Lucene search

K
centosCentOS ProjectCESA-2009:0256
HistoryFeb 05, 2009 - 12:56 a.m.

firefox, nss, xulrunner security update

2009-02-0500:56:08
CentOS Project
lists.centos.org
53

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.483 Medium

EPSS

Percentile

97.4%

CentOS Errata and Security Advisory CESA-2009:0256

Mozilla Firefox is an open source Web browser.

Several flaws were found in the processing of malformed web content. A web
page containing malicious content could cause Firefox to crash or,
potentially, execute arbitrary code as the user running Firefox.
(CVE-2009-0352, CVE-2009-0353, CVE-2009-0356)

Several flaws were found in the way malformed content was processed. A
website containing specially-crafted content could, potentially, trick a
Firefox user into surrendering sensitive information. (CVE-2009-0354,
CVE-2009-0355)

A flaw was found in the way Firefox treated HTTPOnly cookies. An attacker
able to execute arbitrary JavaScript on a target site using HTTPOnly
cookies may be able to use this flaw to steal the cookie. (CVE-2009-0357)

A flaw was found in the way Firefox treated certain HTTP page caching
directives. A local attacker could steal the contents of sensitive pages
which the page author did not intend to be cached. (CVE-2009-0358)

For technical details regarding these flaws, please see the Mozilla
security advisories for Firefox 3.0.6. You can find a link to the Mozilla
advisories in the References section.

All Firefox users should upgrade to these updated packages, which contain
Firefox version 3.0.6, which corrects these issues. After installing the
update, Firefox must be restarted for the changes to take effect.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2009-February/077767.html
https://lists.centos.org/pipermail/centos-announce/2009-February/077768.html
https://lists.centos.org/pipermail/centos-announce/2009-February/077769.html
https://lists.centos.org/pipermail/centos-announce/2009-February/077770.html
https://lists.centos.org/pipermail/centos-announce/2009-February/077779.html
https://lists.centos.org/pipermail/centos-announce/2009-February/077785.html

Affected packages:
firefox
nss
nss-devel
nss-pkcs11-devel
nss-tools
xulrunner
xulrunner-devel
xulrunner-devel-unstable

Upstream details at:
https://access.redhat.com/errata/RHSA-2009:0256

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.483 Medium

EPSS

Percentile

97.4%