Debian DSA-2075-1 : xulrunner - several vulnerabilities

high Nessus Plugin ID 47889

Language:

Synopsis

The remote Debian host is missing a security-related update.

Description

Several remote vulnerabilities have been discovered in Xulrunner, a runtime environment for XUL applications. The Common Vulnerabilities and Exposures project identifies the following problems :

- CVE-2010-0182 Wladimir Palant discovered that security checks in XML processing were insufficiently enforced.

- CVE-2010-0654 Chris Evans discovered that insecure CSS handling could lead to reading data across domain boundaries.

- CVE-2010-1205 Aki Helin discovered a buffer overflow in the internal copy of libpng, which could lead to the execution of arbitrary code.

- CVE-2010-1208 'regenrecht' discovered that incorrect memory handling in DOM parsing could lead to the execution of arbitrary code.

- CVE-2010-1211 Jesse Ruderman, Ehsan Akhgari, Mats Palmgren, Igor Bukanov, Gary Kwong, Tobias Markus and Daniel Holbert discovered crashes in the layout engine, which might allow the execution of arbitrary code.

- CVE-2010-1214 'JS3' discovered an integer overflow in the plugin code, which could lead to the execution of arbitrary code.

- CVE-2010-2751 Jordi Chancel discovered that the location could be spoofed to appear like a secured page.

- CVE-2010-2753 'regenrecht' discovered that incorrect memory handling in XUL parsing could lead to the execution of arbitrary code.

- CVE-2010-2754 Soroush Dalili discovered an information leak in script processing.

Solution

Upgrade the xulrunner packages.

For the stable distribution (lenny), these problems have been fixed in version 1.9.0.19-3.

See Also

https://security-tracker.debian.org/tracker/CVE-2010-0182

https://security-tracker.debian.org/tracker/CVE-2010-0654

https://security-tracker.debian.org/tracker/CVE-2010-1205

https://security-tracker.debian.org/tracker/CVE-2010-1208

https://security-tracker.debian.org/tracker/CVE-2010-1211

https://security-tracker.debian.org/tracker/CVE-2010-1214

https://security-tracker.debian.org/tracker/CVE-2010-2751

https://security-tracker.debian.org/tracker/CVE-2010-2753

https://security-tracker.debian.org/tracker/CVE-2010-2754

https://www.debian.org/security/2010/dsa-2075

Plugin Details

Severity: High

ID: 47889

File Name: debian_DSA-2075.nasl

Version: 1.18

Type: local

Agent: unix

Published: 7/29/2010

Updated: 1/4/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 7.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:xulrunner, cpe:/o:debian:debian_linux:5.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 7/27/2010

Reference Information

CVE: CVE-2010-0182, CVE-2010-0654, CVE-2010-1205, CVE-2010-1208, CVE-2010-1211, CVE-2010-1214, CVE-2010-2751, CVE-2010-2753, CVE-2010-2754

BID: 39479, 41174, 41842, 41849, 41853, 41859, 41860, 41872, 41968

CWE: 94

DSA: 2075