SuSE 11.3 Security Update : Mozilla Firefox (SAT Patch Number 10524)

This script is Copyright (C) 2015 Tenable Network Security, Inc.


Synopsis :

The remote SuSE 11 host is missing one or more security updates.

Description :

Mozilla Firefox was updated to the 31.5.3ESR release to fix two
security vulnerabilities :

- Security researcher ilxu1a reported, through HP Zero Day
Initiative's Pwn2Own contest, a flaw in Mozilla's
implementation of typed array bounds checking in
JavaScript just-in-time compilation (JIT) and its
management of bounds checking for heap access. This flaw
can be leveraged into the reading and writing of memory
allowing for arbitary code execution on the local
system. (MFSA 2015-29 / CVE-2015-0817)

- Security researcher Mariusz Mlynski reported, through HP
Zero Day Initiative's Pwn2Own contest, a method to run
arbitrary scripts in a privileged context. This bypassed
the same-origin policy protections by using a flaw in
the processing of SVG format content navigation. (MFSA
2015-28 / CVE-2015-0818)

See also :

http://www.mozilla.org/security/announce/2015/mfsa2015-28.html
http://www.mozilla.org/security/announce/2015/mfsa2015-29.html
https://bugzilla.novell.com/show_bug.cgi?id=923534
http://support.novell.com/security/cve/CVE-2015-0817.html
http://support.novell.com/security/cve/CVE-2015-0818.html

Solution :

Apply SAT patch number 10524.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

Family: SuSE Local Security Checks

Nessus Plugin ID: 82068 ()

Bugtraq ID:

CVE ID: CVE-2015-0817
CVE-2015-0818

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now