Ubuntu 10.04 LTS / 10.10 / 11.04 / 11.10 : firefox vulnerabilities (USN-1400-1)

Ubuntu Security Notice (C) 2012-2014 Canonical, Inc. / NASL script (C) 2012-2014 Tenable Network Security, Inc.


Synopsis :

The remote Ubuntu host is missing a security-related patch.

Description :

Soroush Dalili discovered that Firefox did not adequately protect
against dropping JavaScript links onto a frame. A remote attacker
could, through cross-site scripting (XSS), exploit this to modify the
contents or steal confidential data. (CVE-2012-0455)

Atte Kettunen discovered a use-after-free vulnerability in Firefox's
handling of SVG animations. An attacker could potentially exploit this
to execute arbitrary code with the privileges of the user invoking
Firefox. (CVE-2012-0457)

Atte Kettunen discovered an out of bounds read vulnerability in
Firefox's handling of SVG Filters. An attacker could potentially
exploit this to make data from the user's memory accessible to the
page content. (CVE-2012-0456)

Mike Brooks discovered that using carriage return line feed (CRLF)
injection, one could introduce a new Content Security Policy (CSP)
rule which allows for cross-site scripting (XSS) on sites with a
separate header injection vulnerability. With cross-site scripting
vulnerabilities, if a user were tricked into viewing a specially
crafted page, a remote attacker could exploit this to modify the
contents, or steal confidential data, within the same domain.
(CVE-2012-0451)

Mariusz Mlynski discovered that the Home button accepted JavaScript
links to set the browser Home page. An attacker could use this
vulnerability to get the script URL loaded in the privileged
about:sessionrestore context. (CVE-2012-0458)

Daniel Glazman discovered that the Cascading Style Sheets (CSS)
implementation is vulnerable to crashing due to modification of a
keyframe followed by access to the cssText of the keyframe. If the
user were tricked into opening a specially crafted web page, an
attacker could exploit this to cause a denial of service via
application crash, or potentially execute code with the privileges of
the user invoking Firefox. (CVE-2012-0459)

Matt Brubeck discovered that Firefox did not properly restrict access
to the window.fullScreen object. If the user were tricked into opening
a specially crafted web page, an attacker could potentially use this
vulnerability to spoof the user interface. (CVE-2012-0460)

Bob Clary, Christian Holler, Jesse Ruderman, Michael Bebenita, David
Anderson, Jeff Walden, Vincenzo Iozzo, and Willem Pinckaers discovered
memory safety issues affecting Firefox. If the user were tricked into
opening a specially crafted page, an attacker could exploit these to
cause a denial of service via application crash, or potentially
execute code with the privileges of the user invoking Firefox.
(CVE-2012-0461, CVE-2012-0462, CVE-2012-0464).

Solution :

Update the affected firefox package.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.1
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false