Fedora 7 : Miro-1.0-2.fc7 / blam-1.8.3-10.fc7 / chmsee-1.0.0-1.27.fc7 / devhelp-0.13-12.fc7 / etc (2007-3952)

high Nessus Plugin ID 28345

Synopsis

The remote Fedora host is missing one or more security updates.

Description

Updated firefox packages that fix several security issues are now available for Fedora 7.

This update has been rated as having critical security impact by the Fedora Security Response Team.

Mozilla Firefox is an open source Web browser.

A cross-site scripting flaw was found in the way Firefox handled the jar: URI scheme. It was possible for a malicious website to leverage this flaw and conduct a cross-site scripting attack against a user running Firefox. (CVE-2007-5947)

Several flaws were found in the way Firefox processed certain malformed web content. A web page containing malicious content could cause Firefox to crash, or potentially execute arbitrary code as the user running Firefox. (CVE-2007-5959)

A race condition existed when Firefox set the 'window.location' property for a web page. This flaw could allow a web page to set an arbitrary Referer header, which may lead to a Cross-site Request Forgery (CSRF) attack against websites that rely only on the Referer header for protection. (CVE-2007-5960)

Users of Firefox are advised to upgrade to these updated packages, which contain backported patches to resolve these issues.

Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?0f4e38da

http://www.nessus.org/u?391a9f25

http://www.nessus.org/u?db401f4f

http://www.nessus.org/u?9f3f7b4d

http://www.nessus.org/u?2ffece71

http://www.nessus.org/u?12393ef3

http://www.nessus.org/u?0af9fb9c

http://www.nessus.org/u?c8360769

http://www.nessus.org/u?6b7e7175

http://www.nessus.org/u?aadc3c9e

http://www.nessus.org/u?28660866

http://www.nessus.org/u?237b9220

http://www.nessus.org/u?914cc116

http://www.nessus.org/u?f4ca37d7

http://www.nessus.org/u?766f2f9d

Plugin Details

Severity: High

ID: 28345

File Name: fedora_2007-3952.nasl

Version: 1.17

Type: local

Agent: unix

Published: 11/29/2007

Updated: 1/11/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.8

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:fedoraproject:fedora:ruby-gtkhtml2, p-cpe:/a:fedoraproject:fedora:firefox-devel, p-cpe:/a:fedoraproject:fedora:ruby-panelapplet2, p-cpe:/a:fedoraproject:fedora:ruby-gconf2, p-cpe:/a:fedoraproject:fedora:epiphany-extensions, p-cpe:/a:fedoraproject:fedora:blam, p-cpe:/a:fedoraproject:fedora:ruby-gnomeprint2, p-cpe:/a:fedoraproject:fedora:ruby-libart2-devel, p-cpe:/a:fedoraproject:fedora:ruby-pango, p-cpe:/a:fedoraproject:fedora:yelp-debuginfo, p-cpe:/a:fedoraproject:fedora:openvrml-devel, p-cpe:/a:fedoraproject:fedora:kazehakase-ruby, p-cpe:/a:fedoraproject:fedora:chmsee, p-cpe:/a:fedoraproject:fedora:ruby-gtkglext, p-cpe:/a:fedoraproject:fedora:ruby-gdkpixbuf2, p-cpe:/a:fedoraproject:fedora:yelp, p-cpe:/a:fedoraproject:fedora:kazehakase-hyperestraier, p-cpe:/a:fedoraproject:fedora:ruby-gnome2-debuginfo, p-cpe:/a:fedoraproject:fedora:chmsee-debuginfo, p-cpe:/a:fedoraproject:fedora:miro, p-cpe:/a:fedoraproject:fedora:epiphany-debuginfo, p-cpe:/a:fedoraproject:fedora:liferea-debuginfo, p-cpe:/a:fedoraproject:fedora:openvrml, p-cpe:/a:fedoraproject:fedora:openvrml-gl-devel, p-cpe:/a:fedoraproject:fedora:ruby-gtksourceview, p-cpe:/a:fedoraproject:fedora:ruby-libglade2, p-cpe:/a:fedoraproject:fedora:gnome-python2-extras-debuginfo, p-cpe:/a:fedoraproject:fedora:openvrml-gl, p-cpe:/a:fedoraproject:fedora:ruby-libart2, p-cpe:/a:fedoraproject:fedora:gtkmozembedmm-debuginfo, p-cpe:/a:fedoraproject:fedora:ruby-atk, p-cpe:/a:fedoraproject:fedora:gnome-python2-gtkspell, p-cpe:/a:fedoraproject:fedora:blam-debuginfo, p-cpe:/a:fedoraproject:fedora:kazehakase-debuginfo, p-cpe:/a:fedoraproject:fedora:devhelp, p-cpe:/a:fedoraproject:fedora:gnome-python2-gtkmozembed, p-cpe:/a:fedoraproject:fedora:openvrml-debuginfo, p-cpe:/a:fedoraproject:fedora:ruby-gnomeprintui2, p-cpe:/a:fedoraproject:fedora:ruby-glib2, p-cpe:/a:fedoraproject:fedora:epiphany-extensions-debuginfo, p-cpe:/a:fedoraproject:fedora:ruby-gtk2-devel, p-cpe:/a:fedoraproject:fedora:gtkmozembedmm, p-cpe:/a:fedoraproject:fedora:liferea, cpe:/o:fedoraproject:fedora:7, p-cpe:/a:fedoraproject:fedora:ruby-atk-devel, p-cpe:/a:fedoraproject:fedora:gtkmozembedmm-devel, p-cpe:/a:fedoraproject:fedora:miro-debuginfo, p-cpe:/a:fedoraproject:fedora:ruby-glib2-devel, p-cpe:/a:fedoraproject:fedora:ruby-gnomecanvas2, p-cpe:/a:fedoraproject:fedora:ruby-gtkmozembed, p-cpe:/a:fedoraproject:fedora:ruby-vte, p-cpe:/a:fedoraproject:fedora:galeon, p-cpe:/a:fedoraproject:fedora:gnome-python2-libegg, p-cpe:/a:fedoraproject:fedora:firefox-debuginfo, p-cpe:/a:fedoraproject:fedora:ruby-gnomevfs, p-cpe:/a:fedoraproject:fedora:ruby-rsvg, p-cpe:/a:fedoraproject:fedora:epiphany, p-cpe:/a:fedoraproject:fedora:devhelp-devel, p-cpe:/a:fedoraproject:fedora:gnome-python2-extras, p-cpe:/a:fedoraproject:fedora:gnome-python2-gtkhtml2, p-cpe:/a:fedoraproject:fedora:ruby-gnome2, p-cpe:/a:fedoraproject:fedora:galeon-debuginfo, p-cpe:/a:fedoraproject:fedora:ruby-poppler, p-cpe:/a:fedoraproject:fedora:epiphany-devel, p-cpe:/a:fedoraproject:fedora:ruby-pango-devel, p-cpe:/a:fedoraproject:fedora:openvrml-mozilla-plugin, p-cpe:/a:fedoraproject:fedora:openvrml-xembed, p-cpe:/a:fedoraproject:fedora:kazehakase, p-cpe:/a:fedoraproject:fedora:ruby-gtk2, p-cpe:/a:fedoraproject:fedora:devhelp-debuginfo, p-cpe:/a:fedoraproject:fedora:openvrml-player, p-cpe:/a:fedoraproject:fedora:firefox

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 11/29/2007

Reference Information

CVE: CVE-2007-5947, CVE-2007-5959, CVE-2007-5960

BID: 26385, 26589, 26593

CWE: 22, 79

FEDORA: 2007-3952