Impact
remote code execution, remote denial of service
Solution
Please Install the Updated Packages.
Insight
The Mozilla suite of browsers received security updates.
Following updates are included in this update:
Mozilla Firefox was updated on SUSE Linux Enterprise 10 and 11 to the 3.6.17 security release.
Mozilla Firefox was updated on openSUSE 11.4 to the 4.0.1 security release.
Mozilla Thunderbird was updated on openSUSE to the 3.1.10 security release.
Mozilla Seamonkey was updated on openSUSE to the 2.0.14 security release.
Mozilla XULRunner 1.9.1 was updated to 1.9.1.19.
Mozilla XULRunner 1.9.2 was updated to 1.9.2.17.
Following security issues were fixed:
MFSA 2011-12:
Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code.
Mozilla developers Boris Zbarsky, Gary Kwong, Jesse Ruderman, Michael Wu, Nils, Scoobidiver, and Ted Mielczarek reported memory safety issues which affected Firefox 4. CVE-2011-0079
Mozilla developer Scoobidiver reported a memory safety issue which affected Firefox 4 and Firefox 3.6 CVE-2011-0081
The web development team of Alcidion reported a crash that affected Firefox 4, Firefox 3.6 and Firefox 3.5. CVE-2011-0069
Ian Beer reported a crash that affected Firefox 4, Firefox 3.6 and Firefox 3.5.
CVE-2011-0070
Mozilla developers Bob Clary, Henri Sivonen, Marco Bonardo, Mats Palmgren and Jesse Ruderman reported memory safety issues which affected Firefox 3.6 and Firefox 3.5. CVE-2011-0080
Aki Helin reported memory safety issues which affected Firefox 3.6 and Firefox 3.5. CVE-2011-0075
Ian Beer reported memory safety issues which affected Firefox 3.6 and Firefox 3.5. CVE-2011-0078
Martin Barbella reported a memory safety issue which affected Firefox 3.6 and Firefox 3.5. CVE-2011-0072
CVE-2011-0073:
Security researcher regenrecht reported several dangling pointer vulnerabilities via TippingPoint's Zero Day Initiative.
Firefox 4 was not affected by these issues.
CVE-2011-0067:
Security researcher Paul Stone reported that a Java applet could be used to mimic interaction with form autocomplete controls and steal entries from the form history.
Firefox 4 was not affected by this issue.
CVE-2011-0076: David Remahl of Apple Product Security reported that the Java Embedding Plugin (JEP) shipped with the Mac OS X version ...
Description truncated, for more information please check the Reference URL
Affected
MozillaFirefox,seamonkey,MozillaThunderbird on openSUSE 11.2, openSUSE 11.3
References
Updated on 2015-03-25
Severity
Classification
-
CVSS Base Score: 10.0
AV:N/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities