Mandriva Linux Security Advisory : firefox (MDVSA-2009:338)

high Nessus Plugin ID 48162

Language:

Synopsis

The remote Mandriva Linux host is missing one or more security updates.

Description

Security issues were identified and fixed in firefox 3.5.x :

liboggplay in Mozilla Firefox 3.5.x before 3.5.6 and SeaMonkey before 2.0.1 might allow context-dependent attackers to cause a denial of service (application crash) or execute arbitrary code via unspecified vectors, related to memory safety issues. (CVE-2009-3388)

Integer overflow in libtheora in Xiph.Org Theora before 1.1, as used in Mozilla Firefox 3.5 before 3.5.6 and SeaMonkey before 2.0.1, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a video with large dimensions (CVE-2009-3389).

Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, SeaMonkey before 2.0.1, and Thunderbird allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors (CVE-2009-3979).

Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.5.x before 3.5.6, SeaMonkey before 2.0.1, and Thunderbird allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors (CVE-2009-3980).

Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox 3.5.x before 3.5.6, SeaMonkey before 2.0.1, and Thunderbird allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors (CVE-2009-3982).

Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, and SeaMonkey before 2.0.1, allows remote attackers to send authenticated requests to arbitrary applications by replaying the NTLM credentials of a browser user (CVE-2009-3983).

Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, and SeaMonkey before 2.0.1, allows remote attackers to spoof an SSL indicator for an http URL or a file URL by setting document.location to an https URL corresponding to a site that responds with a No Content (aka 204) status code and an empty body (CVE-2009-3984).

Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, and SeaMonkey before 2.0.1, allows remote attackers to associate spoofed content with an invalid URL by setting document.location to this URL, and then writing arbitrary web script or HTML to the associated blank document, a related issue to CVE-2009-2654 (CVE-2009-3985).

Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, and SeaMonkey before 2.0.1, allows remote attackers to execute arbitrary JavaScript with chrome privileges by leveraging a reference to a chrome window from a content window, related to the window.opener property (CVE-2009-3986).

The GeckoActiveXObject function in Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, and SeaMonkey before 2.0.1, generates different exception messages depending on whether the referenced COM object is listed in the registry, which allows remote attackers to obtain potentially sensitive information about installed software by making multiple calls that specify the ProgID values of different COM objects (CVE-2009-3987).

Additionally, some packages which require so, have been rebuilt and are being provided as updates.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?2677d5ca

