USN-920-1: Firefox 3.0 and Xulrunner vulnerabilities
9 April 2010
Firefox 3.0 and Xulrunner vulnerabilities
Releases
Packages
Details
Martijn Wargers, Josh Soref, Jesse Ruderman, and Ehsan Akhgari discovered
flaws in the browser engine of Firefox. If a user were tricked into viewing
a malicious website, a remote attacker could cause a denial of service or
possibly execute arbitrary code with the privileges of the user invoking
the program. (CVE-2010-0174)
It was discovered that Firefox could be made to access previously freed
memory. If a user were tricked into viewing a malicious website, a remote
attacker could cause a denial of service or possibly execute arbitrary code
with the privileges of the user invoking the program. (CVE-2010-0175,
CVE-2010-0176, CVE-2010-0177)
Paul Stone discovered that Firefox could be made to change a mouse click
into a drag and drop event. If the user could be tricked into performing
this action twice on a crafted website, an attacker could execute
arbitrary JavaScript with chrome privileges. (CVE-2010-0178)
It was discovered that the XMLHttpRequestSpy module as used by the Firebug
add-on could be used to escalate privileges within the browser. If the user
had the Firebug add-on installed and were tricked into viewing a malicious
website, an attacker could potentially run arbitrary JavaScript.
(CVE-2010-0179)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 9.04
-
firefox-3.0
-
3.0.19+nobinonly-0ubuntu0.9.04.1
-
abrowser
-
3.0.19+nobinonly-0ubuntu0.9.04.1
-
xulrunner-1.9
-
1.9.0.19+nobinonly-0ubuntu0.9.04.1
Ubuntu 8.10
-
firefox-3.0
-
3.0.19+nobinonly-0ubuntu0.8.10.1
-
abrowser
-
3.0.19+nobinonly-0ubuntu0.8.10.1
-
xulrunner-1.9
-
1.9.0.19+nobinonly-0ubuntu0.8.10.1
Ubuntu 8.04
After a standard system upgrade you need to restart Firefox and any
applications that use Xulrunner to effect the necessary changes.
Related notices
- USN-921-1: firefox-3.5, xulrunner-1.9.1