SuSE 10 Security Update : Mozilla Firefox (ZYPP Patch Number 7083)

This script is Copyright (C) 2010-2012 Tenable Network Security, Inc.


Synopsis :

The remote SuSE 10 host is missing a security-related patch.

Description :

Mozilla Firefox has been updated to version 3.5.10, fixing various
bugs and security issues.

- Security researcher Amit Klein reported that it was
possible to reverse engineer the value used to seed
Math.random(). Since the pseudo-random number generator
was only seeded once per browsing session, this seed
value could be used as a unique token to identify and
track users across different web sites. (MFSA 2010-33/
CVE-2008-5913)

- Security researcher Ilja van Sprundel of IOActive
reported that the Content-Disposition: attachment HTTP
header was ignored when `Content-Type: multipart` was
also present. This issue could potentially lead to XSS
problems in sites that allow users to upload arbitrary
files and specify a content type but rely on
Content-Disposition: attachment to prevent the content
from being displayed inline. (MFSA 2010-32/
CVE-2010-1197)

- Google security researcher Michal Zalewski reported that
focus() could be used to change a user's cursor focus
while they are typing, potentially directing their
keyboard input to an unintended location. This behaviour
was also present across origins when content from one
domain was embedded within another via an iframe. A
malicious web page could use this behaviour to steal
keystrokes from a victim while they were typing
sensitive information such as a password. (MFSA 2010-31/
CVE-2010-1125)

- Security researcher Martin Barbella reported via
TippingPoint's Zero Day Initiative that an XSLT node
sorting routine contained an integer overflow
vulnerability. In cases where one of the nodes to be
sorted contained a very large text value, the integer
used to allocate a memory buffer to store its value
would overflow, resulting in too small a buffer being
created. An attacker could use this vulnerability to
write data past the end of the buffer, causing the
browser to crash and potentially running arbitrary code
on a victim's computer. (MFSA 2010-30/ CVE-2010-1199)

- Security researcher Nils of MWR InfoSecurity reported
that the routine for setting the text value for certain
types of DOM nodes contained an integer overflow
vulnerability. When a very long string was passed to
this routine, the integer value used in creating a new
memory buffer to hold the string would overflow,
resulting in too small a buffer being allocated. An
attacker could use this vulnerability to write data past
the end of the buffer, causing a crash and potentially
running arbitrary code on a victim's computer. . (MFSA
2010-29/ CVE-2010-1196)

- Microsoft Vulnerability Research reported that two
plugin instances could interact in a way in which one
plugin gets a reference to an object owned by a second
plugin and continues to hold that reference after the
second plugin is unloaded and its object is destroyed.
In these cases, the first plugin would contain a pointer
to freed memory which, if accessed, could be used by an
attacker to execute arbitrary code on a victim's
computer. (MFSA 2010-28/ CVE-2010-1198)

- Security researcher Wushi of Team509 reported that the
frame construction process for certain types of menus
could result in a menu containing a pointer to a
previously freed menu item. During the cycle collection
process, this freed item could be accessed, resulting in
the execution of a section of code potentially
controlled by an attacker. (MFSA 2010-27/ CVE-2010-0183)

- Mozilla developers identified and fixed several
stability bugs in the browser engine used in Firefox and
other Mozilla-based products. Some of these crashes
showed evidence of memory corruption under certain
circumstances, and we presume that with enough effort at
least some of these could be exploited to run arbitrary
code. (MFSA 2010-26/ CVE-2010-1200 / CVE-2010-1201 /
CVE-2010-1202 / CVE-2010-1203)

- A memory corruption flaw leading to code execution was
reported by security researcher Nils of MWR InfoSecurity
during the 2010 Pwn2Own contest sponsored by
TippingPoint's Zero Day Initiative. By moving DOM nodes
between documents, Nils found a case where the moved
node incorrectly retained its old scope. If garbage
collection could be triggered at the right time then
Firefox would later use this freed object. The exploit
only affects Firefox 3.6 and not earlier versions.
Updated (June 22, 2010): Firefox 3.5, SeaMonkey 2.0, and
Thunderbird 3.0 based on earlier versions of the browser
engine were patched just in case there is an alternate
way of triggering the underlying flaw. (MFSA 2010-25/
CVE-2010-1121)

See also :

http://www.mozilla.org/security/announce/2010/mfsa2010-25.html
http://www.mozilla.org/security/announce/2010/mfsa2010-26.html
http://www.mozilla.org/security/announce/2010/mfsa2010-27.html
http://www.mozilla.org/security/announce/2010/mfsa2010-28.html
http://www.mozilla.org/security/announce/2010/mfsa2010-29.html
http://www.mozilla.org/security/announce/2010/mfsa2010-30.html
http://www.mozilla.org/security/announce/2010/mfsa2010-32.html
http://www.mozilla.org/security/announce/2010/mfsa2010-33.html
http://support.novell.com/security/cve/CVE-2008-5913.html
http://support.novell.com/security/cve/CVE-2010-0183.html
http://support.novell.com/security/cve/CVE-2010-1121.html
http://support.novell.com/security/cve/CVE-2010-1125.html
http://support.novell.com/security/cve/CVE-2010-1196.html
http://support.novell.com/security/cve/CVE-2010-1197.html
http://support.novell.com/security/cve/CVE-2010-1198.html
http://support.novell.com/security/cve/CVE-2010-1199.html
http://support.novell.com/security/cve/CVE-2010-1200.html
http://support.novell.com/security/cve/CVE-2010-1201.html
http://support.novell.com/security/cve/CVE-2010-1202.html
http://support.novell.com/security/cve/CVE-2010-1203.html

Solution :

Apply ZYPP patch number 7083.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now