Fedora 8 : Miro-1.2.3-2.fc8 / blam-1.8.3-16.fc8 / chmsee-1.0.0-2.31.fc8 / devhelp-0.16.1-8.fc8 / etc (2008-6127)

This script is Copyright (C) 2008-2016 Tenable Network Security, Inc.


Synopsis :

The remote Fedora host is missing one or more security updates.

Description :

Updated firefox packages that fix several security issues are now
available for Fedora 8. This update has been rated as having critical
security impact by the Fedora Security Response Team. Multiple flaws
were found in the processing of malformed JavaScript content. A web
page containing such malicious content could cause Firefox to crash
or, potentially, execute arbitrary code as the user running Firefox.
(CVE-2008-2801, CVE-2008-2802, CVE-2008-2803) Several flaws were found
in the processing of malformed web content. A web page containing
malicious content could cause Firefox to crash or, potentially,
execute arbitrary code as the user running Firefox. (CVE-2008-2798,
CVE-2008-2799, CVE-2008-2811) Several flaws were found in the way
malformed web content was displayed. A web page containing specially
crafted content could potentially trick a Firefox user into
surrendering sensitive information. (CVE-2008-2800) Two local file
disclosure flaws were found in Firefox. A web page containing
malicious content could cause Firefox to reveal the contents of a
local file to a remote attacker. (CVE-2008-2805, CVE-2008-2810) A flaw
was found in the way a malformed .properties file was processed by
Firefox. A malicious extension could read uninitialized memory,
possibly leaking sensitive data to the extension. (CVE-2008-2807) A
flaw was found in the way Firefox escaped a listing of local file
names. If a user could be tricked into listing a local directory
containing malicious file names, arbitrary JavaScript could be run
with the permissions of the user running Firefox. (CVE-2008-2808) A
flaw was found in the way Firefox displayed information about
self-signed certificates. It was possible for a self-signed
certificate to contain multiple alternate name entries, which were not
all displayed to the user, allowing them to mistakenly extend trust to
an unknown site. (CVE-2008-2809) Updated packages update Mozilla
Firefox to upstream version 2.0.0.15 to address these flaws:
http://www.mozilla.org/projects/security/known-
vulnerabilities.html#firefox2.0.0.15 This update also contains blam,
chmsee, devhelp, epiphany, epiphany-extensions, galeon,
gnome-python2-extras, gnome-web- photo, gtkmozembedmm, kazehakase,
liferea, Miro, openvrml, ruby-gnome2 and yelp packages rebuilt against
new Firefox / Gecko libraries.

Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.

See also :

http://www.mozilla.org/projects/security/known-
https://bugzilla.redhat.com/show_bug.cgi?id=452597
https://bugzilla.redhat.com/show_bug.cgi?id=452598
https://bugzilla.redhat.com/show_bug.cgi?id=452599
https://bugzilla.redhat.com/show_bug.cgi?id=452600
https://bugzilla.redhat.com/show_bug.cgi?id=452602
https://bugzilla.redhat.com/show_bug.cgi?id=452604
https://bugzilla.redhat.com/show_bug.cgi?id=452605
https://bugzilla.redhat.com/show_bug.cgi?id=452709
https://bugzilla.redhat.com/show_bug.cgi?id=452710
https://bugzilla.redhat.com/show_bug.cgi?id=452711
https://bugzilla.redhat.com/show_bug.cgi?id=452712
https://bugzilla.redhat.com/show_bug.cgi?id=453007
http://www.nessus.org/u?d2460e57
http://www.nessus.org/u?d3b4c17f
http://www.nessus.org/u?3ff5cbb0
http://www.nessus.org/u?4d06816c
http://www.nessus.org/u?e60763df
http://www.nessus.org/u?fa203d27
http://www.nessus.org/u?18c78a76
http://www.nessus.org/u?624121d5
http://www.nessus.org/u?8769e8c5
http://www.nessus.org/u?379c4555
http://www.nessus.org/u?168014e0
http://www.nessus.org/u?7feff463
http://www.nessus.org/u?3e44ead7
http://www.nessus.org/u?f0dc44e2
http://www.nessus.org/u?4ee7d0be
http://www.nessus.org/u?2a6fefa4

Solution :

Update the affected packages.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.7
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: Fedora Local Security Checks

Nessus Plugin ID: 33416 (fedora_2008-6127.nasl)

Bugtraq ID: 30038

CVE ID: CVE-2008-2798
CVE-2008-2799
CVE-2008-2800
CVE-2008-2801
CVE-2008-2802
CVE-2008-2803
CVE-2008-2805
CVE-2008-2807
CVE-2008-2808
CVE-2008-2809
CVE-2008-2810
CVE-2008-2811

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now