Executive Summary
Summary | |
---|---|
Title | firefox security and bug fix update |
Informations | |||
---|---|---|---|
Name | RHSA-2012:0387 | First vendor Publication | 2012-03-14 |
Vendor | RedHat | Last vendor Modification | 2012-03-14 |
Severity (Vendor) | Critical | Revision | 01 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Problem Description: Updated firefox packages that fix multiple security issues and three bugs are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: Mozilla Firefox is an open source web browser. Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2012-0461, CVE-2012-0462, CVE-2012-0464) Two flaws were found in the way Firefox parsed certain Scalable Vector Graphics (SVG) image files. A web page containing a malicious SVG image file could cause an information leak, or cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2012-0456, CVE-2012-0457) A flaw could allow a malicious site to bypass intended restrictions, possibly leading to a cross-site scripting (XSS) attack if a user were tricked into dropping a "javascript:" link onto a frame. (CVE-2012-0455) It was found that the home page could be set to a "javascript:" link. If a user were tricked into setting such a home page by dragging a link to the home button, it could cause Firefox to repeatedly crash, eventually leading to arbitrary code execution with the privileges of the user running Firefox. (CVE-2012-0458) A flaw was found in the way Firefox parsed certain web content containing "cssText". A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2012-0459) It was found that by using the DOM fullscreen API, untrusted content could bypass the mozRequestFullscreen security protections. A web page containing malicious web content could exploit this API flaw to cause user interface spoofing. (CVE-2012-0460) A flaw was found in the way Firefox handled pages with multiple Content Security Policy (CSP) headers. This could lead to a cross-site scripting attack if used in conjunction with a website that has a header injection flaw. (CVE-2012-0451) For technical details regarding these flaws, refer to the Mozilla security advisories for Firefox 10.0.3 ESR. You can find a link to the Mozilla advisories in the References section of this erratum. This update also fixes the following bugs: * When using the Traditional Chinese locale (zh-TW), a segmentation fault sometimes occurred when closing Firefox. (BZ#729632) * Inputting any text in the Web Console (Tools -> Web Developer -> Web Console) caused Firefox to crash. (BZ#784048) * The java-1.6.0-ibm-plugin and java-1.6.0-sun-plugin packages require the "/usr/lib/mozilla/plugins/" directory on 32-bit systems, and the "/usr/lib64/mozilla/plugins/" directory on 64-bit systems. These directories are created by the xulrunner package; however, they were missing from the xulrunner package provided by the RHEA-2012:0327 update. Therefore, upgrading to RHEA-2012:0327 removed those directories, causing dependency errors when attempting to install the java-1.6.0-ibm-plugin or java-1.6.0-sun-plugin package. With this update, xulrunner once again creates the plugins directory. This issue did not affect users of Red Hat Enterprise Linux |
Original Source
Url : https://rhn.redhat.com/errata/RHSA-2012-0387.html |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
38 % | CWE-264 | Permissions, Privileges, and Access Controls |
25 % | CWE-399 | Resource Management Errors |
12 % | CWE-200 | Information Exposure |
12 % | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
12 % | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25) |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:14170 | |||
Oval ID: | oval:org.mitre.oval:def:14170 | ||
Title: | Use-after-free vulnerability in the browser engine in Mozilla Firefox before 3.6.28 and 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird before 3.1.20 and 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 allows remote attackers to execute arbitrary code via vectors involving an empty argument to the array.join function in conjunction with the triggering of garbage collection. | ||
