Ubuntu 1149-1: Firefox and Xulrunner vulnerabilities

    Date22 Jun 2011
    CategoryUbuntu
    43
    Posted ByLinuxSecurity Advisories
    Multiple Vulnerabilities were fixed in Firefox and Xulrunner
    ==========================================================================
    Ubuntu Security Notice USN-1149-1
    June 22, 2011
    
    firefox, xulrunner-1.9.2 vulnerabilities
    ==========================================================================
    
    A security issue affects these releases of Ubuntu and its derivatives:
    
    - Ubuntu 10.10
    - Ubuntu 10.04 LTS
    
    Summary:
    
    Multiple Vulnerabilities were fixed in Firefox and Xulrunner
    
    Software Description:
    - firefox: safe and easy web browser from Mozilla
    - xulrunner-1.9.2: XUL + XPCOM application runner
    
    Details:
    
    Multiple memory vulnerabilities were discovered in the browser rendering
    engine. An attacker could use these to possibly execute arbitrary code with
    the privileges of the user invoking Firefox. (CVE-2011-2364, CVE-2011-2365,
    CVE-2011-2374, CVE-2011-2376)
    
    Martin Barbella discovered that under certain conditions, viewing a XUL
    document while JavaScript was disabled caused deleted memory to be
    accessed. An attacker could potentially use this to crash Firefox or
    execute arbitrary code with the privileges of the user invoking Firefox.
    (CVE-2011-2373)
     
    Jordi Chancel discovered a vulnerability on multipart/x-mixed-replace
    images due to memory corruption. An attacker could potentially use this to
    crash Firefox or execute arbitrary code with the privileges of the user
    invoking Firefox. (CVE-2011-2377)
     
    Chris Rohlf and Yan Ivnitskiy discovered an integer overflow vulnerability
    in JavaScript Arrays. An attacker could potentially use this to execute
    arbitrary code with the privileges of the user invoking Firefox.
    (CVE-2011-2371)
    
    Multiple use-after-free vulnerabilities were discovered. An attacker could
    potentially use these to execute arbitrary code with the privileges of the
    user invoking Firefox. (CVE-2011-0083, CVE-2011-0085, CVE-2011-2363)
    
    David Chan discovered that cookies did not honor same-origin conventions.
    This could potentially lead to cookie data being leaked to a third party.
    (CVE-2011-2362)
    
    Update instructions:
    
    The problem can be corrected by updating your system to the following
    package versions:
    
    Ubuntu 10.10:
      firefox                         3.6.18+build2+nobinonly-0ubuntu0.10.10.1
      xulrunner-1.9.2                 1.9.2.18+build2+nobinonly-0ubuntu0.10.10.1
    
    Ubuntu 10.04 LTS:
      firefox                         3.6.18+build2+nobinonly-0ubuntu0.10.04.1
      xulrunner-1.9.2                 1.9.2.18+build2+nobinonly-0ubuntu0.10.04.1
    
    After a standard system update you need to restart Firefox and any
    applications which use Xulrunner to make all the necessary changes.
    
    References:
      CVE-2011-0083, CVE-2011-0085, CVE-2011-2362, CVE-2011-2363,
      CVE-2011-2364, CVE-2011-2365, CVE-2011-2371, CVE-2011-2373,
      CVE-2011-2374, CVE-2011-2376, CVE-2011-2377
    
    Package Information:
      https://launchpad.net/ubuntu/+source/firefox/3.6.18+build2+nobinonly-0ubuntu0.10.10.1
      https://launchpad.net/ubuntu/+source/xulrunner-1.9.2/1.9.2.18+build2+nobinonly-0ubuntu0.10.10.1
      https://launchpad.net/ubuntu/+source/firefox/3.6.18+build2+nobinonly-0ubuntu0.10.04.1
      https://launchpad.net/ubuntu/+source/xulrunner-1.9.2/1.9.2.18+build2+nobinonly-0ubuntu0.10.04.1
    
    
    
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"22","type":"x","order":"1","pct":55,"resources":[]},{"id":"88","title":"Should be more technical","votes":"5","type":"x","order":"2","pct":12.5,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"13","type":"x","order":"3","pct":32.5,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.