Plugin Details

Severity: High

ID: 48162

File Name: mandriva_MDVSA-2009-338.nasl

Version: 1.18

Type: local

Published: 7/30/2010

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:beagle, p-cpe:/a:mandriva:linux:beagle-crawl-system, p-cpe:/a:mandriva:linux:beagle-doc, p-cpe:/a:mandriva:linux:beagle-evolution, p-cpe:/a:mandriva:linux:beagle-gui, p-cpe:/a:mandriva:linux:beagle-gui-qt, p-cpe:/a:mandriva:linux:beagle-libs, p-cpe:/a:mandriva:linux:firefox, p-cpe:/a:mandriva:linux:firefox-af, p-cpe:/a:mandriva:linux:firefox-ar, p-cpe:/a:mandriva:linux:firefox-be, p-cpe:/a:mandriva:linux:firefox-bg, p-cpe:/a:mandriva:linux:firefox-bn, p-cpe:/a:mandriva:linux:firefox-ca, p-cpe:/a:mandriva:linux:firefox-cs, p-cpe:/a:mandriva:linux:firefox-cy, p-cpe:/a:mandriva:linux:firefox-nb_no, p-cpe:/a:mandriva:linux:firefox-nl, p-cpe:/a:mandriva:linux:firefox-nn_no, p-cpe:/a:mandriva:linux:firefox-oc, p-cpe:/a:mandriva:linux:firefox-pa_in, p-cpe:/a:mandriva:linux:firefox-pl, p-cpe:/a:mandriva:linux:firefox-pt_br, p-cpe:/a:mandriva:linux:firefox-pt_pt, p-cpe:/a:mandriva:linux:firefox-ro, p-cpe:/a:mandriva:linux:firefox-ru, p-cpe:/a:mandriva:linux:firefox-si, p-cpe:/a:mandriva:linux:firefox-sk, p-cpe:/a:mandriva:linux:firefox-sl, p-cpe:/a:mandriva:linux:firefox-sq, p-cpe:/a:mandriva:linux:firefox-sr, p-cpe:/a:mandriva:linux:firefox-sv_se, p-cpe:/a:mandriva:linux:firefox-te, p-cpe:/a:mandriva:linux:firefox-da, p-cpe:/a:mandriva:linux:firefox-de, p-cpe:/a:mandriva:linux:firefox-devel, p-cpe:/a:mandriva:linux:firefox-el, p-cpe:/a:mandriva:linux:firefox-en_gb, p-cpe:/a:mandriva:linux:firefox-eo, p-cpe:/a:mandriva:linux:firefox-es_ar, p-cpe:/a:mandriva:linux:firefox-es_es, p-cpe:/a:mandriva:linux:firefox-et, p-cpe:/a:mandriva:linux:firefox-eu, p-cpe:/a:mandriva:linux:firefox-ext-beagle, p-cpe:/a:mandriva:linux:firefox-ext-blogrovr, p-cpe:/a:mandriva:linux:firefox-ext-mozvoikko, p-cpe:/a:mandriva:linux:firefox-ext-plasmanotify, p-cpe:/a:mandriva:linux:firefox-ext-r-kiosk, p-cpe:/a:mandriva:linux:firefox-ext-scribefire, p-cpe:/a:mandriva:linux:firefox-fi, p-cpe:/a:mandriva:linux:firefox-fr, p-cpe:/a:mandriva:linux:firefox-fy, p-cpe:/a:mandriva:linux:firefox-ga_ie, p-cpe:/a:mandriva:linux:firefox-gl, p-cpe:/a:mandriva:linux:firefox-gu_in, p-cpe:/a:mandriva:linux:firefox-he, p-cpe:/a:mandriva:linux:firefox-hi, p-cpe:/a:mandriva:linux:firefox-hu, p-cpe:/a:mandriva:linux:firefox-id, p-cpe:/a:mandriva:linux:firefox-is, p-cpe:/a:mandriva:linux:firefox-it, p-cpe:/a:mandriva:linux:firefox-ja, p-cpe:/a:mandriva:linux:firefox-ka, p-cpe:/a:mandriva:linux:firefox-kn, p-cpe:/a:mandriva:linux:firefox-ko, p-cpe:/a:mandriva:linux:firefox-ku, p-cpe:/a:mandriva:linux:firefox-lt, p-cpe:/a:mandriva:linux:firefox-lv, p-cpe:/a:mandriva:linux:firefox-mk, p-cpe:/a:mandriva:linux:firefox-mn, p-cpe:/a:mandriva:linux:firefox-mr, p-cpe:/a:mandriva:linux:gnome-python-gtkhtml2, p-cpe:/a:mandriva:linux:gnome-python-gtkmozembed, p-cpe:/a:mandriva:linux:gnome-python-gtkspell, p-cpe:/a:mandriva:linux:lib64opensc-devel, p-cpe:/a:mandriva:linux:lib64opensc2, p-cpe:/a:mandriva:linux:lib64xulrunner-devel, p-cpe:/a:mandriva:linux:lib64xulrunner1.9.1.6, p-cpe:/a:mandriva:linux:libopensc-devel, p-cpe:/a:mandriva:linux:libopensc2, p-cpe:/a:mandriva:linux:libxulrunner-devel, p-cpe:/a:mandriva:linux:firefox-th, p-cpe:/a:mandriva:linux:firefox-theme-kde4ff, p-cpe:/a:mandriva:linux:firefox-tr, p-cpe:/a:mandriva:linux:firefox-uk, p-cpe:/a:mandriva:linux:firefox-zh_cn, p-cpe:/a:mandriva:linux:firefox-zh_tw, p-cpe:/a:mandriva:linux:gnome-python-extras, p-cpe:/a:mandriva:linux:gnome-python-gda, p-cpe:/a:mandriva:linux:gnome-python-gda-devel, p-cpe:/a:mandriva:linux:gnome-python-gdl, p-cpe:/a:mandriva:linux:libxulrunner1.9.1.6, p-cpe:/a:mandriva:linux:mozilla-plugin-opensc, p-cpe:/a:mandriva:linux:mozilla-thunderbird-beagle, p-cpe:/a:mandriva:linux:opensc, p-cpe:/a:mandriva:linux:python-xpcom, p-cpe:/a:mandriva:linux:xulrunner, p-cpe:/a:mandriva:linux:yelp, cpe:/o:mandriva:linux:2010.0

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 12/22/2009

Reference Information

CVE: CVE-2009-3388, CVE-2009-3389, CVE-2009-3979, CVE-2009-3980, CVE-2009-3982, CVE-2009-3983, CVE-2009-3984, CVE-2009-3985, CVE-2009-3986, CVE-2009-3987

BID: 37361, 37362, 37364, 37365, 37366, 37367, 37368, 37369, 37370

CWE: 189, 200, 399, 94

MDVSA: 2009:338