firefox-3.6.9-2.0.1.AXS3, nspr-4.8.6-1.AXS3, nss-3.12.7-2.AXS3, xulrunner-1.9.2.9-1.0.1.AXS3

エラータID: AXSA:2010-445:06

Release date: 
Wednesday, September 15, 2010 - 14:17
Subject: 
firefox-3.6.9-2.0.1.AXS3, nspr-4.8.6-1.AXS3, nss-3.12.7-2.AXS3, xulrunner-1.9.2.9-1.0.1.AXS3
Affected Channels: 
Asianux Server 3 for x86_64
Asianux Server 3 for x86
Severity: 
High
Description: 

Mozilla Firefox is an open-source web browser, designed for standards compliance, performance and portability.
NSPR provides platform independence for non-GUI operating system facilities. These facilities include threads, thread synchronization, normal file and network I/O, interval timing and calendar time, basic memory management (malloc and free) and shared library linking.
Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Applications built with NSS can support SSL v2 and v3, TLS, PKCS #5, PKCS #7, PKCS #11, PKCS #12, S/MIME, X.509 v3 certificates, and other security standards.
XULRunner provides the XUL Runtime environment for Gecko applications.
Security issues fixed with this release:
CVE-2010-2760
Use-after-free vulnerability in the nsTreeSelection function in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 might allow remote attackers to execute arbitrary code via vectors involving a XUL tree selection, related to a dangling pointer vulnerability. NOTE: this issue exists because of an incomplete fix for CVE-2010-2753.
CVE-2010-2762
The XPCSafeJSObjectWrapper class in the SafeJSObjectWrapper (aka SJOW) implementation in Mozilla Firefox 3.6.x before 3.6.9 and Thunderbird 3.1.x before 3.1.3 does not properly restrict objects at the end of scope chains, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via vectors related to a chrome privileged object and a chain ending in an outer object.
CVE-2010-2764
Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 do not properly restrict read access to the statusText property of XMLHttpRequest objects, which allows remote attackers to discover the existence of intranet web servers via cross-origin requests.
CVE-2010-2765
Integer overflow in the FRAMESET element implementation in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 might allow remote attackers to execute arbitrary code via a large number of values in the cols (aka columns) attribute, leading to a heap-based buffer overflow.
CVE-2010-2766
The normalizeDocument function in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 does not properly handle the removal of DOM nodes during normalization, which might allow remote attackers to execute arbitrary code via vectors involving access to a deleted object.
CVE-2010-2767
The navigator.plugins implementation in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 does not properly handle destruction of the DOM plugin array, which might allow remote attackers to cause a denial of service (application crash) or execute arbitrary code via crafted access to the navigator object, related to a dangling pointer vulnerability.
CVE-2010-2768
Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 do not properly restrict use of the type attribute of an OBJECT element to set a document's charset, which allows remote attackers to bypass cross-site scripting (XSS) protection mechanisms via UTF-7 encoding.
CVE-2010-2769
Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 allows user-assisted remote attackers to inject arbitrary web script or HTML via a selection that is added to a document in which the designMode property is enabled.
CVE-2010-3166
Heap-based buffer overflow in the nsTextFrameUtils::TransformText function in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 might allow remote attackers to execute arbitrary code via a bidirectional text run.
CVE-2010-3167
The nsTreeContentView function in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 does not properly handle node removal in XUL trees, which allows remote attackers to execute arbitrary code via vectors involving access to deleted memory, related to a dangling pointer vulnerability.
CVE-2010-3168
Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 do not properly restrict the role of property changes in triggering XUL tree removal, which allows remote attackers to cause a denial of service (deleted memory access and application crash) or possibly execute arbitrary code by setting unspecified properties.
CVE-2010-3169
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. firefox-3.6.9-2.0.1.AXS3.src.rpm
    MD5: 5727cbf6a43fe4fb7f2a428116fb2b00
    SHA-256: 2fdb8c5902de4fe6ca5c53d18b1d4053cdf306066109e8be077a1b84221ce0da
    Size: 57.74 MB
  2. nspr-4.8.6-1.AXS3.src.rpm
    MD5: 8d70615f0ba3214f1f0f1b7cb7350433
    SHA-256: 3a38f874daae16dba21b2f9adf3495881c7508593c0bb1256f084e59b3568891
    Size: 912.31 kB
  3. nss-3.12.7-2.AXS3.src.rpm
    MD5: ebe8502505554d751b10d1756c6a042e
    SHA-256: 3056e32629edd194aa8efb9ca4dc053f168cb243e2db2936966166ff89109541
    Size: 5.34 MB
  4. xulrunner-1.9.2.9-1.0.1.AXS3.src.rpm
    MD5: 4d29ade3f4dd5f1f8caf03cde5e356d5
    SHA-256: e9e01bfa0f733ba9d8382c8ba1f284c18b0e36a1420f0640dcc566ca2940af5f
    Size: 48.61 MB

Asianux Server 3 for x86
  1. firefox-3.6.9-2.0.1.AXS3.i386.rpm
    MD5: e93ac205a95000585fd83e8502141d77
    SHA-256: feb63ed081a455359926f23eb85e8828cb8e3bc0f1dd3e3d334fbce17c9887d4
    Size: 14.48 MB
  2. xulrunner-1.9.2.9-1.0.1.AXS3.i386.rpm
    MD5: 4f810f7c14ff1ae566bbd87b3a364953
    SHA-256: e80b6d22161f571f296a934a543cf3e1608782abbf8a7a0006dd65748f8cfb5d
    Size: 11.54 MB

Asianux Server 3 for x86_64
  1. firefox-3.6.9-2.0.1.AXS3.x86_64.rpm
    MD5: 93bbdb1bb10dd5f9b0a2f816ce6876b5
    SHA-256: f41d9db0a03a4c8828bbd4bc5905f0173097addb1eae35cbaf6f70e4d2f017b4
    Size: 14.48 MB
  2. xulrunner-1.9.2.9-1.0.1.AXS3.x86_64.rpm
    MD5: 8571d077f669ca219c97d2dd17bd1c23
    SHA-256: 018d399b07a7d95354ea436cdf32589cece74f5addbdec887d57e5227d5f0a84
    Size: 10.98 MB