firefox-10.0.3-1.0.1.AXS3, xulrunner-10.0.3-1.0.1.AXS3

エラータID: AXSA:2012-468:03

Release date: 
Sunday, April 1, 2012 - 15:53
Subject: 
firefox-10.0.3-1.0.1.AXS3, xulrunner-10.0.3-1.0.1.AXS3
Affected Channels: 
Asianux Server 3 for x86
Asianux Server 3 for x86_64
Severity: 
High
Description: 

Mozilla Firefox is an open-source web browser, designed for standards compliance, performance and portability.

Upgraded from version 3.6.26 to version 10.0.3

Security issues fixed with this release:

• CVE-2012-0451
CRLF injection vulnerability in Mozilla Firefox 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 allows remote web servers to bypass intended Content Security Policy (CSP) restrictions and possibly conduct cross-site scripting (XSS) attacks via crafted HTTP headers.

• CVE-2012-0455
Mozilla Firefox before 3.6.28 and 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird before 3.1.20 and 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 do not properly restrict drag-and-drop operations on javascript: URLs, which allows user-assisted remote attackers to conduct cross-site scripting (XSS) attacks via a crafted web page, related to a "DragAndDropJacking" issue.

• CVE-2012-0456
The SVG Filters implementation in Mozilla Firefox before 3.6.28 and 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird before 3.1.20 and 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 might allow remote attackers to obtain sensitive information from process memory via vectors that trigger an out-of-bounds read.

• CVE-2012-0457
Use-after-free vulnerability in the nsSMILTimeValueSpec::ConvertBetweenTimeContainer function in Mozilla Firefox before 3.6.28 and 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird before 3.1.20 and 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 might allow remote attackers to execute arbitrary code via an SVG animation.

• CVE-2012-0458
Mozilla Firefox before 3.6.28 and 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird before 3.1.20 and 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 do not properly restrict setting the home page through the dragging of a URL to the home button, which allows user-assisted remote attackers to execute arbitrary JavaScript code with chrome privileges via a javascript: URL that is later interpreted in the about:sessionrestore context.

• CVE-2012-0459
The Cascading Style Sheets (CSS) implementation in Mozilla Firefox 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via dynamic modification of a keyframe followed by access to the cssText of the keyframe.

• CVE-2012-0460
Mozilla Firefox 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 do not properly restrict write access to the window.fullScreen object, which allows remote attackers to spoof the user interface via a crafted web page.

• CVE-2012-0461
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.28 and 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird before 3.1.20 and 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.

• CVE-2012-0462
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.

• CVE-2012-0464
Use-after-free vulnerability in the browser engine in Mozilla Firefox before 3.6.28 and 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird before 3.1.20 and 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 allows remote attackers to execute arbitrary code via vectors involving an empty argument to the array.join function in conjunction with the triggering of garbage collection.

• Important: Firefox 10 is not completely backwards-compatible with all Mozilla add-ons and Firefox plug-ins that worked with Firefox 3.6. Firefox 10 checks compatibility on first-launch, and, depending on the individual configuration and the installed add-ons and plug-ins, may disable said Add-ons and plug-ins, or attempt to check for updates and upgrade them. Add-ons and plug-ins may have to be manually updated.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. firefox-10.0.3-1.0.1.AXS3.src.rpm
    MD5: 9ea69399270a05f11a4533d64c135599
    SHA-256: 13286d9a02a6f8dc206fe063c271b33eee442cba1e02f49c3ede1b291810bdb0
    Size: 89.28 MB
  2. xulrunner-10.0.3-1.0.1.AXS3.src.rpm
    MD5: 9914ea7ebfb65d14b398e29e891a9ef5
    SHA-256: b7debb6aa5ff852edc9e2053b4c989e46e8f2d3e19a84d322637a337f142dbb3
    Size: 71.70 MB

Asianux Server 3 for x86
  1. firefox-10.0.3-1.0.1.AXS3.i386.rpm
    MD5: 04962d68538c8ad9a4ec271d62d073b2
    SHA-256: b3531768a13d8936633f06635337f900e568da42aca51d98711c6f525f640e00
    Size: 20.45 MB
  2. xulrunner-10.0.3-1.0.1.AXS3.i386.rpm
    MD5: 7f527d68e1f3d28b6489fbd35bf62bcc
    SHA-256: 6645d6327bed264ba3b63094d13d4477aca6092e75c7a122bba11c00cad06f16
    Size: 13.31 MB

Asianux Server 3 for x86_64
  1. firefox-10.0.3-1.0.1.AXS3.x86_64.rpm
    MD5: 83fd1ca3a563a9941a2dd5d950404625
    SHA-256: 42abf022286cdcb13565500784ad1c2628d156c5e6a21c5f9dd6a6b128265b71
    Size: 20.45 MB
  2. xulrunner-10.0.3-1.0.1.AXS3.x86_64.rpm
    MD5: f7419a40ff294bcc9ade8a0a9ecf5afe
    SHA-256: 523130e1dd89f042d5fbc655802843abc382739f44fcd9d9d445b8c1fb26a258
    Size: 12.86 MB