USN-930-6: Firefox and Xulrunner vulnerability
26 July 2010
Firefox could be made to run programs as your login if it opened a specially crafted file or website.
Releases
Packages
- firefox-3.0 - Safe and easy web browser from Mozilla
- firefox-3.5 - Safe and easy web browser from Mozilla
- xulrunner-1.9.2 - XUL + XPCOM application runner
Details
USN-957-1 fixed vulnerabilities in Firefox and Xulrunner. Daniel Holbert
discovered that the fix for CVE-2010-1214 introduced a regression which did
not properly initialize a plugin pointer. If a user were tricked into
viewing a malicious site, a remote attacker could use this to crash the
browser or run arbitrary code as the user invoking the program.
(CVE-2010-2755)
This update fixes the problem.
Original advisory details:
If was discovered that Firefox could be made to access freed memory. If a
user were tricked into viewing a malicious site, a remote attacker could
cause a denial of service or possibly execute arbitrary code with the
privileges of the user invoking the program. This issue only affected
Ubuntu 8.04 LTS. (CVE-2010-1121)
Several flaws were discovered in the browser engine of Firefox. If a
user were tricked into viewing a malicious site, a remote attacker could
cause a denial of service or possibly execute arbitrary code with the
privileges of the user invoking the program. (CVE-2010-1200, CVE-2010-1201,
CVE-2010-1202, CVE-2010-1203)
A flaw was discovered in the way plugin instances interacted. An attacker
could potentially exploit this and use one plugin to access freed memory from a
second plugin to execute arbitrary code with the privileges of the user
invoking the program. (CVE-2010-1198)
An integer overflow was discovered in Firefox. If a user were tricked into
viewing a malicious site, an attacker could overflow a buffer and cause a
denial of service or possibly execute arbitrary code with the privileges of
the user invoking the program. (CVE-2010-1196)
Martin Barbella discovered an integer overflow in an XSLT node sorting
routine. An attacker could exploit this to overflow a buffer and cause a
denial of service or possibly execute arbitrary code with the privileges of
the user invoking the program. (CVE-2010-1199)
Michal Zalewski discovered that the focus behavior of Firefox could be
subverted. If a user were tricked into viewing a malicious site, a remote
attacker could use this to capture keystrokes. (CVE-2010-1125)
Ilja van Sprundel discovered that the 'Content-Disposition: attachment'
HTTP header was ignored when 'Content-Type: multipart' was also present.
Under certain circumstances, this could potentially lead to cross-site
scripting attacks. (CVE-2010-1197)
Amit Klein discovered that Firefox did not seed its random number generator
often enough. An attacker could exploit this to identify and track users
across different web sites. (CVE-2008-5913)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 9.10
-
abrowser
-
3.6.8+build1+nobinonly-0ubuntu0.9.10.1
-
firefox-3.5
-
3.6.8+build1+nobinonly-0ubuntu0.9.10.1
-
xulrunner-1.9.2
-
1.9.2.8+build1+nobinonly-0ubuntu0.9.10.1
Ubuntu 9.04
-
firefox-3.0
-
3.6.8+build1+nobinonly-0ubuntu0.9.04.1
-
abrowser
-
3.6.8+build1+nobinonly-0ubuntu0.9.04.1
-
xulrunner-1.9.2
-
1.9.2.8+build1+nobinonly-0ubuntu0.9.04.1
After a standard system upgrade you need to restart Firefox and any
applications that use Xulrunner to effect the necessary changes.
References
Related notices
- USN-957-2: firefox, firefox-3.0, xulrunner-1.9.2, abrowser