Ubuntu 8.04 LTS / 9.04 / 9.10 / 10.04 LTS : firefox, firefox-3.0, firefox-3.5, xulrunner-1.9.1, xulrunner-1.9.2 regression (USN-975-2)

high Nessus Plugin ID 49268

Language:

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

USN-975-1 fixed vulnerabilities in Firefox and Xulrunner. Some users reported stability problems under certain circumstances. This update fixes the problem.

We apologize for the inconvenience.

Several dangling pointer vulnerabilities were discovered in Firefox.
An attacker could exploit this to crash the browser or possibly run arbitrary code as the user invoking the program. (CVE-2010-2760, CVE-2010-2767, CVE-2010-3167)

Blake Kaplan and Michal Zalewski discovered several weaknesses in the XPCSafeJSObjectWrapper (SJOW) security wrapper. If a user were tricked into viewing a malicious site, a remote attacker could use this to run arbitrary JavaScript with chrome privileges. (CVE-2010-2762)

Matt Haggard discovered that Firefox did not honor same-origin policy when processing the statusText property of an XMLHttpRequest object. If a user were tricked into viewing a malicious site, a remote attacker could use this to gather information about servers on internal private networks. (CVE-2010-2764)

Chris Rohlf discovered an integer overflow when Firefox processed the HTML frameset element. If a user were tricked into viewing a malicious site, a remote attacker could use this to crash the browser or possibly run arbitrary code as the user invoking the program. (CVE-2010-2765)

Several issues were discovered in the browser engine. If a user were tricked into viewing a malicious site, a remote attacker could use this to crash the browser or possibly run arbitrary code as the user invoking the program.
(CVE-2010-2766, CVE-2010-3168)

David Huang and Collin Jackson discovered that the <object> tag could override the charset of a framed HTML document in another origin. An attacker could utilize this to perform cross-site scripting attacks. (CVE-2010-2768)

Paul Stone discovered that with designMode enabled an HTML selection containing JavaScript could be copied and pasted into a document and have the JavaScript execute within the context of the site where the code was dropped. An attacker could utilize this to perform cross-site scripting attacks.
(CVE-2010-2769)

A buffer overflow was discovered in Firefox when processing text runs. If a user were tricked into viewing a malicious site, a remote attacker could use this to crash the browser or possibly run arbitrary code as the user invoking the program. (CVE-2010-3166)

Peter Van der Beken, Jason Oster, Jesse Ruderman, Igor Bukanov, Jeff Walden, Gary Kwong and Olli Pettay discovered several flaws in the browser engine. If a user were tricked into viewing a malicious site, a remote attacker could use this to crash the browser or possibly run arbitrary code as the user invoking the program. (CVE-2010-3169).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.

Solution

Update the affected packages.

