Oval Definition:oval:org.mitre.oval:def:7740
Revision Date:2014-06-23Version:18
Title:DSA-1669 xulrunner -- several vulnerabilities
Description:Several remote vulnerabilities have been discovered in Xulrunner, a runtime environment for XUL applications. The Common Vulnerabilities and Exposures project identifies the following problems: Justin Schuh, Tom Cross and Peter Williams discovered a buffer overflow in the parser for UTF-8 URLs, which may lead to the execution of arbitrary code. "moz_bug_r_a4" discovered that the same-origin check in nsXMLDocument::OnChannelRedirect() could by bypassed. "moz_bug_r_a4" discovered that several vulnerabilities in feedWriter could lead to Chrome privilege escalation. Paul Nickerson discovered that an attacker could move windows during a mouse click, resulting in unwanted action triggered by drag-and-drop. "moz_bug_r_a4" discovered a vulnerability which can result in Chrome privilege escalation through XPCNativeWrappers. "moz_bug_r_a4" discovered a vulnerability which can result in Chrome privilege escalation through XPCNativeWrappers. Olli Pettay and "moz_bug_r_a4" discovered a Chrome privilege escalation vulnerability in XSLT handling. Jesse Ruderman discovered a crash in the layout engine, which might allow the execution of arbitrary code. Igor Bukanov, Philip Taylor, Georgi Guninski and Antoine Labour discovered crashes in the Javascript engine, which might allow the execution of arbitrary code. Dave Reed discovered that some Unicode byte order marks are stripped from Javascript code before execution, which can result in code being executed, which were otherwise part of a quoted string. Gareth Heyes discovered that some Unicode surrogate characters are ignored by the HTML parser. Boris Zbarsky discovered that resource: URls allow directory traversal when using URL-encoded slashes. Georgi Guninski discovered that resource: URLs could bypass local access restrictions. Billy Hoffman discovered that the XBM decoder could reveal uninitialised memory. Liu Die Yu discovered an information leak through local shortcut files. Georgi Guninski, Michal Zalewski and Chris Evan discovered that the canvas element could be used to bypass same-origin restrictions. It was discovered that insufficient checks in the Flash plugin glue code could lead to arbitrary code execution. Jesse Ruderman discovered that a programming error in the window.__proto__.__proto__ object could lead to arbitrary code execution. It was discovered that crashes in the layout engine could lead to arbitrary code execution. It was discovered that crashes in the Javascript engine could lead to arbitrary code execution. Justin Schuh discovered that a buffer overflow in http-index-format parser could lead to arbitrary code execution. It was discovered that a crash in the nsFrameManager might lead to the execution of arbitrary code. "moz_bug_r_a4" discovered that the same-origin check in nsXMLHttpRequest::NotifyEventListeners() could be bypassed. Collin Jackson discovered that the -moz-binding property bypasses security checks on codebase principals. Chris Evans discovered that quote characters were improperly escaped in the default namespace of E4X documents.
Family:unixClass:patch
Status:ACCEPTEDReference(s):CVE-2008-0016
CVE-2008-0017
CVE-2008-3835
CVE-2008-3836
CVE-2008-3837
CVE-2008-4058
CVE-2008-4059
CVE-2008-4060
CVE-2008-4061
CVE-2008-4062
CVE-2008-4065
CVE-2008-4066
CVE-2008-4067
CVE-2008-4068
CVE-2008-4069
CVE-2008-4582
CVE-2008-5012
CVE-2008-5013
CVE-2008-5014
CVE-2008-5017
CVE-2008-5018
CVE-2008-5021
CVE-2008-5022
CVE-2008-5023
CVE-2008-5024
DSA-1669
Platform(s):Debian GNU/Linux 4.0
Product(s):xulrunner
Definition Synopsis
  • Debian GNU/Linux 4.0 is installed.
  • AND Architecture section
  • Architecture independent section
  • Installed architecture is all
  • AND Packages section
  • libxul-dev is earlier than 1.8.0.15~pre080614h-0etch1
  • OR libmozjs-dev is earlier than 1.8.0.15~pre080614h-0etch1
  • OR libsmjs-dev is earlier than 1.8.0.15~pre080614h-0etch1
  • OR libmozillainterfaces-java is earlier than 1.8.0.15~pre080614h-0etch1
  • OR libxul-common is earlier than 1.8.0.15~pre080614h-0etch1
  • OR libsmjs1 is earlier than 1.8.0.15~pre080614h-0etch1
  • OR libnspr4-dev is earlier than 1.8.0.15~pre080614h-0etch1
  • OR libnss3-dev is earlier than 1.8.0.15~pre080614h-0etch1
  • OR Architecture dependent section
  • Supported architectures section
  • Installed architecture is s390
  • OR Installed architecture is amd64
  • OR Installed architecture is sparc
  • OR Installed architecture is arm
  • OR Installed architecture is i386
  • OR Installed architecture is ia64
  • OR Installed architecture is alpha
  • OR Installed architecture is powerpc
  • OR Installed architecture is mipsel
  • OR Installed architecture is hppa
  • AND Packages section
  • libxul0d is earlier than 1.8.0.15~pre080614h-0etch1
  • OR libnss3-0d-dbg is earlier than 1.8.0.15~pre080614h-0etch1
  • OR libmozjs0d-dbg is earlier than 1.8.0.15~pre080614h-0etch1
  • OR python-xpcom is earlier than 1.8.0.15~pre080614h-0etch1
  • OR spidermonkey-bin is earlier than 1.8.0.15~pre080614h-0etch1
  • OR libnspr4-0d-dbg is earlier than 1.8.0.15~pre080614h-0etch1
  • OR xulrunner-gnome-support is earlier than 1.8.0.15~pre080614h-0etch1
  • OR libxul0d-dbg is earlier than 1.8.0.15~pre080614h-0etch1
  • OR xulrunner is earlier than 1.8.0.15~pre080614h-0etch1
  • OR libnss3-tools is earlier than 1.8.0.15~pre080614h-0etch1
  • OR libmozjs0d is earlier than 1.8.0.15~pre080614h-0etch1
  • OR libnspr4-0d is earlier than 1.8.0.15~pre080614h-0etch1
  • OR libnss3-0d is earlier than 1.8.0.15~pre080614h-0etch1
  • BACK