Synopsis
The remote Debian host is missing a security-related update.
Description
Several remote vulnerabilities have been discovered in Xulrunner, a runtime environment for XUL applications, such as the Iceweasel web browser. The Common Vulnerabilities and Exposures project identifies the following problems :
  - CVE-2009-3070     Jesse Ruderman discovered crashes in the layout engine,     which might allow the execution of arbitrary code.
  - CVE-2009-3071     Daniel Holbert, Jesse Ruderman, Olli Pettay and 'toshi'     discovered crashes in the layout engine, which might     allow the execution of arbitrary code.
  - CVE-2009-3072     Josh Soref, Jesse Ruderman and Martin Wargers discovered     crashes in the layout engine, which might allow the     execution of arbitrary code.
  - CVE-2009-3074     Jesse Ruderman discovered a crash in the JavaScript     engine, which might allow the execution of arbitrary     code.
  - CVE-2009-3075     Carsten Book and 'Taral' discovered crashes in the     layout engine, which might allow the execution of     arbitrary code.
  - CVE-2009-3076     Jesse Ruderman discovered that the user interface for     installing/ removing PCKS #11 securiy modules wasn't     informative enough, which might allow social engineering     attacks.
  - CVE-2009-3077     It was discovered that incorrect pointer handling in the     XUL parser could lead to the execution of arbitrary     code.
  - CVE-2009-3078     Juan Pablo Lopez Yacubian discovered that incorrent     rendering of some Unicode font characters could lead to     spoofing attacks on the location bar.
Solution
Upgrade the xulrunner package.
For the stable distribution (lenny), these problems have been fixed in version 1.9.0.14-0lenny1.
As indicated in the Etch release notes, security support for the Mozilla products in the oldstable distribution needed to be stopped before the end of the regular Etch security maintenance life cycle.
You are strongly encouraged to upgrade to stable or switch to a still supported browser.
Plugin Details
File Name: debian_DSA-1885.nasl
Agent: unix
Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
Risk Information
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
Vulnerability Information
CPE: p-cpe:/a:debian:debian_linux:xulrunner, cpe:/o:debian:debian_linux:5.0
Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l
Patch Publication Date: 9/14/2009