Ubuntu Security Notice (C) 2013-2016 Canonical, Inc. / NASL script (C) 2013-2016 Tenable Network Security, Inc.
The remote Ubuntu host is missing a security-related patch.
Olli Pettay, Jesse Ruderman, Boris Zbarsky, Christian Holler, Milan
Sreckovic, Joe Drew, Andrew McCreight, Randell Jesup, Gary Kwong and
Mats Palmgren discovered multiple memory safety issues affecting
Firefox. If the user were tricked into opening a specially crafted
page, an attacker could possibly exploit these to cause a denial of
service via application crash, or potentially execute code with the
privileges of the user invoking Firefox. (CVE-2013-0788,
Ambroz Bizjak discovered an out-of-bounds array read in the
CERT_DecodeCertPackage function of the Network Security Services (NSS)
libary when decoding certain certificates. An attacker could
potentially exploit this to cause a denial of service via application
Tobias Schula discovered an information leak in Firefox when the
gfx.color_management.enablev4 preference is enabled. If the user were
tricked into opening a specially crafted image, an attacker could
potentially exploit this to steal confidential data. By default, the
gfx.color_management.enablev4 preference is not enabled in Ubuntu.
Mariusz Mlynski discovered that timed history navigations could be
used to load arbitrary websites with the wrong URL displayed in the
addressbar. An attacker could exploit this to conduct cross-site
scripting (XSS) or phishing attacks. (CVE-2013-0793)
It was discovered that the origin indication on tab-modal dialog boxes
could be removed, which could allow an attacker's dialog to be
displayed over another sites content. An attacker could exploit this
to conduct phishing attacks. (CVE-2013-0794)
Cody Crews discovered that the cloneNode method could be used to
bypass System Only Wrappers (SOW) to clone a protected node and bypass
same-origin policy checks. An attacker could potentially exploit this
to steal confidential data or execute code with the privileges of the
user invoking Firefox. (CVE-2013-0795)
A crash in WebGL rendering was discovered in Firefox. An attacker
could potentially exploit this to execute code with the privileges of
the user invoking Firefox. This issue only affects users with Intel
graphics drivers. (CVE-2013-0796)
Abhishek Arya discovered an out-of-bounds write in the Cairo graphics
library. An attacker could potentially exploit this to execute code
with the privileges of the user invoking Firefox. (CVE-2013-0800).
Note that Tenable Network Security has extracted the preceding
description block directly from the Ubuntu security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.
Update the affected firefox package.
Risk factor :
Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 8.7
Public Exploit Available : false
Family: Ubuntu Local Security Checks
Nessus Plugin ID: 65816 ()
Bugtraq ID: 588195882158825588265882858831588355883658837
CVE ID: CVE-2013-0788CVE-2013-0789CVE-2013-0791CVE-2013-0792CVE-2013-0793CVE-2013-0794CVE-2013-0795CVE-2013-0796CVE-2013-0800
Upgrade to Nessus Professional today!
Start your free Nessus Cloud trial now!
Begin Free Trial
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.