Ispravljen je sigurnosni propust koji se javlja kod programskog paketa XULRunner, a zlonamjerni napadači mogu ga iskoristiti za MITM napad i otkrivanje osjetljivih informacija.
Paket:
Xulrunner 9.x
Operacijski sustavi:
Fedora 15
Kritičnost:
3.2
Problem:
neodgovarajuće rukovanje datotekama
Iskorištavanje:
udaljeno
Posljedica:
otkrivanje osjetljivih informacija
Rješenje:
programska zakrpa proizvođača
CVE:
CVE-2011-3389
Izvorni ID preporuke:
FEDORA-2011-17399
Izvor:
Fedora
Problem:
Ranjivost se javlja tijekom odabira inicijalizacijskih vektora korištenih sa skupom kriptografskih algoritama u CBC modu.
Posljedica:
Sigurnosni nedostatak može se iskoristiti za napad ubacivanjem posrednika (eng. Man in the Middle) i pregled HTTP zaglavlja.
Rješenje:
Svim korisnicima preporuča se instalacija ispravne inačice programskog paketa.
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2011-17399
2011-12-23 03:10:48
--------------------------------------------------------------------------------
Name : xulrunner
Product : Fedora 15
Version : 9.0.1
Release : 1.fc15
URL : http://developer.mozilla.org/En/XULRunner
Summary : XUL Runtime for Gecko Applications
Description :
XULRunner is a Mozilla runtime package that can be used to bootstrap XUL+XPCOM
applications that are as rich as Firefox and Thunderbird. It provides mechanisms
for installing, upgrading, and uninstalling these applications. XULRunner also
provides libxul, a solution which allows the embedding of Mozilla technologies
in other projects and products.
--------------------------------------------------------------------------------
Update Information:
The latest version of Firefox and Thunderbird have the following changes:
* Added Type Inference, significantly improving JavaScript performance
* Added support for querying Do Not Track status via JavaScript
* Added support for font-stretch
* Improved support for text-overflow
* Improved standards support for HTML5, MathML, and CSS
* Fixed several stability issues
* Fixed several security issues
Notable nss changes include:
1. SSL 2.0 is disabled by default.
2. A defense against the SSL 3.0 and TLS 1.0 CBC chosen plaintext attack
demonstrated by Rizzo and Duong (CVE-2011-3389) is enabled by default.
Set the SSL_CBC_RANDOM_IV SSL option to PR_FALSE to disable it.
3. SHA-224 is supported.
4. Added PORT_ErrorToString and PORT_ErrorToName to return the
error message and symbolic name of an NSS error code.
5. Added NSS_GetVersion to return the NSS version string.
6. Added experimental support of RSA-PSS to the softoken only
(contributed by Hanno BÄ
Posljednje sigurnosne preporuke