Summary
The remote host is missing an update to xulrunner
announced via advisory DSA 2075-1.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202075-1
Insight
Several remote vulnerabilities have been discovered in Xulrunner, a runtime environment for XUL applications. The Common Vulnerabilities and Exposures project identifies the following problems:
CVE-2010-0182
Wladimir Palant discovered that security checks in XML processing were insufficiently enforced.
CVE-2010-0654
Chris Evans discovered that insecure CSS handling could lead to reading data across domain boundaries.
CVE-2010-1205
Aki Helin discovered a buffer overflow in the internal copy of libpng, which could lead to the execution of arbitrary code.
CVE-2010-1208
regenrecht discovered that incorrect memory handling in DOM parsing could lead to the execution of arbitrary code.
CVE-2010-1211
Jesse Ruderman, Ehsan Akhgari, Mats Palmgren, Igor Bukanov, Gary Kwong, Tobias Markus and Daniel Holbert discovered crashes in the layout engine, which might allow the execution of arbitrary code.
CVE-2010-1214
JS3 discovered an integer overflow in the plugin code, which could lead to the execution of arbitrary code.
CVE-2010-2751
Jordi Chancel discovered that the location could be spoofed to appear like a secured page.
CVE-2010-2753
regenrecht discovered that incorrect memory handling in XUL parsing could lead to the execution of arbitrary code.
CVE-2010-2754
Soroush Dalili discovered an information leak in script processing.
For the stable distribution (lenny), these problems have been fixed in version 1.9.0.19-3.
For the unstable distribution (sid), these problems have been fixed in version 1.9.1.11-1.
For the experimental distribution, these problems have been fixed in version 1.9.2.7-1.
We recommend that you upgrade your xulrunner packages.
Severity
Classification
-
CVE CVE-2010-0182, CVE-2010-0654, CVE-2010-1205, CVE-2010-1208, CVE-2010-1211, CVE-2010-1214, CVE-2010-2751, CVE-2010-2753, CVE-2010-2754 -
CVSS Base Score: 9.3
AV:N/AC:M/Au:N/C:C/I:C/A:C
Related Vulnerabilities