SuSE 11.1 Security Update : MozillaFirefox (SAT Patch Number 5754)

This script is Copyright (C) 2012-2015 Tenable Network Security, Inc.


Synopsis :

The remote SuSE 11 host is missing one or more security updates.

Description :

This update provides Mozilla Firefox 10, which provides many fixes,
security and feature enhancements.

For a detailed list, please have a look at

http://www.mozilla.org/en-US/firefox/10.0/releasenotes/

and

http://www.mozilla.org/de/firefox/features/

The following security issues have been fixed in this update :

- Mozilla developers identified and fixed several memory
safety bugs in the browser engine used in Firefox and
other Mozilla-based products. Some of these bugs showed
evidence of memory corruption under certain
circumstances, and we presume that with enough effort at
least some of these could be exploited to run arbitrary
code. (MFSA 2012-01 / CVE-2012-0442 / CVE-2012-0443)

- Alex Dvorov reported that an attacker could replace a
sub-frame in another domain's document by using the name
attribute of the sub-frame as a form submission target.
This can potentially allow for phishing attacks against
users and violates the HTML5 frame navigation policy.
(MFSA 2012-03 / CVE-2012-0445)

- Security researcher regenrecht reported via
TippingPoint's Zero Day Initiative that removed child
nodes of nsDOMAttribute can be accessed under certain
circumstances because of a premature notification of
AttributeChildRemoved. This use-after-free of the child
nodes could possibly allow for for remote code
execution. (MFSA 2012-04 / CVE-2011-3659)

- Mozilla security researcher moz_bug_r_a4 reported that
frame scripts bypass XPConnect security checks when
calling untrusted objects. This allows for cross-site
scripting (XSS) attacks through web pages and Firefox
extensions. The fix enables the Script Security Manager
(SSM) to force security checks on all frame scripts.
(MFSA 2012-05 / CVE-2012-0446)

- Mozilla developer Tim Abraldes reported that when
encoding images as image/vnd.microsoft.icon the
resulting data was always a fixed size, with
uninitialized memory appended as padding beyond the size
of the actual image. This is the result of
mImageBufferSize in the encoder being initialized with a
value different than the size of the source image. There
is the possibility of sensitive data from uninitialized
memory being appended to a PNG image when converted fron
an ICO format image. This sensitive data may then be
disclosed in the resulting image. ((MFSA 2012-06)
http://www.mozilla.org/security/announce/2012/mfsa2012-0
6.html], [CVE-2012-0447)

- Security researcher regenrecht reported via
TippingPoint's Zero Day Initiative the possibility of
memory corruption during the decoding of Ogg Vorbis
files. This can cause a crash during decoding and has
the potential for remote code execution. (MFSA 2012-07 /
CVE-2012-0444)

- Security researchers Nicolas Gregoire and Aki Helin
independently reported that when processing a malformed
embedded XSLT stylesheet, Firefox can crash due to a
memory corruption. While there is no evidence that this
is directly exploitable, there is a possibility of
remote code execution. (MFSA 2012-08 / CVE-2012-0449)

- magicant starmen reported that if a user chooses to
export their Firefox Sync key the 'Firefox Recovery
Key.html' file is saved with incorrect permissions,
making the file contents potentially readable by other
users on Linux and OS X systems. (MFSA 2012-09 /
CVE-2012-0450)

See also :

http://www.mozilla.org/security/announce/2012/mfsa2012-01.html
http://www.mozilla.org/security/announce/2012/mfsa2012-03.html
http://www.mozilla.org/security/announce/2012/mfsa2012-04.html
http://www.mozilla.org/security/announce/2012/mfsa2012-05.html
http://www.mozilla.org/security/announce/2012/mfsa2012-06.html
http://www.mozilla.org/security/announce/2012/mfsa2012-07.html
http://www.mozilla.org/security/announce/2012/mfsa2012-08.html
http://www.mozilla.org/security/announce/2012/mfsa2012-09.html
https://bugzilla.novell.com/show_bug.cgi?id=742826
http://support.novell.com/security/cve/CVE-2011-3659.html
http://support.novell.com/security/cve/CVE-2012-0442.html
http://support.novell.com/security/cve/CVE-2012-0443.html
http://support.novell.com/security/cve/CVE-2012-0444.html
http://support.novell.com/security/cve/CVE-2012-0445.html
http://support.novell.com/security/cve/CVE-2012-0446.html
http://support.novell.com/security/cve/CVE-2012-0447.html
http://support.novell.com/security/cve/CVE-2012-0449.html
http://support.novell.com/security/cve/CVE-2012-0450.html

Solution :

Apply SAT patch number 5754.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
Public Exploit Available : true

Family: SuSE Local Security Checks

Nessus Plugin ID: 57838 ()

Bugtraq ID:

CVE ID: CVE-2011-3659
CVE-2012-0442
CVE-2012-0443
CVE-2012-0444
CVE-2012-0445
CVE-2012-0446
CVE-2012-0447
CVE-2012-0449
CVE-2012-0450

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now