[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250363

 
 

909

 
 

196124

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

MDVSA-2013:087 -- Mandriva firefox

ID: oval:org.secpod.oval:def:1300178Date: (C)2013-04-17   (M)2023-12-07
Class: PATCHFamily: unix




Multiple security issues was identified and fixed in mozilla firefox: Security researcher Mariusz Mlynski reported a method to use browser navigations through history to load an arbitrary website with that page's baseURI property pointing to another site instead of the seemingly loaded one. The user will continue to see the incorrect site in the addressbar of the browser. This allows for a cross-site scripting attack or the theft of data through a phishing attack . Security researcher Cody Crews reported a mechanism to use the cloneNode method to bypass System Only Wrappers and clone a protected node. This allows violation of the browser's same origin policy and could also lead to privilege escalation and the execution of arbitrary code . Security researcher miaubiz used the Address Sanitizer tool to discover a crash in WebGL rendering when memory is freed that has not previously been allocated. This issue only affects Linux users who have Intel Mesa graphics drivers. The resulting crash could be potentially exploitable . Security researcher Abhishek Arya of the Google Chrome Security Team used the Address Sanitizer tool to discover an out-of-bounds write in Cairo graphics library. When certain values are passed to it during rendering, Cairo attempts to use negative boundaries or sizes for boxes, leading to a potentially exploitable crash in some instances . Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code . The mozilla firefox packages has been upgraded to the latest ESR version which is unaffected by these security flaws.

Platform:
Mandriva Enterprise Server 5.2
Product:
firefox
Reference:
MDVSA-2013:087
CVE-2013-0793
CVE-2013-0795
CVE-2013-0796
CVE-2013-0800
CVE-2013-0788
CVE    5
CVE-2013-0796
CVE-2013-0795
CVE-2013-0793
CVE-2013-0788
...
CPE    1
cpe:/o:mandriva:enterprise_server:5.2

© SecPod Technologies