Lucene search

K
osvGoogleOSV:DSA-1704-1
HistoryJan 14, 2009 - 12:00 a.m.

xulrunner - several vulnerabilities

2009-01-1400:00:00
Google
osv.dev
31

EPSS

0.044

Percentile

92.6%

Several remote vulnerabilities have been discovered in Xulrunner, a
runtime environment for XUL applications. The Common Vulnerabilities and
Exposures project identifies the following problems:

  • CVE-2008-5500
    Jesse Ruderman discovered that the layout engine is vulnerable to
    DoS attacks that might trigger memory corruption and an integer
    overflow. (MFSA 2008-60)
  • CVE-2008-5503
    Boris Zbarsky discovered that an information disclosure attack could
    be performed via XBL bindings. (MFSA 2008-61)
  • CVE-2008-5506
    Marius Schilder discovered that it is possible to obtain sensible
    data via a XMLHttpRequest. (MFSA 2008-64)
  • CVE-2008-5507
    Chris Evans discovered that it is possible to obtain sensible data
    via a JavaScript URL. (MFSA 2008-65)
  • CVE-2008-5508
    Chip Salzenberg discovered possible phishing attacks via URLs with
    leading whitespaces or control characters. (MFSA 2008-66)
  • CVE-2008-5511
    It was discovered that it is possible to perform cross-site scripting
    attacks via an XBL binding to an “unloaded document.” (MFSA 2008-68)
  • CVE-2008-5512
    It was discovered that it is possible to run arbitrary JavaScript
    with chrome privileges via unknown vectors. (MFSA 2008-68)

For the stable distribution (etch) these problems have been fixed in
version 1.8.0.15~pre080614i-0etch1.

For the testing distribution (lenny) and the unstable distribution (sid)
these problems have been fixed in version 1.9.0.5-1.

We recommend that you upgrade your xulrunner packages.