USN-626-1: Firefox and xulrunner vulnerabilities
28 July 2008
Firefox and xulrunner vulnerabilities
Releases
Packages
Details
A flaw was discovered in the browser engine. A variable could be made to
overflow causing the browser to crash. If a user were tricked into opening
a malicious web page, an attacker could cause a denial of service or
possibly execute arbitrary code with the privileges of the user invoking
the program. (CVE-2008-2785)
Billy Rios discovered that Firefox and xulrunner, as used by browsers
such as Epiphany, did not properly perform URI splitting with pipe
symbols when passed a command-line URI. If Firefox or xulrunner were
passed a malicious URL, an attacker may be able to execute local
content with chrome privileges. (CVE-2008-2933)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 8.04
-
firefox-3.0
-
3.0.1+build1+nobinonly-0ubuntu0.8.04.3
-
xulrunner-1.9
-
1.9.0.1+build1+nobinonly-0ubuntu0.8.04.3
After a standard system upgrade you need to restart Firefox and any
applications that use xulrunner, such as Epiphany, to effect the
necessary changes.