Description: | Summary: The remote host is missing an update for the 'MozillaFirefox' package(s) announced via the SUSE-SU-2013:0292-1 advisory.
Vulnerability Insight: Mozilla Firefox was updated to the 10.0.12ESR release for LTSS.
*
MFSA 2013-01: Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code.
o Christoph Diehl, Christian Holler, Mats Palmgren, and Chiaki Ishikawa reported memory safety problems and crashes that affect Firefox ESR 10, Firefox ESR 17, and Firefox 17. ( CVE-2013-0769 > ) o Bill Gianopoulos, Benoit Jacob, Christoph Diehl, Christian Holler, Gary Kwong, Robert O'Callahan, and Scoobidiver reported memory safety problems and crashes that affect Firefox ESR 17 and Firefox 17. (CVE-2013-0749 > ) o Jesse Ruderman, Christian Holler, Julian Seward, and Scoobidiver reported memory safety problems and crashes that affect Firefox 17. (CVE-2013-0770 > ) *
MFSA 2013-02: Security researcher Abhishek Arya (Inferno) of the Google Chrome Security Team discovered a series critically rated of use-after-free, out of bounds read, and buffer overflow issues using the Address Sanitizer tool in shipped software. These issues are potentially exploitable, allowing for remote code execution. We would also like to thank Abhishek for reporting three additional user-after-free and out of bounds read flaws introduced during Firefox development that were fixed before general release.
The following issue was fixed in Firefox 18:
o Global-buffer-overflow in CharDistributionAnalysis::HandleOneChar (CVE-2013-0760 > )
The following issues were fixed in Firefox 18, ESR 17.0.1, and ESR 10.0.12:
o Heap-use-after-free in imgRequest::OnStopFrame (CVE-2013-0762 > ) o Heap-use-after-free in ~ nsHTMLEditRules (CVE-2013-0766 > ) o Out of bounds read in nsSVGPathElement::GetPathLengthScale ( CVE-2013-0767 > )
The following issues were fixed in Firefox 18 and ESR 17.0.1:
o Heap-use-after-free in mozilla::TrackUnionStream::EndTrack ( CVE-2013-0761 > ) o Heap-use-after-free in Mesa, triggerable by resizing a WebGL canvas (CVE-2013-0763 > ) o Heap-buffer-overflow in gfxTextRun::ShrinkToLigatureBoundaries (CVE-2013-0771 > )
The following issue was fixed in Firefox 18 and in the earlier ESR 10.0.11 release:
o Heap-buffer-overflow in nsWindow::OnExposeEvent (CVE-2012-5829 > ) *
MFSA 2013-03: Security researcher miaubiz used the Address Sanitizer tool to discover a buffer overflow in Canvas when specific bad height and width values were given through HTML. This could lead to a potentially exploitable crash. (CVE-2013-0768 > )
Miaubiz also found a potentially exploitable crash when 2D and 3D content was mixed which was introduced during Firefox development and fixed before general release.
*
MFSA 2013-04: Security researcher Masato Kinugawa found a flaw in which the ... [Please see the references for more information on the vulnerabilities]
Affected Software/OS: 'MozillaFirefox' package(s) on SUSE Linux Enterprise Server 11-SP1.
Solution: Please install the updated package(s).
CVSS Score: 10.0
CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
|