Description: | Use-after-free vulnerability in the browser engine in Mozilla Firefox before 3.6.28 and 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird before 3.1.20 and 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 allows remote attackers to execute arbitrary code via vectors involving an empty argument to the array.join function in conjunction with the triggering of garbage collection. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-0464 | Version: | 23 |
Platform(s): | Microsoft Windows 7 Microsoft Windows Server 2008 Microsoft Windows Vista Microsoft Windows Server 2003 Microsoft Windows XP Microsoft Windows 2000 | Product(s): | Mozilla Firefox Mozilla Thunderbird Mozilla Seamonkey Mozilla Firefox ESR Mozilla Thunderbird ESR |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:14590 | |||
Oval ID: | oval:org.mitre.oval:def:14590 | ||
Title: | DSA-2433-1 iceweasel -- several | ||
Description: | Several vulnerabilities have been discovered in Iceweasel, a web browser based on Firefox. The included XULRunner library provides rendering services for several other applications included in Debian. CVE-2012-0455 Soroush Dalili discovered that a cross-site scripting countermeasure related to Javascript URLs could be bypassed. CVE-2012-0456 Atte Kettunen discovered an out of bounds read in the SVG Filters, resulting in memory disclosure. CVE-2012-0458 Mariusz Mlynski discovered that privileges could be escalated through a Javascript URL as the home page. CVE-2012-0461 Bob Clary discovered memory corruption bugs, which may lead to the execution of arbitrary code. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2433-1 CVE-2012-0455 CVE-2012-0456 CVE-2012-0458 CVE-2012-0461 | Version: | 5 |
Platform(s): | Debian GNU/Linux 6.0 Debian GNU/kFreeBSD 6.0 | Product(s): | iceweasel |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:14716 | |||
Oval ID: | oval:org.mitre.oval:def:14716 | ||
Title: | USN-1401-1 -- Xulrunner vulnerabilities | ||
Description: | xulrunner-1.9.2: Mozilla Gecko runtime environment Several security issues were fixed in Firefox. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1401-1 CVE-2011-3658 CVE-2012-0457 CVE-2012-0456 CVE-2012-0455 CVE-2012-0458 CVE-2012-0461 CVE-2012-0464 | Version: | 5 |
Platform(s): | Ubuntu 10.10 Ubuntu 10.04 | Product(s): | Xulrunner |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:14775 | |||
Oval ID: | oval:org.mitre.oval:def:14775 | ||
Title: | Use-after-free vulnerability in the nsSMILTimeValueSpec::ConvertBetweenTimeContainer function in Mozilla Firefox before 3.6.28 and 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird before 3.1.20 and 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 might allow remote attackers to execute arbitrary code via an SVG animation. | ||
Description: | Use-after-free vulnerability in the nsSMILTimeValueSpec::ConvertBetweenTimeContainer function in Mozilla Firefox before 3.6.28 and 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird before 3.1.20 and 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 might allow remote attackers to execute arbitrary code via an SVG animation. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-0457 | Version: | 23 |
Platform(s): | Microsoft Windows 7 Microsoft Windows Server 2008 Microsoft Windows Vista Microsoft Windows Server 2003 Microsoft Windows XP Microsoft Windows 2000 | Product(s): | Mozilla Firefox Mozilla Thunderbird Mozilla Seamonkey Mozilla Firefox ESR Mozilla Thunderbird ESR |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:14829 | |||
Oval ID: | oval:org.mitre.oval:def:14829 | ||
Title: | Mozilla Firefox before 3.6.28 and 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird before 3.1.20 and 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 do not properly restrict drag-and-drop operations on javascript: URLs, which allows user-assisted remote attackers to conduct cross-site scripting (XSS) attacks via a crafted web page, related to a "DragAndDropJacking" issue. | ||
Description: | Mozilla Firefox before 3.6.28 and 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird before 3.1.20 and 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 do not properly restrict drag-and-drop operations on javascript: URLs, which allows user-assisted remote attackers to conduct cross-site scripting (XSS) attacks via a crafted web page, related to a "DragAndDropJacking" issue. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-0455 | Version: | 23 |
