Executive Summary
Summary | |
---|---|
Title | firefox security update |
Informations | |||
---|---|---|---|
Name | RHSA-2015:1581 | First vendor Publication | 2015-08-07 |
Vendor | RedHat | Last vendor Modification | 2015-08-07 |
Severity (Vendor) | Important | Revision | 01 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:P/I:N/A:N) | |||
---|---|---|---|
Cvss Base Score | 4.3 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Problem Description: Updated firefox packages that fix one security issue are now available for Red Hat Enterprise Linux 5, 6, and 7. Red Hat Product Security has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux (v. 5 server) - i386, ppc, s390x, x86_64 Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: Mozilla Firefox is an open source web browser. XULRunner provides the XUL Runtime environment for Mozilla Firefox. A flaw was discovered in Mozilla Firefox that could be used to violate the same-origin policy and inject web script into a non-privileged part of the built-in PDF file viewer (PDF.js). An attacker could create a malicious web page that, when viewed by a victim, could steal arbitrary files (including private SSH keys, the /etc/passwd file, and other potentially sensitive files) from the system running Firefox. (CVE-2015-4495) Red Hat would like to thank the Mozilla project for reporting this issue. Upstream acknowledges Cody Crews as the original reporter. All Firefox users should upgrade to these updated packages, which contain Firefox version 38.1.1 ESR, which corrects this issue. After installing the update, Firefox must be restarted for the changes to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1251318 - CVE-2015-4495 Mozilla: Same origin violation and local file stealing via PDF reader (MFSA 2015-78) |
Original Source
Url : https://rhn.redhat.com/errata/RHSA-2015-1581.html |
CPE : Common Platform Enumeration
Snort® IPS/IDS
Date | Description |
---|---|
2015-09-23 | Mozilla Firefox PDF.js same origin policy violation attempt RuleID : 35676 - Revision : 3 - Type : BROWSER-FIREFOX |
2015-09-23 | Mozilla Firefox PDF.js same origin policy violation attempt RuleID : 35675 - Revision : 3 - Type : BROWSER-FIREFOX |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2016-01-04 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201512-10.nasl - Type : ACT_GATHER_INFO |
2015-09-11 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2015-1528-1.nasl - Type : ACT_GATHER_INFO |
2015-09-03 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2015-1476-1.nasl - Type : ACT_GATHER_INFO |
2015-09-01 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2015-1449-1.nasl - Type : ACT_GATHER_INFO |
2015-08-17 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2015-548.nasl - Type : ACT_GATHER_INFO |
2015-08-17 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2015-547.nasl - Type : ACT_GATHER_INFO |
2015-08-14 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2015-1380-1.nasl - Type : ACT_GATHER_INFO |
2015-08-14 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2015-1379-1.nasl - Type : ACT_GATHER_INFO |
2015-08-11 | Name : The remote CentOS host is missing a security update. File : centos_RHSA-2015-1581.nasl - Type : ACT_GATHER_INFO |
2015-08-10 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2707-1.nasl - Type : ACT_GATHER_INFO |
2015-08-10 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20150807_firefox_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2015-08-10 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2015-1581.nasl - Type : ACT_GATHER_INFO |
2015-08-10 | Name : The remote Oracle Linux host is missing a security update. File : oraclelinux_ELSA-2015-1581.nasl - Type : ACT_GATHER_INFO |
2015-08-10 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_8eee06d4c21d4f07a669455151ff426f.nasl - Type : ACT_GATHER_INFO |
2015-08-07 | Name : The remote Windows host contains a web browser that is affected by an arbitra... File : mozilla_firefox_39_0_3.nasl - Type : ACT_GATHER_INFO |
2015-08-07 | Name : The remote Windows host contains a web browser that is affected by an arbitra... File : mozilla_firefox_38_1_1_esr.nasl - Type : ACT_GATHER_INFO |
2015-08-07 | Name : The remote Mac OS X host contains a web browser that is affected by an arbitr... File : macosx_firefox_39_0_3.nasl - Type : ACT_GATHER_INFO |
2015-08-07 | Name : The remote Mac OS X host contains a web browser that is affected by an arbitr... File : macosx_firefox_38_1_1_esr.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2015-12-05 13:28:15 |
|
2015-08-12 13:33:37 |
|
2015-08-10 17:32:54 |
|
2015-08-08 09:30:43 |
|
2015-08-08 05:25:16 |
|