Mandriva Linux Security Advisory : firefox (MDVSA-2010:125)

high Nessus Plugin ID 47132

Language:

Synopsis

The remote Mandriva Linux host is missing one or more security updates.

Description

Security issues were identified and fixed in firefox :

An unspecified function in the JavaScript implementation in Mozilla Firefox creates and exposes a temporary footprint when there is a current login to a website, which makes it easier for remote attackers to trick a user into acting upon a spoofed pop-up message, aka an in-session phishing attack. (CVE-2008-5913).

The JavaScript implementation in Mozilla Firefox 3.x allows remote attackers to send selected keystrokes to a form field in a hidden frame, instead of the intended form field in a visible frame, via certain calls to the focus method (CVE-2010-1125).

Integer overflow in the nsGenericDOMDataNode::SetTextInternal function in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, Thunderbird before 3.0.5, and SeaMonkey before 2.0.5 allows remote attackers to execute arbitrary code via a DOM node with a long text value that triggers a heap-based buffer overflow (CVE-2010-1196).

Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, and SeaMonkey before 2.0.5, does not properly handle situations in which both Content-Disposition: attachment and Content-Type: multipart are present in HTTP headers, which allows remote attackers to conduct cross-site scripting (XSS) attacks via an uploaded HTML document (CVE-2010-1197).

Use-after-free vulnerability in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, and SeaMonkey before 2.0.5, allows remote attackers to execute arbitrary code via vectors involving multiple plugin instances (CVE-2010-1198).

Integer overflow in the XSLT node sorting implementation in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, Thunderbird before 3.0.5, and SeaMonkey before 2.0.5 allows remote attackers to execute arbitrary code via a large text value for a node (CVE-2010-1199).

Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, Thunderbird before 3.0.5, and SeaMonkey before 2.0.5 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors (CVE-2010-1200).

Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, Thunderbird before 3.0.5, and SeaMonkey before 2.0.5 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors (CVE-2010-1202).

Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox 3.6.x before 3.6.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors (CVE-2010-1203).

Packages for 2008.0 and 2009.0 are provided as of the Extended Maintenance Program. Please visit this link to learn more:
http://store.mandriva.com/product_info.php?cPath=149&products_id=4 90

Additionally, some packages which require so, have been rebuilt and are being provided as updates.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?d3ddc182

