Synopsis
The remote SuSE 10 host is missing a security-related patch.
Description
The Mozilla Firefox browser was updated to version 2.0.0.19, fixing various security issues and stability problems.
The following security issues were fixed :
  - Mozilla security researcher moz_bug_r_a4 reported     vulnerabilities in the session-restore feature by which     content could be injected into an incorrect document     storage location, including storage locations for other     domains. An attacker could utilize these issues to     violate the browser's same-origin policy and perform an     XSS attack while SessionStore data is being restored.
    moz_bug_r_a4 also reported that one variant could be     used by an attacker to run arbitrary JavaScript with     chrome privileges. (MFSA 2008-69 / CVE-2008-5513)
  - Mozilla security researcher moz_bug_r_a4 reported that     an XBL binding, when attached to an unloaded document,     can be used to violate the same-origin policy and     execute arbitrary JavaScript within the context of a     different website. moz_bug_r_a4 also reported two     vulnerabilities by which page content can pollute     XPCNativeWrappers and run arbitary JavaScript with     chrome priviliges. Thunderbird shares the browser engine     with Firefox and could be vulnerable if JavaScript were     to be enabled in mail. This is not the default setting     and we strongly discourage users from running JavaScript     in mail. Workaround Disable JavaScript until a version     containing these fixes can be installed. (MFSA 2008-68 /     CVE-2008-5512 / CVE-2008-5511)
  - Kojima Hajime reported that unlike literal null     characters which were handled correctly, the escaped     form '\0' was ignored by the CSS parser and treated as     if it was not present in the CSS input string. This     issue could potentially be used to bypass script     sanitization routines in web applications. The severity     of this issue was determined to be low. (MFSA 2008-67 /     CVE-2008-5510)
  - Perl developer Chip Salzenberg reported that certain     control characters, when placed at the beginning of a     URL, would lead to incorrect parsing resulting in a     malformed URL being output by the parser. IBM     researchers Justin Schuh, Tom Cross, and Peter William     also reported a related symptom as part of their     research that resulted in MFSA 2008-37. There was no     direct security impact from this issue and its effect     was limited to the improper rendering of hyperlinks     containing specific characters. The severity of this     issue was determined to be low. (MFSA 2008-66 /     CVE-2008-5508)
  - Google security researcher Chris Evans reported that a     website could access a limited amount of data from a     different domain by loading a same-domain JavaScript URL     which redirects to an off-domain target resource     containing data which is not parsable as JavaScript.
    Upon attempting to load the data as JavaScript a syntax     error is generated that can reveal some of the file     context via the window.onerror DOM API. This issue could     be used by a malicious website to steal private data     from users who are authenticated on the redirected     website. How much data could be at risk would depend on     the format of the data and how the JavaScript parser     attempts to interpret it. For most files the amount of     data that can be recovered would be limited to the first     word or two. Some data files might allow deeper probing     with repeated loads. Thunderbird shares the browser     engine with Firefox and could be vulnerable if     JavaScript were to be enabled in mail. This is not the     default setting and we strongly discourage users from     running JavaScript in mail. Workaround Disable     JavaScript until a version containing these fixes can be     installed. (MFSA 2008-65 / CVE-2008-5507)
  - Marius Schilder of Google Security reported that when a     XMLHttpRequest is made to a same-origin resource which     302 redirects to a resource in a different domain, the     response from the cross-domain resource is readable by     the site issuing the XHR. Cookies marked HttpOnly were     not readable, but other potentially sensitive data could     be revealed in the XHR response including URL parameters     and content in the response body. Thunderbird shares the     browser engine with Firefox and could be vulnerable if     JavaScript were to be enabled in mail. This is not the     default setting and we strongly discourage users from     running JavaScript in mail. Workaround Disable     JavaScript until a version containing these fixes can be     installed. (MFSA 2008-64 / CVE-2008-5506)
  - Mozilla security researcher moz_bug_r_a4 reported an     additional variation on the feed preview vulnerabilities     fixed in Firefox 2.0.0.17. moz_bug_r_a4 demonstrated     that it was still possible to use the feed preview as a     vector for JavaScript privilege escalation. An attacker     could use this issue to run arbitrary JavaScript with     chrome privileges. Firefox 3 is not affected by this     issue. Workaround Disable JavaScript until a version     containing these fixes can be installed. (MFSA 2008-62 /     CVE-2008-5504)
  - Mozilla developer Boris Zbarsky reported that XBL     bindings could be used to read data from other domains,     a violation of the same-origin policy. The severity of     this issue was determined to be moderate due to several     mitigating factors: The target document requires a     <bindingsi> element in the XBL namespace in order to be     read. The reader of the data needs to know the id     attribute of the binding being read in advance. It is     unlikely that web services will expose private data in     the manner described above. Firefox 3 is not affected by     this issue. Thunderbird shares the browser engine with     Firefox and could be vulnerable if JavaScript were to be     enabled in mail. This is not the default setting and we     strongly discourage users from running JavaScript in     mail. Workaround Products built from the Mozilla 1.9.0     branch and later, Firefox 3 for example, are not     affected by this issue. Upgrading to one of these     products is a reliable workaround for this particular     issue and it is also Mozilla's recommendation that the     most current version of any Mozilla product be used.
    Alternatively, you can disable JavaScript until a     version containing these fixes can be installed. (MFSA     2008-61 / CVE-2008-5503)
  - Mozilla developers identified and fixed several     stability bugs in the browser engine used in Firefox and     other Mozilla-based products. Some of these crashes     showed evidence of memory corruption under certain     circumstances and we presume that with enough effort at     least some of these could be exploited to run arbitrary     code. Thunderbird shares the browser engine with Firefox     and could be vulnerable if JavaScript were to be enabled     in mail. This is not the default setting and we strongly     discourage users from running JavaScript in mail.
    Without further investigation we cannot rule out the     possibility that for some of these an attacker might be     able to prepare memory for exploitation through some     means other than JavaScript such as large images.
    Workaround Disable JavaScript until a version containing     these fixes can be installed. (MFSA 2008-60 /     CVE-2008-5500)
Solution
Apply ZYPP patch number 5890.
Plugin Details
File Name: suse_MozillaFirefox-5890.nasl
Agent: unix
Supported Sensors: Nessus Agent, Continuous Assessment, Nessus
Risk Information
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
Vulnerability Information
CPE: cpe:/o:suse:suse_linux
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Patch Publication Date: 12/18/2008
Vulnerability Publication Date: 12/17/2008