[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

MDVSA-2011:111 -- Mandriva mozilla

ID: oval:org.secpod.oval:def:301038Date: (C)2012-01-07   (M)2023-11-18
Class: PATCHFamily: unix




Security issues were identified and fixed in mozilla firefox and thunderbird: Security researcher regenrecht reported via TippingPoint's Zero Day Initiative two instances of code which modifies SVG element lists failed to account for changes made to the list by user-supplied callbacks before accessing list elements. If a user-supplied callback deleted such an object, the element-modifying code could wind up accessing deleted memory and potentially executing attacker-controlled memory. regenrecht also reported via TippingPoint's Zero Day Initiative that a XUL document could force the nsXULCommandDispatcher to remove all command updaters from the queue, including the one currently in use. This could result in the execution of deleted memory which an attacker could use to run arbitrary code on a victim's computer . Mozilla security researcher David Chan reported that cookies set for example.com. and example.com were treated as interchangeable. This is a violation of same-origin conventions and could potentially lead to leakage of cookie data to the wrong party . Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code . Security researchers Chris Rohlf and Yan Ivnitskiy of Matasano Security reported that when a JavaScript Array object had its length set to an extremely large value, the iteration of array elements that occurs when its reduceRight method was subsequently called could result in the execution of attacker controlled memory due to an invalid index value being used to access element properties . Security researcher Martin Barbella reported that under certain conditions, viewing a XUL document while JavaScript was disabled caused deleted memory to be accessed. This flaw could potentially be used by an attacker to crash a victim's browser and run arbitrary code on their computer . Security researcher Jordi Chancel reported a crash on multipart/x-mixed-replace images due to memory corruption . Packages for 2009.0 are provided as of the Extended Maintenance Program

Platform:
Mandriva Linux 2010.1
Mandriva Linux 2009.0
Product:
mozilla
Reference:
MDVSA-2011:111
CVE-2011-2377
CVE-2011-2373
CVE-2011-2371
CVE-2011-2376
CVE-2011-2375
CVE-2011-2374
CVE-2011-2365
CVE-2011-2364
CVE-2011-2362
CVE-2011-2363
CVE-2011-0083
CVE-2011-0085
CVE    12
CVE-2011-2364
CVE-2011-2375
CVE-2011-2363
CVE-2011-2374
...
CPE    2
cpe:/o:mandriva:linux:2009.0
cpe:/o:mandriva:linux:2010.1

© SecPod Technologies