Ubuntu 1251-1: Firefox and Xulrunner vulnerabilities

    Date10 Nov 2011
    CategoryUbuntu
    83
    Posted ByLinuxSecurity Advisories
    Multiple vulnerabilities have been fixed in Firefox and Xulrunner.
    ==========================================================================
    Ubuntu Security Notice USN-1251-1
    November 10, 2011
    
    firefox, xulrunner-1.9.2 vulnerabilities
    ==========================================================================
    
    A security issue affects these releases of Ubuntu and its derivatives:
    
    - Ubuntu 10.10
    - Ubuntu 10.04 LTS
    
    Summary:
    
    Multiple vulnerabilities have been fixed in Firefox and Xulrunner.
    
    Software Description:
    - firefox: Mozilla Open Source web browser
    - xulrunner-1.9.2: Mozilla Gecko runtime environment
    
    Details:
    
    It was discovered that CVE-2011-3004, which addressed possible privilege
    escalation in addons, also affected Firefox 3.6. An attacker could
    potentially exploit Firefox when an add-on was installed that used
    loadSubscript in vulnerable ways. (CVE-2011-3647)
    
    Yosuke Hasegawa discovered that the Mozilla browser engine mishandled
    invalid sequences in the Shift-JIS encoding. A malicious website could
    possibly use this flaw this to steal data or inject malicious scripts into
    web content. (CVE-2011-3648)
    
    Marc Schoenefeld discovered that using Firebug to profile a JavaScript file
    with many functions would cause Firefox to crash. An attacker might be able
    to exploit this without using the debugging APIs which would potentially
    allow an attacker to remotely crash the browser. (CVE-2011-3650)
    
    Update instructions:
    
    The problem can be corrected by updating your system to the following
    package versions:
    
    Ubuntu 10.10:
      firefox                         3.6.24+build2+nobinonly-0ubuntu0.10.10.1
      xulrunner-1.9.2                 1.9.2.24+build2+nobinonly-0ubuntu0.10.10.1
    
    Ubuntu 10.04 LTS:
      firefox                         3.6.24+build2+nobinonly-0ubuntu0.10.04.1
      xulrunner-1.9.2                 1.9.2.24+build2+nobinonly-0ubuntu0.10.04.1
    
    After a standard system upgrade you need to restart Firefox and any
    applications that use Xulrunner to effect the necessary changes.
    
    References:
      http://www.ubuntu.com/usn/usn-1251-1
      CVE-2011-3647, CVE-2011-3648, CVE-2011-3650
    
    Package Information:
      https://launchpad.net/ubuntu/+source/firefox/3.6.24+build2+nobinonly-0ubuntu0.10.10.1
      https://launchpad.net/ubuntu/+source/xulrunner-1.9.2/1.9.2.24+build2+nobinonly-0ubuntu0.10.10.1
      https://launchpad.net/ubuntu/+source/firefox/3.6.24+build2+nobinonly-0ubuntu0.10.04.1
      https://launchpad.net/ubuntu/+source/xulrunner-1.9.2/1.9.2.24+build2+nobinonly-0ubuntu0.10.04.1
    
    
    
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"23","type":"x","order":"1","pct":56.1,"resources":[]},{"id":"88","title":"Should be more technical","votes":"5","type":"x","order":"2","pct":12.2,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"13","type":"x","order":"3","pct":31.71,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    Advisories

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.