Lucene search

K
centosCentOS ProjectCESA-2010:0332
HistoryApr 06, 2010 - 9:01 p.m.

firefox security update

2010-04-0621:01:59
CentOS Project
lists.centos.org
57

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.901 High

EPSS

Percentile

98.8%

CentOS Errata and Security Advisory CESA-2010:0332

Mozilla Firefox is an open source Web browser. XULRunner provides the XUL
Runtime environment for Mozilla Firefox.

Several use-after-free flaws were found in Firefox. Visiting a web page
containing malicious content could result in Firefox executing arbitrary
code with the privileges of the user running Firefox. (CVE-2010-0175,
CVE-2010-0176, CVE-2010-0177)

A flaw was found in Firefox that could allow an applet to generate a drag
and drop action from a mouse click. Such an action could be used to execute
arbitrary JavaScript with the privileges of the user running Firefox.
(CVE-2010-0178)

A privilege escalation flaw was found in Firefox when the Firebug add-on is
in use. The XMLHttpRequestSpy module in the Firebug add-on exposes a Chrome
privilege escalation flaw that could be used to execute arbitrary
JavaScript with the privileges of the user running Firefox. (CVE-2010-0179)

Several flaws were found in the processing of malformed web content. A web
page containing malicious content could cause Firefox to crash or,
potentially, execute arbitrary code with the privileges of the user running
Firefox. (CVE-2010-0174)

For technical details regarding these flaws, refer to the Mozilla security
advisories for Firefox 3.0.19. You can find a link to the Mozilla
advisories in the References section of this erratum.

All Firefox users should upgrade to these updated packages, which contain
Firefox version 3.0.19, which corrects these issues. After installing the
update, Firefox must be restarted for the changes to take effect.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2010-April/078785.html
https://lists.centos.org/pipermail/centos-announce/2010-April/078786.html

Affected packages:
firefox

Upstream details at:
https://access.redhat.com/errata/RHSA-2010:0332

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.901 High

EPSS

Percentile

98.8%