USN-690-1: Firefox and xulrunner vulnerabilities


 
Thread Tools Search this Thread
Special Forums Cybersecurity Security Advisories (RSS) USN-690-1: Firefox and xulrunner vulnerabilities
# 1  
Old 12-17-2008
USN-690-1: Firefox and xulrunner vulnerabilities

Referenced CVEs:
CVE-2008-5500, CVE-2008-5501, CVE-2008-5502, CVE-2008-5505, CVE-2008-5506, CVE-2008-5507, CVE-2008-5508, CVE-2008-5510, CVE-2008-5511, CVE-2008-5512, CVE-2008-5513


Description:
===========================================================Ubuntu Security Notice USN-690-1 December 17, 2008firefox-3.0, xulrunner-1.9 vulnerabilitiesCVE-2008-5500, CVE-2008-5501, CVE-2008-5502, CVE-2008-5505,CVE-2008-5506, CVE-2008-5507, CVE-2008-5508, CVE-2008-5510,CVE-2008-5511, CVE-2008-5512, CVE-2008-5513===========================================================A security issue affects the following Ubuntu releases:Ubuntu 8.04 LTSUbuntu 8.10This advisory also applies to the corresponding versions ofKubuntu, Edubuntu, and Xubuntu.The problem can be corrected by upgrading your system to thefollowing package versions:Ubuntu 8.04 LTS: firefox-3.0 3.0.5+nobinonly-0ubuntu0.8.04.1 xulrunner-1.9 1.9.0.5+nobinonly-0ubuntu0.8.04.1Ubuntu 8.10: abrowser 3.0.5+nobinonly-0ubuntu0.8.10.1 firefox-3.0 3.0.5+nobinonly-0ubuntu0.8.10.1 xulrunner-1.9 1.9.0.5+nobinonly-0ubuntu0.8.10.1After a standard system upgrade you need to restart Firefox and anyapplications that use xulrunner, such as Epiphany, to effect the necessarychanges.Details follow:Several flaws were discovered in the browser engine. These problems could allowan attacker to crash the browser and possibly execute arbitrary code with userprivileges. (CVE-2008-5500, CVE-2008-5501, CVE-2008-5502)It was discovered that Firefox did not properly handle persistent cookie data.If a user were tricked into opening a malicious website, an attacker couldwrite persistent data in the user's browser and track the user across browsingsessions. (CVE-2008-5505)Marius Schilder discovered that Firefox did not properly handle redirects toan outside domain when an XMLHttpRequest was made to a same-origin resource.It's possible that sensitive information could be revealed in theXMLHttpRequest response. (CVE-2008-5506)Chris Evans discovered that Firefox did not properly protect a user's data whenaccessing a same-domain Javascript URL that is redirected to an unparsableJavascript off-site resource. If a user were tricked into opening a maliciouswebsite, an attacker may be able to steal a limited amount of private data.(CVE-2008-5507)Chip Salzenberg, Justin Schuh, Tom Cross, and Peter William discovered Firefoxdid not properly parse URLs when processing certain control characters.(CVE-2008-5508)Kojima Hajime discovered that Firefox did not properly handle an escaped nullcharacter. An attacker may be able to exploit this flaw to bypass scriptsanitization. (CVE-2008-5510)Several flaws were discovered in the Javascript engine. If a user were trickedinto opening a malicious website, an attacker could exploit this to executearbitrary Javascript code within the context of another website or with chromeprivileges. (CVE-2008-5511, CVE-2008-5512)Flaws were discovered in the session-restore feature of Firefox. If a user weretricked into opening a malicious website, an attacker could exploit this toperform cross-site scripting attacks or execute arbitrary Javascript code withchrome privileges. (CVE-2008-5513)





More...
Login or Register to Ask a Question

Previous Thread | Next Thread
Login or Register to Ask a Question