SUSE SLES11 Security Update : MozillaFirefox, MozillaFirefox-branding-SLED, firefox-gcc5, mozilla-nss (SUSE-SU-2017:2235-1)

High Nessus Plugin ID 102694


The remote SUSE host is missing one or more security updates.


This update for MozillaFirefox and mozilla-nss fixes the following issues: Security issues fixed :

- Fixes in Firefox ESR 52.2 (bsc#1043960,MFSA 2017-16)

- CVE-2017-7758: Out-of-bounds read in Opus encoder

- CVE-2017-7749: Use-after-free during docshell reloading

- CVE-2017-7751: Use-after-free with content viewer listeners

- CVE-2017-5472: Use-after-free using destroyed node when regenerating trees

- CVE-2017-5470: Memory safety bugs fixed in Firefox 54 and Firefox ESR 52.2

- CVE-2017-7752: Use-after-free with IME input

- CVE-2017-7750: Use-after-free with track elements

- CVE-2017-7768: 32 byte arbitrary file read through Mozilla Maintenance Service

- CVE-2017-7778: Vulnerabilities in the Graphite 2 library

- CVE-2017-7754: Out-of-bounds read in WebGL with ImageInfo object

- CVE-2017-7755: Privilege escalation through Firefox Installer with same directory DLL files

- CVE-2017-7756: Use-after-free and use-after-scope logging XHR header errors

- CVE-2017-7757: Use-after-free in IndexedDB

- CVE-2017-7761: File deletion and privilege escalation through Mozilla Maintenance Service helper.exe application

- CVE-2017-7763: Mac fonts render some unicode characters as spaces

- CVE-2017-7765: Mark of the Web bypass when saving executable files

- CVE-2017-7764: Domain spoofing with combination of Canadian Syllabics and other unicode blocks

- update to Firefox ESR 52.1 (bsc#1035082,MFSA 2017-12)

- CVE-2016-10196: Vulnerabilities in Libevent library

- CVE-2017-5443: Out-of-bounds write during BinHex decoding

- CVE-2017-5429: Memory safety bugs fixed in Firefox 53, Firefox ESR 45.9, and Firefox ESR 52.1

- CVE-2017-5464: Memory corruption with accessibility and DOM manipulation

- CVE-2017-5465: Out-of-bounds read in ConvolvePixel

- CVE-2017-5466: Origin confusion when reloading isolated data:text/html URL

- CVE-2017-5467: Memory corruption when drawing Skia content

- CVE-2017-5460: Use-after-free in frame selection

- CVE-2017-5461: Out-of-bounds write in Base64 encoding in NSS

- CVE-2017-5448: Out-of-bounds write in ClearKeyDecryptor

- CVE-2017-5449: Crash during bidirectional unicode manipulation with animation

- CVE-2017-5446: Out-of-bounds read when HTTP/2 DATA frames are sent with incorrect data

- CVE-2017-5447: Out-of-bounds read during glyph processing

- CVE-2017-5444: Buffer overflow while parsing application/http-index-format content

- CVE-2017-5445: Uninitialized values used while parsing application/http- index-format content

- CVE-2017-5442: Use-after-free during style changes

- CVE-2017-5469: Potential Buffer overflow in flex-generated code

- CVE-2017-5440: Use-after-free in txExecutionState destructor during XSLT processing

- CVE-2017-5441: Use-after-free with selection during scroll events

- CVE-2017-5439: Use-after-free in nsTArray Length() during XSLT processing

- CVE-2017-5438: Use-after-free in nsAutoPtr during XSLT processing

- CVE-2017-5436: Out-of-bounds write with malicious font in Graphite 2

- CVE-2017-5435: Use-after-free during transaction processing in the editor

- CVE-2017-5434: Use-after-free during focus handling

- CVE-2017-5433: Use-after-free in SMIL animation functions

- CVE-2017-5432: Use-after-free in text input selection

- CVE-2017-5430: Memory safety bugs fixed in Firefox 53 and Firefox ESR 52.1

- CVE-2017-5459: Buffer overflow in WebGL

- CVE-2017-5462: DRBG flaw in NSS

- CVE-2017-5455: Sandbox escape through internal feed reader APIs

- CVE-2017-5454: Sandbox escape allowing file system read access through file picker

- CVE-2017-5456: Sandbox escape allowing local file system access

- CVE-2017-5451: Addressbar spoofing with onblur event

- General

- CVE-2015-5276: Fix for C++11 std::random_device short reads (bsc#945842) Bugfixes :

- workaround for Firefox hangs (bsc#1031485, bsc#1025108)

- Update to gcc-5-branch head.

