Ubuntu 8.04 LTS / 9.04 / 9.10 / 10.04 LTS : firefox, firefox-3.0, firefox-3.5, xulrunner-1.9.1, xulrunner-1.9.2 vulnerabilities (USN-975-1)

Ubuntu Security Notice (C) 2010-2016 Canonical, Inc. / NASL script (C) 2010-2016 Tenable Network Security, Inc.


Synopsis :

The remote Ubuntu host is missing one or more security-related
patches.

Description :

Several dangling pointer vulnerabilities were discovered in Firefox.
An attacker could exploit this to crash the browser or possibly run
arbitrary code as the user invoking the program. (CVE-2010-2760,
CVE-2010-2767, CVE-2010-3167)

Blake Kaplan and Michal Zalewski discovered several weaknesses in the
XPCSafeJSObjectWrapper (SJOW) security wrapper. If a user were tricked
into viewing a malicious site, a remote attacker could use this to run
arbitrary JavaScript with chrome privileges. (CVE-2010-2762)

Matt Haggard discovered that Firefox did not honor same-origin policy
when processing the statusText property of an XMLHttpRequest object.
If a user were tricked into viewing a malicious site, a remote
attacker could use this to gather information about servers on
internal private networks. (CVE-2010-2764)

Chris Rohlf discovered an integer overflow when Firefox processed the
HTML frameset element. If a user were tricked into viewing a malicious
site, a remote attacker could use this to crash the browser or
possibly run arbitrary code as the user invoking the program.
(CVE-2010-2765)

Several issues were discovered in the browser engine. If a user were
tricked into viewing a malicious site, a remote attacker could use
this to crash the browser or possibly run arbitrary code as the user
invoking the program. (CVE-2010-2766, CVE-2010-3168)

David Huang and Collin Jackson discovered that the <object> tag could
override the charset of a framed HTML document in another origin. An
attacker could utilize this to perform cross-site scripting attacks.
(CVE-2010-2768)

Paul Stone discovered that with designMode enabled an HTML selection
containing JavaScript could be copied and pasted into a document and
have the JavaScript execute within the context of the site where the
code was dropped. An attacker could utilize this to perform cross-site
scripting attacks. (CVE-2010-2769)

A buffer overflow was discovered in Firefox when processing text runs.
If a user were tricked into viewing a malicious site, a remote
attacker could use this to crash the browser or possibly run arbitrary
code as the user invoking the program. (CVE-2010-3166)

Peter Van der Beken, Jason Oster, Jesse Ruderman, Igor Bukanov, Jeff
Walden, Gary Kwong and Olli Pettay discovered several flaws in the
browser engine. If a user were tricked into viewing a malicious site,
a remote attacker could use this to crash the browser or possibly run
arbitrary code as the user invoking the program. (CVE-2010-3169).

Note that Tenable Network Security has extracted the preceding
description block directly from the Ubuntu security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.

Solution :

Update the affected packages.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.1
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false

Ready to Scan Unlimited IPs & Run Compliance Checks?

Upgrade to Nessus Professional today!

Buy Now

Combine the Power of Nessus with the Ease of Cloud

Start your free Nessus Cloud trial now!

Begin Free Trial