Executive Summary
Summary | |
---|---|
Title | firefox security update |
Informations | |||
---|---|---|---|
Name | RHSA-2010:0558 | First vendor Publication | 2010-07-23 |
Vendor | RedHat | Last vendor Modification | 2010-07-23 |
Severity (Vendor) | Critical | Revision | 01 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 10 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Problem Description: Updated firefox packages that fix a security issue are now available for Red Hat Enterprise Linux 4. The Red Hat Security Response Team has rated this update as having critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Description: Mozilla Firefox is an open source web browser. An invalid free flaw was found in Firefox's plugin handler. Malicious web content could result in an invalid memory pointer being freed, causing Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2010-2755) All Firefox users should upgrade to these updated packages, which contain a backported patch that corrects this issue. After installing the update, Firefox must be restarted for the changes to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 617657 - CVE-2010-2755 Mozilla arbitrary free flaw |
Original Source
Url : https://rhn.redhat.com/errata/RHSA-2010-0558.html |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-399 | Resource Management Errors |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:11961 | |||
Oval ID: | oval:org.mitre.oval:def:11961 | ||
Title: | Mozilla Firefox Plugin Parameter Reference Remote Code Execution Vulnerability | ||
Description: | layout/generic/nsObjectFrame.cpp in Mozilla Firefox 3.6.7 does not properly free memory in the parameter array of a plugin instance, which allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted HTML document, related to the DATA and SRC attributes of an OBJECT element. NOTE: this vulnerability exists because of an incorrect fix for CVE-2010-1214. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-2755 | Version: | 11 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows 7 | Product(s): | Mozilla Firefox |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:22353 | |||
Oval ID: | oval:org.mitre.oval:def:22353 | ||
Title: | RHSA-2010:0556: firefox security update (Critical) | ||
Description: | layout/generic/nsObjectFrame.cpp in Mozilla Firefox 3.6.7 does not properly free memory in the parameter array of a plugin instance, which allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted HTML document, related to the DATA and SRC attributes of an OBJECT element. NOTE: this vulnerability exists because of an incorrect fix for CVE-2010-1214. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2010:0556-01 CESA-2010:0556 CVE-2010-2755 | Version: | 4 |
Platform(s): | Red Hat Enterprise Linux 5 CentOS Linux 5 | Product(s): | firefox xulrunner |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:22925 | |||
Oval ID: | oval:org.mitre.oval:def:22925 | ||
Title: | ELSA-2010:0556: firefox security update (Critical) | ||
Description: | layout/generic/nsObjectFrame.cpp in Mozilla Firefox 3.6.7 does not properly free memory in the parameter array of a plugin instance, which allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted HTML document, related to the DATA and SRC attributes of an OBJECT element. NOTE: this vulnerability exists because of an incorrect fix for CVE-2010-1214. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2010:0556-01 CVE-2010-2755 | Version: | 6 |
Platform(s): | Oracle Linux 5 | Product(s): | firefox xulrunner |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:28140 | |||
Oval ID: | oval:org.mitre.oval:def:28140 | ||
Title: | DEPRECATED: ELSA-2010-0556 -- firefox security update (critical) | ||
Description: | firefox: [3.6.7-3.0.1.el5] - Add firefox-oracle-default-prefs.js and firefox-oracle-default-bookmarks.html and remove the corresponding Red Hat ones [3.6.7-3] - Rebuild xulrunner: [1.9.2.7-3.0.1.el5] - Added xulrunner-oracle-default-prefs.js and removed the corresponding RedHat one. [1.9.2.7-3] - Include fix for 575836 | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2010-0556 CVE-2010-2755 | Version: | 4 |
