Lucene search

K
centosCentOS ProjectCESA-2010:0809
HistoryOct 28, 2010 - 10:41 p.m.

xulrunner security update

2010-10-2822:41:34
CentOS Project
lists.centos.org
55

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.971 High

EPSS

Percentile

99.8%

CentOS Errata and Security Advisory CESA-2010:0809

XULRunner provides the XUL Runtime environment for applications using the
Gecko layout engine.

A race condition flaw was found in the way XULRunner handled Document
Object Model (DOM) element properties. Malicious HTML content could cause
an application linked against XULRunner (such as Firefox) to crash or,
potentially, execute arbitrary code with the privileges of the user running
the application. (CVE-2010-3765)

For technical details regarding this flaw, refer to the Mozilla security
advisories for Firefox 3.6.12. You can find a link to the Mozilla
advisories in the References section of this erratum.

All XULRunner users should upgrade to these updated packages, which contain
a backported patch to correct this issue. After installing the update,
applications using XULRunner must be restarted for the changes to take
effect.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2010-October/079293.html
https://lists.centos.org/pipermail/centos-announce/2010-October/079294.html

Affected packages:
xulrunner
xulrunner-devel

Upstream details at:
https://access.redhat.com/errata/RHSA-2010:0809

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.971 High

EPSS

Percentile

99.8%