Ubuntu 1367-4: Xulrunner vulnerability

    Date17 Feb 2012
    CategoryUbuntu
    309
    Posted ByLinuxSecurity Advisories
    Xulrunner based applications could be made to crash or run programs as your login if they opened a specially crafted file.
    1==========================================================================
    Ubuntu Security Notice USN-1367-4
    February 17, 2012
    
    xulrunner-1.9.2 vulnerability
    ==========================================================================
    
    A security issue affects these releases of Ubuntu and its derivatives:
    
    - Ubuntu 10.10
    - Ubuntu 10.04 LTS
    
    Summary:
    
    Xulrunner based applications could be made to crash or run programs as your
    login if they opened a specially crafted file.
    
    Software Description:
    - xulrunner-1.9.2: Mozilla Gecko runtime environment
    
    Details:
    
    USN-1367-1 fixed vulnerabilities in libpng. This provides the corresponding
    update for Xulrunner.
    
    Original advisory details:
     
     Jueri Aedla discovered that libpng did not properly verify the size used
     when allocating memory during chunk decompression. If a user or automated
     system using libpng were tricked into opening a specially crafted image,
     an attacker could exploit this to cause a denial of service or execute
     code with the privileges of the user invoking the program. (CVE-2011-3026)
    
    Update instructions:
    
    The problem can be corrected by updating your system to the following
    package versions:
    
    Ubuntu 10.10:
      xulrunner-1.9.2                 1.9.2.27+build1+nobinonly-0ubuntu0.10.10.1
    
    Ubuntu 10.04 LTS:
      xulrunner-1.9.2                 1.9.2.27+build1+nobinonly-0ubuntu0.10.04.1
    
    After a standard system update you need to restart any application based on
    Xulrunner such as Yelp or Conkeror to make all the necessary changes.
    
    References:
      http://www.ubuntu.com/usn/usn-1367-4
      http://www.ubuntu.com/usn/usn-1367-1
      CVE-2011-3026, https://launchpad.net/bugs/934073
    
    Package Information:
      https://launchpad.net/ubuntu/+source/xulrunner-1.9.2/1.9.2.27+build1+nobinonly-0ubuntu0.10.10.1
      https://launchpad.net/ubuntu/+source/xulrunner-1.9.2/1.9.2.27+build1+nobinonly-0ubuntu0.10.04.1
    
    
    
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"25","type":"x","order":"1","pct":55.56,"resources":[]},{"id":"88","title":"Should be more technical","votes":"5","type":"x","order":"2","pct":11.11,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"15","type":"x","order":"3","pct":33.33,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.