Debian DSA-1484-1 : xulrunner - several vulnerabilities

high Nessus Plugin ID 30224
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The remote Debian host is missing a security-related update.

Description

Several remote vulnerabilities have been discovered in Xulrunner, a runtime environment for XUL applications. The Common Vulnerabilities and Exposures project identifies the following problems :

- CVE-2008-0412 Jesse Ruderman, Kai Engert, Martijn Wargers, Mats Palmgren and Paul Nickerson discovered crashes in the layout engine, which might allow the execution of arbitrary code.

- CVE-2008-0413 Carsten Book, Wesley Garland, Igor Bukanov, 'moz_bug_r_a4', 'shutdown', Philip Taylor and 'tgirmann' discovered crashes in the JavaScript engine, which might allow the execution of arbitrary code.

- CVE-2008-0414 'hong' and Gregory Fleischer discovered that file input focus vulnerabilities in the file upload control could allow information disclosure of local files.

- CVE-2008-0415 'moz_bug_r_a4' and Boris Zbarsky discovered several vulnerabilities in JavaScript handling, which could allow privilege escalation.

- CVE-2008-0417 Justin Dolske discovered that the password storage mechanism could be abused by malicious websites to corrupt existing saved passwords.

- CVE-2008-0418 Gerry Eisenhaur and 'moz_bug_r_a4' discovered that a directory traversal vulnerability in chrome: URI handling could lead to information disclosure.

- CVE-2008-0419 David Bloom discovered a race condition in the image handling of designMode elements, which could lead to information disclosure or potentially the execution of arbitrary code.

- CVE-2008-0591 Michal Zalewski discovered that timers protecting security-sensitive dialogs (which disable dialog elements until a timeout is reached) could be bypassed by window focus changes through JavaScript.

- CVE-2008-0592 It was discovered that malformed content declarations of saved attachments could prevent a user from opening local files with a '.txt' file name, resulting in minor denial of service.

- CVE-2008-0593 Martin Straka discovered that insecure stylesheet handling during redirects could lead to information disclosure.

- CVE-2008-0594 Emil Ljungdahl and Lars-Olof Moilanen discovered that phishing protections could be bypassed with <div> elements.

Solution

Upgrade the xulrunner packages.

The old stable distribution (sarge) doesn't contain xulrunner.

For the stable distribution (etch), these problems have been fixed in version 1.8.0.15~pre080131b-0etch1.

See Also

https://security-tracker.debian.org/tracker/CVE-2008-0412

https://security-tracker.debian.org/tracker/CVE-2008-0413

https://security-tracker.debian.org/tracker/CVE-2008-0414

https://security-tracker.debian.org/tracker/CVE-2008-0415

https://security-tracker.debian.org/tracker/CVE-2008-0417

https://security-tracker.debian.org/tracker/CVE-2008-0418

https://security-tracker.debian.org/tracker/CVE-2008-0419

https://security-tracker.debian.org/tracker/CVE-2008-0591

https://security-tracker.debian.org/tracker/CVE-2008-0592

https://security-tracker.debian.org/tracker/CVE-2008-0593

https://security-tracker.debian.org/tracker/CVE-2008-0594

https://www.debian.org/security/2008/dsa-1484

Plugin Details

Severity: High

ID: 30224

File Name: debian_DSA-1484.nasl

Version: 1.22

Type: local

Agent: unix

Published: 2/11/2008

Updated: 1/4/2021

Dependencies: ssh_get_info.nasl

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 7.3

Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: E:POC/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:xulrunner, cpe:/o:debian:debian_linux:4.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2/10/2008

Reference Information

CVE: CVE-2008-0412, CVE-2008-0413, CVE-2008-0414, CVE-2008-0415, CVE-2008-0416, CVE-2008-0417, CVE-2008-0418, CVE-2008-0419, CVE-2008-0591, CVE-2008-0592, CVE-2008-0593, CVE-2008-0594

BID: 27406, 27683

DSA: 1484

CWE: 20, 22, 79, 94, 200, 399