Ubuntu 1638-1: Firefox vulnerabilities

    Date21 Nov 2012
    CategoryUbuntu
    39
    Posted ByLinuxSecurity Advisories
    Several security issues were fixed in Firefox.
    ==========================================================================
    Ubuntu Security Notice USN-1638-1
    November 21, 2012
    
    firefox vulnerabilities
    ==========================================================================
    
    A security issue affects these releases of Ubuntu and its derivatives:
    
    - Ubuntu 12.10
    - Ubuntu 12.04 LTS
    - Ubuntu 11.10
    - Ubuntu 10.04 LTS
    
    Summary:
    
    Several security issues were fixed in Firefox.
    
    Software Description:
    - firefox: Mozilla Open Source web browser
    
    Details:
    
    Gary Kwong, Jesse Ruderman, Christian Holler, Bob Clary, Kyle Huey, Ed
    Morley, Chris Lord, Boris Zbarsky, Julian Seward, Bill McCloskey, and
    Andrew McCreight discovered multiple memory safety issues affecting
    Firefox. If the user were tricked into opening a specially crafted page, an
    attacker could possibly exploit these to cause a denial of service via
    application crash, or potentially execute code with the privileges of the
    user invoking Firefox. (CVE-2012-5842, CVE-2012-5843)
    
    Atte Kettunen discovered a buffer overflow while rendering GIF format
    images. An attacker could exploit this to possibly execute arbitrary code
    as the user invoking Firefox. (CVE-2012-4202)
    
    It was discovered that the evalInSandbox function's JavaScript sandbox
    context could be circumvented. An attacker could exploit this to perform a
    cross-site scripting (XSS) attack or steal a copy of a local file if the
    user has installed an add-on vulnerable to this attack. With cross-site
    scripting vulnerabilities, if a user were tricked into viewing a specially
    crafted page, a remote attacker could exploit this to modify the contents,
    or steal confidential data, within the same domain. (CVE-2012-4201)
    
    Jonathan Stephens discovered that combining vectors involving the setting
    of Cascading Style Sheets (CSS) properties in conjunction with SVG text
    could cause Firefox to crash. If a user were tricked into opening a
    malicious web page, an attacker could cause a denial of service via
    application crash or execute arbitrary code with the privliges of the user
    invoking the program. (CVE-2012-5836)
    
    It was discovered that if a javascript: URL is selected from the list of
    Firefox "new tab" page, the script will inherit the privileges of the
    privileged "new tab" page. This allows for the execution of locally
    installed programs if a user can be convinced to save a bookmark of a
    malicious javascript: URL. (CVE-2012-4203)
    
    Scott Bell discovered a memory corruption issue in the JavaScript engine.
    If a user were tricked into opening a malicious website, an attacker could
    exploit this to execute arbitrary JavaScript code within the context of
    another website or arbitrary code as the user invoking the program.
    (CVE-2012-4204)
    
    Gabor Krizsanits discovered that XMLHttpRequest objects created within
    sandboxes have the system principal instead of the sandbox principal. This
    can lead to cross-site request forgery (CSRF) or information theft via an
    add-on running untrusted code in a sandbox. (CVE-2012-4205)
    
    Peter Van der Beken discovered XrayWrapper implementation in Firefox does
    not consider the compartment during property filtering. An attacker could
    use this to bypass intended chrome-only restrictions on reading DOM object
    properties via a crafted web site. (CVE-2012-4208)
    
    Bobby Holley discovered that cross-origin wrappers were allowing write
    actions on objects when only read actions should have been properly
    allowed. This can lead to cross-site scripting (XSS) attacks. With
    cross-site scripting vulnerabilities, if a user were tricked into viewing a
    specially crafted page, a remote attacker could exploit this to modify the
    contents, or steal confidential data, within the same domain.
    (CVE-2012-5841)
    
