Lucene search

K
suseSuseSUSE-SU-2012:0221-1
HistoryFeb 09, 2012 - 7:10 p.m.

Security update for Mozilla Firefox (important)

2012-02-0919:10:22
lists.opensuse.org
17

0.916 High

EPSS

Percentile

98.6%

Mozilla Firefox was updated to 3.6.26 fixing bugs and
security issues.

The following security issues have been fixed by this
update:

MFSA 2012-01: Mozilla developers identified and fixed
several memory safety bugs in the browser engine used in
Firefox and other Mozilla-based products. Some of these
bugs showed evidence of memory corruption under certain
circumstances, and we presume that with enough effort at
least some of these could be exploited to run arbitrary
code.

In general these flaws cannot be exploited through
email in the Thunderbird and SeaMonkey products because
scripting is disabled, but are potentially a risk in
browser or browser-like contexts in those products.
References

CVE-2012-0442: Jesse Ruderman and Bob Clary reported
memory safety problems that were fixed in both Firefox 10
and Firefox 3.6.26.

MFSA 2012-02/CVE-2011-3670: For historical reasons
Firefox has been generous in its interpretation of web
addresses containing square brackets around the host. If
this host was not a valid IPv6 literal address, Firefox
attempted to interpret the host as a regular domain name.
Gregory Fleischer reported that requests made using IPv6
syntax using XMLHttpRequest objects through a proxy may
generate errors depending on proxy configuration for IPv6.
The resulting error messages from the proxy may disclose
sensitive data because Same-Origin Policy (SOP) will allow
the XMLHttpRequest object to read these error messages,
allowing user privacy to be eroded. Firefox now enforces
RFC 3986 IPv6 literal syntax and that may break links
written using the non-standard Firefox-only forms that were
previously accepted.

This was fixed previously for Firefox 7.0,
Thunderbird 7.0, and SeaMonkey 2.4 but only fixed in
Firefox 3.6.26 and Thunderbird 3.1.18 during 2012.

MFSA 2012-04/CVE-2011-3659: Security researcher
regenrecht reported via TippingPoint’s Zero Day Initiative
that removed child nodes of nsDOMAttribute can be accessed
under certain circumstances because of a premature
notification of AttributeChildRemoved. This use-after-free
of the child nodes could possibly allow for for remote code
execution.

MFSA 2012-07/CVE-2012-0444: Security researcher
regenrecht reported via TippingPoint’s Zero Day Initiative
the possibility of memory corruption during the decoding of
Ogg Vorbis files. This can cause a crash during decoding
and has the potential for remote code execution.

MFSA 2012-08/CVE-2012-0449: Security researchers
Nicolas Gregoire and Aki Helin independently reported that
when processing a malformed embedded XSLT stylesheet,
Firefox can crash due to a memory corruption. While there
is no evidence that this is directly exploitable, there is
a possibility of remote code execution.