Rapid7 Vulnerability & Exploit Database

RHSA-2009:1530: firefox security update

Back to Search

RHSA-2009:1530: firefox security update

Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
10/29/2009
Created
07/25/2018
Added
11/02/2009
Modified
07/04/2017

Description

Mozilla Firefox is an open source Web browser. XULRunner provides the XULRuntime environment for Mozilla Firefox. nspr provides the NetscapePortable Runtime (NSPR).A flaw was found in the way Firefox handles form history. A malicious webpage could steal saved form data by synthesizing input events, causing thebrowser to auto-fill form fields (which could then be read by an attacker).(CVE-2009-3370)A flaw was found in the way Firefox creates temporary file names fordownloaded files. If a local attacker knows the name of a file Firefox isgoing to download, they can replace the contents of that file witharbitrary contents. (CVE-2009-3274)A flaw was found in the Firefox Proxy Auto-Configuration (PAC) fileprocessor. If Firefox loads a malicious PAC file, it could crash Firefoxor, potentially, execute arbitrary code with the privileges of the userrunning Firefox. (CVE-2009-3372)A heap-based buffer overflow flaw was found in the Firefox GIF imageprocessor. A malicious GIF image could crash Firefox or, potentially,execute arbitrary code with the privileges of the user running Firefox.(CVE-2009-3373)A heap-based buffer overflow flaw was found in the Firefox string tofloating point conversion routines. A web page containing maliciousJavaScript could crash Firefox or, potentially, execute arbitrary code withthe privileges of the user running Firefox. (CVE-2009-1563)A flaw was found in the way Firefox handles text selection. A maliciouswebsite may be able to read highlighted text in a different domain (e.g.another website the user is viewing), bypassing the same-origin policy.(CVE-2009-3375)A flaw was found in the way Firefox displays a right-to-left overridecharacter when downloading a file. In these cases, the name displayed inthe title bar differs from the name displayed in the dialog body. Anattacker could use this flaw to trick a user into downloading a file thathas a file name or extension that differs from what the user expected.(CVE-2009-3376)Several flaws were found in the processing of malformed web content. A webpage containing malicious content could cause Firefox to crash or,potentially, execute arbitrary code with the privileges of the user runningFirefox. (CVE-2009-3374, CVE-2009-3380, CVE-2009-3382)For technical details regarding these flaws, refer to the Mozilla securityadvisories for Firefox 3.0.15. You can find a link to the Mozillaadvisories in the References section of this errata.All Firefox users should upgrade to these updated packages, which containFirefox version 3.0.15, which corrects these issues. After installing theupdate, Firefox must be restarted for the changes to take effect.

Solution(s)

  • redhat-upgrade-firefox
  • redhat-upgrade-nspr
  • redhat-upgrade-nspr-devel
  • redhat-upgrade-xulrunner
  • redhat-upgrade-xulrunner-devel
  • redhat-upgrade-xulrunner-devel-unstable

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;