Ubuntu Security Notice (C) 2008-2016 Canonical, Inc. / NASL script (C) 2008-2016 Tenable Network Security, Inc.
The remote Ubuntu host is missing one or more security-related
Various flaws were discovered in the browser engine. By tricking a
user into opening a malicious web page, an attacker could cause a
denial of service via application crash, or possibly execute arbitrary
code with the privileges of the user invoking the program.
were tricked into opening a malicious web page, an attacker could
perform cross-site scripting attacks. (CVE-2008-2800)
were tricked into opening malicious web content, an attacker may be
able to execute arbitrary code with the privileges of a different
website or link content within the JAR file to an attacker-controlled
It was discovered that Firefox would allow non-privileged XUL
documents to load chrome scripts from the fastload file. This could
A flaw was discovered in Firefox that allowed overwriting trusted
objects via mozIJSSubScriptLoader.loadSubScript(). If a user were
tricked into opening a malicious web page, an attacker could execute
arbitrary code with the privileges of the user invoking the program.
Claudio Santambrogio discovered a vulnerability in Firefox which could
lead to stealing of arbitrary files. If a user were tricked into
opening malicious content, an attacker could force the browser into
uploading local files to the remote server. (CVE-2008-2805)
Gregory Fleischer discovered a flaw in Java LiveConnect. An attacker
could exploit this to bypass the same-origin policy and create
arbitrary socket connections to other domains. (CVE-2008-2806)
Daniel Glazman found that an improperly encoded .properties file in an
add-on can result in uninitialized memory being used. If a user were
tricked into installing a malicious add-on, the browser may be able to
see data from other programs. (CVE-2008-2807)
Masahiro Yamada discovered that Firefox did not properly sanitize file
URLs in directory listings, resulting in files from directory listings
being opened in unintended ways or not being able to be opened by the
browser at all. (CVE-2008-2808)
John G. Myers discovered a weakness in the trust model used by Firefox
regarding alternate names on self-signed certificates. If a user were
tricked into accepting a certificate containing alternate name
entries, an attacker could impersonate another server. (CVE-2008-2809)
A flaw was discovered in the way Firefox opened URL files. If a user
were tricked into opening a bookmark to a malicious web page, the page
could potentially read from local files on the user's computer.
A vulnerability was discovered in the block reflow code of Firefox.
This vulnerability could be used by an attacker to cause a denial of
service via application crash, or execute arbitrary code with the
privileges of the user invoking the program. (CVE-2008-2811).
Note that Tenable Network Security has extracted the preceding
description block directly from the Ubuntu security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.
Update the affected packages.
Risk factor :
Critical / CVSS Base Score : 10.0
Public Exploit Available : true
Family: Ubuntu Local Security Checks
Nessus Plugin ID: 33436 ()
CVE ID: CVE-2008-2798CVE-2008-2799CVE-2008-2800CVE-2008-2801CVE-2008-2802CVE-2008-2803CVE-2008-2805CVE-2008-2806CVE-2008-2807CVE-2008-2808CVE-2008-2809CVE-2008-2810CVE-2008-2811
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.