    Masato Kinugawa discovered that when HZ-GB-2312 charset encoding is used
    for text, the "~" character will destroy another character near the chunk
    delimiter. This can lead to a cross-site scripting (XSS) attack in pages
    encoded in HZ-GB-2312. With cross-site scripting vulnerabilities, if a user
    were tricked into viewing a specially crafted page, a remote attacker could
    exploit these to modify the contents, or steal confidential data, within
    the same domain. (CVE-2012-4207)
    
    Mariusz Mlynski discovered that the location property can be accessed by
    binary plugins through top.location with a frame whose name attribute's
    value is set to "top". This can allow for possible cross-site scripting
    (XSS) attacks through plugins. With cross-site scripting vulnerabilities,
    if a user were tricked into viewing a specially crafted page, a remote
    attacker could exploit this to modify the contents, or steal confidential
    data, within the same domain. (CVE-2012-4209)
    
    Mariusz Mlynski discovered that when a maliciously crafted stylesheet is
    inspected in the Style Inspector, HTML and CSS can run in a chrome
    privileged context without being properly sanitized first. If a user were
    tricked into opening a malicious web page, an attacker could execute
    arbitrary code with the privliges of the user invoking the program.
    (CVE-2012-4210)
    
    Abhishek Arya discovered multiple use-after-free and buffer overflow issues
    in Firefox. If a user were tricked into opening a malicious page, an
    attacker could exploit these to execute arbitrary code as the user invoking
    the program. (CVE-2012-4214, CVE-2012-4215, CVE-2012-4216, CVE-2012-5829,
    CVE-2012-5839, CVE-2012-5840, CVE-2012-4212, CVE-2012-4213, CVE-2012-4217,
    CVE-2012-4218)
    
    Several memory corruption flaws were discovered in Firefox. If a user were
    tricked into opening a malicious page, an attacker could exploit these to
    execute arbitrary code as the user invoking the program. (CVE-2012-5830,
    CVE-2012-5833, CVE-2012-5835, CVE-2012-5838)
    
    Update instructions:
    
    The problem can be corrected by updating your system to the following
    package versions:
    
    Ubuntu 12.10:
      firefox                         17.0+build2-0ubuntu0.12.10.1
    
    Ubuntu 12.04 LTS:
      firefox                         17.0+build2-0ubuntu0.12.04.1
    
    Ubuntu 11.10:
      firefox                         17.0+build2-0ubuntu0.11.10.1
    
    Ubuntu 10.04 LTS:
      firefox                         17.0+build2-0ubuntu0.10.04.1
    
    After a standard system update you need to restart Firefox to make all
    the necessary changes.
    
    References:
      http://www.ubuntu.com/usn/usn-1638-1
      CVE-2012-4201, CVE-2012-4202, CVE-2012-4203, CVE-2012-4204,
      CVE-2012-4205, CVE-2012-4207, CVE-2012-4208, CVE-2012-4209,
      CVE-2012-4210, CVE-2012-4212, CVE-2012-4213, CVE-2012-4214,
      CVE-2012-4215, CVE-2012-4216, CVE-2012-4217, CVE-2012-4218,
      CVE-2012-5829, CVE-2012-5830, CVE-2012-5833, CVE-2012-5835,
      CVE-2012-5836, CVE-2012-5838, CVE-2012-5839, CVE-2012-5840,
      CVE-2012-5841, CVE-2012-5842, CVE-2012-5843, https://launchpad.net/bugs/1080211
    
    Package Information:
      https://launchpad.net/ubuntu/+source/firefox/17.0+build2-0ubuntu0.12.10.1
      https://launchpad.net/ubuntu/+source/firefox/17.0+build2-0ubuntu0.12.04.1
      https://launchpad.net/ubuntu/+source/firefox/17.0+build2-0ubuntu0.11.10.1
      https://launchpad.net/ubuntu/+source/firefox/17.0+build2-0ubuntu0.10.04.1
    
    
    
    
    
    You are not authorised to post comments.

    Comments powered by CComment

    Advisories

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"64","type":"x","order":"1","pct":57.14,"resources":[]},{"id":"88","title":"Should be more technical","votes":"15","type":"x","order":"2","pct":13.39,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"33","type":"x","order":"3","pct":29.46,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.