Platform(s): | Microsoft Windows 7 Microsoft Windows Server 2008 Microsoft Windows Vista Microsoft Windows Server 2003 Microsoft Windows XP Microsoft Windows 2000 | Product(s): | Mozilla Firefox Mozilla Thunderbird Mozilla Seamonkey Mozilla Firefox ESR Mozilla Thunderbird ESR |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:14909 | |||
Oval ID: | oval:org.mitre.oval:def:14909 | ||
Title: | CRLF injection vulnerability in Mozilla Firefox 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 allows remote web servers to bypass intended Content Security Policy (CSP) restrictions and possibly conduct cross-site scripting (XSS) attacks via crafted HTTP headers. | ||
Description: | CRLF injection vulnerability in Mozilla Firefox 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 allows remote web servers to bypass intended Content Security Policy (CSP) restrictions and possibly conduct cross-site scripting (XSS) attacks via crafted HTTP headers. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-0451 | Version: | 21 |
Platform(s): | Microsoft Windows 7 Microsoft Windows Server 2008 Microsoft Windows Vista Microsoft Windows Server 2003 Microsoft Windows XP Microsoft Windows 2000 | Product(s): | Mozilla Firefox Mozilla Thunderbird Mozilla Seamonkey Mozilla Firefox ESR Mozilla Thunderbird ESR |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:14977 | |||
Oval ID: | oval:org.mitre.oval:def:14977 | ||
Title: | USN-1401-2 -- Thunderbird vulnerabilities | ||
Description: | thunderbird: Mozilla Open Source mail and newsgroup client Details: USN-1401-1 fixed vulnerabilities in Xulrunner. This update provides the corresponding fixes for Thunderbird. Original advisory Several security issues were fixed in Thunderbird. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1401-2 CVE-2011-3658 CVE-2012-0457 CVE-2012-0456 CVE-2012-0455 CVE-2012-0458 CVE-2012-0461 CVE-2012-0464 | Version: | 5 |
Platform(s): | Ubuntu 11.04 Ubuntu 10.04 Ubuntu 10.10 | Product(s): | Thunderbird |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:14980 | |||
Oval ID: | oval:org.mitre.oval:def:14980 | ||
Title: | DSA-2437-1 icedove -- several | ||
Description: | Several vulnerabilities have been discovered in Icedove, an unbranded version of the Thunderbird mail/news client. CVE-2012-0455 Soroush Dalili discovered that a cross-site scripting countermeasure related to Javascript URLs could be bypassed. CVE-2012-0456 Atte Kettunen discovered an out of bounds read in the SVG Filters, resulting in memory disclosure. CVE-2012-0458 Mariusz Mlynski discovered that privileges could be escalated through a Javascript URL as the home page. CVE-2012-0461 Bob Clary discovered memory corruption bugs, which may lead to the execution of arbitrary code. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2437-1 CVE-2012-0455 CVE-2012-0456 CVE-2012-0458 CVE-2012-0461 | Version: | 5 |
Platform(s): | Debian GNU/Linux 6.0 Debian GNU/kFreeBSD 6.0 | Product(s): | icedove |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:15007 | |||
Oval ID: | oval:org.mitre.oval:def:15007 | ||
Title: | The SVG Filters implementation in Mozilla Firefox before 3.6.28 and 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird before 3.1.20 and 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 might allow remote attackers to obtain sensitive information from process memory via vectors that trigger an out-of-bounds read. | ||
Description: | The SVG Filters implementation in Mozilla Firefox before 3.6.28 and 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird before 3.1.20 and 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 might allow remote attackers to obtain sensitive information from process memory via vectors that trigger an out-of-bounds read. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-0456 | Version: | 23 |
Platform(s): | Microsoft Windows 7 Microsoft Windows Server 2008 Microsoft Windows Vista Microsoft Windows Server 2003 Microsoft Windows XP Microsoft Windows 2000 | Product(s): | Mozilla Firefox Mozilla Thunderbird Mozilla Seamonkey Mozilla Firefox ESR Mozilla Thunderbird ESR |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:15009 | |||
Oval ID: | oval:org.mitre.oval:def:15009 | ||