Plugin Details

Severity: High

ID: 47132

File Name: mandriva_MDVSA-2010-125.nasl

Version: 1.19

Type: local

Published: 6/25/2010

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 7.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:beagle, p-cpe:/a:mandriva:linux:beagle-crawl-system, p-cpe:/a:mandriva:linux:beagle-doc, p-cpe:/a:mandriva:linux:beagle-epiphany, p-cpe:/a:mandriva:linux:beagle-evolution, p-cpe:/a:mandriva:linux:beagle-gui, p-cpe:/a:mandriva:linux:beagle-gui-qt, p-cpe:/a:mandriva:linux:firefox-fr, p-cpe:/a:mandriva:linux:firefox-fy, p-cpe:/a:mandriva:linux:firefox-ga_ie, p-cpe:/a:mandriva:linux:firefox-gl, p-cpe:/a:mandriva:linux:firefox-gu_in, p-cpe:/a:mandriva:linux:firefox-he, p-cpe:/a:mandriva:linux:firefox-hi, p-cpe:/a:mandriva:linux:firefox-hu, p-cpe:/a:mandriva:linux:firefox-id, p-cpe:/a:mandriva:linux:firefox-is, p-cpe:/a:mandriva:linux:firefox-it, p-cpe:/a:mandriva:linux:firefox-ja, p-cpe:/a:mandriva:linux:firefox-kn, p-cpe:/a:mandriva:linux:firefox-ko, p-cpe:/a:mandriva:linux:firefox-lt, p-cpe:/a:mandriva:linux:firefox-lv, p-cpe:/a:mandriva:linux:firefox-mk, p-cpe:/a:mandriva:linux:firefox-mr, p-cpe:/a:mandriva:linux:firefox-nb_no, p-cpe:/a:mandriva:linux:firefox-nl, p-cpe:/a:mandriva:linux:firefox-nn_no, p-cpe:/a:mandriva:linux:firefox-pa_in, p-cpe:/a:mandriva:linux:firefox-pl, p-cpe:/a:mandriva:linux:firefox-pt_br, p-cpe:/a:mandriva:linux:firefox-pt_pt, p-cpe:/a:mandriva:linux:firefox-ro, p-cpe:/a:mandriva:linux:firefox-ru, p-cpe:/a:mandriva:linux:firefox-si, p-cpe:/a:mandriva:linux:firefox-sk, p-cpe:/a:mandriva:linux:firefox-sl, p-cpe:/a:mandriva:linux:firefox-sq, p-cpe:/a:mandriva:linux:firefox-sv_se, p-cpe:/a:mandriva:linux:firefox-te, p-cpe:/a:mandriva:linux:firefox-th, p-cpe:/a:mandriva:linux:firefox-theme-kfirefox, p-cpe:/a:mandriva:linux:firefox-tr, p-cpe:/a:mandriva:linux:beagle-libs, p-cpe:/a:mandriva:linux:devhelp, p-cpe:/a:mandriva:linux:devhelp-plugins, p-cpe:/a:mandriva:linux:epiphany, p-cpe:/a:mandriva:linux:epiphany-devel, p-cpe:/a:mandriva:linux:firefox, p-cpe:/a:mandriva:linux:firefox-af, p-cpe:/a:mandriva:linux:firefox-ar, p-cpe:/a:mandriva:linux:firefox-be, p-cpe:/a:mandriva:linux:firefox-bg, p-cpe:/a:mandriva:linux:firefox-bn, p-cpe:/a:mandriva:linux:firefox-ca, p-cpe:/a:mandriva:linux:firefox-cs, p-cpe:/a:mandriva:linux:firefox-cy, p-cpe:/a:mandriva:linux:firefox-da, p-cpe:/a:mandriva:linux:firefox-de, p-cpe:/a:mandriva:linux:firefox-devel, p-cpe:/a:mandriva:linux:firefox-el, p-cpe:/a:mandriva:linux:firefox-en_gb, p-cpe:/a:mandriva:linux:firefox-eo, p-cpe:/a:mandriva:linux:firefox-es_ar, p-cpe:/a:mandriva:linux:firefox-es_es, p-cpe:/a:mandriva:linux:firefox-et, p-cpe:/a:mandriva:linux:firefox-eu, p-cpe:/a:mandriva:linux:firefox-ext-beagle, p-cpe:/a:mandriva:linux:firefox-ext-blogrovr, p-cpe:/a:mandriva:linux:firefox-ext-mozvoikko, p-cpe:/a:mandriva:linux:firefox-ext-plasmanotify, p-cpe:/a:mandriva:linux:firefox-ext-r-kiosk, p-cpe:/a:mandriva:linux:firefox-ext-scribefire, p-cpe:/a:mandriva:linux:firefox-ext