Mandriva Linux Security Advisory : firefox (MDVSA-2011:139)

critical Nessus Plugin ID 56373

Synopsis

The remote Mandriva Linux host is missing one or more security updates.

Description

Security issues were identified and fixed in mozilla firefox and thunderbird :

Mozilla Firefox before 3.6.23 and 4.x through 6, Thunderbird before 7.0, and SeaMonkey before 2.4 do not prevent the starting of a download in response to the holding of the Enter key, which allows user-assisted remote attackers to bypass intended access restrictions via a crafted web site (CVE-2011-2372).

Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.23 and 4.x through 6, Thunderbird before 7.0, and SeaMonkey before 2.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors (CVE-2011-2995).

Unspecified vulnerability in the plugin API in Mozilla Firefox 3.6.x before 3.6.23 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors (CVE-2011-2996).

Integer underflow in Mozilla Firefox 3.6.x before 3.6.23 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via JavaScript code containing a large RegExp expression (CVE-2011-2998).

Mozilla Firefox before 3.6.23 and 4.x through 5, Thunderbird before 6.0, and SeaMonkey before 2.3 do not properly handle location as the name of a frame, which allows remote attackers to bypass the Same Origin Policy via a crafted web site, a different vulnerability than CVE-2010-0170 (CVE-2011-2999).

Mozilla Firefox before 3.6.23 and 4.x through 6, Thunderbird before 7.0, and SeaMonkey before 2.4 do not properly handle HTTP responses that contain multiple Location, Content-Length, or Content-Disposition headers, which makes it easier for remote attackers to conduct HTTP response splitting attacks via crafted header values (CVE-2011-3000).

Mozilla Firefox 4.x through 6, Thunderbird before 7.0, and SeaMonkey before 2.4 do not prevent manual add-on installation in response to the holding of the Enter key, which allows user-assisted remote attackers to bypass intended access restrictions via a crafted web site that triggers an unspecified internal error (CVE-2011-3001).

Integer underflow in Mozilla Firefox 3.6.x before 3.6.23 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via JavaScript code containing a large RegExp expression (CVE-2011-3867).

Packages for 2009.0 are provided as of the Extended Maintenance Program. Please visit this link to learn more:
http://store.mandriva.com/product_info.php?cPath=149 products_id=490

Additionally, some packages which require so, have been rebuilt and are being provided as updates.

Solution

Update the affected packages.

