SuSE 11.3 Security Update : Mozilla Firefox (SAT Patch Number 8657)

This script is Copyright (C) 2013 Tenable Network Security, Inc.


Synopsis :

The remote SuSE 11 host is missing one or more security updates.

Description :

Mozilla Firefox has been updated to the 24.2.0 ESR security release.

This is a major upgrade from the 17 ESR release branch.

Security issues fixed :

- Application Installation doorhanger persists on
navigation. (MFSA 2013-105). (CVE-2013-5611)

- Miscellaneous memory safety hazards (rv:24.2). (MFSA
2013-104). (CVE-2013-5609)

- Miscellaneous memory safety hazards (rv:26.0). (MFSA
2013-104). (CVE-2013-5610)

- Character encoding cross-origin XSS attack. (MFSA
2013-106). (CVE-2013-5612)

- Sandbox restrictions not applied to nested object
elements. (MFSA 2013-107). (CVE-2013-5614)

- Use-after-free in event listeners. (MFSA 2013-108).
(CVE-2013-5616)

- Potential overflow in JavaScript binary search
algorithms. (MFSA 2013-110). (CVE-2013-5619)

- Segmentation violation when replacing ordered list
elements. (MFSA 2013-111). (CVE-2013-6671)

- Trust settings for built-in roots ignored during EV
certificate validation. (MFSA 2013-113). (CVE-2013-6673)

- Use-after-free in synthetic mouse movement. (MFSA
2013-114). (CVE-2013-5613)

- GetElementIC typed array stubs can be generated outside
observed typesets. (MFSA 2013-115). (CVE-2013-5615)

- Linux clipboard information disclosure though selection
paste. (MFSA 2013-112). (CVE-2013-6672)

- Use-after-free during Table Editing (MFSA 2013-109).
(CVE-2013-5618)

See also :

http://www.mozilla.org/security/announce/2013/mfsa2013-105.html
http://www.mozilla.org/security/announce/2013/mfsa2013-107.html
http://www.mozilla.org/security/announce/2013/mfsa2013-108.html
http://www.mozilla.org/security/announce/2013/mfsa2013-109.html
http://www.mozilla.org/security/announce/2013/mfsa2013-110.html
http://www.mozilla.org/security/announce/2013/mfsa2013-111.html
http://www.mozilla.org/security/announce/2013/mfsa2013-112.html
http://www.mozilla.org/security/announce/2013/mfsa2013-113.html
http://www.mozilla.org/security/announce/2013/mfsa2013-115.html
https://bugzilla.novell.com/show_bug.cgi?id=854367
https://bugzilla.novell.com/show_bug.cgi?id=854370
http://support.novell.com/security/cve/CVE-2013-5609.html
http://support.novell.com/security/cve/CVE-2013-5610.html
http://support.novell.com/security/cve/CVE-2013-5611.html
http://support.novell.com/security/cve/CVE-2013-5612.html
http://support.novell.com/security/cve/CVE-2013-5613.html
http://support.novell.com/security/cve/CVE-2013-5614.html
http://support.novell.com/security/cve/CVE-2013-5615.html
http://support.novell.com/security/cve/CVE-2013-5616.html
http://support.novell.com/security/cve/CVE-2013-5618.html
http://support.novell.com/security/cve/CVE-2013-5619.html
http://support.novell.com/security/cve/CVE-2013-6671.html
http://support.novell.com/security/cve/CVE-2013-6672.html
http://support.novell.com/security/cve/CVE-2013-6673.html

Solution :

Apply SAT patch number 8657.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now