-xmarks, p-cpe:/a:mandriva:linux:firefox-fi, p-cpe:/a:mandriva:linux:gnome-python-extras, p-cpe:/a:mandriva:linux:gnome-python-gda, p-cpe:/a:mandriva:linux:gnome-python-gda-devel, p-cpe:/a:mandriva:linux:gnome-python-gdl, p-cpe:/a:mandriva:linux:gnome-python-gtkhtml2, p-cpe:/a:mandriva:linux:gnome-python-gtkmozembed, p-cpe:/a:mandriva:linux:gnome-python-gtkspell, p-cpe:/a:mandriva:linux:google-gadgets-common, p-cpe:/a:mandriva:linux:google-gadgets-gtk, p-cpe:/a:mandriva:linux:google-gadgets-qt, p-cpe:/a:mandriva:linux:lib64devhelp-1-devel, p-cpe:/a:mandriva:linux:lib64devhelp-1_0, p-cpe:/a:mandriva:linux:lib64ggadget-dbus1.0_0, p-cpe:/a:mandriva:linux:lib64ggadget-gtk1.0_0, p-cpe:/a:mandriva:linux:lib64ggadget-js1.0_0, p-cpe:/a:mandriva:linux:lib64ggadget-npapi1.0_0, p-cpe:/a:mandriva:linux:lib64ggadget-qt1.0_0, p-cpe:/a:mandriva:linux:lib64ggadget-webkitjs0, p-cpe:/a:mandriva:linux:lib64ggadget-xdg1.0_0, p-cpe:/a:mandriva:linux:firefox-uk, p-cpe:/a:mandriva:linux:firefox-zh_cn, p-cpe:/a:mandriva:linux:firefox-zh_tw, p-cpe:/a:mandriva:linux:lib64ggadget1.0_0, p-cpe:/a:mandriva:linux:lib64google-gadgets-devel, p-cpe:/a:mandriva:linux:lib64opensc-devel, p-cpe:/a:mandriva:linux:lib64opensc2, p-cpe:/a:mandriva:linux:lib64totem-plparser-devel, p-cpe:/a:mandriva:linux:lib64totem-plparser7, p-cpe:/a:mandriva:linux:lib64xulrunner-devel, p-cpe:/a:mandriva:linux:lib64xulrunner1.9.2.4, p-cpe:/a:mandriva:linux:libdevhelp-1-devel, p-cpe:/a:mandriva:linux:libdevhelp-1_0, p-cpe:/a:mandriva:linux:libggadget-dbus1.0_0, p-cpe:/a:mandriva:linux:libggadget-gtk1.0_0, p-cpe:/a:mandriva:linux:libggadget-js1.0_0, p-cpe:/a:mandriva:linux:libggadget-npapi1.0_0, p-cpe:/a:mandriva:linux:libggadget-qt1.0_0, p-cpe:/a:mandriva:linux:libggadget-webkitjs0, p-cpe:/a:mandriva:linux:libggadget-xdg1.0_0, p-cpe:/a:mandriva:linux:libggadget1.0_0, p-cpe:/a:mandriva:linux:libgoogle-gadgets-devel, p-cpe:/a:mandriva:linux:libopensc-devel, p-cpe:/a:mandriva:linux:libopensc2, p-cpe:/a:mandriva:linux:libtotem-plparser-devel, p-cpe:/a:mandriva:linux:libtotem-plparser7, p-cpe:/a:mandriva:linux:libxulrunner-devel, p-cpe:/a:mandriva:linux:libxulrunner1.9.2.4, p-cpe:/a:mandriva:linux:mozilla-plugin-opensc, p-cpe:/a:mandriva:linux:mozilla-thunderbird-beagle, p-cpe:/a:mandriva:linux:opensc, p-cpe:/a:mandriva:linux:totem, p-cpe:/a:mandriva:linux:totem-common, p-cpe:/a:mandriva:linux:totem-gstreamer, p-cpe:/a:mandriva:linux:totem-mozilla, p-cpe:/a:mandriva:linux:totem-mozilla-gstreamer, p-cpe:/a:mandriva:linux:totem-nautilus, p-cpe:/a:mandriva:linux:xulrunner, p-cpe:/a:mandriva:linux:yelp, cpe:/o:mandriva:linux:2008.0, cpe:/o:mandriva:linux:2009.0, cpe:/o:mandriva:linux:2009.1, cpe:/o:mandriva:linux:2010.0

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 6/24/2010

Reference Information

CVE: CVE-2008-5913, CVE-2010-1125, CVE-2010-1196, CVE-2010-1197, CVE-2010-1198, CVE-2010-1199, CVE-2010-1200, CVE-2010-1202, CVE-2010-1203

BID: 33276, 40701, 41082, 41087, 41090, 41094, 41099, 41102, 41103

MDVSA: 2010:125