This script is Copyright (C) 2012-2016 Tenable Network Security, Inc.
The remote Mandriva Linux host is missing one or more security
Security issues were identified and fixed in mozilla firefox and
Security researchers Blair Strang and Scott Bell of Security
Assessment found that when a parent window spawns and closes a child
window that uses the file open dialog, a crash can be induced in
shlwapi.dll on 32-bit Windows 7 systems. This crash may be potentially
prevent malicious sites from tricking users into performing a
cross-site scripting (XSS) attacks on themselves. Security researcher
Soroush Dalili reported a way to bypass this protection
Security researcher Atte Kettunen from OUSPG found two issues with
Firefox's handling of SVG using the Address Sanitizer tool. The first
issue, critically rated, is a use-after-free in SVG animation that
could potentially lead to arbitrary code execution. The second issue
is rated moderate and is an out of bounds read in SVG Filters. This
could potentially incorporate data from the user's memory, making it
accessible to the page content (CVE-2012-0457, CVE-2012-0456).
Security Researcher Mike Brooks of Sitewatch reported that if multiple
Content Security Policy (CSP) headers are present on a page, they have
an additive effect page policy. Using carriage return line feed (CRLF)
injection, a new CSP rule can be introduced which allows for
cross-site scripting (XSS) on sites with a separate header injection
Security researcher Mariusz Mlynski reported that an attacker able to
convince a potential victim to set a new home page by dragging a link
Once this is done the attacker's page can cause repeated crashes of
the browser, eventually getting the script URL loaded in the
privileged about:sessionrestore context (CVE-2012-0458).
Mozilla community member Daniel Glazman of Disruptive Innovations
reported a crash when accessing a keyframe's cssText after dynamic
modification. This crash may be potentially exploitable
Mozilla developer Matt Brubeck reported that window.fullScreen is
writeable by untrusted content now that the DOM fullscreen API is
enabled. Because window.fullScreen does not include
mozRequestFullscreen's security protections, it could be used for UI
spoofing. This code change makes window.fullScreen read only by
untrusted content, forcing the use of the DOM fullscreen API in normal
Mozilla developers identified and fixed several memory safety bugs in
the browser engine used in Firefox and other Mozilla-based products.
Some of these bugs showed evidence of memory corruption under certain
circumstances, and we presume that with enough effort at least some of
these could be exploited to run arbitrary code (CVE-2012-0461,
The mozilla firefox and thunderbird packages has been upgraded to the
latest respective versions which is unaffected by these security
Additionally the NSS and NSPR packages has been upgraded to the latest
versions. The OpenJDK java plugin (icedtea-web) has been upgraded to
the 1.1.5 version whish bas better support for firefox 10.x+.
Updated packages for 2010.2 is being provided, despite the Mandriva
products lifetime policy dictates otherwise.
See also :
Update the affected packages.
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 8.1
Public Exploit Available : false
Family: Mandriva Local Security Checks
Nessus Plugin ID: 58771 ()
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now