Sender: |
|
Date: |
Fri, 4 Mar 2011 15:11:13 -0600 |
MIME-version: |
1.0 |
Reply-To: |
|
Content-type: |
text/plain; format=flowed; charset=ISO-8859-1 |
Subject: |
|
From: |
|
Content-transfer-encoding: |
7BIT |
Comments: |
|
Parts/Attachments: |
|
|
Synopsis: Critical: firefox security update
Issue date: 2010-11-10
CVE Names: CVE-2010-3175 CVE-2010-3176 CVE-2010-3177
CVE-2010-3178 CVE-2010-3179 CVE-2010-3180
CVE-2010-3182 CVE-2010-3183 CVE-2010-3765
A race condition flaw was found in the way Firefox handled Document
Object Model (DOM) element properties. Malicious HTML content could
cause Firefox to crash or, potentially, execute arbitrary code with the
privileges of the user running Firefox. (CVE-2010-3765)
Several flaws were found in the processing of malformed web content. A
web page containing malicious content could cause Firefox to crash or,
potentially, execute arbitrary code with the privileges of the user
running Firefox. (CVE-2010-3175, CVE-2010-3176, CVE-2010-3179,
CVE-2010-3183, CVE-2010-3180)
A flaw was found in the way the Gopher parser in Firefox converted text
into HTML. A malformed file name on a Gopher server could, when accessed
by a victim running Firefox, allow arbitrary JavaScript to be executed
in the context of the Gopher domain. (CVE-2010-3177)
A same-origin policy bypass flaw was found in Firefox. An attacker could
create a malicious web page that, when viewed by a victim, could steal
private data from a different website the victim had loaded with
Firefox. (CVE-2010-3178)
A flaw was found in the script that launches Firefox. The
LD_LIBRARY_PATH variable was appending a "." character, which could
allow a local attacker to execute arbitrary code with the privileges of
a different user running Firefox, if that user ran Firefox from within
an attacker-controlled directory. (CVE-2010-3182)
For technical details regarding these flaws, refer to the Mozilla
security advisories for Firefox 3.6.11 and 3.6.12.
After installing the update, Firefox must be restarted for the changes
to take effect.
SL 6.x
SRPMS:
firefox-3.6.12-1.el6_0.src.rpm
xulrunner-1.9.2.12-1.el6_0.src.rpm
i386:
firefox-3.6.12-1.el6_0.i686.rpm
xulrunner-1.9.2.12-1.el6_0.i686.rpm
xulrunner-devel-1.9.2.12-1.el6_0.i686.rpm
x86_64:
firefox-3.6.12-1.el6_0.x86_64.rpm
xulrunner-1.9.2.12-1.el6_0.i686.rpm
xulrunner-1.9.2.12-1.el6_0.x86_64.rpm
xulrunner-devel-1.9.2.12-1.el6_0.i686.rpm
xulrunner-devel-1.9.2.12-1.el6_0.x86_64.rpm
-Connie Sieh
-Troy Dawson
|
|
|