Description: | Summary: The remote host is missing an update for the 'MozillaFirefox, seamonkey, MozillaThunderbird' package(s) announced via the referenced advisory.
Vulnerability Insight: The Mozilla suite of browsers received security updates.
The following updates are included in this update: Mozilla Firefox was updated on SUSE Linux Enterprise 10 and 11 to the 3.6.17 security release. Mozilla Firefox was updated on openSUSE 11.4 to the 4.0.1 security release. Mozilla Thunderbird was updated on openSUSE to the 3.1.10 security release. Mozilla Seamonkey was updated on openSUSE to the 2.0.14 security release. Mozilla XULRunner 1.9.1 was updated to 1.9.1.19. Mozilla XULRunner 1.9.2 was updated to 1.9.2.17.
The following security issues were fixed: MFSA 2011-12: Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code.
Mozilla developers Boris Zbarsky, Gary Kwong, Jesse Ruderman, Michael Wu, Nils, Scoobidiver, and Ted Mielczarek reported memory safety issues which affected Firefox 4. CVE-2011-0079
Mozilla developer Scoobidiver reported a memory safety issue which affected Firefox 4 and Firefox 3.6 CVE-2011-0081
The web development team of Alcidion reported a crash that affected Firefox 4, Firefox 3.6 and Firefox 3.5. CVE-2011-0069
Ian Beer reported a crash that affected Firefox 4, Firefox 3.6 and Firefox 3.5. CVE-2011-0070
Mozilla developers Bob Clary, Henri Sivonen, Marco Bonardo, Mats Palmgren and Jesse Ruderman reported memory safety issues which affected Firefox 3.6 and Firefox 3.5. CVE-2011-0080
Aki Helin reported memory safety issues which affected Firefox 3.6 and Firefox 3.5. CVE-2011-0075
Ian Beer reported memory safety issues which affected Firefox 3.6 and Firefox 3.5. CVE-2011-0078
Martin Barbella reported a memory safety issue which affected Firefox 3.6 and Firefox 3.5. CVE-2011-0072
CVE-2011-0073: Security researcher regenrecht reported several dangling pointer vulnerabilities via TippingPoint's Zero Day Initiative.
Firefox 4 was not affected by these issues.
CVE-2011-0067: Security researcher Paul Stone reported that a Java applet could be used to mimic interaction with form autocomplete controls and steal entries from the form history.
Firefox 4 was not affected by this issue.
CVE-2011-0076: David Remahl of Apple Product Security reported that the Java Embedding Plugin (JEP) shipped with the Mac OS X version ...
Description truncated, please see the referenced URL(s) for more information.
Vulnerability Impact: remote code execution, remote denial of service
Affected Software/OS: MozillaFirefox, seamonkey, MozillaThunderbird on openSUSE 11.2, openSUSE 11.3
Solution: Please install the updated package(s).
CVSS Score: 10.0
CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
|