26852
Common Vulnerability Exposure (CVE) ID: CVE-2006-2784
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9768
XForce ISS Database: mozilla-pluginspage-code-execution(26847)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26847
Common Vulnerability Exposure (CVE) ID: CVE-2006-2785
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10545
XForce ISS Database: mozilla-viewimage-xss(26845)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26845
Common Vulnerability Exposure (CVE) ID: CVE-2006-2786
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9966
XForce ISS Database: mozilla-http-response-smuggling(26844)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26844
Common Vulnerability Exposure (CVE) ID: CVE-2006-2787
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9491
XForce ISS Database: mozilla-valueof-sandbox-bypass(26842)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26842
CopyrightCopyright (C) 2022 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.