Title: | Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.28 and 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird before 3.1.20 and 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. | ||
Description: | Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.28 and 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird before 3.1.20 and 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-0461 | Version: | 23 |
Platform(s): | Microsoft Windows 7 Microsoft Windows Server 2008 Microsoft Windows Vista Microsoft Windows Server 2003 Microsoft Windows XP Microsoft Windows 2000 | Product(s): | Mozilla Firefox Mozilla Thunderbird Mozilla Seamonkey Mozilla Firefox ESR Mozilla Thunderbird ESR |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:15012 | |||
Oval ID: | oval:org.mitre.oval:def:15012 | ||
Title: | Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. | ||
Description: | Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-0462 | Version: | 21 |
Platform(s): | Microsoft Windows 7 Microsoft Windows Server 2008 Microsoft Windows Vista Microsoft Windows Server 2003 Microsoft Windows XP Microsoft Windows 2000 | Product(s): | Mozilla Firefox Mozilla Thunderbird Mozilla Seamonkey Mozilla Firefox ESR Mozilla Thunderbird ESR |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:15066 | |||
Oval ID: | oval:org.mitre.oval:def:15066 | ||
Title: | The Cascading Style Sheets (CSS) implementation in Mozilla Firefox 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via dynamic modification of a keyframe followed by access to the cssText of the keyframe. | ||
Description: | The Cascading Style Sheets (CSS) implementation in Mozilla Firefox 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via dynamic modification of a keyframe followed by access to the cssText of the keyframe. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-0459 | Version: | 21 |
Platform(s): | Microsoft Windows 7 Microsoft Windows Server 2008 Microsoft Windows Vista Microsoft Windows Server 2003 Microsoft Windows XP Microsoft Windows 2000 | Product(s): | Mozilla Firefox Mozilla Thunderbird Mozilla Seamonkey Mozilla Firefox ESR Mozilla Thunderbird ESR |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:15114 | |||
Oval ID: | oval:org.mitre.oval:def:15114 | ||
Title: | Mozilla Firefox 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 do not properly restrict write access to the window.fullScreen object, which allows remote attackers to spoof the user interface via a crafted web page. | ||
Description: | Mozilla Firefox 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 do not properly restrict write access to the window.fullScreen object, which allows remote attackers to spoof the user interface via a crafted web page. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-0460 | Version: | 21 |
Platform(s): | Microsoft Windows 7 Microsoft Windows Server 2008 Microsoft Windows Vista Microsoft Windows Server 2003 Microsoft Windows XP Microsoft Windows 2000 | Product(s): | Mozilla Firefox Mozilla Thunderbird Mozilla Seamonkey Mozilla Firefox ESR Mozilla Thunderbird ESR |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:15122 | |||
Oval ID: | oval:org.mitre.oval:def:15122 | ||
Title: | Mozilla Firefox before 3.6.28 and 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird before 3.1.20 and 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 do not properly restrict setting the home page through the dragging of a URL to the home button, which allows user-assisted remote attackers to execute arbitrary JavaScript code with chrome privileges via a javascript: URL that is later interpreted in the about:sessionrestore context. | ||
Description: | Mozilla Firefox before 3.6.28 and 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird before 3.1.20 and 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 do not properly restrict setting the home page through the dragging of a URL to the home button, which allows user-assisted remote attackers to execute arbitrary JavaScript code with chrome privileges via a javascript: URL that is later interpreted in the about:sessionrestore context. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-0458 | Version: | 23 |
