[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

254492

 
 

909

 
 

198541

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-2106-1 xulrunner -- several

ID: oval:org.secpod.oval:def:600161Date: (C)2011-01-28   (M)2022-10-10
Class: PATCHFamily: unix




Several remote vulnerabilities have been discovered in Xulrunner, a runtime environment for XUL applications. The Common Vulnerabilities and Exposures project identifies the following problems: - - Implementation errors in XUL processing allow the execution of arbitrary code - - An implementation error in the XPCSafeJSObjectWrapper wrapper allows the bypass of the same origin policy - - An integer overflow in frame handling allows the execution of arbitrary code - - An implementation error in DOM handling allows the execution of arbitrary code - - Incorrect pointer handling in the plugin code allow the execution of arbitrary code - - Incorrect handling of an object tag may lead to the bypass of cross site scripting filters - - Incorrect copy and paste handling could lead to cross site scripting - - Crashes in the layout engine may lead to the execution of arbitrary code For the stable distribution , these problems have been fixed in version 1.9.0.19-4. For the unstable distribution , these problems have been fixed in version 3.5.12-1 of the iceweasel source package . For the experimental distribution, these problems have been fixed in version 3.6.9-1 of the iceweasel source package . We recommend that you upgrade your xulrunner packages.

Platform:
Debian 5.0
Product:
xulrunner
Reference:
DSA-2106-1
CVE-2010-2760
CVE-2010-2763
CVE-2010-2765
CVE-2010-2766
CVE-2010-2767
CVE-2010-2768
CVE-2010-2769
CVE-2010-3167
CVE-2010-3168
CVE-2010-3169
CVE    10
CVE-2010-2763
CVE-2010-3169
CVE-2010-3168
CVE-2010-2760
...
CPE    1
cpe:/o:debian:debian_linux:5.x

© SecPod Technologies