Subject: | |
From: | |
Reply To: | |
Date: | Wed, 20 Oct 2010 13:32:33 -0500 |
Content-Type: | text/plain |
Parts/Attachments: |
|
|
Synopsis: Critical: firefox security update
Issue date: 2010-10-19
CVE Names: CVE-2010-3170 CVE-2010-3173 CVE-2010-3175
CVE-2010-3176 CVE-2010-3177 CVE-2010-3178
CVE-2010-3179 CVE-2010-3180 CVE-2010-3182
CVE-2010-3183
Several flaws were found in the processing of malformed web content. A
web page containing malicious content could cause Firefox to crash or,
potentially, execute arbitrary code with the privileges of the user
running Firefox. (CVE-2010-3175, CVE-2010-3176, CVE-2010-3179,
CVE-2010-3183, CVE-2010-3180)
A flaw was found in the way the Gopher parser in Firefox converted text
into HTML. A malformed file name on a Gopher server could, when accessed
by a victim running Firefox, allow arbitrary JavaScript to be executed
in the context of the Gopher domain. (CVE-2010-3177)
A same-origin policy bypass flaw was found in Firefox. An attacker could
create a malicious web page that, when viewed by a victim, could steal
private data from a different website the victim has loaded with
Firefox. (CVE-2010-3178)
A flaw was found in the script that launches Firefox. The
LD_LIBRARY_PATH variable was appending a "." character, which could
allow a local attacker to execute arbitrary code with the privileges of
a different user running Firefox, if that user ran Firefox from within
an attacker-controlled directory. (CVE-2010-3182)
This update also provides NSS version 3.12.8 which is required by the
updated Firefox version, fixing the following security issues:
It was found that the SSL DHE (Diffie-Hellman Ephemeral) mode
implementation for key exchanges in Firefox accepted DHE keys that were
256 bits in length. This update removes support for 256 bit DHE keys, as
such keys are easily broken using modern hardware. (CVE-2010-3173)
A flaw was found in the way NSS matched SSL certificates when the
certificates had a Common Name containing a wildcard and a partial IP
address. NSS incorrectly accepted connections to IP addresses that fell
within the SSL certificate's wildcard range as valid SSL connections,
possibly allowing an attacker to conduct a man-in-the-middle attack.
(CVE-2010-3170)
After installing the update, Firefox must be restarted for the changes
to take effect.
SL 4.x
SRPMS:
firefox-3.6.11-2.el4.src.rpm
nss-3.12.8-1.el4.src.rpm
i386:
firefox-3.6.11-2.el4.i386.rpm
nss-3.12.8-1.el4.i386.rpm
nss-devel-3.12.8-1.el4.i386.rpm
nss-tools-3.12.8-1.el4.i386.rpm
x86_64:
firefox-3.6.11-2.el4.i386.rpm
firefox-3.6.11-2.el4.x86_64.rpm
nss-3.12.8-1.el4.i386.rpm
nss-3.12.8-1.el4.x86_64.rpm
nss-devel-3.12.8-1.el4.x86_64.rpm
nss-tools-3.12.8-1.el4.x86_64.rpm
SL 5.x
SRPMS:
firefox-3.6.11-2.el5.src.rpm
nss-3.12.8-1.el5.src.rpm
xulrunner-1.9.2.11-2.el5.src.rpm
i386:
firefox-3.6.11-2.el5.i386.rpm
nss-3.12.8-1.el5.i386.rpm
nss-devel-3.12.8-1.el5.i386.rpm
nss-pkcs11-devel-3.12.8-1.el5.i386.rpm
nss-tools-3.12.8-1.el5.i386.rpm
xulrunner-1.9.2.11-2.el5.i386.rpm
xulrunner-devel-1.9.2.11-2.el5.i386.rpm
x86_64:
firefox-3.6.11-2.el5.i386.rpm
firefox-3.6.11-2.el5.x86_64.rpm
nss-3.12.8-1.el5.i386.rpm
nss-3.12.8-1.el5.x86_64.rpm
nss-devel-3.12.8-1.el5.i386.rpm
nss-devel-3.12.8-1.el5.x86_64.rpm
nss-pkcs11-devel-3.12.8-1.el5.i386.rpm
nss-pkcs11-devel-3.12.8-1.el5.x86_64.rpm
nss-tools-3.12.8-1.el5.x86_64.rpm
xulrunner-1.9.2.11-2.el5.i386.rpm
xulrunner-1.9.2.11-2.el5.x86_64.rpm
xulrunner-devel-1.9.2.11-2.el5.i386.rpm
xulrunner-devel-1.9.2.11-2.el5.x86_64.rpm
-Connie Sieh
-Troy Dawson
|
|
|