Rapid7 Vulnerability & Exploit Database

RHSA-2009:0397: firefox security update

Back to Search

RHSA-2009:0397: firefox security update

Severity
9
CVSS
(AV:N/AC:M/Au:N/C:C/I:C/A:C)
Published
03/26/2009
Created
07/25/2018
Added
09/12/2009
Modified
07/04/2017

Description

Mozilla Firefox is an open source Web browser. XULRunner provides the XULRuntime environment for Mozilla Firefox.A memory corruption flaw was discovered in the way Firefox handles XMLfiles containing an XSLT transform. A remote attacker could use this flawto crash Firefox or, potentially, execute arbitrary code as the userrunning Firefox. (CVE-2009-1169)A flaw was discovered in the way Firefox handles certain XUL garbagecollection events. A remote attacker could use this flaw to crash Firefoxor, potentially, execute arbitrary code as the user running Firefox.(CVE-2009-1044)For technical details regarding these flaws, refer to the Mozilla securityadvisories. You can find a link to the Mozilla advisories in the Referencessection of this errata.Firefox users should upgrade to these updated packages, which resolve theseissues. For Red Hat Enterprise Linux 4, they contain backported patches tothe firefox package. For Red Hat Enterprise Linux 5, they containbackported patches to the xulrunner packages. After installing the update,Firefox must be restarted for the changes to take effect.

Solution(s)

  • redhat-upgrade-firefox
  • redhat-upgrade-xulrunner
  • redhat-upgrade-xulrunner-devel
  • redhat-upgrade-xulrunner-devel-unstable

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;