SuSE 11.1 Security Update : Mozilla Firefox (SAT Patch Number 6007)

This script is Copyright (C) 2012-2013 Tenable Network Security, Inc.


Synopsis :

The remote SuSE 11 host is missing one or more security updates.

Description :

Mozilla Firefox was updated to 10.0.3 ESR to fix various bugs and
security issues.

The following security issues have been fixed :

- Mozilla developers identified and fixed several memory
safety bugs in the browser engine used in Firefox and
other Mozilla-based products. Some of these bugs showed
evidence of memory corruption under certain
circumstances, and we presume that with enough effort at
least some of these could be exploited to run arbitrary
code. (MFSA 2012-19)

In general these flaws cannot be exploited through email
in the Thunderbird and SeaMonkey products because
scripting is disabled, but are potentially a risk in
browser or browser-like contexts in those products.

References :

Bob Clary reported two bugs that causes crashes that
affected Firefox 3.6, Firefox ESR, and Firefox 10.
(CVE-2012-0461)

Christian Holler, Jesse Ruderman, Nils, Michael
Bebenita, Dindog, and David Anderson reported memory
safety problems and crashes that affect Firefox ESR and
Firefox 10. (CVE-2012-0462)

Jeff Walden reported a memory safety problem in the
array.join function. This bug was independently reported
by Vincenzo Iozzo via TippingPoint's Zero Day Initiative
Pwn2Own contest. (CVE-2012-0464)

Masayuki Nakano reported a memory safety problem that
affected Mobile Firefox

- CVE-2012-0463

- Mozilla developer Matt Brubeck reported that
window.fullScreen is writeable by untrusted content now
that the DOM fullscreen API is enabled. Because
window.fullScreen does not include
mozRequestFullscreen's security protections, it could be
used for UI spoofing. This code change makes
window.fullScreen read only by untrusted content,
forcing the use of the DOM fullscreen API in normal
usage. (MFSA 2012-18 / CVE-2012-0460)

Firefox 3.6 and Thunderbird 3.1 are not affected by this
vulnerability.

- Mozilla community member Daniel Glazman of Disruptive
Innovations reported a crash when accessing a keyframe's
cssText after dynamic modification. This crash may be
potentially exploitable. (MFSA 2012-17 / CVE-2012-0459)

Firefox 3.6 and Thunderbird 3.1 are not affected by this
vulnerability.

- Security researcher Mariusz Mlynski reported that an
attacker able to convince a potential victim to set a
new home page by dragging a link to the 'home' button
can set that user's home page to a javascript: URL. Once
this is done the attacker's page can cause repeated
crashes of the browser, eventually getting the script
URL loaded in the privileged about:sessionrestore
context. (MFSA 2012-16 / CVE-2012-0458)

- Security Researcher Mike Brooks of Sitewatch reported
that if multiple Content Security Policy (CSP) headers
are present on a page, they have an additive effect page
policy. Using carriage return line feed (CRLF)
injection, a new CSP rule can be introduced which allows
for cross-site scripting (XSS) on sites with a separate
header injection vulnerability. (MFSA 2012-15 /
CVE-2012-0451)

Firefox 3.6 and Thunderbird 3.1 are not affected by this
vulnerability.

- Security researcher Atte Kettunen from OUSPG found two
issues with Firefox's handling of SVG using the Address
Sanitizer tool. The first issue, critically rated, is a
use-after-free in SVG animation that could potentially
lead to arbitrary code execution. The second issue is
rated moderate and is an out of bounds read in SVG
Filters. This could potentially incorporate data from
the user's memory, making it accessible to the page
content. (MFSA 2012-14 / CVE-2012-0457 / CVE-2012-0456)

- Firefox prevents the dropping of javascript: links onto
a frame to prevent malicious sites from tricking users
into performing a cross-site scripting (XSS) attacks on
themselves. Security researcher Soroush Dalili reported
a way to bypass this protection. (MFSA 2012-13 /
CVE-2012-0455)

- Security researchers Blair Strang and Scott Bell of
Security Assessment found that when a parent window
spawns and closes a child window that uses the file open
dialog, a crash can be induced in shlwapi.dll on 32-bit
Windows 7 systems. This crash may be potentially
exploitable. (MFSA 2012-12 / CVE-2012-0454)

Firefox 3.6 and Thunderbird 3.1 are not affected by this
vulnerability.

- Reworked the KDE4 integration. (bnc#745017)

See also :

http://www.mozilla.org/security/announce/2012/mfsa2012-12.html
http://www.mozilla.org/security/announce/2012/mfsa2012-13.html
http://www.mozilla.org/security/announce/2012/mfsa2012-14.html
http://www.mozilla.org/security/announce/2012/mfsa2012-15.html
http://www.mozilla.org/security/announce/2012/mfsa2012-16.html
http://www.mozilla.org/security/announce/2012/mfsa2012-17.html
http://www.mozilla.org/security/announce/2012/mfsa2012-18.html
http://www.mozilla.org/security/announce/2012/mfsa2012-19.html
https://bugzilla.novell.com/show_bug.cgi?id=745017
https://bugzilla.novell.com/show_bug.cgi?id=750044
http://support.novell.com/security/cve/CVE-2012-0451.html
http://support.novell.com/security/cve/CVE-2012-0454.html
http://support.novell.com/security/cve/CVE-2012-0455.html
http://support.novell.com/security/cve/CVE-2012-0456.html
http://support.novell.com/security/cve/CVE-2012-0457.html
http://support.novell.com/security/cve/CVE-2012-0458.html
http://support.novell.com/security/cve/CVE-2012-0459.html
http://support.novell.com/security/cve/CVE-2012-0460.html
http://support.novell.com/security/cve/CVE-2012-0461.html
http://support.novell.com/security/cve/CVE-2012-0462.html
http://support.novell.com/security/cve/CVE-2012-0463.html
http://support.novell.com/security/cve/CVE-2012-0464.html

Solution :

Apply SAT patch number 6007.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now