Platform(s): | Microsoft Windows 7 Microsoft Windows Server 2008 Microsoft Windows Vista Microsoft Windows Server 2003 Microsoft Windows XP Microsoft Windows 2000 | Product(s): | Mozilla Firefox Mozilla Thunderbird Mozilla Seamonkey Mozilla Firefox ESR Mozilla Thunderbird ESR |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:15260 | |||
Oval ID: | oval:org.mitre.oval:def:15260 | ||
Title: | USN-1400-2 -- ubufox update | ||
Description: | ubufox: Finnish spell-checker extension for Firefox Details: USN-1400-1 fixed vulnerabilities in Firefox. This update provides an updated ubufox package for use with the latest Firefox. Original advisory This update provides compatible ubufox packages for the latest Firefox. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1400-2 CVE-2012-0455 CVE-2012-0457 CVE-2012-0456 CVE-2012-0451 CVE-2012-0458 CVE-2012-0459 CVE-2012-0460 CVE-2012-0461 CVE-2012-0462 CVE-2012-0464 | Version: | 5 |
Platform(s): | Ubuntu 11.04 Ubuntu 11.10 Ubuntu 10.04 Ubuntu 10.10 | Product(s): | ubufox |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:15321 | |||
Oval ID: | oval:org.mitre.oval:def:15321 | ||
Title: | USN-1400-1 -- Firefox vulnerabilities | ||
Description: | firefox: Mozilla Open Source web browser Several security issues were fixed in Firefox. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1400-1 CVE-2012-0455 CVE-2012-0457 CVE-2012-0456 CVE-2012-0451 CVE-2012-0458 CVE-2012-0459 CVE-2012-0460 CVE-2012-0461 CVE-2012-0462 CVE-2012-0464 | Version: | 5 |
Platform(s): | Ubuntu 11.04 Ubuntu 11.10 Ubuntu 10.04 Ubuntu 10.10 | Product(s): | Firefox |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:15457 | |||
Oval ID: | oval:org.mitre.oval:def:15457 | ||
Title: | USN-1400-3 -- Thunderbird vulnerabilities | ||
Description: | thunderbird: Mozilla Open Source mail and newsgroup client Details: USN-1400-1 fixed vulnerabilities in Firefox. This update provides the corresponding fixes for Thunderbird. Original advisory Several security issues were fixed in Thunderbird. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1400-3 CVE-2012-0455 CVE-2012-0457 CVE-2012-0456 CVE-2012-0451 CVE-2012-0458 CVE-2012-0459 CVE-2012-0460 CVE-2012-0461 CVE-2012-0462 CVE-2012-0464 | Version: | 5 |
Platform(s): | Ubuntu 11.10 | Product(s): | Thunderbird |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:17944 | |||
Oval ID: | oval:org.mitre.oval:def:17944 | ||
Title: | USN-1400-4 -- thunderbird regressions | ||
Description: | USN-1400-3 introduced regressions in Thunderbird. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1400-4 CVE-2012-0455 CVE-2012-0457 CVE-2012-0456 CVE-2012-0451 CVE-2012-0458 CVE-2012-0459 CVE-2012-0460 CVE-2012-0461 CVE-2012-0462 CVE-2012-0464 | Version: | 7 |
Platform(s): | Ubuntu 11.10 | Product(s): | thunderbird |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:17946 | |||
Oval ID: | oval:org.mitre.oval:def:17946 | ||
Title: | USN-1400-5 -- gsettings-desktop-schemas regression | ||
Description: | Firefox's ability to use system proxy settings regressed. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1400-5 CVE-2012-0455 CVE-2012-0457 CVE-2012-0456 CVE-2012-0451 CVE-2012-0458 CVE-2012-0459 CVE-2012-0460 CVE-2012-0461 CVE-2012-0462 CVE-2012-0464 | Version: | 7 |
Platform(s): | Ubuntu 11.04 | Product(s): | gsettings-desktop-schemas |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:21087 | |||
Oval ID: | oval:org.mitre.oval:def:21087 | ||
Title: | RHSA-2012:0387: firefox security and bug fix update (Critical) | ||
Description: | Use-after-free vulnerability in the browser engine in Mozilla Firefox before 3.6.28 and 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird before 3.1.20 and 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 allows remote attackers to execute arbitrary code via vectors involving an empty argument to the array.join function in conjunction with the triggering of garbage collection. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2012:0387-01 CESA-2012:0387 CVE-2012-0451 CVE-2012-0455 CVE-2012-0456 CVE-2012-0457 CVE-2012-0458 CVE-2012-0459 CVE-2012-0460 CVE-2012-0461 CVE-2012-0462 CVE-2012-0464 | Version: | 133 |
Platform(s): | Red Hat Enterprise Linux 5 Red Hat Enterprise Linux 6 CentOS Linux 5 CentOS Linux 6 | Product(s): | firefox xulrunner |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:21392 | |||
Oval ID: | oval:org.mitre.oval:def:21392 | ||
Title: | RHSA-2012:0388: thunderbird security update (Critical) | ||
