Lucene search

K
ubuntuUbuntuUSN-930-2
HistoryJun 29, 2010 - 12:00 a.m.

apturl, Epiphany, gecko-sharp, gnome-python-extras, liferea, rhythmbox, totem, ubufox, yelp update

2010-06-2900:00:00
ubuntu.com
40

10 High

AI Score

Confidence

High

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.729 High

EPSS

Percentile

98.1%

Releases

  • Ubuntu 8.04

Packages

  • apturl - Install package with the apt protocol
  • epiphany-browser - Intuitive web browser
  • gecko-sharp2 - CLI binding for the GtkMozEmbed library
  • gnome-python-extras - Python bindings for the GNOME desktop environment
  • liferea - feed aggregator for GNOME
  • rhythmbox - music player and organizer for GNOME
  • totem - A simple media player for the Gnome desktop
  • ubufox - Ubuntu Firefox specific configuration defaults and apt support
  • yelp - Help browser for GNOME 2

Details

USN-930-1 fixed vulnerabilities in Firefox and Xulrunner. This update
provides updated packages for use with Firefox 3.6 and Xulrunner 1.9.2 on
Ubuntu 8.04 LTS.

Original advisory details:

If was discovered that Firefox could be made to access freed memory. If a
user were tricked into viewing a malicious site, a remote attacker could
cause a denial of service or possibly execute arbitrary code with the
privileges of the user invoking the program. This issue only affected
Ubuntu 8.04 LTS. (CVE-2010-1121)

Several flaws were discovered in the browser engine of Firefox. If a
user were tricked into viewing a malicious site, a remote attacker could
cause a denial of service or possibly execute arbitrary code with the
privileges of the user invoking the program. (CVE-2010-1200, CVE-2010-1201,
CVE-2010-1202, CVE-2010-1203)

A flaw was discovered in the way plugin instances interacted. An attacker
could potentially exploit this and use one plugin to access freed memory from a
second plugin to execute arbitrary code with the privileges of the user
invoking the program. (CVE-2010-1198)

An integer overflow was discovered in Firefox. If a user were tricked into
viewing a malicious site, an attacker could overflow a buffer and cause a
denial of service or possibly execute arbitrary code with the privileges of
the user invoking the program. (CVE-2010-1196)

Martin Barbella discovered an integer overflow in an XSLT node sorting
routine. An attacker could exploit this to overflow a buffer and cause a
denial of service or possibly execute arbitrary code with the privileges of
the user invoking the program. (CVE-2010-1199)

Michal Zalewski discovered that the focus behavior of Firefox could be
subverted. If a user were tricked into viewing a malicious site, a remote
attacker could use this to capture keystrokes. (CVE-2010-1125)

Ilja van Sprundel discovered that the ‘Content-Disposition: attachment’
HTTP header was ignored when ‘Content-Type: multipart’ was also present.
Under certain circumstances, this could potentially lead to cross-site
scripting attacks. (CVE-2010-1197)

Amit Klein discovered that Firefox did not seed its random number generator
often enough. An attacker could exploit this to identify and track users
across different web sites. (CVE-2008-5913)

OSVersionArchitecturePackageVersionFilename
Ubuntu8.04noarchepiphany-gecko< 2.22.2-0ubuntu0.8.04.7UNKNOWN
Ubuntu8.04noarchepiphany-browser-dbg< 2.22.2-0ubuntu0.8.04.7UNKNOWN
Ubuntu8.04noarchapturl< 0.2.2ubuntu1.1UNKNOWN
Ubuntu8.04noarchyelp< 2.22.1-0ubuntu2.8.04.4UNKNOWN
Ubuntu8.04noarchliferea< 1.4.14-0ubuntu4.1UNKNOWN
Ubuntu8.04noarchliferea-dbg< 1.4.14-0ubuntu4.1UNKNOWN
Ubuntu8.04noarchpython-gnome2-extras< 2.19.1-0ubuntu7.2UNKNOWN
Ubuntu8.04noarchpython-gnome2-extras-dbg< 2.19.1-0ubuntu7.2UNKNOWN
Ubuntu8.04noarchpython-gtkhtml2< 2.19.1-0ubuntu7.2UNKNOWN
Ubuntu8.04noarchpython-gtkhtml2-dbg< 2.19.1-0ubuntu7.2UNKNOWN
Rows per page:
1-10 of 201

10 High

AI Score

Confidence

High

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.729 High

EPSS

Percentile

98.1%