xulrunner -- several vulnerabilities

2010-04-03T00:00:00
ID DSA-2027
Type debian
Reporter Debian
Modified 2010-04-03T00:00:00

Description

Several remote vulnerabilities have been discovered in Xulrunner, a runtime environment for XUL applications, such as the Iceweasel web browser. The Common Vulnerabilities and Exposures project identifies the following problems:

Jesse Ruderman and Ehsan Akhgari discovered crashes in the layout engine, which might allow the execution of arbitrary code.

It was discovered that incorrect memory handling in the XUL event handler might allow the execution of arbitrary code.

It was discovered that incorrect memory handling in the XUL event handler might allow the execution of arbitrary code.

It was discovered that incorrect memory handling in the plugin code might allow the execution of arbitrary code.

Paul Stone discovered that forced drag-and-drop events could lead to Chrome privilege escalation.

It was discovered that a programming error in the XMLHttpRequestSpy module could lead to the execution of arbitrary code.

For the stable distribution (lenny), these problems have been fixed in version 1.9.0.19-1.

For the unstable distribution (sid), these problems will be fixed soon.

We recommend that you upgrade your xulrunner packages.