SUSE SLED12 / SLES12 Security Update : MozillaFirefox (SUSE-SU-2017:2589-1)

This script is Copyright (C) 2017 Tenable Network Security, Inc.

Synopsis :

The remote SUSE host is missing one or more security updates.

Description :

This update for MozillaFirefox to ESR 52.3 fixes several issues. These
security issues were fixed :

- CVE-2017-7807 Domain hijacking through AppCache fallback

- CVE-2017-7791 Spoofing following page navigation with
data: protocol and modal alerts (bsc#1052829)

- CVE-2017-7792 Buffer overflow viewing certificates with
an extremely long OID (bsc#1052829)

- CVE-2017-7782 WindowsDllDetourPatcher allocates memory
without DEP protections (bsc#1052829)

- CVE-2017-7787 Same-origin policy bypass with iframes
through page reloads (bsc#1052829)

- CVE-2017-7786 Buffer overflow while painting
non-displayable SVG (bsc#1052829)

- CVE-2017-7785 Buffer overflow manipulating ARIA
attributes in DOM (bsc#1052829)

- CVE-2017-7784 Use-after-free with image observers

- CVE-2017-7753 Out-of-bounds read with cached style data
and pseudo-elements (bsc#1052829)

- CVE-2017-7798 XUL injection in the style editor in
devtools (bsc#1052829)

- CVE-2017-7804 Memory protection bypass through
WindowsDllDetourPatcher (bsc#1052829)

- CVE-2017-7779 Memory safety bugs fixed in Firefox 55 and
Firefox ESR 52.3 (bsc#1052829)

- CVE-2017-7800 Use-after-free in WebSockets during
disconnection (bsc#1052829)

- CVE-2017-7801 Use-after-free with marquee during window
resizing (bsc#1052829)

- CVE-2017-7802 Use-after-free resizing image elements

- CVE-2017-7803 CSP containing 'sandbox' improperly
applied (bsc#1052829)

Note that Tenable Network Security has extracted the preceding
description block directly from the SUSE security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.

See also :

Solution :

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product :

SUSE OpenStack Cloud 6:zypper in -t patch

SUSE Linux Enterprise Software Development Kit 12-SP3:zypper in -t
patch SUSE-SLE-SDK-12-SP3-2017-1603=1

SUSE Linux Enterprise Software Development Kit 12-SP2:zypper in -t
patch SUSE-SLE-SDK-12-SP2-2017-1603=1

SUSE Linux Enterprise Server for SAP 12-SP1:zypper in -t patch

SUSE Linux Enterprise Server for Raspberry Pi 12-SP2:zypper in -t
patch SUSE-SLE-RPI-12-SP2-2017-1603=1

SUSE Linux Enterprise Server 12-SP3:zypper in -t patch

SUSE Linux Enterprise Server 12-SP2:zypper in -t patch

SUSE Linux Enterprise Server 12-SP1-LTSS:zypper in -t patch

SUSE Linux Enterprise Server 12-LTSS:zypper in -t patch

SUSE Linux Enterprise Desktop 12-SP3:zypper in -t patch

SUSE Linux Enterprise Desktop 12-SP2:zypper in -t patch

To bring your system up-to-date, use 'zypper patch'.

Risk factor :

High / CVSS Base Score : 9.3
CVSS Temporal Score : 6.9
Public Exploit Available : false

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now