SuSE 11.1 Security Update : Mozilla Firefox (SAT Patch Number 5057)

This script is Copyright (C) 2011-2014 Tenable Network Security, Inc.


Synopsis :

The remote SuSE 11 host is missing one or more security updates.

Description :

Mozilla Firefox was updated to version 3.6.20.

It fixes bugs and security issues. Following security issues were
fixed: Mozilla Foundation Security Advisory 2011-30 - MFSA 2011-30

- Miscellaneous memory safety hazards Mozilla developers
and community members identified and fixed several
memory safety bugs in the browser engine used in Firefox
3.6 and other Mozilla-based products. Some of these bugs
showed evidence of memory corruption under certain
circumstances, and we presume that with enough effort at
least some of these could be exploited to run arbitrary
code.

Gary Kwong, Igor Bukanov, Nils and Bob Clary reported
memory safety issues which affected Firefox 3.6.
(CVE-2011-2982)

- Crash in SVGTextElement.getCharNumAtPosition() Security
researcher regenrecht reported via TippingPoint's Zero
Day Initiative that a SVG text manipulation routine
contained a dangling pointer vulnerability.
(CVE-2011-0084)

- Privilege escalation using event handlers Mozilla
security researcher moz_bug_r_a_4 reported a
vulnerability in event management code that would permit
JavaScript to be run in the wrong context, including
that of a different website or potentially in a
chrome-privileged context. (CVE-2011-2981)

- Dangling pointer vulnerability in appendChild Security
researcher regenrecht reported via TippingPoint's Zero
Day Initiative that appendChild did not correctly
account for DOM objects it operated upon and could be
exploited to dereference an invalid pointer.
(CVE-2011-2378)

- Privilege escalation dropping a tab element in content
area Mozilla security researcher moz_bug_r_a4 reported
that web content could receive chrome privileges if it
registered for drop events and a browser tab element was
dropped into the content area. (CVE-2011-2984)

- Binary planting vulnerability in ThinkPadSensor::Startup
Security researcher Mitja Kolsek of Acros Security
reported that ThinkPadSensor::Startup could potentially
be exploited to load a malicious DLL into the running
process. (CVE-2011-2980) (This issue is likely Windows
only)

- Private data leakage using RegExp.input Security
researcher shutdown reported that data from other
domains could be read when RegExp.input was set.
(CVE-2011-2983)

See also :

http://www.mozilla.org/security/announce/2011/mfsa2011-30.html
https://bugzilla.novell.com/show_bug.cgi?id=712224
http://support.novell.com/security/cve/CVE-2011-0084.html
http://support.novell.com/security/cve/CVE-2011-2378.html
http://support.novell.com/security/cve/CVE-2011-2980.html
http://support.novell.com/security/cve/CVE-2011-2981.html
http://support.novell.com/security/cve/CVE-2011-2982.html
http://support.novell.com/security/cve/CVE-2011-2983.html
http://support.novell.com/security/cve/CVE-2011-2984.html

Solution :

Apply SAT patch number 5057.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
Public Exploit Available : true

Family: SuSE Local Security Checks

Nessus Plugin ID: 56003 ()

Bugtraq ID:

CVE ID: CVE-2011-0084
CVE-2011-2378
CVE-2011-2980
CVE-2011-2981
CVE-2011-2982
CVE-2011-2983
CVE-2011-2984

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now