Oracle Linux 5 : firefox (ELSA-2010-0501)

medium Nessus Plugin ID 68055

Synopsis

The remote Oracle Linux host is missing one or more security updates.

Description

The remote Oracle Linux 5 host has packages installed that are affected by multiple vulnerabilities as referenced in the ELSA-2010-0501 advisory.

devhelp:

[0.12-21]
- Rebuild against xulrunner

esc:

[1.1.0-12]
- Rebuild for xulrunner update

firefox:

[3.6.4-8.0.1.el5]
- Add firefox-oracle-default-prefs.js and firefox-oracle-default-bookmarks.html and remove the corresponding Red Hat ones

[3.6.4-8]
- Fixing NVR

[3.6.4-7]
- Update to 3.6.4 build7
- Disable checking for updates since they can't be applied

[3.6.4-6]
- Update to 3.6.4 build6

[3.6.4-5]
- Update to 3.6.4 build5

[3.6.4-4]
- Update to 3.6.4 build4

[3.6.4-3]
- Update to 3.6.4 build 3

[3.6.4-2]
- Update to 3.6.4 build 2

[3.6.4-1]
- Update to 3.6.4

[3.6.3-3]
- Fixed language packs (#581392)

[3.6.3-2]
- Fixed multilib conflict

[3.6.3-1]
- Rebase to 3.6.3

gnome-python2-extras:

[2.14.2-7]
- rebuild agains xulrunner

totem:

[2.16.7-7]
- rebuild against new xulrunner

xulrunner:

[1.9.2.4-9.0.1]
- Added xulrunner-oracle-default-prefs.js and removed the corresponding RedHat one.

[1.9.2.4-9]
- Update to 1.9.2.4 build 7

[1.9.2.4-8]
- Update to 1.9.2.4 build 6

[1.9.2.4-7]
- Update to 1.9.2.4 build 5

[1.9.2.4-6]
- Update to 1.9.2.4 build 4
- Fixed mozbz#546270 patch

[1.9.2.4-5]
- Update to 1.9.2.4 build 3

[1.9.2.4-4]
- Update to 1.9.2.4 build 2
- Enabled oopp

[1.9.2.4-3]
- Disabled libnotify

[1.9.2.4-2]
- Disabled oopp, causes TEXTREL

[1.9.2.4-1]
- Update to 1.9.2.4

[1.9.2.3-3]
- fixed js-config.h multilib conflict
- fixed file list

[1.9.2.3-2]
- Added fix for rhbz#555760 - Firefox Javascript anomily, landscape print orientation reverts to portrait (mozbz#546270)

[1.9.2.3-1]
- Update to 1.9.2.3

[1.9.2.2-1]
- Rebase to 1.9.2.2

yelp:

[2.16.0-26]
- rebuild against xulrunner

[2.16.0-25]
- rebuild against xulrunner
- added xulrunner fix
- added -fno-strict-aliasing to build flags

Tenable has extracted the preceding description block directly from the Oracle Linux security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://linux.oracle.com/errata/ELSA-2010-0501.html

Plugin Details

Severity: Medium

ID: 68055

File Name: oraclelinux_ELSA-2010-0501.nasl

Version: 1.12

Type: local

Agent: unix

Published: 7/12/2013

Updated: 10/22/2024

Supported Sensors: Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2010-1121

CVSS v3

Risk Factor: Medium

Base Score: 6.1

Temporal Score: 5.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

CVSS Score Source: CVE-2010-1197

Vulnerability Information

CPE: p-cpe:/a:oracle:linux:gnome-python2-gtkhtml2, p-cpe:/a:oracle:linux:esc, p-cpe:/a:oracle:linux:totem-mozplugin, p-cpe:/a:oracle:linux:xulrunner, cpe:/o:oracle:linux:5, p-cpe:/a:oracle:linux:totem, p-cpe:/a:oracle:linux:devhelp, p-cpe:/a:oracle:linux:yelp, p-cpe:/a:oracle:linux:devhelp-devel, p-cpe:/a:oracle:linux:firefox, p-cpe:/a:oracle:linux:gnome-python2-gtkmozembed, p-cpe:/a:oracle:linux:gnome-python2-libegg, p-cpe:/a:oracle:linux:xulrunner-devel, p-cpe:/a:oracle:linux:gnome-python2-extras, p-cpe:/a:oracle:linux:totem-devel, p-cpe:/a:oracle:linux:gnome-python2-gtkspell

Required KB Items: Host/local_checks_enabled, Host/OracleLinux, Host/RedHat/release, Host/RedHat/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 6/23/2010

Vulnerability Publication Date: 1/20/2009

Reference Information

CVE: CVE-2008-5913, CVE-2009-5017, CVE-2010-0182, CVE-2010-1121, CVE-2010-1125, CVE-2010-1196, CVE-2010-1197, CVE-2010-1198, CVE-2010-1199, CVE-2010-1200, CVE-2010-1202, CVE-2010-1203

RHSA: 2010:0501