Ubuntu 8.04 LTS / 9.04 / 9.10 / 10.04 LTS / 10.10 : firefox, firefox-3.0, firefox-3.5, xulrunner-1.9.1, xulrunner-1.9.2 vulnerabilities (USN-997-1)

Ubuntu Security Notice (C) 2010-2014 Canonical, Inc. / NASL script (C) 2010-2014 Tenable Network Security, Inc.


Synopsis :

The remote Ubuntu host is missing one or more security-related patches.

Description :

Paul Nickerson, Jesse Ruderman, Olli Pettay, Igor Bukanov, Josh Soref,
Gary Kwong, Martijn Wargers, Siddharth Agarwal and Michal Zalewski
discovered various flaws in the browser engine. An attacker could
exploit this to crash the browser or possibly run arbitrary code as
the user invoking the program. (CVE-2010-3175, CVE-2010-3176)

Alexander Miller, Sergey Glazunov, and others discovered several flaws
in the JavaScript engine. An attacker could exploit this to crash the
browser or possibly run arbitrary code as the user invoking the
program. (CVE-2010-3179, CVE-2010-3180, CVE-2010-3183)

Robert Swiecki discovered that Firefox did not properly validate
Gopher URLs. If a user were tricked into opening a crafted file via
Gopher, an attacker could possibly run arbitrary JavaScript.
(CVE-2010-3177)

Eduardo Vela Nava discovered that Firefox could be made to violate the
same-origin policy by using modal calls with JavaScript. An attacker
could exploit this to steal information from another site.
(CVE-2010-3178)

Dmitri GribenkoDmitri Gribenko discovered that Firefox did not
properly setup the LD_LIBRARY_PATH environment variable. A local
attacker could exploit this to execute arbitrary code as the user
invoking the program. (CVE-2010-3182).

Solution :

Update the affected packages.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.1
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false