[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249622

 
 

909

 
 

195549

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

MDVSA-2012:173 -- Mandriva firefox

ID: oval:org.secpod.oval:def:1300142Date: (C)2013-01-01   (M)2022-10-10
Class: PATCHFamily: unix




Multiple security issue were identified and fixed in mozilla firefox: Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code . Security researcher Atte Kettunen from OUSPG used the Address Sanitizer tool to discover a buffer overflow while rendering GIF format images. This issue is potentially exploitable and could lead to arbitrary code execution . Mozilla security researcher moz_bug_r_a4 reported that if code executed by the evalInSandbox function sets location.href, it can get the wrong subject principal for the URL check, ignoring the sandbox's Javascript context and gaining the context of evalInSandbox object. This can lead to malicious web content being able to perform a cross-site scripting attack or stealing a copy of a local file if the user has installed an add-on vulnerable to this attack . Mozilla developer Bobby Holley reported that security wrappers filter at the time of property access, but once a function is returned, the caller can use this function without further security checks. This affects cross-origin wrappers, allowing for write actions on objects when only read actions should be properly allowed. This can lead to cross-site scripting attacks . Security researcher Masato Kinugawa found when HZ-GB-2312 charset encoding is used for text, the ~ character will destroy another character near the chunk delimiter. This can lead to a cross-site scripting attack in pages encoded in HZ-GB-2312 . Security researcher Mariusz Mlynski reported that the location property can be accessed by binary plugins through top.location with a frame whose name attribute's value is set to top. This can allow for possible cross-site scripting attacks through plugins . Security researcher Mariusz Mlynski reported that when a maliciously crafted stylesheet is inspected in the Style Inspector, HTML and CSS can run in a chrome privileged context without being properly sanitized first. This can lead to arbitrary code execution . Security researcher Abhishek Arya of the Google Chrome Security Team discovered a series critically rated of use-after-free and buffer overflow issues using the Address Sanitizer tool in shipped software. These issues are potentially exploitable, allowing for remote code execution. We would also like to thank Abhishek for reporting five additional use-after-free, out of bounds read, and buffer overflow flaws introduced during Firefox development that were fixed before general release . Security researcher miaubiz used the Address Sanitizer tool to discover a series critically rated of use-after-free, buffer overflow, and memory corruption issues in shipped software. These issues are potentially exploitable, allowing for remote code execution. We would also like to thank miaubiz for reporting two additional use-after-free and memory corruption issues introduced during Firefox development that were fixed before general release . The mozilla firefox packages has been upgraded to the latest version which is unaffected by these security flaws.

Platform:
Mandriva Enterprise Server 5.2
Product:
firefox
Reference:
MDVSA-2012:173
CVE-2012-5842
CVE-2012-4202
CVE-2012-4201
CVE-2012-5841
CVE-2012-4207
CVE-2012-4209
CVE-2012-4210
CVE-2012-4214
CVE-2012-4215
CVE-2012-4216
CVE-2012-5829
CVE-2012-5839
CVE-2012-5840
CVE-2012-5833
CVE-2012-5835
CVE    15
CVE-2012-5840
CVE-2012-4210
CVE-2012-5841
CVE-2012-4202
...
CPE    1
cpe:/o:mandriva:enterprise_server:5.2

© SecPod Technologies