Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Ubuntu Local Security Checks >> USN134-1 : mozilla-firefox vulnerabilities


Vulnerability Assessment Details

USN134-1 : mozilla-firefox vulnerabilities

Vulnerability Assessment Summary
mozilla-firefox vulnerabilities

Detailed Explanation for this Vulnerability Assessment

Summary :

These remote packages are missing security patches :
- mozilla-firefox
- mozilla-firefox-dev
- mozilla-firefox-dom-inspector
- mozilla-firefox-gnome-support


Description :

It was discovered that a malicious website could inject arbitrary
scripts into a target site by loading it into a frame and navigating
back to a previous Javascript URL that contained an eval() call. This
could be used to steal cookies or other confidential data from the
target site. If the target site is permited to raise the install
confirmation dialog in Firefox then this flaw even permited the
malicious site to execute arbitrary code with the rights of the
Firefox user. By default only the Mozilla Update site is permited to
attempt software installation
however, users can permit this for
additional sites. (MFSA 2005-42)

Michael Krax, Georgi Guninski, and L. David Baron found that the
security checks that prevent script injection could be bypassed by
wrapping a javascript: url in another pseudo-protocol like
"view-source:" or "jar:". (CVE-2005-1531)

A variant of the attack described in CVE-2005-1160 (see USN-124-1) was
discovered. Additional checks were added to make sure Javascript eval
and Script
[...]

Solution :

Upgrade to :
- mozilla-firefox-1.0.2-0ubuntu5.3 (Ubuntu 5.04)
- mozilla-firefox-dev-1.0.2-0ubuntu5.3 (Ubuntu 5.04)
- mozilla-firefox-dom-inspector-1.0.2-0ubuntu5.3 (Ubuntu 5.04)
- mozilla-firefox-gnome-support-1.0.2-0ubuntu5.3 (Ubuntu 5.04)



Network Security Threat Level: High


Networks Security ID:

Vulnerability Assessment Copyright: Ubuntu Security Notice (C) 2005 Canonical, Inc. / NASL script (C) 2005 Michel Arboi

Cables, Connectors

Cisco Meraki MR53 Cloud Managed Indoor Access Point PLEASE READ
$49.99
Cisco Meraki MR53 Cloud Managed Indoor Access Point PLEASE READ pictureCisco Meraki MX100 Firewall (750 Mbps throughput)
$1999.0
Cisco Meraki MX100 Firewall (750 Mbps throughput) pictureCisco ASA5525-SSD120-K9 ASA 5525-X Firewall 6-GE 250-IPsec/2-SSL 3DES/AES AC
$2990.0
Cisco ASA5525-SSD120-K9 ASA 5525-X Firewall 6-GE 250-IPsec/2-SSL 3DES/AES AC pictureCisco PVDM3-128 used Original 128-Channel High Density Voice DSP PVDM module
$218.0
Cisco PVDM3-128 used Original 128-Channel High Density Voice DSP PVDM module  picture


Discussions

No Discussions have been posted on this vulnerability.