USN-878-1: Firefox 3.5 and Xulrunner 1.9.1 regression
8 January 2010
firefox-3.5, xulrunner-1.9.1 regression
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 9.10
USN-874-1 fixed vulnerabilities in Firefox and Xulrunner. The upstream changes introduced a regression when using NTLM authentication. This update fixes the problem and adds additional stability fixes.
We apologize for the inconvenience.
Takehiro Takahashi discovered flaws in the NTLM implementation in Firefox. If an NTLM authenticated user visited a malicious website, a remote attacker could send requests to other applications, authenticated as the user. (CVE-2009-3983)
Jonathan Morgan discovered that Firefox did not properly display SSL indicators under certain circumstances. This could be used by an attacker to spoof an encrypted page, such as in a phishing attack. (CVE-2009-3984)
Jordi Chancel discovered that Firefox did not properly display invalid URLs for a blank page. If a user were tricked into accessing a malicious website, an attacker could exploit this to spoof the location bar, such as in a phishing attack. (CVE-2009-3985)
David Keeler, Bob Clary, and Dan Kaminsky discovered several flaws in third party media libraries. If a user were tricked into opening a crafted media file, a remote attacker could cause a denial of service or possibly execute arbitrary code with the privileges of the user invoking the program. (CVE-2009-3388, CVE-2009-3389)
The problem can be corrected by updating your system to the following package versions:
- Ubuntu 9.10
- firefox-3.5 - 3.5.7+nobinonly-0ubuntu0.9.10.1
- xulrunner-1.9.1 - 188.8.131.52+nobinonly-0ubuntu0.9.10.1
To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.
After a standard system upgrade you need to restart Firefox and any applications that use xulrunner to effect the necessary changes.