Rapid7 Vulnerability & Exploit Database

USN-1197-1: Firefox and Xulrunner vulnerability

Free InsightVM Trial No credit card necessary
Watch Demo See how it all works
Back to Search

USN-1197-1: Firefox and Xulrunner vulnerability

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
08/31/2011
Created
07/25/2018
Added
08/31/2011
Modified
07/09/2020

Description

It was discovered that Dutch Certificate Authority DigiNotar hadmis-issued multiple fraudulent certificates. These certificates could allowan attacker to perform a "man in the middle" (MITM) attack which would makethe user believe their connection is secure, but is actually beingmonitored. For the protection of its users, Mozilla has removed the DigiNotarcertificate. Sites using certificates issued by DigiNotar will need to seekanother certificate vendor. We are currently aware of a regression that blocks one of two Staat derNederlanden root certificates which are believed to still be secure. Thisregression is being tracked at https://launchpad.net/bugs/838322. The problem can be corrected by updating your system to the following package version: To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades. After a standard system upgrade you need to restart Firefox and anyapplications that use Xulrunner to effect the necessary changes. LP: 837557, LP: 838322

Solution(s)

  • ubuntu-upgrade-firefox
  • ubuntu-upgrade-xulrunner-1-9-2

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;