SuSE 11.3 Security Update : Mozilla Firefox (SAT Patch Number 10524)

High Nessus Plugin ID 82068


The remote SuSE 11 host is missing one or more security updates.


Mozilla Firefox was updated to the 31.5.3ESR release to fix two security vulnerabilities :

- Security researcher ilxu1a reported, through HP Zero Day Initiative's Pwn2Own contest, a flaw in Mozilla's implementation of typed array bounds checking in JavaScript just-in-time compilation (JIT) and its management of bounds checking for heap access. This flaw can be leveraged into the reading and writing of memory allowing for arbitary code execution on the local system. (MFSA 2015-29 / CVE-2015-0817)

- Security researcher Mariusz Mlynski reported, through HP Zero Day Initiative's Pwn2Own contest, a method to run arbitrary scripts in a privileged context. This bypassed the same-origin policy protections by using a flaw in the processing of SVG format content navigation. (MFSA 2015-28 / CVE-2015-0818)


Apply SAT patch number 10524.

See Also

Plugin Details

Severity: High

ID: 82068

File Name: suse_11_firefox-20150323-150324.nasl

Version: Revision: 1.4

Type: local

Agent: unix

Published: 2015/03/25

Updated: 2015/04/05

Dependencies: 12634

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:11:MozillaFirefox, p-cpe:/a:novell:suse_linux:11:MozillaFirefox-translations, cpe:/o:novell:suse_linux:11

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Patch Publication Date: 2015/03/24

Reference Information

CVE: CVE-2015-0817, CVE-2015-0818