openSUSE Security Update : MozillaFirefox (MozillaFirefox-5750)

This script is Copyright (C) 2014-2015 Tenable Network Security, Inc.


Synopsis :

The remote openSUSE host is missing a security update.

Description :

Mozilla Firefox was updated to version 10 to fix bugs and security
issues.

MFSA 2012-01: Mozilla developers identified and fixed several memory
safety bugs in the browser engine used in Firefox and other
Mozilla-based products. Some of these bugs showed evidence of memory
corruption under certain circumstances, and we presume that with
enough effort at least some of these could be exploited to run
arbitrary code.

In general these flaws cannot be exploited through email in the
Thunderbird and SeaMonkey products because scripting is disabled, but
are potentially a risk in browser or browser-like contexts in those
products. References

CVE-2012-0443: Ben Hawkes, Christian Holler, Honza Bombas, Jason
Orendorff, Jesse Ruderman, Jan Odvarko, Peter Van Der Beken, and Bill
McCloskey reported memory safety problems that were fixed in Firefox
10.

CVE-2012-0442: Jesse Ruderman and Bob Clary reported memory safety
problems that were fixed in both Firefox 10 and Firefox 3.6.26.

MFSA 2012-02/CVE-2011-3670: For historical reasons Firefox has been
generous in its interpretation of web addresses containing square
brackets around the host. If this host was not a valid IPv6 literal
address, Firefox attempted to interpret the host as a regular domain
name. Gregory Fleischer reported that requests made using IPv6 syntax
using XMLHttpRequest objects through a proxy may generate errors
depending on proxy configuration for IPv6. The resulting error
messages from the proxy may disclose sensitive data because
Same-Origin Policy (SOP) will allow the XMLHttpRequest object to read
these error messages, allowing user privacy to be eroded. Firefox now
enforces RFC 3986 IPv6 literal syntax and that may break links written
using the non-standard Firefox-only forms that were previously
accepted.

This was fixed previously for Firefox 7.0, Thunderbird 7.0, and
SeaMonkey 2.4 but only fixed in Firefox 3.6.26 and Thunderbird 3.1.18
during 2012.

MFSA 2012-03/CVE-2012-0445: Alex Dvorov reported that an attacker
could replace a sub-frame in another domain's document by using the
name attribute of the sub-frame as a form submission target. This can
potentially allow for phishing attacks against users and violates the
HTML5 frame navigation policy.

Firefox 3.6 and Thunderbird 3.1 are not affected by this vulnerability

MFSA 2012-04/CVE-2011-3659: Security researcher regenrecht reported
via TippingPoint's Zero Day Initiative that removed child nodes of
nsDOMAttribute can be accessed under certain circumstances because of
a premature notification of AttributeChildRemoved. This use-after-free
of the child nodes could possibly allow for for remote code execution.

MFSA 2012-05/CVE-2012-0446: Mozilla security researcher moz_bug_r_a4
reported that frame scripts bypass XPConnect security checks when
calling untrusted objects. This allows for cross-site scripting (XSS)
attacks through web pages and Firefox extensions. The fix enables the
Script Security Manager (SSM) to force security checks on all frame
scripts.

Firefox 3.6 and Thunderbird 3.1 are not affected by this vulnerability

MFSA 2012-06/CVE-2012-0447: Mozilla developer Tim Abraldes reported
that when encoding images as image/vnd.microsoft.icon the resulting
data was always a fixed size, with uninitialized memory appended as
padding beyond the size of the actual image. This is the result of
mImageBufferSize in the encoder being initialized with a value
different than the size of the source image. There is the possibility
of sensitive data from uninitialized memory being appended to a PNG
image when converted fron an ICO format image. This sensitive data may
then be disclosed in the resulting image.

Firefox 3.6 and Thunderbird 3.1 are not affected by this vulnerability

MFSA 2012-07/CVE-2012-0444: Security researcher regenrecht reported
via TippingPoint's Zero Day Initiative the possibility of memory
corruption during the decoding of Ogg Vorbis files. This can cause a
crash during decoding and has the potential for remote code execution.

MFSA 2012-08/CVE-2012-0449: Security researchers Nicolas Gregoire and
Aki Helin independently reported that when processing a malformed
embedded XSLT stylesheet, Firefox can crash due to a memory
corruption. While there is no evidence that this is directly
exploitable, there is a possibility of remote code execution.

MFSA 2012-09/CVE-2012-0450: magicant starmen reported that if a user
chooses to export their Firefox Sync key the 'Firefox Recovery
Key.html' file is saved with incorrect permissions, making the file
contents potentially readable by other users on Linux and OS X
systems.

Firefox 3.6 is not affected by this vulnerability.

See also :

https://bugzilla.novell.com/show_bug.cgi?id=744275

Solution :

Update the affected MozillaFirefox packages.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
Public Exploit Available : true

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now