openSUSE 10 Security Update : MozillaFirefox (MozillaFirefox-4758)

High Nessus Plugin ID 28369


The remote openSUSE host is missing a security update.


This update brings Mozilla Firefox to security update version

Following security problems were fixed: MFSA 2007-37 / CVE-2007-5947:
The jar protocol handler in Mozilla Firefox retrieves the inner URL regardless of its MIME type, and considers HTML documents within a jar archive to have the same origin as the inner URL, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a jar:

MFSA 2007-38 / CVE-2007-5959: The Firefox update contains fixes for three bugs that improve the stability of the product. These crashes showed some evidence of memory corruption under certain circumstances and we presume that with enough effort at least some of these could be exploited to run arbitrary code.

MFSA 2007-39 / CVE-2007-5960: Gregory Fleischer demonstrated that it was possible to generate a fake HTTP Referer header by exploiting a timing condition when setting the window.location property. This could be used to conduct a Cross-site Request Forgery (CSRF) attack against websites that rely only on the Referer header as protection against such attacks.


Update the affected MozillaFirefox packages.

Plugin Details

Severity: High

ID: 28369

File Name: suse_MozillaFirefox-4758.nasl

Version: $Revision: 1.9 $

Type: local

Agent: unix

Published: 2007/11/30

Modified: 2016/12/22

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 9.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:MozillaFirefox, p-cpe:/a:novell:opensuse:MozillaFirefox-translations, cpe:/o:novell:opensuse:10.1, cpe:/o:novell:opensuse:10.2, cpe:/o:novell:opensuse:10.3

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Patch Publication Date: 2007/11/27

Reference Information

CVE: CVE-2007-5947, CVE-2007-5959, CVE-2007-5960

CWE: 22, 79