Rapid7 Vulnerability & Exploit Database

RHSA-2010:0861: firefox security update

Back to Search

RHSA-2010:0861: firefox security update

Severity
9
CVSS
(AV:N/AC:M/Au:N/C:C/I:C/A:C)
Published
10/27/2010
Created
07/25/2018
Added
11/18/2010
Modified
07/04/2017

Description

Mozilla Firefox is an open source web browser. XULRunner provides the XULRuntime environment for Mozilla Firefox.A race condition flaw was found in the way Firefox handled Document ObjectModel (DOM) element properties. Malicious HTML content could cause Firefoxto crash or, potentially, execute arbitrary code with the privileges of theuser running Firefox. (CVE-2010-3765)Several flaws were found in the processing of malformed web content. A webpage containing malicious content could cause Firefox to crash or,potentially, execute arbitrary code with the privileges of the user runningFirefox. (CVE-2010-3175, CVE-2010-3176, CVE-2010-3179, CVE-2010-3183,CVE-2010-3180)A flaw was found in the way the Gopher parser in Firefox converted textinto HTML. A malformed file name on a Gopher server could, when accessed bya victim running Firefox, allow arbitrary JavaScript to be executed in thecontext of the Gopher domain. (CVE-2010-3177)A same-origin policy bypass flaw was found in Firefox. An attacker couldcreate a malicious web page that, when viewed by a victim, could stealprivate data from a different website the victim had loaded with Firefox.(CVE-2010-3178)A flaw was found in the script that launches Firefox. The LD_LIBRARY_PATHvariable was appending a "." character, which could allow a local attackerto execute arbitrary code with the privileges of a different user runningFirefox, if that user ran Firefox from within an attacker-controlleddirectory. (CVE-2010-3182)For technical details regarding these flaws, refer to the Mozilla securityadvisories for Firefox 3.6.11 and 3.6.12. You can find links to the Mozillaadvisories in the References section of this erratum.All Firefox users should upgrade to these updated packages, which containFirefox version 3.6.12, which corrects these issues. After installing theupdate, Firefox must be restarted for the changes to take effect.

Solution(s)

  • redhat-upgrade-firefox
  • redhat-upgrade-firefox-debuginfo
  • redhat-upgrade-xulrunner
  • redhat-upgrade-xulrunner-debuginfo
  • redhat-upgrade-xulrunner-devel

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;