Fedora 8 : Miro-1.2.7-2.fc8 / blam-1.8.3-19.fc8 / cairo-dock-1.6.3.1-1.fc8.1 / chmsee-1.0.0-5.31.fc8 / etc (2008-9667)

This script is Copyright (C) 2008-2016 Tenable Network Security, Inc.


Synopsis :

The remote Fedora host is missing one or more security updates.

Description :

Updated firefox and xulrunner packages that fix various security
issues are now available for Fedora Core 8. This update has been rated
as having critical security impact by the Fedora Security Response
Team. Mozilla Firefox is an open source Web browser. Several flaws
were found in the processing of malformed web content. A web page
containing malicious content could cause Firefox to crash or,
potentially, execute arbitrary code as the user running Firefox.
(CVE-2008-0017, CVE-2008-5014, CVE-2008-5016, CVE-2008-5017,
CVE-2008-5018, CVE-2008-5019, CVE-2008-5021) Several flaws were found
in the way malformed content was processed. A website containing
specially crafted content could potentially trick a Firefox user into
surrendering sensitive information. (CVE-2008-5022, CVE-2008-5023,
CVE-2008-5024) A flaw was found in the way Firefox opened 'file:'
URIs. If a file: URI was loaded in the same tab as a chrome or
privileged 'about:' page, the file: URI could execute arbitrary code
with the permissions of the user running Firefox. (CVE-2008-5015) For
technical details regarding these flaws, please see the Mozilla
security advisories for Firefox 2.0.0.18[1]. All firefox users and
users of packages depending on firefox[2] should upgrade to these
updated packages, which correct these issues. [1]
http://www.mozilla.org/security/known-
vulnerabilities/firefox20.html#firefox2.0.0.18 [2] blam cairo-dock
chmsee devhelp epiphany epiphany-extensions evolution-rss galeon
gnome-python2-extras gnome-web-photo kazehakase liferea Miro openvrml
ruby-gnome2 yelp Provides Python bindings for libgdl on PPC64.

Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.

See also :

http://www.mozilla.org/security/known-
https://bugzilla.redhat.com/show_bug.cgi?id=470864
https://bugzilla.redhat.com/show_bug.cgi?id=470867
https://bugzilla.redhat.com/show_bug.cgi?id=470873
https://bugzilla.redhat.com/show_bug.cgi?id=470881
https://bugzilla.redhat.com/show_bug.cgi?id=470883
https://bugzilla.redhat.com/show_bug.cgi?id=470884
https://bugzilla.redhat.com/show_bug.cgi?id=470889
https://bugzilla.redhat.com/show_bug.cgi?id=470892
https://bugzilla.redhat.com/show_bug.cgi?id=470894
https://bugzilla.redhat.com/show_bug.cgi?id=470895
https://bugzilla.redhat.com/show_bug.cgi?id=470898
https://bugzilla.redhat.com/show_bug.cgi?id=470902
https://bugzilla.redhat.com/show_bug.cgi?id=470903
http://www.nessus.org/u?b6db5d30
http://www.nessus.org/u?600d585c
http://www.nessus.org/u?fb0cedcf
http://www.nessus.org/u?a3c058f8
http://www.nessus.org/u?560b7225
http://www.nessus.org/u?fe591968
http://www.nessus.org/u?08b920c6
http://www.nessus.org/u?99c0fa87
http://www.nessus.org/u?397ca14f
http://www.nessus.org/u?3b7d4200
http://www.nessus.org/u?bdf6f7b1
http://www.nessus.org/u?198521cc
http://www.nessus.org/u?2c57566b
http://www.nessus.org/u?c66e2091
http://www.nessus.org/u?17fdc2f6
http://www.nessus.org/u?8ff66be1
http://www.nessus.org/u?ec2d94d0
http://www.nessus.org/u?b2392f2c

Solution :

Update the affected packages.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now