openSUSE Security Update : xulrunner (openSUSE-SU-2012:1586-1)

critical Nessus Plugin ID 74826

Synopsis

The remote openSUSE host is missing a security update.

Description

Changes in xulrunner :

- update to 17.0 (bnc#790140)

- MFSA 2012-91/CVE-2012-5842/CVE-2012-5843 Miscellaneous memory safety hazards

- MFSA 2012-92/CVE-2012-4202 (bmo#758200) Buffer overflow while rendering GIF images

- MFSA 2012-93/CVE-2012-4201 (bmo#747607) evalInSanbox location context incorrectly applied

- MFSA 2012-94/CVE-2012-5836 (bmo#792857) Crash when combining SVG text on path with CSS

- MFSA 2012-95/CVE-2012-4203 (bmo#765628) Javascript: URLs run in privileged context on New Tab page

- MFSA 2012-96/CVE-2012-4204 (bmo#778603) Memory corruption in str_unescape

- MFSA 2012-97/CVE-2012-4205 (bmo#779821) XMLHttpRequest inherits incorrect principal within sandbox

- MFSA 2012-99/CVE-2012-4208 (bmo#798264) XrayWrappers exposes chrome-only properties when not in chrome compartment

- MFSA 2012-100/CVE-2012-5841 (bmo#805807) Improper security filtering for cross-origin wrappers

- MFSA 2012-101/CVE-2012-4207 (bmo#801681) Improper character decoding in HZ-GB-2312 charset

- MFSA 2012-102/CVE-2012-5837 (bmo#800363) Script entered into Developer Toolbar runs with chrome privileges

- MFSA 2012-103/CVE-2012-4209 (bmo#792405) Frames can shadow top.location

- MFSA 2012-104/CVE-2012-4210 (bmo#796866) CSS and HTML injection through Style Inspector

- MFSA 2012-105/CVE-2012-4214/CVE-2012-4215/CVE-2012-4216/ CVE-2012-5829/CVE-2012-5839/CVE-2012-5840/CVE-2012-4212/ CVE-2012-4213/CVE-2012-4217/CVE-2012-4218 Use-after-free and buffer overflow issues found using Address Sanitizer

- MFSA 2012-106/CVE-2012-5830/CVE-2012-5833/CVE-2012-5835/CVE-2 012-5838 Use-after-free, buffer overflow, and memory corruption issues found using Address Sanitizer

- rebased patches

- disabled WebRTC since build is broken (bmo#776877)

Solution

Update the affected xulrunner packages.

See Also

https://bugzilla.novell.com/show_bug.cgi?id=790140

https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html

Plugin Details

Severity: Critical

ID: 74826

File Name: openSUSE-2012-819.nasl

Version: 1.6

Type: local

Agent: unix

Published: 6/13/2014

Updated: 1/19/2021

Supported Sensors: Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:mozilla-js-debuginfo, p-cpe:/a:novell:opensuse:mozilla-js-debuginfo-32bit, p-cpe:/a:novell:opensuse:mozilla-js-32bit, p-cpe:/a:novell:opensuse:xulrunner-32bit, cpe:/o:novell:opensuse:12.2, p-cpe:/a:novell:opensuse:xulrunner-devel-debuginfo, p-cpe:/a:novell:opensuse:xulrunner-debuginfo, p-cpe:/a:novell:opensuse:xulrunner-buildsymbols, p-cpe:/a:novell:opensuse:xulrunner-debuginfo-32bit, cpe:/o:novell:opensuse:12.1, p-cpe:/a:novell:opensuse:mozilla-js, p-cpe:/a:novell:opensuse:xulrunner-debugsource, p-cpe:/a:novell:opensuse:xulrunner-devel, p-cpe:/a:novell:opensuse:xulrunner

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 11/21/2012

Reference Information

CVE: CVE-2012-4201, CVE-2012-4202, CVE-2012-4203, CVE-2012-4204, CVE-2012-4205, CVE-2012-4207, CVE-2012-4208, CVE-2012-4209, CVE-2012-4210, CVE-2012-4212, CVE-2012-4213, CVE-2012-4214, CVE-2012-4215, CVE-2012-4216, CVE-2012-4217, CVE-2012-4218, CVE-2012-5829, CVE-2012-5830, CVE-2012-5833, CVE-2012-5835, CVE-2012-5836, CVE-2012-5837, CVE-2012-5838, CVE-2012-5839, CVE-2012-5840, CVE-2012-5841, CVE-2012-5842, CVE-2012-5843