firefox-10.0.12-1.0.1.AXS4, xulrunner-10.0.12-1.0.1.AXS4

エラータID: AXSA:2013-58:01

Release date: 
Wednesday, January 30, 2013 - 12:10
Subject: 
firefox-10.0.12-1.0.1.AXS4, xulrunner-10.0.12-1.0.1.AXS4
Affected Channels: 
Asianux Server 4 for x86_64
Asianux Server 4 for x86
Severity: 
High
Description: 

Description Mozilla Firefox is an open-source web browser, designed for standards compliance, performance and portability.

Security issues fixed with this release:

• CVE-2013-0744
Use-after-free vulnerability in the TableBackgroundPainter::TableBackgroundData::Destroy function in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via an HTML document with a table containing many columns and column groups.

• CVE-2013-0746
Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 do not properly implement quickstubs that use the jsval data type for their return values, which allows remote attackers to execute arbitrary code or cause a denial of service (compartment mismatch and application crash) via crafted JavaScript code that is not properly handled during garbage collection.

• CVE-2013-0748
The XBL.__proto__.toString implementation in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 makes it easier for remote attackers to bypass the ASLR protection mechanism by calling the toString function of an XBL object.

• CVE-2013-0750
Integer overflow in the JavaScript implementation in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via a crafted string concatenation, leading to improper memory allocation and a heap-based buffer overflow.

• CVE-2013-0753
Use-after-free vulnerability in the serializeToStream implementation in the XMLSerializer component in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via crafted web content.

• CVE-2013-0754
Use-after-free vulnerability in the ListenerManager implementation in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via vectors involving the triggering of garbage collection after memory allocation for listener objects.

• CVE-2013-0758
Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allow remote attackers to execute arbitrary JavaScript code with chrome privileges by leveraging improper interaction between plugin objects and SVG elements.

• CVE-2013-0759
Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allow remote attackers to spoof the address bar via vectors involving authentication information in the userinfo field of a URL, in conjunction with a 204 (aka No Content) HTTP status code.

• CVE-2013-0762
Use-after-free vulnerability in the imgRequest::OnStopFrame function in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.1, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.

• CVE-2013-0766
Use-after-free vulnerability in the ~nsHTMLEditRules implementation in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.1, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.

• CVE-2013-0767
The nsSVGPathElement::GetPathLengthScale function in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.1, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via unspecified vectors.

• CVE-2013-0769
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.1, and SeaMonkey before 2.15 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. firefox-10.0.12-1.0.1.AXS4.src.rpm
    MD5: af9d80dc398a51fb43d0a85f7bec2465
    SHA-256: 2ce07aa51ceb68aa02a89af74d13e50df88e9268bb2abb15c1a6e4dbfc7ff417
    Size: 89.29 MB
  2. xulrunner-10.0.12-1.0.1.AXS4.src.rpm
    MD5: aa270644c8abc3025f26252c45571d0d
    SHA-256: 3786c38c4966c78335b58db28aec4be339d333fb8b9ba4d877201ea6d1845619
    Size: 71.73 MB

Asianux Server 4 for x86
  1. firefox-10.0.12-1.0.1.AXS4.i686.rpm
    MD5: 6c827f9dfed1e73547d6b5b9dd659330
    SHA-256: dd772348957e94b960ac3e42d96a5804b42b9b3ca2794ca87d6e0b1a5a31c0b5
    Size: 19.79 MB
  2. xulrunner-10.0.12-1.0.1.AXS4.i686.rpm
    MD5: 477d239fb720085ea789ca7c9a66243c
    SHA-256: d44b4c611632bf2ffdbad43e40b3bd255ca53b68b671d5add23896f1a8a567f1
    Size: 12.07 MB

Asianux Server 4 for x86_64
  1. firefox-10.0.12-1.0.1.AXS4.x86_64.rpm
    MD5: c7747c85bd7a86da460dd96d22e069fc
    SHA-256: 4779dfcae8d34c2c3173a104bb345427aa5292b9dffbb1e6d449d44e7fc507e7
    Size: 19.82 MB
  2. firefox-10.0.12-1.0.1.AXS4.i686.rpm
    MD5: 6c827f9dfed1e73547d6b5b9dd659330
    SHA-256: dd772348957e94b960ac3e42d96a5804b42b9b3ca2794ca87d6e0b1a5a31c0b5
    Size: 19.79 MB
  3. xulrunner-10.0.12-1.0.1.AXS4.x86_64.rpm
    MD5: 04908ee4cf18dd90349476ae6a2ca47c
    SHA-256: b8eb78d36c0e08bfb21507dbf58ba158fed71aaf65a34bdf557ffabbf54df872
    Size: 12.00 MB
  4. xulrunner-10.0.12-1.0.1.AXS4.i686.rpm
    MD5: 477d239fb720085ea789ca7c9a66243c
    SHA-256: d44b4c611632bf2ffdbad43e40b3bd255ca53b68b671d5add23896f1a8a567f1
    Size: 12.07 MB