Executive Summary
Informations | |||
---|---|---|---|
Name | MDVSA-2009:084 | First vendor Publication | 2009-04-01 |
Vendor | Mandriva | Last vendor Modification | 2009-04-01 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Security vulnerabilities have been discovered in previous versions, and corrected in the latest Mozilla Firefox 3.x, version 3.0.8 (CVE-2009-1044, CVE-2009-1169). This update provides the latest Mozilla Firefox 3.x to correct these issues. Additionally, some packages requiring it have also been rebuilt and are being provided as updates. |
Original Source
Url : http://www.mandriva.com/security/advisories?name=MDVSA-2009:084 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-399 | Resource Management Errors |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:11368 | |||
Oval ID: | oval:org.mitre.oval:def:11368 | ||
Title: | Mozilla Firefox 3.0.7 on Windows 7 allows remote attackers to execute arbitrary code via unknown vectors related to the _moveToEdgeShift XUL tree method, which triggers garbage collection on objects that are still in use, as demonstrated by Nils during a PWN2OWN competition at CanSecWest 2009. | ||
Description: | Mozilla Firefox 3.0.7 on Windows 7 allows remote attackers to execute arbitrary code via unknown vectors related to the _moveToEdgeShift XUL tree method, which triggers garbage collection on objects that are still in use, as demonstrated by Nils during a PWN2OWN competition at CanSecWest 2009. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2009-1044 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 Red Hat Enterprise Linux 5 CentOS Linux 5 Oracle Linux 5 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:11372 | |||
Oval ID: | oval:org.mitre.oval:def:11372 | ||
Title: | The txMozillaXSLTProcessor::TransformToDoc function in Mozilla Firefox before 3.0.8 and SeaMonkey before 1.1.16 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an XML file with a crafted XSLT transform. | ||
Description: | The txMozillaXSLTProcessor::TransformToDoc function in Mozilla Firefox before 3.0.8 and SeaMonkey before 1.1.16 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an XML file with a crafted XSLT transform. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2009-1169 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 Red Hat Enterprise Linux 5 CentOS Linux 5 Oracle Linux 5 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:13356 | |||
Oval ID: | oval:org.mitre.oval:def:13356 | ||
Title: | DSA-1756-1 xulrunner -- multiple | ||
Description: | Several remote vulnerabilities have been discovered in Xulrunner, a runtime environment for XUL applications, such as the Iceweasel web browser. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2009-1169 Security researcher Guido Landi discovered that a XSL stylesheet could be used to crash the browser during a XSL transformation. An attacker could potentially use this crash to run arbitrary code on a victim’s computer. CVE-2009-1044 Security researcher Nils reported via TippingPoint’s Zero Day Initiative that the XUL tree method _moveToEdgeShift was in some cases triggering garbage collection routines on objects which were still in use. In such cases, the browser would crash when attempting to access a previously destroyed object and this crash could be used by an attacker to run arbitrary code on a victim’s computer. Note that after installing these updates, you will need to restart any packages using xulrunner, typically iceweasel or epiphany. For the stable distribution, these problems have been fixed in version 1.9.0.7-0lenny2. As indicated in the Etch release notes, security support for the Mozilla products in the oldstable distribution needed to be stopped before the end of the regular Etch security maintenance life cycle. You are strongly encouraged to upgrade to stable or switch to a still supported browser. For the unstable distribution, these problems have been fixed in version 1.9.0.8-1 We recommend that you upgrade your xulrunner package. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-1756-1 CVE-2009-1169 CVE-2009-1044 | Version: | 5 |
Platform(s): | Debian GNU/Linux 5.0 | Product(s): | xulrunner |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:22766 | |||
Oval ID: | oval:org.mitre.oval:def:22766 | ||
Title: | ELSA-2009:0397: firefox security update (Critical) | ||
Description: | The txMozillaXSLTProcessor::TransformToDoc function in Mozilla Firefox before 3.0.8 and SeaMonkey before 1.1.16 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an XML file with a crafted XSLT transform. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2009:0397-01 CVE-2009-1044 CVE-2009-1169 | Version: | 13 |
