firefox-17.0.7-1.0.1.AXS3, xulrunner-17.0.7-1.0.1.AXS3

エラータID: AXSA:2013-552:05

Release date: 
Thursday, July 18, 2013 - 21:38
Subject: 
firefox-17.0.7-1.0.1.AXS3, xulrunner-17.0.7-1.0.1.AXS3
Affected Channels: 
Asianux Server 3 for x86
Asianux Server 3 for x86_64
Severity: 
High
Description: 

Mozilla Firefox is an open-source web browser, designed for standards compliance, performance and portability.

Security issues fixed with this release:

• CVE-2013-1682
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.

• CVE-2013-1684
Use-after-free vulnerability in the mozilla::dom::HTMLMediaElement::LookupMediaElementURITable function in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted web site.

• CVE-2013-1685
Use-after-free vulnerability in the nsIDocument::GetRootElement function in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted web site.

• CVE-2013-1686
Use-after-free vulnerability in the mozilla::ResetDir function in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.

• CVE-2013-1687
The System Only Wrapper (SOW) and Chrome Object Wrapper (COW) implementations in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 do not properly restrict XBL user-defined functions, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges, or conduct cross-site scripting (XSS) attacks, via a crafted web site.

• CVE-2013-1690
Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 do not properly handle onreadystatechange events in conjunction with page reloading, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted web site that triggers an attempt to execute data at an unmapped memory location.

• CVE-2013-1692
Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 do not prevent the inclusion of body data in an XMLHttpRequest HEAD request, which makes it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks via a crafted web site.

• CVE-2013-1693
The SVG filter implementation in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 allows remote attackers to read pixel values, and possibly bypass the Same Origin Policy and read text from a different domain, by observing timing differences in execution of filter code.

• CVE-2013-1694
The PreserveWrapper implementation in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 does not properly handle the lack of a wrapper, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code by leveraging unintended clearing of the wrapper cache's preserved-wrapper flag.

• CVE-2013-1697
The XrayWrapper implementation in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 does not properly restrict use of DefaultValue for method calls, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted web site that triggers use of a user-defined (1) toString or (2) valueOf method.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. firefox-17.0.7-1.0.1.AXS3.src.rpm
    MD5: 23eadaabadc3f45a4e330b2252f19b68
    SHA-256: 4bd3c93d80f25f1b2852cf0a34668364d8d2c0666653298fb621b158363c1dcb
    Size: 107.89 MB
  2. xulrunner-17.0.7-1.0.1.AXS3.src.rpm
    MD5: 76ff34b1587b7e3f8e30f5b44803dc9d
    SHA-256: d4f856a3f328f2217754d0a21ab89e43fa91414e3f9501439b00ae17b5feefbf
    Size: 86.15 MB

Asianux Server 3 for x86
  1. firefox-17.0.7-1.0.1.AXS3.i386.rpm
    MD5: e1ae56a6ccad7a276ee68d1f2148faaf
    SHA-256: 5e060bb9c39a2540c8f891cc1fff6bac57343d6206487e24c9d2a87c17c46104
    Size: 25.98 MB
  2. xulrunner-17.0.7-1.0.1.AXS3.i386.rpm
    MD5: 297d3785b8f6489f59554fbc52b2a404
    SHA-256: 17d2c4aa51af27888d18e4c6df362765a4ae0131255d8535c8071e36c91b2376
    Size: 15.23 MB

Asianux Server 3 for x86_64
  1. firefox-17.0.7-1.0.1.AXS3.x86_64.rpm
    MD5: 43e547d97e318ca6ca8b1c4b5a8ee96a
    SHA-256: ff005f6c00f6a65721ccb58c86ba3d9ac653482b3dfb18c2d200d04181a9733f
    Size: 25.97 MB
  2. xulrunner-17.0.7-1.0.1.AXS3.x86_64.rpm
    MD5: fea926bd9e1ffead54d95d74f343b7d0
    SHA-256: 75827fe640603f46c6845cf05ec27ebdc5c1fd9d9d78cb342b28d84b04721795
    Size: 14.67 MB