Scientific Linux Security Update : spice-xpi on SL5.x i386/x86_64

This script is Copyright (C) 2012 Tenable Network Security, Inc.


Synopsis :

The remote Scientific Linux host is missing a security update.

Description :

The spice-xpi package provides a plug-in that allows the SPICE client
to run from within Mozilla Firefox.

A race condition was found in the way the SPICE Firefox plug-in and
the SPICE client communicated. A local attacker could use this flaw to
trick the plug-in and the SPICE client into communicating over an
attacker-controlled socket, possibly gaining access to authentication
details, or resulting in a man-in-the-middle attack on the SPICE
connection. (CVE-2010-2792)

It was found that the SPICE Firefox plug-in used a predictable name
for its log file. A local attacker could use this flaw to conduct a
symbolic link attack, allowing them to overwrite arbitrary files
accessible to the user running Firefox. (CVE-2010-2794)

This update also fixes the following bugs :

- a bug prevented users of Red Hat Enterprise Linux 5.5,
with all updates applied, from running the SPICE Firefox
plug-in when using Firefox 3.6.4. With this update, the
plug-in works correctly with Firefox 3.6.4 and the
latest version in Red Hat Enterprise Linux 5.5, Firefox
3.6.7. (BZ#618244)

- unused code has been removed during source code
refactoring. This also resolves a bug in the SPICE
Firefox plug-in that caused it to close random file
descriptors. (BZ#594006, BZ#619067)

Note: This update should be installed together with the qspice-client
security update.

After installing the update, Firefox must be restarted for the changes
to take effect.

See also :

http://www.nessus.org/u?7e0e143f
https://bugzilla.redhat.com/show_bug.cgi?id=594006
https://bugzilla.redhat.com/show_bug.cgi?id=618244
https://bugzilla.redhat.com/show_bug.cgi?id=619067

Solution :

Update the affected spice-xpi package.

Risk factor :

Low / CVSS Base Score : 3.3
(CVSS2#AV:L/AC:M/Au:N/C:P/I:P/A:N)

Family: Scientific Linux Local Security Checks

Nessus Plugin ID: 60845 ()

Bugtraq ID:

CVE ID: CVE-2010-2792
CVE-2010-2794