Ubuntu 10.04 LTS / 10.10 / 11.04 : firefox, xulrunner-1.9.2 vulnerability (USN-1197-1)

High Nessus Plugin ID 56036


The remote Ubuntu host is missing one or more security-related patches.


It was discovered that Dutch Certificate Authority DigiNotar had mis-issued multiple fraudulent certificates. These certificates could allow an attacker to perform a 'man in the middle' (MITM) attack which would make the user believe their connection is secure, but is actually being monitored.

For the protection of its users, Mozilla has removed the DigiNotar certificate. Sites using certificates issued by DigiNotar will need to seek another certificate vendor.

We are currently aware of a regression that blocks one of two Staat der Nederlanden root certificates which are believed to still be secure. This regression is being tracked at https://launchpad.net/bugs/838322.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.


Update the affected firefox and / or xulrunner-1.9.2 packages.

Plugin Details

Severity: High

ID: 56036

File Name: ubuntu_USN-1197-1.nasl

Version: $Revision: 1.5 $

Type: local

Agent: unix

Published: 2011/09/01

Modified: 2016/05/26

Dependencies: 12634

Risk Information

Risk Factor: High

Vulnerability Information

CPE: p-cpe:/a:canonical:ubuntu_linux:firefox, p-cpe:/a:canonical:ubuntu_linux:xulrunner-1.9.2, cpe:/o:canonical:ubuntu_linux:10.04:-:lts, cpe:/o:canonical:ubuntu_linux:10.10, cpe:/o:canonical:ubuntu_linux:11.04

Required KB Items: Host/cpu, Host/Ubuntu, Host/Ubuntu/release, Host/Debian/dpkg-l

Patch Publication Date: 2011/08/31

Reference Information

USN: 1197-1