Ubuntu 8.04 LTS / 8.10 : firefox-3.0, xulrunner-1.9 vulnerabilities (USN-690-1)

Ubuntu Security Notice (C) 2008-2014 Canonical, Inc. / NASL script (C) 2009-2014 Tenable Network Security, Inc.


Synopsis :

The remote Ubuntu host is missing one or more security-related patches.

Description :

Several flaws were discovered in the browser engine. These problems
could allow an attacker to crash the browser and possibly execute
arbitrary code with user privileges. (CVE-2008-5500, CVE-2008-5501,
CVE-2008-5502)

It was discovered that Firefox did not properly handle persistent
cookie data. If a user were tricked into opening a malicious website,
an attacker could write persistent data in the user's browser and
track the user across browsing sessions. (CVE-2008-5505)

Marius Schilder discovered that Firefox did not properly handle
redirects to an outside domain when an XMLHttpRequest was made to a
same-origin resource. It's possible that sensitive information could
be revealed in the XMLHttpRequest response. (CVE-2008-5506)

Chris Evans discovered that Firefox did not properly protect a user's
data when accessing a same-domain JavaScript URL that is redirected to
an unparsable JavaScript off-site resource. If a user were tricked
into opening a malicious website, an attacker may be able to steal a
limited amount of private data. (CVE-2008-5507)

Chip Salzenberg, Justin Schuh, Tom Cross, and Peter William discovered
Firefox did not properly parse URLs when processing certain control
characters. (CVE-2008-5508)

Kojima Hajime discovered that Firefox did not properly handle an
escaped null character. An attacker may be able to exploit this flaw
to bypass script sanitization. (CVE-2008-5510)

Several flaws were discovered in the JavaScript engine. If a user were
tricked into opening a malicious website, an attacker could exploit
this to execute arbitrary JavaScript code within the context of
another website or with chrome privileges. (CVE-2008-5511,
CVE-2008-5512)

Flaws were discovered in the session-restore feature of Firefox. If a
user were tricked into opening a malicious website, an attacker could
exploit this to perform cross-site scripting attacks or execute
arbitrary JavaScript code with chrome privileges. (CVE-2008-5513).

Solution :

Update the affected packages.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)