Ubuntu 8.04 LTS / 8.10 : firefox-3.0, xulrunner-1.9 vulnerabilities (USN-690-1)

critical Nessus Plugin ID 36262

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Several flaws were discovered in the browser engine. These problems could allow an attacker to crash the browser and possibly execute arbitrary code with user privileges. (CVE-2008-5500, CVE-2008-5501, CVE-2008-5502)

It was discovered that Firefox did not properly handle persistent cookie data. If a user were tricked into opening a malicious website, an attacker could write persistent data in the user's browser and track the user across browsing sessions. (CVE-2008-5505)

Marius Schilder discovered that Firefox did not properly handle redirects to an outside domain when an XMLHttpRequest was made to a same-origin resource. It's possible that sensitive information could be revealed in the XMLHttpRequest response. (CVE-2008-5506)

Chris Evans discovered that Firefox did not properly protect a user's data when accessing a same-domain JavaScript URL that is redirected to an unparsable JavaScript off-site resource. If a user were tricked into opening a malicious website, an attacker may be able to steal a limited amount of private data. (CVE-2008-5507)

Chip Salzenberg, Justin Schuh, Tom Cross, and Peter William discovered Firefox did not properly parse URLs when processing certain control characters. (CVE-2008-5508)

Kojima Hajime discovered that Firefox did not properly handle an escaped null character. An attacker may be able to exploit this flaw to bypass script sanitization. (CVE-2008-5510)

Several flaws were discovered in the JavaScript engine. If a user were tricked into opening a malicious website, an attacker could exploit this to execute arbitrary JavaScript code within the context of another website or with chrome privileges. (CVE-2008-5511, CVE-2008-5512)

Flaws were discovered in the session-restore feature of Firefox. If a user were tricked into opening a malicious website, an attacker could exploit this to perform cross-site scripting attacks or execute arbitrary JavaScript code with chrome privileges. (CVE-2008-5513).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.

Solution

Update the affected packages.

See Also

https://usn.ubuntu.com/690-1/

Plugin Details

Severity: Critical

ID: 36262

File Name: ubuntu_USN-690-1.nasl

Version: 1.18

Type: local

Agent: unix

Published: 4/23/2009

Updated: 1/19/2021

Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:canonical:ubuntu_linux:abrowser, p-cpe:/a:canonical:ubuntu_linux:abrowser-3.0-branding, p-cpe:/a:canonical:ubuntu_linux:firefox, p-cpe:/a:canonical:ubuntu_linux:firefox-3.0, p-cpe:/a:canonical:ubuntu_linux:firefox-3.0-branding, p-cpe:/a:canonical:ubuntu_linux:firefox-3.0-dev, p-cpe:/a:canonical:ubuntu_linux:firefox-3.0-dom-inspector, p-cpe:/a:canonical:ubuntu_linux:firefox-3.0-gnome-support, p-cpe:/a:canonical:ubuntu_linux:firefox-3.0-venkman, p-cpe:/a:canonical:ubuntu_linux:firefox-dev, p-cpe:/a:canonical:ubuntu_linux:firefox-dom-inspector, p-cpe:/a:canonical:ubuntu_linux:firefox-gnome-support, p-cpe:/a:canonical:ubuntu_linux:firefox-granparadiso, p-cpe:/a:canonical:ubuntu_linux:firefox-granparadiso-dev, p-cpe:/a:canonical:ubuntu_linux:firefox-granparadiso-dom-inspector, p-cpe:/a:canonical:ubuntu_linux:firefox-granparadiso-gnome-support, p-cpe:/a:canonical:ubuntu_linux:firefox-libthai, p-cpe:/a:canonical:ubuntu_linux:firefox-trunk, p-cpe:/a:canonical:ubuntu_linux:firefox-trunk-dev, p-cpe:/a:canonical:ubuntu_linux:firefox-trunk-dom-inspector, p-cpe:/a:canonical:ubuntu_linux:firefox-trunk-gnome-support, p-cpe:/a:canonical:ubuntu_linux:firefox-trunk-venkman, p-cpe:/a:canonical:ubuntu_linux:xulrunner-1.9, p-cpe:/a:canonical:ubuntu_linux:xulrunner-1.9-dev, p-cpe:/a:canonical:ubuntu_linux:xulrunner-1.9-dom-inspector, p-cpe:/a:canonical:ubuntu_linux:xulrunner-1.9-gnome-support, p-cpe:/a:canonical:ubuntu_linux:xulrunner-1.9-venkman, p-cpe:/a:canonical:ubuntu_linux:xulrunner-dev, cpe:/o:canonical:ubuntu_linux:8.04:-:lts, cpe:/o:canonical:ubuntu_linux:8.10

Required KB Items: Host/cpu, Host/Ubuntu, Host/Ubuntu/release, Host/Debian/dpkg-l

Exploit Ease: No known exploits are available

Patch Publication Date: 12/17/2008

Reference Information

CVE: CVE-2008-5500, CVE-2008-5501, CVE-2008-5502, CVE-2008-5505, CVE-2008-5506, CVE-2008-5507, CVE-2008-5508, CVE-2008-5510, CVE-2008-5511, CVE-2008-5512, CVE-2008-5513

BID: 32882

CWE: 20, 200, 264, 399, 79

USN: 690-1