Summary
The remote host is missing an update to xulrunner
announced via advisory DSA 1999-1.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201999-1
Insight
Several remote vulnerabilities have been discovered in Xulrunner, a runtime environment for XUL applications, such as the Iceweasel web browser. The Common Vulnerabilities and Exposures project identifies the following problems:
CVE-2009-1571
Alin Rad Pop discovered that incorrect memory handling in the HTML parser could lead to the execution of arbitrary code.
CVE-2009-3988
Hidetake Jo discovered that the same-origin policy can be bypassed through window.dialogArguments.
CVE-2010-0159
Henri Sivonen, Boris Zbarsky, Zack Weinberg, Bob Clary, Martijn Wargers and Paul Nickerson reported crashes in layout engine, which might allow the execution of arbitrary code.
CVE-2010-0160
Orlando Barrera II discovered that incorrect memory handling in the implementation of the web worker API could lead to the execution of arbitrary code.
CVE-2010-0162
Georgi Guninski discovered that the same origin policy can be bypassed through specially crafted SVG documents.
For the stable distribution (lenny), these problems have been fixed in version 1.9.0.18-1.
For the unstable distribution (sid), these problems have been fixed in version 1.9.1.8-1.
We recommend that you upgrade your xulrunner packages.
Severity
Classification
-
CVE CVE-2009-1571, CVE-2009-3988, CVE-2010-0159, CVE-2010-0160, CVE-2010-0162 -
CVSS Base Score: 10.0
AV:N/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities