Lucene search

K
ubuntuUbuntuUSN-1600-1
HistoryOct 09, 2012 - 12:00 a.m.

Firefox vulnerabilities

2012-10-0900:00:00
ubuntu.com
30

9.1 High

AI Score

Confidence

High

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.713 High

EPSS

Percentile

98.0%

Releases

  • Ubuntu 12.04
  • Ubuntu 11.10
  • Ubuntu 11.04
  • Ubuntu 10.04

Packages

  • firefox - Mozilla Open Source web browser

Details

Henrik Skupin, Jesse Ruderman, Christian Holler, Soroush Dalili and others
discovered several memory corruption flaws in Firefox. If a user were
tricked into opening a specially crafted web page, a remote attacker could
cause Firefox to crash or potentially execute arbitrary code as the user
invoking the program. (CVE-2012-3982, CVE-2012-3983, CVE-2012-3988,
CVE-2012-3989)

David Bloom and Jordi Chancel discovered that Firefox did not always
properly handle the element. A remote attacker could exploit this
to conduct URL spoofing and clickjacking attacks. (CVE-2012-3984)

Collin Jackson discovered that Firefox did not properly follow the HTML5
specification for document.domain behavior. A remote attacker could exploit
this to conduct cross-site scripting (XSS) attacks via javascript
execution. (CVE-2012-3985)

Johnny Stenback discovered that Firefox did not properly perform security
checks on test methods for DOMWindowUtils. (CVE-2012-3986)

Alice White discovered that the security checks for GetProperty could be
bypassed when using JSAPI. If a user were tricked into opening a specially
crafted web page, a remote attacker could exploit this to execute arbitrary
code as the user invoking the program. (CVE-2012-3991)

Mariusz Mlynski discovered a history state error in Firefox. A remote
attacker could exploit this to spoof the location property to inject script
or intercept posted data. (CVE-2012-3992)

Mariusz Mlynski and others discovered several flaws in Firefox that allowed
a remote attacker to conduct cross-site scripting (XSS) attacks.
(CVE-2012-3993, CVE-2012-3994, CVE-2012-4184)

Abhishek Arya, Atte Kettunen and others discovered several memory flaws in
Firefox when using the Address Sanitizer tool. If a user were tricked into
opening a specially crafted web page, a remote attacker could cause Firefox
to crash or potentially execute arbitrary code as the user invoking the
program. (CVE-2012-3990, CVE-2012-3995, CVE-2012-4179, CVE-2012-4180,
CVE-2012-4181, CVE-2012-4182, CVE-2012-4183, CVE-2012-4185, CVE-2012-4186,
CVE-2012-4187, CVE-2012-4188)

OSVersionArchitecturePackageVersionFilename
Ubuntu12.04noarchfirefox< 16.0+build1-0ubuntu0.12.04.1UNKNOWN
Ubuntu12.04noarchabrowser< 16.0+build1-0ubuntu0.12.04.1UNKNOWN
Ubuntu12.04noarchabrowser-branding< 16.0+build1-0ubuntu0.12.04.1UNKNOWN
Ubuntu12.04noarchfirefox-branding< 16.0+build1-0ubuntu0.12.04.1UNKNOWN
Ubuntu12.04noarchfirefox-dbg< 16.0+build1-0ubuntu0.12.04.1UNKNOWN
Ubuntu12.04noarchfirefox-dev< 16.0+build1-0ubuntu0.12.04.1UNKNOWN
Ubuntu12.04noarchfirefox-globalmenu< 16.0+build1-0ubuntu0.12.04.1UNKNOWN
Ubuntu12.04noarchfirefox-gnome-support< 16.0+build1-0ubuntu0.12.04.1UNKNOWN
Ubuntu12.04noarchfirefox-gnome-support-dbg< 16.0+build1-0ubuntu0.12.04.1UNKNOWN
Ubuntu12.04noarchfirefox-locale-af< 16.0+build1-0ubuntu0.12.04.1UNKNOWN
Rows per page:
1-10 of 3551

9.1 High

AI Score

Confidence

High

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.713 High

EPSS

Percentile

98.0%