Description: | Use-after-free vulnerability in the browser engine in Mozilla Firefox before 3.6.28 and 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird before 3.1.20 and 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 allows remote attackers to execute arbitrary code via vectors involving an empty argument to the array.join function in conjunction with the triggering of garbage collection. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2012:0388-01 CESA-2012:0388 CVE-2012-0451 CVE-2012-0455 CVE-2012-0456 CVE-2012-0457 CVE-2012-0458 CVE-2012-0459 CVE-2012-0460 CVE-2012-0461 CVE-2012-0462 CVE-2012-0464 | Version: | 133 |
Platform(s): | Red Hat Enterprise Linux 5 Red Hat Enterprise Linux 6 CentOS Linux 5 CentOS Linux 6 | Product(s): | thunderbird |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:22729 | |||
Oval ID: | oval:org.mitre.oval:def:22729 | ||
Title: | DEPRECATED: ELSA-2012:0387: firefox security and bug fix update (Critical) | ||
Description: | Use-after-free vulnerability in the browser engine in Mozilla Firefox before 3.6.28 and 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird before 3.1.20 and 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 allows remote attackers to execute arbitrary code via vectors involving an empty argument to the array.join function in conjunction with the triggering of garbage collection. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2012:0387-01 CVE-2012-0451 CVE-2012-0455 CVE-2012-0456 CVE-2012-0457 CVE-2012-0458 CVE-2012-0459 CVE-2012-0460 CVE-2012-0461 CVE-2012-0462 CVE-2012-0464 | Version: | 46 |
Platform(s): | Oracle Linux 5 Oracle Linux 6 | Product(s): | firefox xulrunner |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:22923 | |||
Oval ID: | oval:org.mitre.oval:def:22923 | ||
Title: | DEPRECATED: ELSA-2012:0388: thunderbird security update (Critical) | ||
Description: | Use-after-free vulnerability in the browser engine in Mozilla Firefox before 3.6.28 and 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird before 3.1.20 and 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 allows remote attackers to execute arbitrary code via vectors involving an empty argument to the array.join function in conjunction with the triggering of garbage collection. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2012:0388-01 CVE-2012-0451 CVE-2012-0455 CVE-2012-0456 CVE-2012-0457 CVE-2012-0458 CVE-2012-0459 CVE-2012-0460 CVE-2012-0461 CVE-2012-0462 CVE-2012-0464 | Version: | 46 |
Platform(s): | Oracle Linux 5 Oracle Linux 6 | Product(s): | thunderbird |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:23093 | |||
Oval ID: | oval:org.mitre.oval:def:23093 | ||
Title: | ELSA-2012:0387: firefox security and bug fix update (Critical) | ||
Description: | Use-after-free vulnerability in the browser engine in Mozilla Firefox before 3.6.28 and 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird before 3.1.20 and 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 allows remote attackers to execute arbitrary code via vectors involving an empty argument to the array.join function in conjunction with the triggering of garbage collection. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2012:0387-01 CVE-2012-0451 CVE-2012-0455 CVE-2012-0456 CVE-2012-0457 CVE-2012-0458 CVE-2012-0459 CVE-2012-0460 CVE-2012-0461 CVE-2012-0462 CVE-2012-0464 | Version: | 45 |
Platform(s): | Oracle Linux 5 Oracle Linux 6 | Product(s): | firefox xulrunner |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:23382 | |||
Oval ID: | oval:org.mitre.oval:def:23382 | ||
Title: | ELSA-2012:0388: thunderbird security update (Critical) | ||
Description: | Use-after-free vulnerability in the browser engine in Mozilla Firefox before 3.6.28 and 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird before 3.1.20 and 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 allows remote attackers to execute arbitrary code via vectors involving an empty argument to the array.join function in conjunction with the triggering of garbage collection. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2012:0388-01 CVE-2012-0451 CVE-2012-0455 CVE-2012-0456 CVE-2012-0457 CVE-2012-0458 CVE-2012-0459 CVE-2012-0460 CVE-2012-0461 CVE-2012-0462 CVE-2012-0464 | Version: | 45 |
