Ubuntu Security Notice (C) 2012-2016 Canonical, Inc. / NASL script (C) 2012-2016 Tenable Network Security, Inc.
The remote Ubuntu host is missing a security-related patch.
Soroush Dalili discovered that Firefox did not adequately protect
could, through cross-site scripting (XSS), exploit this to modify the
contents or steal confidential data. (CVE-2012-0455)
Atte Kettunen discovered a use-after-free vulnerability in Firefox's
handling of SVG animations. An attacker could potentially exploit this
to execute arbitrary code with the privileges of the user invoking
Atte Kettunen discovered an out of bounds read vulnerability in
Firefox's handling of SVG Filters. An attacker could potentially
exploit this to make data from the user's memory accessible to the
page content. (CVE-2012-0456)
Mike Brooks discovered that using carriage return line feed (CRLF)
injection, one could introduce a new Content Security Policy (CSP)
rule which allows for cross-site scripting (XSS) on sites with a
separate header injection vulnerability. With cross-site scripting
vulnerabilities, if a user were tricked into viewing a specially
crafted page, a remote attacker could exploit this to modify the
contents, or steal confidential data, within the same domain.
links to set the browser Home page. An attacker could use this
vulnerability to get the script URL loaded in the privileged
about:sessionrestore context. (CVE-2012-0458)
Daniel Glazman discovered that the Cascading Style Sheets (CSS)
implementation is vulnerable to crashing due to modification of a
keyframe followed by access to the cssText of the keyframe. If the
user were tricked into opening a specially crafted web page, an
attacker could exploit this to cause a denial of service via
application crash, or potentially execute code with the privileges of
the user invoking Firefox. (CVE-2012-0459)
Matt Brubeck discovered that Firefox did not properly restrict access
to the window.fullScreen object. If the user were tricked into opening
a specially crafted web page, an attacker could potentially use this
vulnerability to spoof the user interface. (CVE-2012-0460)
Bob Clary, Christian Holler, Jesse Ruderman, Michael Bebenita, David
Anderson, Jeff Walden, Vincenzo Iozzo, and Willem Pinckaers discovered
memory safety issues affecting Firefox. If the user were tricked into
opening a specially crafted page, an attacker could exploit these to
cause a denial of service via application crash, or potentially
execute code with the privileges of the user invoking Firefox.
(CVE-2012-0461, CVE-2012-0462, CVE-2012-0464).
Note that Tenable Network Security has extracted the preceding
description block directly from the Ubuntu security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.
Update the affected firefox package.
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 8.1
Public Exploit Available : false
Family: Ubuntu Local Security Checks
Nessus Plugin ID: 58383 ()
Bugtraq ID: 524565245752458524595246052463524645246552467
CVE ID: CVE-2012-0451CVE-2012-0455CVE-2012-0456CVE-2012-0457CVE-2012-0458CVE-2012-0459CVE-2012-0460CVE-2012-0461CVE-2012-0462CVE-2012-0464
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.