firefox-17.0.7-1.0.1.AXS4, xulrunner-17.0.7-1.0.1.AXS4

エラータID: AXSA:2013-511:05

Release date: 
Tuesday, July 2, 2013 - 14:23
Subject: 
firefox-17.0.7-1.0.1.AXS4, xulrunner-17.0.7-1.0.1.AXS4
Affected Channels: 
Asianux Server 4 for x86_64
Asianux Server 4 for x86
Severity: 
High
Description: 

Mozilla Firefox is an open-source web browser, designed for standards compliance, performance and portability.

Security issues fixed with this release:

• CVE-2013-1682
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.

• CVE-2013-1684
Use-after-free vulnerability in the mozilla::dom::HTMLMediaElement::LookupMediaElementURITable function in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted web site.

• CVE-2013-1685
Use-after-free vulnerability in the nsIDocument::GetRootElement function in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted web site.

• CVE-2013-1686
Use-after-free vulnerability in the mozilla::ResetDir function in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.

• CVE-2013-1687
The System Only Wrapper (SOW) and Chrome Object Wrapper (COW) implementations in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 do not properly restrict XBL user-defined functions, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges, or conduct cross-site scripting (XSS) attacks, via a crafted web site.

• CVE-2013-1690
Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 do not properly handle onreadystatechange events in conjunction with page reloading, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted web site that triggers an attempt to execute data at an unmapped memory location.

• CVE-2013-1692
Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 do not prevent the inclusion of body data in an XMLHttpRequest HEAD request, which makes it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks via a crafted web site.

• CVE-2013-1693
The SVG filter implementation in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 allows remote attackers to read pixel values, and possibly bypass the Same Origin Policy and read text from a different domain, by observing timing differences in execution of filter code.

• CVE-2013-1694
The PreserveWrapper implementation in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 does not properly handle the lack of a wrapper, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code by leveraging unintended clearing of the wrapper cache's preserved-wrapper flag.

• CVE-2013-1697
The XrayWrapper implementation in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 does not properly restrict use of DefaultValue for method calls, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted web site that triggers use of a user-defined (1) toString or (2) valueOf method.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. firefox-17.0.7-1.0.1.AXS4.src.rpm
    MD5: ea6713776d4c13307d26eaa8bcc64856
    SHA-256: bf9364d2e2d7a994c3d86648a2d56eee457bbdba12792ce46f9b2c66b43edbcb
    Size: 107.80 MB
  2. xulrunner-17.0.7-1.0.1.AXS4.src.rpm
    MD5: 111953b97fc6e6ab0bf95cc2d04bdf60
    SHA-256: 797f23cb0d543efed029f09a0a68496c4ba884e59b1e441dfab2c887d01ef93a
    Size: 86.06 MB

Asianux Server 4 for x86
  1. firefox-17.0.7-1.0.1.AXS4.i686.rpm
    MD5: a228561f2c2f4efe4e16b550ad2d58c5
    SHA-256: c29868b4c0f14150eb3df448f9c4b0ca5dd27b75775656707fc85a409a6d843c
    Size: 25.39 MB
  2. xulrunner-17.0.7-1.0.1.AXS4.i686.rpm
    MD5: b9c68fba10cb66a0614dcc3f7f8d2948
    SHA-256: b654165700e5d60f87b96f885d2904f0aadccc967818ed2a7b4fefaaa276f21c
    Size: 14.12 MB

Asianux Server 4 for x86_64
  1. firefox-17.0.7-1.0.1.AXS4.x86_64.rpm
    MD5: 5c7917137b0077339bc419c486bf04fd
    SHA-256: ccc31f05b56584b82d5061bb83ce41fc58b0430a374f67e0056cbbf7af937834
    Size: 25.37 MB
  2. firefox-17.0.7-1.0.1.AXS4.i686.rpm
    MD5: a228561f2c2f4efe4e16b550ad2d58c5
    SHA-256: c29868b4c0f14150eb3df448f9c4b0ca5dd27b75775656707fc85a409a6d843c
    Size: 25.39 MB
  3. xulrunner-17.0.7-1.0.1.AXS4.x86_64.rpm
    MD5: 8f3a502a84b91de5f1c6fe9ac3a97aa7
    SHA-256: dcacfcbb55c53f43a4c8df7ef2f0c888267f6879bb818dcd93e4533cda1c3559
    Size: 15.35 MB
  4. xulrunner-17.0.7-1.0.1.AXS4.i686.rpm
    MD5: b9c68fba10cb66a0614dcc3f7f8d2948
    SHA-256: b654165700e5d60f87b96f885d2904f0aadccc967818ed2a7b4fefaaa276f21c
    Size: 14.12 MB