Lucene search

K
centosCentOS ProjectCESA-2012:0143
HistoryFeb 17, 2012 - 1:35 a.m.

xulrunner security update

2012-02-1701:35:23
CentOS Project
lists.centos.org
67

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

EPSS

0.802

Percentile

98.4%

CentOS Errata and Security Advisory CESA-2012:0143

XULRunner provides the XUL Runtime environment for applications using the
Gecko layout engine.

A heap-based buffer overflow flaw was found in the way XULRunner handled
PNG (Portable Network Graphics) images. A web page containing a malicious
PNG image could cause an application linked against XULRunner (such as
Firefox) to crash or, potentially, execute arbitrary code with the
privileges of the user running the application. (CVE-2011-3026)

All XULRunner users should upgrade to these updated packages, which correct
this issue. After installing the update, applications using XULRunner must
be restarted for the changes to take effect.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2012-February/080602.html
https://lists.centos.org/pipermail/centos-announce/2012-February/080605.html

Affected packages:
xulrunner
xulrunner-devel

Upstream details at:
https://access.redhat.com/errata/RHSA-2012:0143

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

EPSS

0.802

Percentile

98.4%