Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Ubuntu USN-728-2 (firefox)

Information

Severity

Severity

Critical

Family

Family

Ubuntu Local Security Checks

CVSSv2 Base

CVSSv2 Base

9.3

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:M/Au:N/C:C/I:C/A:C

Solution Type

Solution Type

Vendor Patch

Created

Created

15 years ago

Modified

Modified

6 years ago

Summary

The remote host is missing an update to firefox announced via advisory USN-728-2.

Insight

Insight

Jesse Ruderman and Gary Kwong discovered flaws in the browser engine. If a user were tricked into viewing a malicious website, a remote attacker could cause a denial of service or possibly execute arbitrary code with the privileges of the user invoking the program. (CVE-2009-0772, CVE-2009-0774) Georgi Guninski discovered a flaw when Firefox performed a cross-domain redirect. An attacker could bypass the same-origin policy in Firefox by utilizing nsIRDFService and steal private data from users authenticated to the redirected website. (CVE-2009-0776)

Solution

Solution

The problem can be corrected by upgrading your system to the following package versions: Ubuntu 7.10: firefox 2.0.0.21~tb.21+nobinonly-0ubuntu0.7.10.1 After a standard system upgrade you need to restart Firefox to effect the necessary changes. https://secure1.securityspace.com/smysecure/catid.html?in=USN-728-2

Common Vulnerabilities and Exposures (CVE)