SuSE 11.3 Security Update : Mozilla Firefox (SAT Patch Number 10524)

high Nessus Plugin ID 82068

Synopsis

The remote SuSE 11 host is missing one or more security updates.

Description

Mozilla Firefox was updated to the 31.5.3ESR release to fix two security vulnerabilities :

- Security researcher ilxu1a reported, through HP Zero Day Initiative's Pwn2Own contest, a flaw in Mozilla's implementation of typed array bounds checking in JavaScript just-in-time compilation (JIT) and its management of bounds checking for heap access. This flaw can be leveraged into the reading and writing of memory allowing for arbitary code execution on the local system. (MFSA 2015-29 / CVE-2015-0817)

- Security researcher Mariusz Mlynski reported, through HP Zero Day Initiative's Pwn2Own contest, a method to run arbitrary scripts in a privileged context. This bypassed the same-origin policy protections by using a flaw in the processing of SVG format content navigation. (MFSA 2015-28 / CVE-2015-0818)

Solution

Apply SAT patch number 10524.

See Also

http://www.mozilla.org/security/announce/2015/mfsa2015-28.html

http://www.mozilla.org/security/announce/2015/mfsa2015-29.html

https://bugzilla.novell.com/show_bug.cgi?id=923534

http://support.novell.com/security/cve/CVE-2015-0817.html

http://support.novell.com/security/cve/CVE-2015-0818.html

Plugin Details

Severity: High

ID: 82068

File Name: suse_11_firefox-20150323-150324.nasl

Version: 1.5

Type: local

Agent: unix

Published: 3/25/2015

Updated: 1/6/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:11:mozillafirefox-translations, cpe:/o:novell:suse_linux:11, p-cpe:/a:novell:suse_linux:11:mozillafirefox

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Patch Publication Date: 3/24/2015

Reference Information

CVE: CVE-2015-0817, CVE-2015-0818