[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244625

 
 

909

 
 

193379

 
 

277

Paid content will be excluded from the download.


Download | Alert*
OVAL

MDVSA-2012:032 -- Mandriva mozilla

ID: oval:org.secpod.oval:def:302796Date: (C)2012-12-11   (M)2023-11-19
Class: PATCHFamily: unix




Security issues were identified and fixed in mozilla firefox and thunderbird: Security researchers Blair Strang and Scott Bell of Security Assessment found that when a parent window spawns and closes a child window that uses the file open dialog, a crash can be induced in shlwapi.dll on 32-bit Windows 7 systems. This crash may be potentially exploitable . Firefox prevents the dropping of javascript: links onto a frame to prevent malicious sites from tricking users into performing a cross-site scripting attacks on themselves. Security researcher Soroush Dalili reported a way to bypass this protection . Security researcher Atte Kettunen from OUSPG found two issues with Firefox's handling of SVG using the Address Sanitizer tool. The first issue, critically rated, is a use-after-free in SVG animation that could potentially lead to arbitrary code execution. The second issue is rated moderate and is an out of bounds read in SVG Filters. This could potentially incorporate data from the user's memory, making it accessible to the page content . Security Researcher Mike Brooks of Sitewatch reported that if multiple Content Security Policy headers are present on a page, they have an additive effect page policy. Using carriage return line feed injection, a new CSP rule can be introduced which allows for cross-site scripting on sites with a separate header injection vulnerability . Security researcher Mariusz Mlynski reported that an attacker able to convince a potential victim to set a new home page by dragging a link to the home button can set that user's home page to a javascript: URL. Once this is done the attacker's page can cause repeated crashes of the browser, eventually getting the script URL loaded in the privileged about:sessionrestore context . Mozilla community member Daniel Glazman of Disruptive Innovations reported a crash when accessing a keyframe's cssText after dynamic modification. This crash may be potentially exploitable . Mozilla developer Matt Brubeck reported that window.fullScreen is writeable by untrusted content now that the DOM fullscreen API is enabled. Because window.fullScreen does not include mozRequestFullscreen's security protections, it could be used for UI spoofing. This code change makes window.fullScreen read only by untrusted content, forcing the use of the DOM fullscreen API in normal usage . Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code . The mozilla firefox and thunderbird packages has been upgraded to the latest respective versions which is unaffected by these security flaws. Additionally the NSS and NSPR packages has been upgraded to the latest versions. The OpenJDK java plugin has been upgraded to the 1.1.5 version which has better support for firefox 10.x+.

Platform:
Mandriva Linux 2011.0
Product:
mozilla
Reference:
MDVSA-2012:032
CVE-2012-0464
CVE-2012-0462
CVE-2012-0461
CVE-2012-0460
CVE-2012-0459
CVE-2012-0458
CVE-2012-0451
CVE-2012-0457
CVE-2012-0456
CVE-2012-0454
CVE-2012-0455
CVE    11
CVE-2012-0459
CVE-2012-0458
CVE-2012-0457
CVE-2012-0456
...
CPE    1
cpe:/o:mandriva:linux:2011.0

© SecPod Technologies