Platform(s): | Oracle Linux 5 Oracle Linux 6 | Product(s): | thunderbird |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:27161 | |||
Oval ID: | oval:org.mitre.oval:def:27161 | ||
Title: | DEPRECATED: ELSA-2012-0387 -- firefox security and bug fix update (critical) | ||
Description: | firefox: [10.0.3-1.0.1.el6_2] - Add firefox-oracle-default-prefs.js and remove the corresponding Red Hat ones [10.0.3-1] - Update to 10.0.3 ESR xulrunner: [10.0.3-1.0.1.el6_2] - Replace xulrunner-redhat-default-prefs.js with - xulrunner-oracle-default-prefs.js [10.0.3-1] - Update to 10.0.3 ESR | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2012-0387 CVE-2012-0451 CVE-2012-0455 CVE-2012-0456 CVE-2012-0457 CVE-2012-0458 CVE-2012-0459 CVE-2012-0460 CVE-2012-0461 CVE-2012-0462 CVE-2012-0464 | Version: | 4 |
Platform(s): | Oracle Linux 5 Oracle Linux 6 | Product(s): | firefox xulrunner |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:27714 | |||
Oval ID: | oval:org.mitre.oval:def:27714 | ||
Title: | DEPRECATED: ELSA-2012-0388 -- thunderbird security update (critical) | ||
Description: | [10.0.3-1.0.1.el6_2] - Replaced thunderbird-redhat-default-prefs.js with thunderbird-oracle-default-prefs.js - Replace clean.gif in tarball [10.0.3-1] - Update to 10.0.3 ESR | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2012-0388 CVE-2012-0451 CVE-2012-0455 CVE-2012-0456 CVE-2012-0457 CVE-2012-0458 CVE-2012-0459 CVE-2012-0460 CVE-2012-0461 CVE-2012-0462 CVE-2012-0464 | Version: | 4 |
Platform(s): | Oracle Linux 6 | Product(s): | thunderbird |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2013-09-18 | Name : Debian Security Advisory DSA 2458-2 (iceape - several vulnerabilities) File : nvt/deb_2458_2.nasl |
2012-08-03 | Name : Mandriva Update for mozilla MDVSA-2012:032-1 (mozilla) File : nvt/gb_mandriva_MDVSA_2012_032_1.nasl |
2012-08-03 | Name : Mandriva Update for mozilla MDVSA-2012:032 (mozilla) File : nvt/gb_mandriva_MDVSA_2012_032.nasl |
2012-07-30 | Name : CentOS Update for firefox CESA-2012:0387 centos5 File : nvt/gb_CESA-2012_0387_firefox_centos5.nasl |
2012-07-30 | Name : CentOS Update for firefox CESA-2012:0387 centos6 File : nvt/gb_CESA-2012_0387_firefox_centos6.nasl |
2012-07-30 | Name : CentOS Update for thunderbird CESA-2012:0388 centos5 File : nvt/gb_CESA-2012_0388_thunderbird_centos5.nasl |
2012-07-30 | Name : CentOS Update for thunderbird CESA-2012:0388 centos6 File : nvt/gb_CESA-2012_0388_thunderbird_centos6.nasl |
2012-07-09 | Name : RedHat Update for thunderbird RHSA-2012:0388-01 File : nvt/gb_RHSA-2012_0388-01_thunderbird.nasl |
2012-04-30 | Name : Debian Security Advisory DSA 2437-1 (icedove) File : nvt/deb_2437_1.nasl |
2012-04-30 | Name : FreeBSD Ports: firefox File : nvt/freebsd_firefox66.nasl |
2012-04-30 | Name : Debian Security Advisory DSA 2433-1 (iceweasel) File : nvt/deb_2433_1.nasl |
2012-04-23 | Name : Ubuntu Update for gsettings-desktop-schemas USN-1400-5 File : nvt/gb_ubuntu_USN_1400_5.nasl |
2012-04-05 | Name : Ubuntu Update for thunderbird USN-1400-4 File : nvt/gb_ubuntu_USN_1400_4.nasl |
2012-03-26 | Name : Ubuntu Update for thunderbird USN-1401-2 File : nvt/gb_ubuntu_USN_1401_2.nasl |
2012-03-22 | Name : Ubuntu Update for thunderbird USN-1400-3 File : nvt/gb_ubuntu_USN_1400_3.nasl |
2012-03-22 | Name : Ubuntu Update for xulrunner-1.9.2 USN-1401-1 File : nvt/gb_ubuntu_USN_1401_1.nasl |
2012-03-20 | Name : Mozilla Products Multiple Vulnerabilities - Mar12 (Mac OS X 01) File : nvt/gb_mozilla_prdts_mult_vuln_mar12_macosx01.nasl |
2012-03-19 | Name : Mozilla Products Multiple Vulnerabilities - Mar12 (Mac OS X) File : nvt/gb_mozilla_prdts_mult_vuln_mar12_macosx.nasl |
2012-03-19 | Name : Mozilla Products Multiple Vulnerabilities - Mar12 (Windows) File : nvt/gb_mozilla_prdts_mult_vuln_mar12_win.nasl |
2012-03-19 | Name : Mozilla Products Multiple Vulnerabilities - Mar12 (Win 01) File : nvt/gb_mozilla_prdts_mult_vuln_mar12_win01.nasl |
2012-03-19 | Name : Ubuntu Update for firefox USN-1400-1 File : nvt/gb_ubuntu_USN_1400_1.nasl |
2012-03-19 | Name : Ubuntu Update for ubufox USN-1400-2 File : nvt/gb_ubuntu_USN_1400_2.nasl |
2012-03-16 | Name : RedHat Update for firefox RHSA-2012:0387-01 File : nvt/gb_RHSA-2012_0387-01_firefox.nasl |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2015-01-19 | Name : The remote Solaris system is missing a security patch for third-party software. File : solaris11_thunderbird_20120626.nasl - Type : ACT_GATHER_INFO |
