openSUSE Security Update : MozillaFirefox (openSUSE-2017-921)

critical Nessus Plugin ID 102472

Language:

Synopsis

The remote openSUSE host is missing a security update.

Description

This update to Mozilla Firefox 52.3esr fixes a number of security issues.

The following vulnerabilities were advised upstream under MFSA 2017-19 (boo#1052829) :

- CVE-2017-7798: XUL injection in the style editor in devtools

- CVE-2017-7800: Use-after-free in WebSockets during disconnection

- CVE-2017-7801: Use-after-free with marquee during window resizing

- CVE-2017-7784: Use-after-free with image observers

- CVE-2017-7802: Use-after-free resizing image elements

- CVE-2017-7785: Buffer overflow manipulating ARIA attributes in DOM

- CVE-2017-7786: Buffer overflow while painting non-displayable SVG

- CVE-2017-7753: Out-of-bounds read with cached style data and pseudo-elements#

- CVE-2017-7787: Same-origin policy bypass with iframes through page reloads

- CVE-2017-7807: Domain hijacking through AppCache fallback

- CVE-2017-7792: Buffer overflow viewing certificates with an extremely long OID

- CVE-2017-7804: Memory protection bypass through WindowsDllDetourPatcher

- CVE-2017-7791: Spoofing following page navigation with data: protocol and modal alerts

- CVE-2017-7782: WindowsDllDetourPatcher allocates memory without DEP protections

- CVE-2017-7803: CSP containing 'sandbox' improperly applied

- CVE-2017-7779: Memory safety bugs fixed in Firefox 55 and Firefox ESR 52.3

Solution

Update the affected MozillaFirefox packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=1052829

Plugin Details

Severity: Critical

ID: 102472

File Name: openSUSE-2017-921.nasl

Version: 3.7

Type: local

Agent: unix

Published: 8/14/2017

Updated: 1/19/2021

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:mozillafirefox-branding-upstream, p-cpe:/a:novell:opensuse:mozillafirefox, p-cpe:/a:novell:opensuse:mozillafirefox-translations-other, cpe:/o:novell:opensuse:42.2, p-cpe:/a:novell:opensuse:mozillafirefox-debugsource, p-cpe:/a:novell:opensuse:mozillafirefox-buildsymbols, p-cpe:/a:novell:opensuse:mozillafirefox-devel, p-cpe:/a:novell:opensuse:mozillafirefox-translations-common, cpe:/o:novell:opensuse:42.3, p-cpe:/a:novell:opensuse:mozillafirefox-debuginfo

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Patch Publication Date: 8/11/2017

Reference Information

CVE: CVE-2017-7753, CVE-2017-7779, CVE-2017-7782, CVE-2017-7784, CVE-2017-7785, CVE-2017-7786, CVE-2017-7787, CVE-2017-7791, CVE-2017-7792, CVE-2017-7798, CVE-2017-7800, CVE-2017-7801, CVE-2017-7802, CVE-2017-7803, CVE-2017-7804, CVE-2017-7807