Platform(s): | Oracle Linux 5 | Product(s): | firefox xulrunner |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 |
OpenVAS Exploits
Date | Description |
---|---|
2011-08-09 | Name : CentOS Update for firefox CESA-2010:0556 centos5 i386 File : nvt/gb_CESA-2010_0556_firefox_centos5_i386.nasl |
2010-08-21 | Name : FreeBSD Ports: firefox File : nvt/freebsd_firefox48.nasl |
2010-08-20 | Name : CentOS Update for seamonkey CESA-2010:0557 centos3 i386 File : nvt/gb_CESA-2010_0557_seamonkey_centos3_i386.nasl |
2010-08-13 | Name : Mandriva Update for firefox MDVSA-2010:147 (firefox) File : nvt/gb_mandriva_MDVSA_2010_147.nasl |
2010-08-06 | Name : SuSE Update for MozillaFirefox,MozillaThunderbird,seamonkey SUSE-SA:2010:032 File : nvt/gb_suse_2010_032.nasl |
2010-07-30 | Name : Fedora Update for xulrunner FEDORA-2010-11452 File : nvt/gb_fedora_2010_11452_xulrunner_fc12.nasl |
2010-07-30 | Name : Fedora Update for xulrunner FEDORA-2010-11472 File : nvt/gb_fedora_2010_11472_xulrunner_fc13.nasl |
2010-07-30 | Name : Ubuntu Update for Firefox and Xulrunner vulnerability USN-930-6 File : nvt/gb_ubuntu_USN_930_6.nasl |
2010-07-30 | Name : Ubuntu Update for Firefox and Xulrunner vulnerability USN-957-2 File : nvt/gb_ubuntu_USN_957_2.nasl |
2010-07-26 | Name : RedHat Update for firefox RHSA-2010:0556-01 File : nvt/gb_RHSA-2010_0556-01_firefox.nasl |
2010-07-26 | Name : RedHat Update for seamonkey RHSA-2010:0557-01 File : nvt/gb_RHSA-2010_0557-01_seamonkey.nasl |
2010-07-26 | Name : RedHat Update for firefox RHSA-2010:0558-01 File : nvt/gb_RHSA-2010_0558-01_firefox.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
66786 | Mozilla Firefox layout/generic/nsObjectFrame.cpp Plugin Instance Parameter Ar... |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Mozilla Firefox plugin parameter array dangling pointer exploit attempt - 2 RuleID : 17154 - Revision : 14 - Type : BROWSER-FIREFOX |
2014-01-10 | Mozilla Firefox plugin parameter array dangling pointer exploit attempt - 1 RuleID : 17153 - Revision : 14 - Type : BROWSER-FIREFOX |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_3_MozillaFirefox-100727.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2010-0556.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing a security update. File : oraclelinux_ELSA-2010-0558.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2010-0557.nasl - Type : ACT_GATHER_INFO |
2013-01-08 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201301-01.nasl - Type : ACT_GATHER_INFO |
2010-08-12 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2010-147.nasl - Type : ACT_GATHER_INFO |
2010-08-10 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_c2eac2b59a7d11df8e32000f20797ede.nasl - Type : ACT_GATHER_INFO |
2010-08-09 | Name : The remote CentOS host is missing a security update. File : centos_RHSA-2010-0558.nasl - Type : ACT_GATHER_INFO |
2010-07-28 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2010-0556.nasl - Type : ACT_GATHER_INFO |
2010-07-28 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2010-0556.nasl - Type : ACT_GATHER_INFO |
2010-07-28 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2010-0557.nasl - Type : ACT_GATHER_INFO |
2010-07-28 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2010-0558.nasl - Type : ACT_GATHER_INFO |
2010-07-28 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2010-0557.nasl - Type : ACT_GATHER_INFO |
2010-07-27 | Name : The remote Fedora host is missing a security update. File : fedora_2010-11472.nasl - Type : ACT_GATHER_INFO |
2010-07-27 | Name : The remote Fedora host is missing a security update. File : fedora_2010-11452.nasl - Type : ACT_GATHER_INFO |
2010-07-27 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-930-6.nasl - Type : ACT_GATHER_INFO |
2010-07-27 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-957-2.nasl - Type : ACT_GATHER_INFO |
2010-07-26 | Name : The remote Windows host contains a web browser that may allow execution of re... File : mozilla_firefox_368.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:53:39 |
|