- Includes fixes for (bsc#966220), (bsc#962765), (bsc#964468), (bsc#939460), (bsc#930496), (bsc#930392) and (bsc#955382).

- Add fix to revert accidential libffi ABI breakage on AARCH64. (bsc#968771)

- Build s390[x] with --with-tune=z9-109 --with-arch=z900 on SLE11 again. (bsc#954002)

- Fix libffi include install. (bsc#935510)

Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.


To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product :

SUSE Linux Enterprise Software Development Kit 11-SP4:zypper in -t patch sdksp4-MozillaFirefox-13237=1

SUSE Linux Enterprise Server 11-SP4:zypper in -t patch slessp4-MozillaFirefox-13237=1

SUSE Linux Enterprise Server 11-SP3-LTSS:zypper in -t patch slessp3-MozillaFirefox-13237=1

SUSE Linux Enterprise Point of Sale 11-SP3:zypper in -t patch sleposp3-MozillaFirefox-13237=1

SUSE Linux Enterprise Debuginfo 11-SP4:zypper in -t patch dbgsp4-MozillaFirefox-13237=1

SUSE Linux Enterprise Debuginfo 11-SP3:zypper in -t patch dbgsp3-MozillaFirefox-13237=1

To bring your system up-to-date, use 'zypper patch'.

See Also

Plugin Details

Severity: High

ID: 102694

File Name: suse_SU-2017-2235-1.nasl

Version: $Revision: 3.2 $

Type: local

Agent: unix

Published: 2017/08/23

Modified: 2018/01/31

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.5

Temporal Score: 6.2

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:F/RL:OF/RC:ND


Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:MozillaFirefox, p-cpe:/a:novell:suse_linux:MozillaFirefox-branding-SLED, p-cpe:/a:novell:suse_linux:MozillaFirefox-translations, p-cpe:/a:novell:suse_linux:firefox-libffi4, p-cpe:/a:novell:suse_linux:firefox-libstdc++6, p-cpe:/a:novell:suse_linux:libfreebl3, p-cpe:/a:novell:suse_linux:libsoftokn3, p-cpe:/a:novell:suse_linux:mozilla-nss, p-cpe:/a:novell:suse_linux:mozilla-nss-tools, cpe:/o:novell:suse_linux:11

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2017/08/22

Reference Information

CVE: CVE-2015-5276, CVE-2016-10196, CVE-2017-5429, CVE-2017-5430, CVE-2017-5432, CVE-2017-5433, CVE-2017-5434, CVE-2017-5435, CVE-2017-5436, CVE-2017-5438, CVE-2017-5439, CVE-2017-5440, CVE-2017-5441, CVE-2017-5442, CVE-2017-5443, CVE-2017-5444, CVE-2017-5445, CVE-2017-5446, CVE-2017-5447, CVE-2017-5448, CVE-2017-5449, CVE-2017-5451, CVE-2017-5454, CVE-2017-5455, CVE-2017-5456, CVE-2017-5459, CVE-2017-5460, CVE-2017-5461, CVE-2017-5462, CVE-2017-5464, CVE-2017-5465, CVE-2017-5466, CVE-2017-5467, CVE-2017-5469, CVE-2017-5470, CVE-2017-5472, CVE-2017-7749, CVE-2017-7750, CVE-2017-7751, CVE-2017-7752, CVE-2017-7754, CVE-2017-7755, CVE-2017-7756, CVE-2017-7757, CVE-2017-7758, CVE-2017-7761, CVE-2017-7763, CVE-2017-7764, CVE-2017-7765, CVE-2017-7768, CVE-2017-7778

OSVDB: 127770, 151247, 155950, 155951, 155952, 155953, 155954, 155955, 155956, 155957, 155958, 155959, 155960, 155961, 155962, 155963, 155964, 155965, 155966, 155967, 155968, 155972, 155973, 155974, 155975, 155976, 155989, 155991, 155992, 155994, 155999, 156037, 156038, 156039, 156040, 156041, 156042, 156043, 156044, 156045, 156046, 156047, 156048, 156049, 156050, 156051, 156052, 156053, 156054, 156055, 156056, 156057, 156058, 156059, 156139, 159018, 159021, 159029, 159030, 159031, 159032, 159033, 159034, 159035, 159036, 159049, 159051, 159052, 159053, 159054, 159055, 159056, 159057, 159058, 159059, 159060, 159062, 159063, 159064, 159065, 159066, 159068, 159069, 159070, 159073, 159078, 159080, 159083, 159085, 159089, 159094