See Also

http://www.mozilla.org/security/announce/2011/mfsa2011-36.html

http://www.mozilla.org/security/announce/2011/mfsa2011-37.html

http://www.mozilla.org/security/announce/2011/mfsa2011-38.html

http://www.mozilla.org/security/announce/2011/mfsa2011-39.html

http://www.mozilla.org/security/announce/2011/mfsa2011-40.html

Plugin Details

Severity: Critical

ID: 56373

File Name: mandriva_MDVSA-2011-139.nasl

Version: 1.13

Type: local

Published: 10/3/2011

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:firefox-devel, p-cpe:/a:mandriva:linux:firefox-el, p-cpe:/a:mandriva:linux:firefox-en_gb, p-cpe:/a:mandriva:linux:firefox-eo, p-cpe:/a:mandriva:linux:firefox-es_ar, p-cpe:/a:mandriva:linux:firefox-es_es, p-cpe:/a:mandriva:linux:firefox-et, p-cpe:/a:mandriva:linux:firefox-eu, p-cpe:/a:mandriva:linux:firefox-ext-beagle, p-cpe:/a:mandriva:linux:firefox-ext-blogrovr, p-cpe:/a:mandriva:linux:firefox-ext-mozvoikko, p-cpe:/a:mandriva:linux:firefox-ext-r-kiosk, p-cpe:/a:mandriva:linux:firefox-ext-scribefire, p-cpe:/a:mandriva:linux:firefox-ext-weave-sync, p-cpe:/a:mandriva:linux:firefox-ext-xmarks, p-cpe:/a:mandriva:linux:firefox-fi, p-cpe:/a:mandriva:linux:firefox-fr, p-cpe:/a:mandriva:linux:firefox-fy, p-cpe:/a:mandriva:linux:firefox-ga_ie, p-cpe:/a:mandriva:linux:firefox-gl, p-cpe:/a:mandriva:linux:firefox-gu_in, p-cpe:/a:mandriva:linux:firefox-he, p-cpe:/a:mandriva:linux:firefox-hi, p-cpe:/a:mandriva:linux:firefox-hu, p-cpe:/a:mandriva:linux:firefox-id, p-cpe:/a:mandriva:linux:firefox-is, p-cpe:/a:mandriva:linux:firefox-it, p-cpe:/a:mandriva:linux:firefox-ja, p-cpe:/a:mandriva:linux:firefox-ka, p-cpe:/a:mandriva:linux:firefox-kn, p-cpe:/a:mandriva:linux:firefox-ko, p-cpe:/a:mandriva:linux:firefox-ku, p-cpe:/a:mandriva:linux:firefox-lt, p-cpe:/a:mandriva:linux:firefox-lv, p-cpe:/a:mandriva:linux:firefox-mk, p-cpe:/a:mandriva:linux:firefox-mr, p-cpe:/a:mandriva:linux:firefox-nb_no, p-cpe:/a:mandriva:linux:firefox-nl, p-cpe:/a:mandriva:linux:firefox-nn_no, p-cpe:/a:mandriva:linux:firefox-oc, p-cpe:/a:mandriva:linux:firefox-pa_in, p-cpe:/a:mandriva:linux:firefox-pl, p-cpe:/a:mandriva:linux:firefox-pt_br, p-cpe:/a:mandriva:linux:firefox-pt_pt, p-cpe:/a:mandriva:linux:firefox-ro, p-cpe:/a:mandriva:linux:firefox-ru, p-cpe:/a:mandriva:linux:firefox-si, p-cpe:/a:mandriva:linux:firefox-sk, p-cpe:/a:mandriva:linux:firefox-sl, p-cpe:/a:mandriva:linux:firefox-sq, p-cpe:/a:mandriva:linux:firefox-sr, p-cpe:/a:mandriva:linux:firefox-sv_se, p-cpe:/a:mandriva:linux:firefox-te, p-cpe:/a:mandriva:linux:firefox-th, p-cpe:/a:mandriva:linux:firefox-theme-kfirefox, p-cpe:/a:mandriva:linux:firefox-tr, p-cpe:/a:mandriva:linux:firefox-uk, p-cpe:/a:mandriva:linux:firefox-zh_cn, p-cpe:/a:mandriva:linux:firefox-zh_tw, p-cpe:/a:mandriva:linux:gjs, p-cpe:/a:mandriva:linux:gnome-python-extras, p-cpe:/a:mandriva:linux:gnome-python-gda, p-cpe:/a:mandriva:linux:gnome-python-gda-devel, p-cpe:/a:mandriva:linux:gnome-python-gdl, p-cpe:/a:mandriva:linux:gnome-python-gtkhtml2, p-cpe:/a:mandriva:linux:gnome-python-gtkmozembed, p-cpe:/a:mandriva:linux:gnome-python-gtkspell, p-cpe:/a:mandriva:linux:lib64devhelp-1-devel, p-cpe:/a:mandriva:linux:lib64devhelp-1_0, p-cpe:/a:mandriva:linux:lib64gjs-devel, p-cpe:/a:mandriva:linux:lib64gjs0, p-cpe:/a:mandriva:linux:lib64xrender-devel, p-cpe:/a:mandriva:linux:lib64xrender-static-devel, p-cpe:/a:mandriva:linux:lib64xrender1, p-cpe:/a:mandriva:linux:lib64xulrunner-devel, p-cpe:/a:mandriva:linux:lib64xulrunner1.9.2.23, p-cpe:/a:mandriva:linux:libdevhelp-1-devel, p-cpe:/a:mandriva:linux:libdevhelp-1_0, p-cpe:/a:mandriva:linux:libgjs-devel, p-cpe:/a:mandriva:linux:libgjs0, p-cpe:/a:mandriva:linux:libxrender-devel, p-cpe:/a:mandriva:linux:libxrender-static-devel, p-cpe:/a:mandriva:linux:libxrender1, p-cpe:/a:mandriva:linux:libxulrunner-devel, p-cpe:/a:mandriva:linux:libxulrunner1.9.2.23, p-cpe:/a:mandriva:linux:xulrunner, p-cpe:/a:mandriva:linux:yelp, cpe:/o:mandriva:linux:2009.0, cpe:/o:mandriva:linux:2010.1, p-cpe:/a:mandriva:linux:beagle, p-cpe:/a:mandriva:linux:beagle-crawl-system, p-cpe:/a:mandriva:linux:beagle-doc, p-cpe:/a:mandriva:linux:beagle-epiphany, p-cpe:/a:mandriva:linux:beagle-evolution, p-cpe:/a:mandriva:linux:beagle-gui, p-cpe:/a:mandriva:linux:beagle-gui-qt, p-cpe:/a:mandriva:linux:beagle-libs, p-cpe:/a:mandriva:linux:devhelp, p-cpe:/a:mandriva:linux:devhelp-plugins, p-cpe:/a:mandriva:linux:epiphany, p-cpe:/a:mandriva:linux:epiphany-devel, p-cpe:/a:mandriva:linux:firefox, p-cpe:/a:mandriva:linux:firefox-af, p-cpe:/a:mandriva:linux:firefox-ar, p-cpe:/a:mandriva:linux:firefox-be, p-cpe:/a:mandriva:linux:firefox-bg, p-cpe:/a:mandriva:linux:firefox-bn, p-cpe:/a:mandriva:linux:firefox-ca, p-cpe:/a:mandriva:linux:firefox-cs, p-cpe:/a:mandriva:linux:firefox-cy, p-cpe:/a:mandriva:linux:firefox-da, p-cpe:/a:mandriva:linux:firefox-de

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 10/1/2011

Reference Information

CVE: CVE-2011-2372, CVE-2011-2995, CVE-2011-2996, CVE-2011-2998, CVE-2011-2999, CVE-2011-3000, CVE-2011-3001

BID: 49809, 49837, 49845, 49848

MDVSA: 2011:139