[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

SUSE-SA:2009:022 -- SUSE MozillaFirefox remote code execution

ID: oval:org.secpod.oval:def:400076Date: (C)2012-01-31   (M)2021-06-02
Class: PATCHFamily: unix




The Mozilla Firefox Browser was updated to the 3.0.8 release. It fixes two critical security issues: CVE-2009-1044: Security researcher Nils reported via TippingPoint"s Zero Day Initiative that the XUL tree method _moveToEdgeShift was in some cases triggering garbage collection routines on objects which were still in use. In such cases, the browser would crash when attempting to access a previously destroyed object and this crash could be used by an attacker to run arbitrary code on a victim"s computer. This vulnerability was used by the reporter to win the 2009 CanSecWest Pwn2Own contest. This vulnerability does not affect Firefox 2, Thunderbird 2, or released versions of SeaMonkey. CVE-2009-1169:Security researcher Guido Landi discovered that a XSL stylesheet could be used to crash the browser during a XSL transformation. An attacker could potentially use this crash to run arbitrary code on a victim"s computer. This vulnerability was also previously reported as a stability problem by Ubuntu community member, Andre. Ubuntu community member Michael Rooney reported Andre"s findings to Mozilla, and Mozilla community member Martin helped reduce Andre"s original test case and contributed a patch to fix the vulnerability.

Platform:
openSUSE 11.1
openSUSE 11.0
Product:
MozillaFirefox
Reference:
SUSE-SA:2009:022
CVE-2009-1044
CVE-2009-1169
CVE    2
CVE-2009-1044
CVE-2009-1169
CPE    2
cpe:/o:opensuse:opensuse:11.1
cpe:/o:opensuse:opensuse:11.0

© SecPod Technologies