Rapid7 Vulnerability & Exploit Database

RHSA-2012:1088: firefox security update

Back to Search

RHSA-2012:1088: firefox security update



Mozilla Firefox is an open source web browser. XULRunner provides the XULRuntime environment for Mozilla Firefox.A web page containing malicious content could cause Firefox to crash or,potentially, execute arbitrary code with the privileges of the user runningFirefox. (CVE-2012-1948, CVE-2012-1951, CVE-2012-1952, CVE-2012-1953,CVE-2012-1954, CVE-2012-1958, CVE-2012-1962, CVE-2012-1967)A malicious web page could bypass same-compartment security wrappers (SCSW)and execute arbitrary code with chrome privileges. (CVE-2012-1959)A flaw in the context menu functionality in Firefox could allow a maliciouswebsite to bypass intended restrictions and allow a cross-site scriptingattack. (CVE-2012-1966)A page different to that in the address bar could be displayed whendragging and dropping to the address bar, possibly making it easier for amalicious site or user to perform a phishing attack. (CVE-2012-1950)A flaw in the way Firefox called history.forward and history.back couldallow an attacker to conceal a malicious URL, possibly tricking a userinto believing they are viewing a trusted site. (CVE-2012-1955)A flaw in a parser utility class used by Firefox to parse feeds (such asRSS) could allow an attacker to execute arbitrary JavaScript with theprivileges of the user running Firefox. This issue could have affectedother browser components or add-ons that assume the class returnssanitized input. (CVE-2012-1957)A flaw in the way Firefox handled X-Frame-Options headers could allow amalicious website to perform a clickjacking attack. (CVE-2012-1961)A flaw in the way Content Security Policy (CSP) reports were generated byFirefox could allow a malicious web page to steal a victim's OAuth 2.0access tokens and OpenID credentials. (CVE-2012-1963)A flaw in the way Firefox handled certificate warnings could allow aman-in-the-middle attacker to create a crafted warning, possibly trickinga user into accepting an arbitrary certificate as trusted. (CVE-2012-1964)A flaw in the way Firefox handled feed:javascript URLs could allow outputfiltering to be bypassed, possibly leading to a cross-site scriptingattack. (CVE-2012-1965)The nss update RHBA-2012:0337 for Red Hat Enterprise Linux 5 and 6introduced a mitigation for the CVE-2011-3389 flaw. For compatibilityreasons, it remains disabled by default in the nss packages. This updatemakes Firefox enable the mitigation by default. It can be disabled bysetting the NSS_SSL_CBC_RANDOM_IV environment variable to 0 beforelaunching Firefox. (BZ#838879)For technical details regarding these flaws, refer to the Mozilla securityadvisories for Firefox 10.0.6 ESR. You can find a link to the Mozillaadvisories in the References section of this erratum.Red Hat would like to thank the Mozilla project for reporting these issues.Upstream acknowledges Benoit Jacob, Jesse Ruderman, Christian Holler, BillMcCloskey, Abhishek Arya, Arthur Gerkis, Bill Keese, moz_bug_r_a4, BobbyHolley, Code Audit Labs, Mariusz Mlynski, Mario Heiderich, Frédéric Buclin,Karthikeyan Bhargavan, Matt McCutchen, Mario Gomes, and Soroush Dalili asthe original reporters of these issues.All Firefox users should upgrade to these updated packages, which containFirefox version 10.0.6 ESR, which corrects these issues. After installingthe update, Firefox must be restarted for the changes to take effect.


  • redhat-upgrade-firefox
  • redhat-upgrade-firefox-debuginfo
  • redhat-upgrade-xulrunner
  • redhat-upgrade-xulrunner-debuginfo
  • redhat-upgrade-xulrunner-devel

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center