Home
Reading
Searching
Subscribe
Sponsors
Statistics
Posting
Contact
Spam
Lists
Links
About
Hosting
Filtering
Features Download
Marketing
Archives
FAQ
Blog
 
Gmane
From: Pat Riehecky <riehecky-13hema8v3vg <at> public.gmane.org>
Subject: Security ERRATA Critical: firefox on SL5.x, SL6.x i386/x86_64
Newsgroups: gmane.linux.scientific.errata
Date: Wednesday 7th August 2013 14:00:18 UTC (over 3 years ago)
Synopsis:          Critical: firefox security update
Advisory ID:       SLSA-2013:1140-1
Issue Date:        2013-08-07
CVE Numbers:       CVE-2013-1701
                   CVE-2013-1709
                   CVE-2013-1710
                   CVE-2013-1713
                   CVE-2013-1714
                   CVE-2013-1717
--

Several flaws were found in the processing of malformed web content. A web
page containing malicious content could cause Firefox to crash or,
potentially, execute arbitrary code with the privileges of the user
running Firefox. (CVE-2013-1701)

A flaw was found in the way Firefox generated Certificate Request Message
Format (CRMF) requests. An attacker could use this flaw to perform cross-
site scripting (XSS) attacks or execute arbitrary code with the privileges
of the user running Firefox. (CVE-2013-1710)

A flaw was found in the way Firefox handled the interaction between frames
and browser history. An attacker could use this flaw to trick Firefox into
treating malicious content as if it came from the browser history,
allowing for XSS attacks. (CVE-2013-1709)

It was found that the same-origin policy could be bypassed due to the way
Uniform Resource Identifiers (URI) were checked in JavaScript. An attacker
could use this flaw to perform XSS attacks, or install malicious add-ons
from third-party pages. (CVE-2013-1713)

It was found that web workers could bypass the same-origin policy. An
attacker could use this flaw to perform XSS attacks. (CVE-2013-1714)

It was found that, in certain circumstances, Firefox incorrectly handled
Java applets. If a user launched an untrusted Java applet via Firefox, the
applet could use this flaw to obtain read-only access to files on the
user's local system. (CVE-2013-1717)

After installing the update, Firefox must be restarted for the changes to
take effect.
--

SL5
  x86_64
    firefox-17.0.8-1.el5_9.i386.rpm
    firefox-17.0.8-1.el5_9.x86_64.rpm
    firefox-debuginfo-17.0.8-1.el5_9.i386.rpm
    firefox-debuginfo-17.0.8-1.el5_9.x86_64.rpm
    xulrunner-17.0.8-3.el5_9.i386.rpm
    xulrunner-17.0.8-3.el5_9.x86_64.rpm
    xulrunner-debuginfo-17.0.8-3.el5_9.i386.rpm
    xulrunner-debuginfo-17.0.8-3.el5_9.x86_64.rpm
    xulrunner-devel-17.0.8-3.el5_9.i386.rpm
    xulrunner-devel-17.0.8-3.el5_9.x86_64.rpm
  i386
    firefox-17.0.8-1.el5_9.i386.rpm
    firefox-debuginfo-17.0.8-1.el5_9.i386.rpm
    xulrunner-17.0.8-3.el5_9.i386.rpm
    xulrunner-debuginfo-17.0.8-3.el5_9.i386.rpm
    xulrunner-devel-17.0.8-3.el5_9.i386.rpm
SL6
  x86_64
    firefox-17.0.8-1.el6_4.i686.rpm
    firefox-17.0.8-1.el6_4.x86_64.rpm
    firefox-debuginfo-17.0.8-1.el6_4.i686.rpm
    firefox-debuginfo-17.0.8-1.el6_4.x86_64.rpm
    xulrunner-17.0.8-3.el6_4.i686.rpm
    xulrunner-17.0.8-3.el6_4.x86_64.rpm
    xulrunner-debuginfo-17.0.8-3.el6_4.i686.rpm
    xulrunner-debuginfo-17.0.8-3.el6_4.x86_64.rpm
    xulrunner-devel-17.0.8-3.el6_4.i686.rpm
    xulrunner-devel-17.0.8-3.el6_4.x86_64.rpm
  i386
    firefox-17.0.8-1.el6_4.i686.rpm
    firefox-debuginfo-17.0.8-1.el6_4.i686.rpm
    xulrunner-17.0.8-3.el6_4.i686.rpm
    xulrunner-debuginfo-17.0.8-3.el6_4.i686.rpm
    xulrunner-devel-17.0.8-3.el6_4.i686.rpm

- Scientific Linux Development Team
 
CD: 3ms