USN-874-1: Firefox 3.5 and Xulrunner 1.9.1 vulnerabilities
18 December 2009
firefox-3.5, xulrunner-1.9.1 vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 9.10
Takehiro Takahashi discovered flaws in the NTLM implementation in Firefox. If an NTLM authenticated user visited a malicious website, a remote attacker could send requests to other applications, authenticated as the user. (CVE-2009-3983)
Jonathan Morgan discovered that Firefox did not properly display SSL indicators under certain circumstances. This could be used by an attacker to spoof an encrypted page, such as in a phishing attack. (CVE-2009-3984)
Jordi Chancel discovered that Firefox did not properly display invalid URLs for a blank page. If a user were tricked into accessing a malicious website, an attacker could exploit this to spoof the location bar, such as in a phishing attack. (CVE-2009-3985)
David Keeler, Bob Clary, and Dan Kaminsky discovered several flaws in third party media libraries. If a user were tricked into opening a crafted media file, a remote attacker could cause a denial of service or possibly execute arbitrary code with the privileges of the user invoking the program. (CVE-2009-3388, CVE-2009-3389)
The problem can be corrected by updating your system to the following package versions:
- Ubuntu 9.10
- firefox-3.5 - 3.5.6+nobinonly-0ubuntu0.9.10.1
- xulrunner-1.9.1 - 220.127.116.11+nobinonly-0ubuntu0.9.10.1
To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.
After a standard system upgrade you need to restart Firefox and any applications that use xulrunner to effect the necessary changes.