USN-975-1: Firefox and Xulrunner vulnerabilities

Ubuntu Security Notice USN-975-1

8th September, 2010

firefox, firefox-3.0, firefox-3.5, xulrunner-1.9.1, xulrunner-1.9.2 vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 10.04 LTS
  • Ubuntu 9.10
  • Ubuntu 9.04
  • Ubuntu 8.04 LTS

Summary

Firefox could be made to crash or possibly run programs as your login if it opened a specially crafted file or website.

Software description

  • firefox - Safe and easy web browser from Mozilla
  • firefox-3.0 - Safe and easy web browser from Mozilla
  • firefox-3.5 - Safe and easy web browser from Mozilla
  • xulrunner-1.9.1 - XUL + XPCOM application runner
  • xulrunner-1.9.2 - XUL + XPCOM application runner

Details

Several dangling pointer vulnerabilities were discovered in Firefox. An
attacker could exploit this to crash the browser or possibly run arbitrary
code as the user invoking the program. (CVE-2010-2760, CVE-2010-2767,
CVE-2010-3167)

Blake Kaplan and Michal Zalewski discovered several weaknesses in the
XPCSafeJSObjectWrapper (SJOW) security wrapper. If a user were tricked into
viewing a malicious site, a remote attacker could use this to run arbitrary
JavaScript with chrome privileges. (CVE-2010-2762)

Matt Haggard discovered that Firefox did not honor same-origin policy when
processing the statusText property of an XMLHttpRequest object. If a user
were tricked into viewing a malicious site, a remote attacker could use
this to gather information about servers on internal private networks.
(CVE-2010-2764)

Chris Rohlf discovered an integer overflow when Firefox processed the HTML
frameset element. If a user were tricked into viewing a malicious site, a
remote attacker could use this to crash the browser or possibly run
arbitrary code as the user invoking the program. (CVE-2010-2765)

Several issues were discovered in the browser engine. If a user were
tricked into viewing a malicious site, a remote attacker could use this to
crash the browser or possibly run arbitrary code as the user invoking the
program. (CVE-2010-2766, CVE-2010-3168)

David Huang and Collin Jackson discovered that the <object> tag could
override the charset of a framed HTML document in another origin. An
attacker could utilize this to perform cross-site scripting attacks.
(CVE-2010-2768)

Paul Stone discovered that with designMode enabled an HTML selection
containing JavaScript could be copied and pasted into a document and have
the JavaScript execute within the context of the site where the code was
dropped. An attacker could utilize this to perform cross-site scripting
attacks. (CVE-2010-2769)

A buffer overflow was discovered in Firefox when processing text runs. If a
user were tricked into viewing a malicious site, a remote attacker could
use this to crash the browser or possibly run arbitrary code as the user
invoking the program. (CVE-2010-3166)

Peter Van der Beken, Jason Oster, Jesse Ruderman, Igor Bukanov, Jeff
Walden, Gary Kwong and Olli Pettay discovered several flaws in the
browser engine. If a user were tricked into viewing a malicious site, a
remote attacker could use this to crash the browser or possibly run
arbitrary code as the user invoking the program. (CVE-2010-3169)

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 10.04 LTS:
abrowser 3.6.9+build1+nobinonly-0ubuntu0.10.04.1
firefox 3.6.9+build1+nobinonly-0ubuntu0.10.04.1
xulrunner-1.9.2 1.9.2.9+build1+nobinonly-0ubuntu0.10.04.1
Ubuntu 9.10:
firefox-3.5 3.6.9+build1+nobinonly-0ubuntu0.9.10.2
xulrunner-1.9.1 1.9.1.12+build1+nobinonly-0ubuntu0.9.10.2
xulrunner-1.9.2 1.9.2.9+build1+nobinonly-0ubuntu0.9.10.1
Ubuntu 9.04:
firefox-3.0 3.6.9+build1+nobinonly-0ubuntu0.9.04.1
abrowser 3.6.9+build1+nobinonly-0ubuntu0.9.04.1
xulrunner-1.9.2 1.9.2.9+build1+nobinonly-0ubuntu0.9.04.1
Ubuntu 8.04 LTS:
firefox-3.0 3.6.9+build1+nobinonly-0ubuntu0.8.04.1
xulrunner-1.9.2 1.9.2.9+build1+nobinonly-0ubuntu0.8.04.1

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to restart Firefox and any
application that use Xulrunner to make all the necessary changes.

References

CVE-2010-2760, CVE-2010-2762, CVE-2010-2764, CVE-2010-2765, CVE-2010-2766, CVE-2010-2767, CVE-2010-2768, CVE-2010-2769, CVE-2010-3166, CVE-2010-3167, CVE-2010-3168, CVE-2010-3169