Lucene search

K
redhatRedHatRHSA-2010:0966
HistoryDec 09, 2010 - 12:00 a.m.

(RHSA-2010:0966) Critical: firefox security update

2010-12-0900:00:00
access.redhat.com
30

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.429 Medium

EPSS

Percentile

97.0%

Mozilla Firefox is an open source web browser.

Several flaws were found in the processing of malformed web content. A web
page containing malicious content could cause Firefox to crash or,
potentially, execute arbitrary code with the privileges of the user running
Firefox. (CVE-2010-3766, CVE-2010-3767, CVE-2010-3772, CVE-2010-3776,
CVE-2010-3777)

A flaw was found in the way Firefox handled malformed JavaScript. A website
with an object containing malicious JavaScript could cause Firefox to
execute that JavaScript with the privileges of the user running Firefox.
(CVE-2010-3771)

This update adds support for the Sanitiser for OpenType (OTS) library to
Firefox. This library helps prevent potential exploits in malformed
OpenType fonts by verifying the font file prior to use. (CVE-2010-3768)

A flaw was found in the way Firefox loaded Java LiveConnect scripts.
Malicious web content could load a Java LiveConnect script in a way that
would result in the plug-in object having elevated privileges, allowing it
to execute Java code with the privileges of the user running Firefox.
(CVE-2010-3775)

It was found that the fix for CVE-2010-0179 was incomplete when the Firebug
add-on was used. If a user visited a website containing malicious
JavaScript while the Firebug add-on was enabled, it could cause Firefox to
execute arbitrary JavaScript with the privileges of the user running
Firefox. (CVE-2010-3773)

A flaw was found in the way Firefox presented the location bar to users. A
malicious website could trick a user into thinking they are visiting the
site reported by the location bar, when the page is actually content
controlled by an attacker. (CVE-2010-3774)

A cross-site scripting (XSS) flaw was found in the Firefox x-mac-arabic,
x-mac-farsi, and x-mac-hebrew character encodings. Certain characters were
converted to angle brackets when displayed. If server-side script filtering
missed these cases, it could result in Firefox executing JavaScript code
with the permissions of a different website. (CVE-2010-3770)

For technical details regarding these flaws, refer to the Mozilla security
advisories for Firefox 3.6.13. You can find a link to the Mozilla
advisories in the References section of this erratum.

All Firefox users should upgrade to these updated packages, which contain
Firefox version 3.6.13, which corrects these issues. After installing the
update, Firefox must be restarted for the changes to take effect.

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.429 Medium

EPSS

Percentile

97.0%