Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | |||
Test ID: | 1.3.6.1.4.1.25623.1.1.4.2012.0425.1 |
Category: | SuSE Local Security Checks |
Title: | SUSE: Security Advisory (SUSE-SU-2012:0425-1) |
Summary: | The remote host is missing an update for the 'Mozilla Firefox' package(s) announced via the SUSE-SU-2012:0425-1 advisory. |
Description: | Summary: The remote host is missing an update for the 'Mozilla Firefox' package(s) announced via the SUSE-SU-2012:0425-1 advisory. Vulnerability Insight: Mozilla Firefox was updated to 3.6.28 to fix various bugs and security issues. The following security issues have been fixed: * MFSA 2012-19: Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code. In general these flaws cannot be exploited through email in the Thunderbird and SeaMonkey products because scripting is disabled, but are potentially a risk in browser or browser-like contexts in those products. References Bob Clary reported two bugs that causes crashes that affected Firefox 3.6, Firefox ESR, and Firefox 10. CVE-2012-0461 Christian Holler, Jesse Ruderman, Nils, Michael Bebenita, Dindog, and David Anderson reported memory safety problems and crashes that affect Firefox ESR and Firefox 10. CVE-2012-0462 Jeff Walden reported a memory safety problem in the array.join function. This bug was independently reported by Vincenzo Iozzo via TippingPoint's Zero Day Initiative Pwn2Own contest. CVE-2012-0464 Masayuki Nakano reported a memory safety problem that affected Mobile Firefox 10. CVE-2012-0463 * MFSA 2012-16 / CVE-2012-0458: Security researcher Mariusz Mlynski reported that an attacker able to convince a potential victim to set a new home page by dragging a link to the 'home' button can set that user's home page to a javascript: URL. Once this is done the attacker's page can cause repeated crashes of the browser, eventually getting the script URL loaded in the privileged about:sessionrestore context. * MFSA 2012-14 / CVE-2012-0457 / CVE-2012-0456: Security researcher Atte Kettunen from OUSPG found two issues with Firefox's handling of SVG using the Address Sanitizer tool. The first issue, critically rated, is a use-after-free in SVG animation that could potentially lead to arbitrary code execution. The second issue is rated moderate and is an out of bounds read in SVG Filters. This could potentially incorporate data from the user's memory, making it accessible to the page content. * MFSA 2012-13 / CVE-2012-0455: Firefox prevents the dropping of javascript: links onto a frame to prevent malicious sites from tricking users into performing a cross-site scripting (XSS) attacks on themselves. Security researcher Soroush Dalili reported a way to bypass this protection. The full overview can be found on Mozillas security page at: [link moved to references] Affected Software/OS: 'Mozilla Firefox' package(s) on SLE SDK 10 SP4, SUSE Linux Enterprise Desktop 10 SP4, SUSE Linux Enterprise Server 10 SP4. Solution: Please install the updated package(s). CVSS Score: 9.3 CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2012-0455 BugTraq ID: 52458 http://www.securityfocus.com/bid/52458 Debian Security Information: DSA-2433 (Google Search) http://www.debian.org/security/2012/dsa-2433 Debian Security Information: DSA-2458 (Google Search) http://www.debian.org/security/2012/dsa-2458 http://www.mandriva.com/security/advisories?name=MDVSA-2012:031 http://www.mandriva.com/security/advisories?name=MDVSA-2012:032 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14829 RedHat Security Advisories: RHSA-2012:0387 http://rhn.redhat.com/errata/RHSA-2012-0387.html RedHat Security Advisories: RHSA-2012:0388 http://rhn.redhat.com/errata/RHSA-2012-0388.html http://www.securitytracker.com/id?1026801 http://www.securitytracker.com/id?1026803 http://www.securitytracker.com/id?1026804 http://secunia.com/advisories/48359 http://secunia.com/advisories/48402 http://secunia.com/advisories/48414 http://secunia.com/advisories/48495 http://secunia.com/advisories/48496 http://secunia.com/advisories/48513 http://secunia.com/advisories/48553 http://secunia.com/advisories/48561 http://secunia.com/advisories/48624 http://secunia.com/advisories/48629 http://secunia.com/advisories/48823 http://secunia.com/advisories/48920 SuSE Security Announcement: SUSE-SU-2012:0424 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00014.html SuSE Security Announcement: SUSE-SU-2012:0425 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00015.html SuSE Security Announcement: openSUSE-SU-2012:0417 (Google Search) http://lists.opensuse.org/opensuse-updates/2012-03/msg00042.html http://www.ubuntu.com/usn/USN-1400-1 http://www.ubuntu.com/usn/USN-1400-2 http://www.ubuntu.com/usn/USN-1400-3 http://www.ubuntu.com/usn/USN-1400-4 http://www.ubuntu.com/usn/USN-1400-5 http://www.ubuntu.com/usn/USN-1401-1 Common Vulnerability Exposure (CVE) ID: CVE-2012-0456 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15007 Common Vulnerability Exposure (CVE) ID: CVE-2012-0457 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14775 Common Vulnerability Exposure (CVE) ID: CVE-2012-0458 BugTraq ID: 52460 http://www.securityfocus.com/bid/52460 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15122 Common Vulnerability Exposure (CVE) ID: CVE-2012-0461 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15009 Common Vulnerability Exposure (CVE) ID: CVE-2012-0462 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15012 Common Vulnerability Exposure (CVE) ID: CVE-2012-0463 BugTraq ID: 52466 http://www.securityfocus.com/bid/52466 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15143 Common Vulnerability Exposure (CVE) ID: CVE-2012-0464 BugTraq ID: 52465 http://www.securityfocus.com/bid/52465 http://pwn2own.zerodayinitiative.com/status.html http://www.zdnet.com/blog/security/mozilla-knew-of-pwn2own-bug-before-cansecwest/10757 http://www.zdnet.com/blog/security/researchers-hack-into-newest-firefox-with-zero-day-flaw/10663 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14170 |
Copyright | Copyright (C) 2021 Greenbone Networks GmbH |
This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |