SuSE 10 Security Update : MozillaFirefox (ZYPP Patch Number 5644)

This script is Copyright (C) 2008-2016 Tenable Network Security, Inc.


Synopsis :

The remote SuSE 10 host is missing a security-related patch.

Description :

This update brings MozillaFirefox to version 2.0.0.17 to fix bugs and
security issues :

- XBM image uninitialized memory reading. (MFSA 2008-45 /
CVE-2008-4069)

- resource: traversal vulnerabilities. (MFSA 2008-44 /
CVE-2008-4067 / CVE-2008-4068)

- BOM characters stripped from JavaScript before execution
CVE-2008-4065: Stripped BOM characters bug
CVE-2008-4066: HTML escaped low surrogates bug. (MFSA
2008-43)

- Crashes with evidence of memory corruption
(rv:1.9.0.2/1.8.1.17): CVE-2008-4061: Jesse Ruderman
reported a crash in the layout engine. CVE-2008-4062:
Igor Bukanov, Philip Taylor, Georgi Guninski, and
Antoine Labour reported crashes in the JavaScript
engine. CVE-2008-4063: Jesse Ruderman, Bob Clary, and
Martijn Wargers reported crashes in the layout engine
which only affected Firefox 3. CVE-2008-4064: David
Maciejak and Drew Yao reported crashes in graphics
rendering which only affected Firefox 3. (MFSA 2008-42)

- Privilege escalation via XPCnativeWrapper pollution
CVE-2008-4058: XPCnativeWrapper pollution bugs
CVE-2008-4059: XPCnativeWrapper pollution (Firefox 2)
CVE-2008-4060: Documents without script handling
objects. (MFSA 2008-41)

- Forced mouse drag. (MFSA 2008-40 / CVE-2008-3837)

- Privilege escalation using feed preview page and XSS
flaw. (MFSA 2008-39 / CVE-2008-3836)

- nsXMLDocument::OnChannelRedirect() same-origin
violation. (MFSA 2008-38 / CVE-2008-3835)

- UTF-8 URL stack buffer overflow. (MFSA 2008-37 /
CVE-2008-0016)

For more details:
http://www.mozilla.org/security/known-vulnerabilities/firefo x20.html

See also :

http://www.mozilla.org/security/announce/2008/mfsa2008-37.html
http://www.mozilla.org/security/announce/2008/mfsa2008-38.html
http://www.mozilla.org/security/announce/2008/mfsa2008-39.html
http://www.mozilla.org/security/announce/2008/mfsa2008-40.html
http://www.mozilla.org/security/announce/2008/mfsa2008-41.html
http://www.mozilla.org/security/announce/2008/mfsa2008-42.html
http://www.mozilla.org/security/announce/2008/mfsa2008-43.html
http://www.mozilla.org/security/announce/2008/mfsa2008-44.html
http://www.mozilla.org/security/announce/2008/mfsa2008-45.html
http://support.novell.com/security/cve/CVE-2008-0016.html
http://support.novell.com/security/cve/CVE-2008-3835.html
http://support.novell.com/security/cve/CVE-2008-3836.html
http://support.novell.com/security/cve/CVE-2008-3837.html
http://support.novell.com/security/cve/CVE-2008-4058.html
http://support.novell.com/security/cve/CVE-2008-4059.html
http://support.novell.com/security/cve/CVE-2008-4060.html
http://support.novell.com/security/cve/CVE-2008-4061.html
http://support.novell.com/security/cve/CVE-2008-4062.html
http://support.novell.com/security/cve/CVE-2008-4063.html
http://support.novell.com/security/cve/CVE-2008-4064.html
http://support.novell.com/security/cve/CVE-2008-4065.html
http://support.novell.com/security/cve/CVE-2008-4066.html
http://support.novell.com/security/cve/CVE-2008-4067.html
http://support.novell.com/security/cve/CVE-2008-4068.html
http://support.novell.com/security/cve/CVE-2008-4069.html

Solution :

Apply ZYPP patch number 5644.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
Public Exploit Available : true

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now