openSUSE Security Update : MozillaFirefox / mozilla-nss (openSUSE-2016-704)

High Nessus Plugin ID 91586

Synopsis

The remote openSUSE host is missing a security update.

Description

This update to Mozilla Firefox 47 fixes the following issues (boo#983549) :

Security fixes :

- CVE-2016-2815/CVE-2016-2818: Miscellaneous memory safety hazards (boo#983638 MFSA 2016-49)

- CVE-2016-2819: Buffer overflow parsing HTML5 fragments (boo#983655 MFSA 2016-50)

- CVE-2016-2821: Use-after-free deleting tables from a contenteditable document (boo#983653 MFSA 2016-51)

- CVE-2016-2822: Addressbar spoofing though the SELECT element (boo#983652 MFSA 2016-52)

- CVE-2016-2824: Out-of-bounds write with WebGL shader (boo#983651 MFSA 2016-53)

- CVE-2016-2825: Partial same-origin-policy through setting location.host through data URI (boo#983649 MFSA 2016-54)

- CVE-2016-2828: Use-after-free when textures are used in WebGL operations after recycle pool destruction (boo#983646 MFSA 2016-56)

- CVE-2016-2829: Incorrect icon displayed on permissions notifications (boo#983644 MFSA 2016-57)

- CVE-2016-2831: Entering fullscreen and persistent pointerlock without user permission (boo#983643 MFSA 2016-58)

- CVE-2016-2832: Information disclosure of disabled plugins through CSS pseudo-classes (boo#983632 MFSA 2016-59)

- CVE-2016-2833: Java applets bypass CSP protections (boo#983640 MFSA 2016-60)

Mozilla NSS was updated to 3.23 to address the following vulnerabilities :

- CVE-2016-2834: Memory safety bugs (boo#983639 MFSA-2016-61) The following non-security changes are included :

- Enable VP9 video codec for users with fast machines

- Embedded YouTube videos now play with HTML5 video if Flash is not installed

- View and search open tabs from your smartphone or another computer in a sidebar

- Allow no-cache on back/forward navigations for https resources

The following packaging changes are included :

- boo#981695: cleanup configure options, notably removing GStreamer support which is gone from FF

- boo#980384: enable build with PIE and full relro on x86_64

The following new functionality is provided :

- ChaCha20/Poly1305 cipher and TLS cipher suites now supported

- The list of TLS extensions sent in the TLS handshake has been reordered to increase compatibility of the Extended Master Secret with with servers

Solution

Update the affected MozillaFirefox / mozilla-nss packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=980384

https://bugzilla.opensuse.org/show_bug.cgi?id=981695

https://bugzilla.opensuse.org/show_bug.cgi?id=983549

https://bugzilla.opensuse.org/show_bug.cgi?id=983632

https://bugzilla.opensuse.org/show_bug.cgi?id=983638

https://bugzilla.opensuse.org/show_bug.cgi?id=983639

https://bugzilla.opensuse.org/show_bug.cgi?id=983640

https://bugzilla.opensuse.org/show_bug.cgi?id=983643

https://bugzilla.opensuse.org/show_bug.cgi?id=983644

https://bugzilla.opensuse.org/show_bug.cgi?id=983646

https://bugzilla.opensuse.org/show_bug.cgi?id=983649

https://bugzilla.opensuse.org/show_bug.cgi?id=983651

https://bugzilla.opensuse.org/show_bug.cgi?id=983652

https://bugzilla.opensuse.org/show_bug.cgi?id=983653

https://bugzilla.opensuse.org/show_bug.cgi?id=983655

Plugin Details

Severity: High

ID: 91586

File Name: openSUSE-2016-704.nasl

Version: 2.9

Type: local

Agent: unix

Published: 2016/06/14

Updated: 2019/04/11

Dependencies: 12634

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:H/RL:OF/RC:C

CVSS v3.0

Base Score: 8.8

Temporal Score: 8.4

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:MozillaFirefox, p-cpe:/a:novell:opensuse:MozillaFirefox-branding-upstream, p-cpe:/a:novell:opensuse:MozillaFirefox-buildsymbols, p-cpe:/a:novell:opensuse:MozillaFirefox-debuginfo, p-cpe:/a:novell:opensuse:MozillaFirefox-debugsource, p-cpe:/a:novell:opensuse:MozillaFirefox-devel, p-cpe:/a:novell:opensuse:MozillaFirefox-translations-common, p-cpe:/a:novell:opensuse:MozillaFirefox-translations-other, p-cpe:/a:novell:opensuse:libfreebl3, p-cpe:/a:novell:opensuse:libfreebl3-32bit, p-cpe:/a:novell:opensuse:libfreebl3-debuginfo, p-cpe:/a:novell:opensuse:libfreebl3-debuginfo-32bit, p-cpe:/a:novell:opensuse:libsoftokn3, p-cpe:/a:novell:opensuse:libsoftokn3-32bit, p-cpe:/a:novell:opensuse:libsoftokn3-debuginfo, p-cpe:/a:novell:opensuse:libsoftokn3-debuginfo-32bit, p-cpe:/a:novell:opensuse:mozilla-nss, p-cpe:/a:novell:opensuse:mozilla-nss-32bit, p-cpe:/a:novell:opensuse:mozilla-nss-certs, p-cpe:/a:novell:opensuse:mozilla-nss-certs-32bit, p-cpe:/a:novell:opensuse:mozilla-nss-certs-debuginfo, p-cpe:/a:novell:opensuse:mozilla-nss-certs-debuginfo-32bit, p-cpe:/a:novell:opensuse:mozilla-nss-debuginfo, p-cpe:/a:novell:opensuse:mozilla-nss-debuginfo-32bit, p-cpe:/a:novell:opensuse:mozilla-nss-debugsource, p-cpe:/a:novell:opensuse:mozilla-nss-devel, p-cpe:/a:novell:opensuse:mozilla-nss-sysinit, p-cpe:/a:novell:opensuse:mozilla-nss-sysinit-32bit, p-cpe:/a:novell:opensuse:mozilla-nss-sysinit-debuginfo, p-cpe:/a:novell:opensuse:mozilla-nss-sysinit-debuginfo-32bit, p-cpe:/a:novell:opensuse:mozilla-nss-tools, p-cpe:/a:novell:opensuse:mozilla-nss-tools-debuginfo, cpe:/o:novell:opensuse:13.2, cpe:/o:novell:opensuse:42.1

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2016/06/11

Reference Information

CVE: CVE-2016-2815, CVE-2016-2818, CVE-2016-2819, CVE-2016-2821, CVE-2016-2822, CVE-2016-2824, CVE-2016-2825, CVE-2016-2828, CVE-2016-2829, CVE-2016-2831, CVE-2016-2832, CVE-2016-2833, CVE-2016-2834