Ubuntu Security Notice (C) 2010-2017 Canonical, Inc. / NASL script (C) 2010-2017 Tenable Network Security, Inc.
The remote Ubuntu host is missing one or more security-related
Paul Nickerson, Jesse Ruderman, Olli Pettay, Igor Bukanov, Josh Soref,
Gary Kwong, Martijn Wargers, Siddharth Agarwal and Michal Zalewski
discovered various flaws in the browser engine. An attacker could
exploit this to crash the browser or possibly run arbitrary code as
the user invoking the program. (CVE-2010-3175, CVE-2010-3176)
Alexander Miller, Sergey Glazunov, and others discovered several flaws
browser or possibly run arbitrary code as the user invoking the
program. (CVE-2010-3179, CVE-2010-3180, CVE-2010-3183)
Robert Swiecki discovered that Firefox did not properly validate
Gopher URLs. If a user were tricked into opening a crafted file via
Eduardo Vela Nava discovered that Firefox could be made to violate the
could exploit this to steal information from another site.
Dmitri GribenkoDmitri Gribenko discovered that Firefox did not
properly setup the LD_LIBRARY_PATH environment variable. A local
attacker could exploit this to execute arbitrary code as the user
invoking the program. (CVE-2010-3182).
Note that Tenable Network Security has extracted the preceding
description block directly from the Ubuntu security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.
Update the affected packages.
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 7.7
Public Exploit Available : true
Family: Ubuntu Local Security Checks
Nessus Plugin ID: 50082 ()
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now