2015-01-19 | Name : The remote Solaris system is missing a security patch for third-party software. File : solaris11_firefox_20120626.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2012-254.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2012-175.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing a security update. File : oraclelinux_ELSA-2012-0388.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2012-0387.nasl - Type : ACT_GATHER_INFO |
2013-01-08 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201301-01.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20120314_thunderbird_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20120314_firefox_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2012-04-25 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2458.nasl - Type : ACT_GATHER_INFO |
2012-04-20 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1400-5.nasl - Type : ACT_GATHER_INFO |
2012-04-18 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2012-032.nasl - Type : ACT_GATHER_INFO |
2012-04-04 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1400-4.nasl - Type : ACT_GATHER_INFO |
2012-03-29 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_firefox-201203-8029.nasl - Type : ACT_GATHER_INFO |
2012-03-29 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_MozillaFirefox-120320.nasl - Type : ACT_GATHER_INFO |
2012-03-26 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1401-2.nasl - Type : ACT_GATHER_INFO |
2012-03-22 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1400-3.nasl - Type : ACT_GATHER_INFO |
2012-03-22 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2437.nasl - Type : ACT_GATHER_INFO |
2012-03-20 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1401-1.nasl - Type : ACT_GATHER_INFO |
2012-03-19 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1400-2.nasl - Type : ACT_GATHER_INFO |
2012-03-19 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1400-1.nasl - Type : ACT_GATHER_INFO |
2012-03-16 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2433.nasl - Type : ACT_GATHER_INFO |
2012-03-15 | Name : The remote CentOS host is missing a security update. File : centos_RHSA-2012-0388.nasl - Type : ACT_GATHER_INFO |
2012-03-15 | Name : The remote Windows host contains a web browser that is affected by multiple v... File : seamonkey_28.nasl - Type : ACT_GATHER_INFO |
2012-03-15 | Name : The remote Windows host contains a mail client that is potentially affected b... File : mozilla_thunderbird_3120.nasl - Type : ACT_GATHER_INFO |
2012-03-15 | Name : The remote Windows host contains a mail client that is potentially affected b... File : mozilla_thunderbird_1003.nasl - Type : ACT_GATHER_INFO |
2012-03-15 | Name : The remote Windows host contains a web browser that is affected by multiple v... File : mozilla_firefox_3628.nasl - Type : ACT_GATHER_INFO |
2012-03-15 | Name : The remote Windows host contains a web browser that is affected by multiple v... File : mozilla_firefox_1003.nasl - Type : ACT_GATHER_INFO |
2012-03-15 | Name : The remote Mac OS X host contains a mail client that is potentially affected ... File : macosx_thunderbird_3_1_20.nasl - Type : ACT_GATHER_INFO |
2012-03-15 | Name : The remote Mac OS X host contains a mail client that is potentially affected ... File : macosx_thunderbird_10_0_3.nasl - Type : ACT_GATHER_INFO |
2012-03-15 | Name : The remote Mac OS X host contains a web browser that is affected by multiple ... File : macosx_firefox_3_6_28.nasl - Type : ACT_GATHER_INFO |
2012-03-15 | Name : The remote Mac OS X host contains a web browser that is affected by multiple ... File : macosx_firefox_10_0_3.nasl - Type : ACT_GATHER_INFO |
2012-03-15 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_a1050b8b6db311e18b370011856a6e37.nasl - Type : ACT_GATHER_INFO |
2012-03-15 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2012-0387.nasl - Type : ACT_GATHER_INFO |
2012-03-14 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2012-0388.nasl - Type : ACT_GATHER_INFO |
2012-03-14 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2012-0387.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:55:47 |
|