See Also

https://usn.ubuntu.com/975-2/

Plugin Details

Severity: High

ID: 49268

File Name: ubuntu_USN-975-2.nasl

Version: 1.11

Type: local

Agent: unix

Published: 9/17/2010

Updated: 9/19/2019

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 9.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:canonical:ubuntu_linux:abrowser, p-cpe:/a:canonical:ubuntu_linux:abrowser-3.0, p-cpe:/a:canonical:ubuntu_linux:abrowser-3.0-branding, p-cpe:/a:canonical:ubuntu_linux:abrowser-3.1, p-cpe:/a:canonical:ubuntu_linux:abrowser-3.1-branding, p-cpe:/a:canonical:ubuntu_linux:abrowser-3.5, p-cpe:/a:canonical:ubuntu_linux:abrowser-3.5-branding, p-cpe:/a:canonical:ubuntu_linux:abrowser-branding, p-cpe:/a:canonical:ubuntu_linux:firefox, p-cpe:/a:canonical:ubuntu_linux:firefox-2, p-cpe:/a:canonical:ubuntu_linux:firefox-2-dbg, p-cpe:/a:canonical:ubuntu_linux:firefox-2-dev, p-cpe:/a:canonical:ubuntu_linux:firefox-2-dom-inspector, p-cpe:/a:canonical:ubuntu_linux:firefox-2-gnome-support, p-cpe:/a:canonical:ubuntu_linux:firefox-2-libthai, p-cpe:/a:canonical:ubuntu_linux:firefox-3.0, p-cpe:/a:canonical:ubuntu_linux:firefox-3.0-branding, p-cpe:/a:canonical:ubuntu_linux:firefox-3.0-dev, p-cpe:/a:canonical:ubuntu_linux:firefox-3.0-dom-inspector, p-cpe:/a:canonical:ubuntu_linux:firefox-3.0-gnome-support, p-cpe:/a:canonical:ubuntu_linux:firefox-3.0-venkman, p-cpe:/a:canonical:ubuntu_linux:firefox-3.1, p-cpe:/a:canonical:ubuntu_linux:firefox-3.1-branding, p-cpe:/a:canonical:ubuntu_linux:firefox-3.1-dbg, p-cpe:/a:canonical:ubuntu_linux:firefox-3.1-dev, p-cpe:/a:canonical:ubuntu_linux:firefox-3.1-gnome-support, p-cpe:/a:canonical:ubuntu_linux:firefox-3.5, p-cpe:/a:canonical:ubuntu_linux:firefox-3.5-branding, p-cpe:/a:canonical:ubuntu_linux:firefox-3.5-dbg, p-cpe:/a:canonical:ubuntu_linux:firefox-3.5-dev, p-cpe:/a:canonical:ubuntu_linux:firefox-3.5-gnome-support, p-cpe:/a:canonical:ubuntu_linux:firefox-branding, p-cpe:/a:canonical:ubuntu_linux:firefox-dbg, p-cpe:/a:canonical:ubuntu_linux:firefox-dev, p-cpe:/a:canonical:ubuntu_linux:firefox-dom-inspector, p-cpe:/a:canonical:ubuntu_linux:firefox-gnome-support, p-cpe:/a:canonical:ubuntu_linux:firefox-gnome-support-dbg, p-cpe:/a:canonical:ubuntu_linux:firefox-granparadiso, p-cpe:/a:canonical:ubuntu_linux:firefox-granparadiso-dev, p-cpe:/a:canonical:ubuntu_linux:firefox-granparadiso-gnome-support, p-cpe:/a:canonical:ubuntu_linux:firefox-libthai, p-cpe:/a:canonical:ubuntu_linux:firefox-mozsymbols, p-cpe:/a:canonical:ubuntu_linux:firefox-trunk, p-cpe:/a:canonical:ubuntu_linux:firefox-trunk-dev, p-cpe:/a:canonical:ubuntu_linux:firefox-trunk-gnome-support, p-cpe:/a:canonical:ubuntu_linux:xulrunner-1.9, p-cpe:/a:canonical:ubuntu_linux:xulrunner-1.9.1, p-cpe:/a:canonical:ubuntu_linux:xulrunner-1.9.1-dbg, p-cpe:/a:canonical:ubuntu_linux:xulrunner-1.9.1-dev, p-cpe:/a:canonical:ubuntu_linux:xulrunner-1.9.1-gnome-support, p-cpe:/a:canonical:ubuntu_linux:xulrunner-1.9.1-testsuite, p-cpe:/a:canonical:ubuntu_linux:xulrunner-1.9.1-testsuite-dev, p-cpe:/a:canonical:ubuntu_linux:xulrunner-1.9.2, p-cpe:/a:canonical:ubuntu_linux:xulrunner-1.9.2-dbg, p-cpe:/a:canonical:ubuntu_linux:xulrunner-1.9.2-dev, p-cpe:/a:canonical:ubuntu_linux:xulrunner-1.9.2-gnome-support, p-cpe:/a:canonical:ubuntu_linux:xulrunner-1.9.2-testsuite, p-cpe:/a:canonical:ubuntu_linux:xulrunner-1.9.2-testsuite-dev, p-cpe:/a:canonical:ubuntu_linux:xulrunner-dev, cpe:/o:canonical:ubuntu_linux:10.04:-:lts, cpe:/o:canonical:ubuntu_linux:8.04:-:lts, cpe:/o:canonical:ubuntu_linux:9.04, cpe:/o:canonical:ubuntu_linux:9.10

Required KB Items: Host/cpu, Host/Debian/dpkg-l, Host/Ubuntu, Host/Ubuntu/release

Patch Publication Date: 9/16/2010

Vulnerability Publication Date: 9/9/2010

Reference Information

CVE: CVE-2010-2760, CVE-2010-2762, CVE-2010-2764, CVE-2010-2765, CVE-2010-2766, CVE-2010-2767, CVE-2010-2768, CVE-2010-2769, CVE-2010-3166, CVE-2010-3167, CVE-2010-3168, CVE-2010-3169

USN: 975-2