Platform(s): | Oracle Linux 5 | Product(s): | firefox xulrunner |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:29178 | |||
Oval ID: | oval:org.mitre.oval:def:29178 | ||
Title: | RHSA-2009:0397 -- firefox security update (Critical) | ||
Description: | Updated firefox packages that fix two security issues are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having critical security impact by the Red Hat Security Response Team. Mozilla Firefox is an open source Web browser. XULRunner provides the XUL Runtime environment for Mozilla Firefox. A memory corruption flaw was discovered in the way Firefox handles XML files containing an XSLT transform. A remote attacker could use this flaw to crash Firefox or, potentially, execute arbitrary code as the user running Firefox. (CVE-2009-1169) | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2009:0397 CESA-2009:0397-CentOS 5 CVE-2009-1044 CVE-2009-1169 | Version: | 3 |
Platform(s): | Red Hat Enterprise Linux 5 Red Hat Enterprise Linux 4 CentOS Linux 5 | Product(s): | firefox xulrunner |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:7898 | |||
Oval ID: | oval:org.mitre.oval:def:7898 | ||
Title: | DSA-1756 xulrunner -- multiple vulnerabilities | ||
Description: | Several remote vulnerabilities have been discovered in Xulrunner, a runtime environment for XUL applications, such as the Iceweasel web browser. The Common Vulnerabilities and Exposures project identifies the following problems: Security researcher Guido Landi discovered that a XSL stylesheet could be used to crash the browser during a XSL transformation. An attacker could potentially use this crash to run arbitrary code on a victim's computer. Security researcher Nils reported via TippingPoint's Zero Day Initiative that the XUL tree method _moveToEdgeShift was in some cases triggering garbage collection routines on objects which were still in use. In such cases, the browser would crash when attempting to access a previously destroyed object and this crash could be used by an attacker to run arbitrary code on a victim's computer. Note that after installing these updates, you will need to restart any packages using xulrunner, typically iceweasel or epiphany. As indicated in the Etch release notes, security support for the Mozilla products in the oldstable distribution needed to be stopped before the end of the regular Etch security maintenance life cycle. You are strongly encouraged to upgrade to stable or switch to a still supported browser. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-1756 CVE-2009-1169 CVE-2009-1044 | Version: | 3 |
Platform(s): | Debian GNU/Linux 5.0 | Product(s): | xulrunner |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2011-08-09 | Name : CentOS Update for seamonkey CESA-2009:0398 centos3 i386 File : nvt/gb_CESA-2009_0398_seamonkey_centos3_i386.nasl |
2011-08-09 | Name : CentOS Update for seamonkey CESA-2009:0398-01 centos2 i386 File : nvt/gb_CESA-2009_0398-01_seamonkey_centos2_i386.nasl |
2011-08-09 | Name : CentOS Update for firefox CESA-2009:0397 centos4 i386 File : nvt/gb_CESA-2009_0397_firefox_centos4_i386.nasl |
2011-08-09 | Name : CentOS Update for xulrunner CESA-2009:0397 centos5 i386 File : nvt/gb_CESA-2009_0397_xulrunner_centos5_i386.nasl |
2009-10-13 | Name : SLES10: Security update for MozillaFirefox File : nvt/sles10_MozillaFirefox3.nasl |
2009-10-11 | Name : SLES11: Security update for MozillaFirefox File : nvt/sles11_MozillaFirefox0.nasl |
2009-04-20 | Name : SuSE Security Advisory SUSE-SA:2009:023 (MozillaFirefox) File : nvt/suse_sa_2009_023.nasl |
2009-04-20 | Name : SuSE Security Advisory SUSE-SA:2009:022 (MozillaFirefox) File : nvt/suse_sa_2009_022.nasl |
2009-04-15 | Name : CentOS Security Advisory CESA-2009:0397 (firefox) File : nvt/ovcesa2009_0397.nasl |
2009-04-08 | Name : Firefox XSL Parsing Vulnerability (Linux) File : nvt/gb_firefox_xsl_parsing_vuln_lin.nasl |
2009-04-08 | Name : Firefox XSL Parsing Vulnerability (Win) File : nvt/gb_firefox_xsl_parsing_vuln_win.nasl |
2009-04-08 | Name : Mozilla Seamonkey XSL Parsing Vulnerability (Linux) File : nvt/gb_seamonkey_xsl_parsing_vuln_lin.nasl |
2009-04-08 | Name : Mozilla Seamonkey XSL Parsing Vulnerability (Win) File : nvt/gb_seamonkey_xsl_parsing_vuln_win.nasl |
2009-04-06 | Name : Ubuntu USN-745-1 (xulrunner-1.9) File : nvt/ubuntu_745_1.nasl |
2009-04-06 | Name : RedHat Security Advisory RHSA-2009:0397 File : nvt/RHSA_2009_0397.nasl |
2009-04-06 | Name : CentOS Security Advisory CESA-2009:0398-01 (seamonkey) File : nvt/ovcesa2009_0398_01.nasl |
2009-04-06 | Name : Ubuntu USN-749-1 (libsndfile) File : nvt/ubuntu_749_1.nasl |
