Ispravljeni su višestruki sigurnosni propusti programskog paketa Seamonkey koje je udaljeni napadač mogao iskoristiti za zaobilaženje postavljenih ograničenja, dobivanje većih privilegija, umetanje HTML i skriptnog koda, otkrivanje osjetljivih informacija, proizvoljno izvršavanje programskog koda ili izvođenje DoS napada.
Paket:
SeaMonkey 2.x
Operacijski sustavi:
openSUSE 11.3, openSUSE 11.4
Kritičnost:
8.7
Problem:
cjelobrojno prepisivanje, neodgovarajuća provjera ulaznih podataka, neodgovarajuće rukovanje memorijom, nespecificirana pogreška, pogreška u programskoj funkciji, pogreška u programskoj komponenti, XSS
Iskorištavanje:
udaljeno
Posljedica:
dobivanje većih privilegija, otkrivanje osjetljivih informacija, proizvoljno izvršavanje programskog koda, umetanje HTML i skriptnog koda, uskraćivanje usluga (DoS), zaobilaženje postavljenih ograničenja
Propusti su uzrokovani neodgovarajućom provjerom ulaznih podataka, cjelobrojnim prepisivanjem, nepravilnim rukovanjem HTTP odgovorima, JavaScript datotekama i XPCNativeWrappers-om, XSS-om te neodgovarajućim rukovanjem memorijom.
Posljedica:
Navedene ranjivosti udaljeni napadač može iskoristiti za zaobilaženje postavljenih ograničenja, povećanje ovlasti, pregled osjetljivih podataka, proizvoljno pokretanje programskog koda ili izvođenje DoS te XSS napada.
openSUSE Security Update: Seamonkey update
______________________________________________________________________________
Announcement ID: openSUSE-SU-2011:1290-1
Rating: critical
References: #728520
Cross-References: CVE-2011-2372 CVE-2011-2996 CVE-2011-2998
CVE-2011-2999 CVE-2011-3000 CVE-2011-3001
CVE-2011-3640 CVE-2011-3647 CVE-2011-3648
CVE-2011-3649 CVE-2011-3650 CVE-2011-3651
CVE-2011-3653 CVE-2011-3655
Affected Products:
openSUSE 11.4
openSUSE 11.3
______________________________________________________________________________
An update that fixes 14 vulnerabilities is now available.
It includes one version update.
Description:
Seamonkey was upgraded to version 2.5 in order to fix the
following security problems:
* MFSA 2011-47/CVE-2011-3648 (bmo#690225) Potential XSS
against sites using Shift-JIS
* MFSA 2011-48/CVE-2011-3651/CVE-2011-3652/CVE-2011-3654
Miscellaneous memory safety hazards
* MFSA 2011-49/CVE-2011-3650 (bmo#674776) Memory corruption
while profiling using Firebug
* MFSA 2011-52/CVE-2011-3655 (bmo#672182) Code execution
via NoWaiverWrapper
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 11.4:
zypper in -t patch seamonkey-5487
- openSUSE 11.3:
zypper in -t patch seamonkey-5487
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 11.4 (i586 x86_64) [New Version: 2.5]:
seamonkey-2.5-0.2.1
seamonkey-dom-inspector-2.5-0.2.1
seamonkey-irc-2.5-0.2.1
seamonkey-translations-common-2.5-0.2.1
seamonkey-translations-other-2.5-0.2.1
seamonkey-venkman-2.5-0.2.1
- openSUSE 11.3 (i586 x86_64) [New Version: 2.5]:
seamonkey-2.5-0.2.1
seamonkey-dom-inspector-2.5-0.2.1
seamonkey-irc-2.5-0.2.1
seamonkey-translations-common-2.5-0.2.1
seamonkey-translations-other-2.5-0.2.1
seamonkey-venkman-2.5-0.2.1
References:
http://support.novell.com/security/cve/CVE-2011-2372.html
http://support.novell.com/security/cve/CVE-2011-2996.html
http://support.novell.com/security/cve/CVE-2011-2998.html
http://support.novell.com/security/cve/CVE-2011-2999.html
http://support.novell.com/security/cve/CVE-2011-3000.html
http://support.novell.com/security/cve/CVE-2011-3001.html
http://support.novell.com/security/cve/CVE-2011-3640.html
http://support.novell.com/security/cve/CVE-2011-3647.html
http://support.novell.com/security/cve/CVE-2011-3648.html
http://support.novell.com/security/cve/CVE-2011-3649.html
http://support.novell.com/security/cve/CVE-2011-3650.html
http://support.novell.com/security/cve/CVE-2011-3651.html
http://support.novell.com/security/cve/CVE-2011-3653.html
http://support.novell.com/security/cve/CVE-2011-3655.html
https://bugzilla.novell.com/728520
--
To unsubscribe, e-mail: Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
For additional commands, e-mail: Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
Posljednje sigurnosne preporuke