Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux

FreeBSD Ports: firefox
Information
Severity
Severity
Family
Family
CVSSv2 Base
CVSSv2 Base
CVSSv2 Vector
CVSSv2 Vector
Solution Type
Solution Type
Created
Created
Modified
Modified
Summary
The remote host is missing an update to the system as announced in the referenced advisory.
Insight
Insight
The following packages are affected: firefox linux-firefox linux-seamonkey linux-thunderbird seamonkey thunderbird libxul CVE-2012-4201 The evalInSandbox implementation in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 uses an incorrect context during the handling of JavaScript code that sets the location.href property, which allows remote attackers to conduct cross-site scripting (XSS) attacks or read arbitrary files by leveraging a sandboxed add-on. CVE-2012-4202 Heap-based buffer overflow in the image::RasterImage::DrawFrameTo function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code via a crafted GIF image. CVE-2012-4203 The New Tab page in Mozilla Firefox before 17.0 uses a privileged context for execution of JavaScript code by bookmarklets, which allows user-assisted remote attackers to run arbitrary programs by leveraging a javascript: URL in a bookmark. CVE-2012-4204 The str_unescape function in the JavaScript engine in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via unspecified vectors. Text truncated. Please see the references for more information.
Solution
Solution
Update your system with the appropriate patches or software upgrades.
Common Vulnerabilities and Exposures (CVE)
- CVE-2012-4201
- CVE-2012-4202
- CVE-2012-4203
- CVE-2012-4204
- CVE-2012-4205
- CVE-2012-4206
- CVE-2012-4207
- CVE-2012-4208
- CVE-2012-4209
- CVE-2012-4210
- CVE-2012-4212
- CVE-2012-4213
- CVE-2012-4214
- CVE-2012-4215
- CVE-2012-4216
- CVE-2012-4217
- CVE-2012-4218
- CVE-2012-5829
- CVE-2012-5830
- CVE-2012-5833
- CVE-2012-5835
- CVE-2012-5836
- CVE-2012-5837
- CVE-2012-5838
- CVE-2012-5839
- CVE-2012-5840
- CVE-2012-5841
- CVE-2012-5842
- CVE-2012-5843
References
- http://www.mozilla.org/security/announce/2012/mfsa2012-90.html
- http://www.mozilla.org/security/announce/2012/mfsa2012-91.html
- http://www.mozilla.org/security/announce/2012/mfsa2012-92.html
- http://www.mozilla.org/security/announce/2012/mfsa2012-93.html
- http://www.mozilla.org/security/announce/2012/mfsa2012-94.html
- http://www.mozilla.org/security/announce/2012/mfsa2012-95.html
- http://www.mozilla.org/security/announce/2012/mfsa2012-96.html
- http://www.mozilla.org/security/announce/2012/mfsa2012-97.html
- http://www.mozilla.org/security/announce/2012/mfsa2012-98.html
- http://www.mozilla.org/security/announce/2012/mfsa2012-99.html
- http://www.mozilla.org/security/announce/2012/mfsa2012-100.html
- http://www.mozilla.org/security/announce/2012/mfsa2012-101.html
- http://www.mozilla.org/security/announce/2012/mfsa2012-102.html
- http://www.mozilla.org/security/announce/2012/mfsa2012-103.html
- http://www.mozilla.org/security/announce/2012/mfsa2012-104.html
- http://www.mozilla.org/security/announce/2012/mfsa2012-105.html
- http://www.mozilla.org/security/announce/2012/mfsa2012-106.html
- http://www.mozilla.org/security/known-vulnerabilities/
- http://www.vuxml.org/freebsd/d23119df-335d-11e2-b64c-c8600054b392.html