2009-04-06 | Name : CentOS Security Advisory CESA-2009:0398 (seamonkey) File : nvt/ovcesa2009_0398.nasl |
2009-04-06 | Name : Mandrake Security Advisory MDVSA-2009:084 (firefox) File : nvt/mdksa_2009_084.nasl |
2009-04-06 | Name : Fedora Core 10 FEDORA-2009-3161 (seamonkey) File : nvt/fcore_2009_3161.nasl |
2009-04-06 | Name : Fedora Core 9 FEDORA-2009-3101 (seamonkey) File : nvt/fcore_2009_3101.nasl |
2009-04-06 | Name : Fedora Core 10 FEDORA-2009-3100 (firefox) File : nvt/fcore_2009_3100.nasl |
2009-04-06 | Name : Fedora Core 9 FEDORA-2009-3099 (firefox) File : nvt/fcore_2009_3099.nasl |
2009-04-06 | Name : Debian Security Advisory DSA 1756-1 (xulrunner) File : nvt/deb_1756_1.nasl |
2009-04-06 | Name : RedHat Security Advisory RHSA-2009:0398 File : nvt/RHSA_2009_0398.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
53079 | Mozilla Multiple Products txMozillaXSLTProcessor::TransformToDoc Function Cra... |
52896 | Mozilla Firefox on Windows _moveToEdgeShift() XUL Tree Method Garbage Collect... |
Snort® IPS/IDS
Date | Description |
---|---|
2017-08-01 | Mozilla Firefox XUL tree element code execution attempt RuleID : 43367 - Revision : 1 - Type : BROWSER-FIREFOX |
2015-03-27 | Mozilla Firefox 3 xsl parsing heap overflow attempt RuleID : 33566 - Revision : 3 - Type : BROWSER-FIREFOX |
2014-01-10 | Mozilla Firefox 3 xsl parsing heap overflow attempt RuleID : 17444 - Revision : 12 - Type : BROWSER-FIREFOX |
2014-01-10 | Mozilla Firefox XUL tree element code execution attempt RuleID : 17258 - Revision : 9 - Type : BROWSER-FIREFOX |
2014-01-10 | Mozilla Firefox 3 xsl parsing heap overflow attempt RuleID : 15431 - Revision : 14 - Type : BROWSER-FIREFOX |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2009-0398.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2009-0397.nasl - Type : ACT_GATHER_INFO |
2013-01-08 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201301-01.nasl - Type : ACT_GATHER_INFO |
2010-01-06 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2009-0397.nasl - Type : ACT_GATHER_INFO |
2009-09-24 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_MozillaFirefox-090407.nasl - Type : ACT_GATHER_INFO |
2009-09-24 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_MozillaFirefox-6187.nasl - Type : ACT_GATHER_INFO |
2009-07-21 | Name : The remote openSUSE host is missing a security update. File : suse_11_0_MozillaFirefox-090407.nasl - Type : ACT_GATHER_INFO |
2009-07-21 | Name : The remote openSUSE host is missing a security update. File : suse_11_0_seamonkey-090617.nasl - Type : ACT_GATHER_INFO |
2009-07-21 | Name : The remote openSUSE host is missing a security update. File : suse_11_1_MozillaFirefox-090407.nasl - Type : ACT_GATHER_INFO |
2009-07-21 | Name : The remote openSUSE host is missing a security update. File : suse_11_1_seamonkey-090617.nasl - Type : ACT_GATHER_INFO |
2009-06-19 | Name : The remote openSUSE host is missing a security update. File : suse_seamonkey-6310.nasl - Type : ACT_GATHER_INFO |
2009-04-23 | Name : The remote Fedora host is missing a security update. File : fedora_2009-3161.nasl - Type : ACT_GATHER_INFO |
2009-04-23 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2009-084.nasl - Type : ACT_GATHER_INFO |
2009-04-23 | Name : The remote Fedora host is missing one or more security updates. File : fedora_2009-3100.nasl - Type : ACT_GATHER_INFO |
2009-04-23 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-745-1.nasl - Type : ACT_GATHER_INFO |
2009-04-21 | Name : The remote openSUSE host is missing a security update. File : suse_MozillaFirefox-6194.nasl - Type : ACT_GATHER_INFO |
2009-04-10 | Name : A web browser on the remote host is affected by multiple vulnerabilities. File : seamonkey_1116.nasl - Type : ACT_GATHER_INFO |
2009-04-01 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-1756.nasl - Type : ACT_GATHER_INFO |
2009-03-31 | Name : The remote Fedora host is missing a security update. File : fedora_2009-3101.nasl - Type : ACT_GATHER_INFO |
2009-03-30 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2009-0397.nasl - Type : ACT_GATHER_INFO |
2009-03-30 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2009-0398.nasl - Type : ACT_GATHER_INFO |
2009-03-30 | Name : The remote Windows host contains a web browser that is affected by multiple v... File : mozilla_firefox_308.nasl - Type : ACT_GATHER_INFO |
2009-03-30 | Name : The remote Fedora host is missing one or more security updates. File : fedora_2009-3099.nasl - Type : ACT_GATHER_INFO |
2009-03-30 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2009-0398.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:40:09 |
|