SuSE 11.1 Security Update : Mozilla-XULrunner (SAT Patch Number 4461)

Critical Nessus Plugin ID 53648

Synopsis

The remote SuSE 11 host is missing one or more security updates.

Description

Mozilla XULRunner 1.9.1 was updated to the 1.9.1.19 security release.

- Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code. Credits. (MFSA 2011-12)

- Mozilla developer Scoobidiver reported a memory safety issue which affected Firefox 4 and Firefox 3.6 (CVE-2011-0081) The web development team of Alcidion reported a crash that affected Firefox 4, Firefox 3.6 and Firefox 3.5. (CVE-2011-0069)

Ian Beer reported a crash that affected Firefox 4, Firefox 3.6 and Firefox 3.5. (CVE-2011-0070)

Mozilla developers Bob Clary, Henri Sivonen, Marco Bonardo, Mats Palmgren and Jesse Ruderman reported memory safety issues which affected Firefox 3.6 and Firefox 3.5. (CVE-2011-0080)

Aki Helin reported memory safety issues which affected Firefox 3.6 and Firefox 3.5. (CVE-2011-0074 / CVE-2011-0075)

Ian Beer reported memory safety issues which affected Firefox 3.6 and Firefox 3.5. (CVE-2011-0077 / CVE-2011-0078)

Martin Barbella reported a memory safety issue which affected Firefox 3.6 and Firefox 3.5. (CVE-2011-0072)

- Security researcher regenrecht reported several dangling pointer vulnerabilities via TippingPoint's Zero Day Initiative. (MFSA 2011-13 / CVE-2011-0065 / CVE-2011-0066 / CVE-2011-0073)

- Security researcher Paul Stone reported that a Java applet could be used to mimic interaction with form autocomplete controls and steal entries from the form history. (MFSA 2011-14 / CVE-2011-0067)

- Chris Evans of the Chrome Security Team reported that the XSLT generate-id() function returned a string that revealed a specific valid address of an object on the memory heap. It is possible that in some cases this address would be valuable information that could be used by an attacker while exploiting a different memory corruption but, in order to make an exploit more reliable or work around mitigation features in the browser or operating system. (MFSA 2011-18 / CVE-2011-1202)

Solution

Apply SAT patch number 4461.

See Also

http://www.mozilla.org/security/announce/2011/mfsa2011-12.html

http://www.mozilla.org/security/announce/2011/mfsa2011-13.html

http://www.mozilla.org/security/announce/2011/mfsa2011-14.html

http://www.mozilla.org/security/announce/2011/mfsa2011-18.html

https://bugzilla.novell.com/show_bug.cgi?id=689281

http://support.novell.com/security/cve/CVE-2011-0065.html

http://support.novell.com/security/cve/CVE-2011-0066.html

http://support.novell.com/security/cve/CVE-2011-0067.html

http://support.novell.com/security/cve/CVE-2011-0069.html

http://support.novell.com/security/cve/CVE-2011-0070.html

http://support.novell.com/security/cve/CVE-2011-0072.html

http://support.novell.com/security/cve/CVE-2011-0073.html

http://support.novell.com/security/cve/CVE-2011-0074.html

http://support.novell.com/security/cve/CVE-2011-0075.html

http://support.novell.com/security/cve/CVE-2011-0077.html

http://support.novell.com/security/cve/CVE-2011-0078.html

http://support.novell.com/security/cve/CVE-2011-0080.html

http://support.novell.com/security/cve/CVE-2011-0081.html

http://support.novell.com/security/cve/CVE-2011-1202.html

Plugin Details

Severity: Critical

ID: 53648

File Name: suse_11_mozilla-xulrunner191-110429.nasl

Version: 1.16

Type: local

Agent: unix

Published: 2011/05/05

Updated: 2019/10/25

Dependencies: 12634

Risk Information

Risk Factor: Critical

CVSS v2.0

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:11:mozilla-xulrunner191, p-cpe:/a:novell:suse_linux:11:mozilla-xulrunner191-32bit, p-cpe:/a:novell:suse_linux:11:mozilla-xulrunner191-gnomevfs, p-cpe:/a:novell:suse_linux:11:mozilla-xulrunner191-gnomevfs-32bit, p-cpe:/a:novell:suse_linux:11:mozilla-xulrunner191-translations, p-cpe:/a:novell:suse_linux:11:mozilla-xulrunner191-translations-32bit, cpe:/o:novell:suse_linux:11

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2011/04/29

Exploitable With

CANVAS (White_Phosphorus)

Core Impact

Metasploit (Mozilla Firefox "nsTreeRange" Dangling Pointer Vulnerability)

Reference Information

CVE: CVE-2011-0065, CVE-2011-0066, CVE-2011-0067, CVE-2011-0069, CVE-2011-0070, CVE-2011-0072, CVE-2011-0073, CVE-2011-0074, CVE-2011-0075, CVE-2011-0077, CVE-2011-0078, CVE-2011-0080, CVE-2011-0081, CVE-2011-1202