Búsqueda de    
Vulnerabilidad   
    Buscar 219043 Descripciones CVE y
99761 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.851800
Categoría:SuSE Local Security Checks
Título:openSUSE: Security Advisory for MozillaFirefox (openSUSE-SU-2018:1833-1)
Resumen:The remote host is missing an update for the 'MozillaFirefox'; package(s) announced via the referenced advisory.
Descripción:Summary:
The remote host is missing an update for the 'MozillaFirefox'
package(s) announced via the referenced advisory.

Vulnerability Insight:
This security update for MozillaFirefox to version 60.1.0esr fixes
multiple issues.

Security issues fixed (MFSA 2018-16, boo#1098998):

- CVE-2018-12359: Buffer overflow using computed size of canvas element

- CVE-2018-12360: Use-after-free when using focus()

- CVE-2018-12361: Integer overflow in SwizzleData

- CVE-2018-12362: Integer overflow in SSSE3 scaler

- CVE-2018-5156: Media recorder segmentation fault when track type is
changed during capture

- CVE-2018-12363: Use-after-free when appending DOM nodes

- CVE-2018-12364: CSRF attacks through 307 redirects and NPAPI plugins

- CVE-2018-12365: Compromised IPC child process can list local filenames

- CVE-2018-12371: Integer overflow in Skia library during edge builder
allocation

- CVE-2018-12366: Invalid data handling during QCMS transformations

- CVE-2018-12367: Timing attack mitigation of PerformanceNavigationTiming

- CVE-2018-12369: WebExtension security permission checks bypassed by
embedded experiments

- CVE-2018-5187: Memory safety bugs fixed in Firefox 60 and Firefox ESR
60.1

- CVE-2018-5188: Memory safety bugs fixed in Firefox 60, Firefox ESR 60.1,
and Firefox ESR 52.9

Other issues fixed:

- various stability and regression fixes

- do not disable system installed unsigned language packs (bmo#1464766)

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended
installation methods
like YaST online_update or 'zypper patch'.

Alternatively you can run the command listed for your product:

- openSUSE Leap 42.3:

zypper in -t patch openSUSE-2018-676=1

- openSUSE Leap 15.0:

zypper in -t patch openSUSE-2018-676=1

Affected Software/OS:
MozillaFirefox on openSUSE Leap 42.3

Solution:
Please install the updated package(s).

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2018-5156
BugTraq ID: 104560
http://www.securityfocus.com/bid/104560
Debian Security Information: DSA-4235 (Google Search)
https://www.debian.org/security/2018/dsa-4235
Debian Security Information: DSA-4295 (Google Search)
https://www.debian.org/security/2018/dsa-4295
https://security.gentoo.org/glsa/201810-01
https://security.gentoo.org/glsa/201811-13
https://lists.debian.org/debian-lts-announce/2018/06/msg00014.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00011.html
RedHat Security Advisories: RHSA-2018:2112
https://access.redhat.com/errata/RHSA-2018:2112
RedHat Security Advisories: RHSA-2018:2113
https://access.redhat.com/errata/RHSA-2018:2113
http://www.securitytracker.com/id/1041193
https://usn.ubuntu.com/3705-1/
Common Vulnerability Exposure (CVE) ID: CVE-2018-5187
BugTraq ID: 104556
http://www.securityfocus.com/bid/104556
Common Vulnerability Exposure (CVE) ID: CVE-2018-5188
BugTraq ID: 104555
http://www.securityfocus.com/bid/104555
Debian Security Information: DSA-4244 (Google Search)
https://www.debian.org/security/2018/dsa-4244
https://lists.debian.org/debian-lts-announce/2018/07/msg00013.html
RedHat Security Advisories: RHSA-2018:2251
https://access.redhat.com/errata/RHSA-2018:2251
RedHat Security Advisories: RHSA-2018:2252
https://access.redhat.com/errata/RHSA-2018:2252
https://usn.ubuntu.com/3714-1/
https://usn.ubuntu.com/3749-1/
CopyrightCopyright (C) 2018 Greenbone Networks GmbH

Esta es sólo una de 99761 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2024 E-Soft Inc. Todos los derechos reservados.