How to Buy
Ubuntu Security Notice (C) 2010-2016 Canonical, Inc. / NASL script (C) 2010-2016 Tenable Network Security, Inc.
The remote Ubuntu host is missing one or more security-related
Jesse Ruderman, Andreas Gal, Nils, Brian Hackett, and Igor Bukanov
discovered several memory issues in the browser engine. An attacker
could exploit these to crash the browser or possibly run arbitrary
code as the user invoking the program. (CVE-2010-3776, CVE-2010-3777,
It was discovered that Firefox did not properly verify the about:blank
location elements when it was opened via window.open(). An attacker
could exploit this to run arbitrary code with chrome privileges.
It was discovered that Firefox did not properly handle <
elements when processing a XUL tree. If a user were tricked into
opening a malicious web page, an attacker could exploit this to crash
the browser or possibly run arbitrary code as the user invoking the
Marc Schoenefeld and Christoph Diehl discovered several problems when
handling downloadable fonts. The new OTS font sanitizing library was
added to mitigate these issues. (CVE-2010-3768)
Gregory Fleischer discovered that the Java LiveConnect script could be
made to run in the wrong security context. An attacker could exploit
this to read local files and run arbitrary code as the user invoking
the program. (CVE-2010-3775)
were tricked into opening a malicious web page, an attacker could
exploit this to crash the browser or possibly run arbitrary code as
the user invoking the program. (CVE-2010-3766, CVE-2010-3767,
Michal Zalewski discovered that Firefox did not always properly handle
displaying pages from network or certificate errors. An attacker could
exploit this to spoof the location bar, such as in a phishing attack.
Yosuke Hasegawa and Masatoshi Kimura discovered that several character
encodings would have some characters converted to angle brackets. An
attacker could utilize this to perform cross-site scripting attacks.
Note that Tenable Network Security has extracted the preceding
description block directly from the Ubuntu security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.
Update the affected packages.
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 8.1
Public Exploit Available : true
Family: Ubuntu Local Security Checks
Nessus Plugin ID: 51114 ()
Bugtraq ID: 4531445322
CVE ID: CVE-2010-3766CVE-2010-3767CVE-2010-3768CVE-2010-3770CVE-2010-3771CVE-2010-3772CVE-2010-3773CVE-2010-3774CVE-2010-3775CVE-2010-3776CVE-2010-3777CVE-2010-3778
Upgrade to Nessus Professional today!
Start your free Nessus Cloud trial now!
Begin Free Trial
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.