==========================================================Ubuntu Security Notice USN-874-1          December 18, 2009
firefox-3.5, xulrunner-1.9.1 vulnerabilities
CVE-2009-3388, CVE-2009-3389, CVE-2009-3979, CVE-2009-3980,
CVE-2009-3982, CVE-2009-3983, CVE-2009-3984, CVE-2009-3985,
CVE-2009-3986
==========================================================
A security issue affects the following Ubuntu releases:

Ubuntu 9.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 9.10:
  firefox-3.5                     3.5.6+nobinonly-0ubuntu0.9.10.1
  xulrunner-1.9.1                 1.9.1.6+nobinonly-0ubuntu0.9.10.1

After a standard system upgrade you need to restart Firefox and any
applications that use xulrunner to effect the necessary changes.

Details follow:

Jesse Ruderman, Josh Soref, Martijn Wargers, Jose Angel, Olli Pettay, and
David James discovered several flaws in the browser and JavaScript engines
of Firefox. If a user were tricked into viewing a malicious website, a
remote attacker could cause a denial of service or possibly execute
arbitrary code with the privileges of the user invoking the program.
(CVE-2009-3979, CVE-2009-3980, CVE-2009-3982, CVE-2009-3986)

Takehiro Takahashi discovered flaws in the NTLM implementation in Firefox.
If an NTLM authenticated user visited a malicious website, a remote
attacker could send requests to other applications, authenticated as the
user. (CVE-2009-3983)

Jonathan Morgan discovered that Firefox did not properly display SSL
indicators under certain circumstances. This could be used by an attacker
to spoof an encrypted page, such as in a phishing attack. (CVE-2009-3984)

Jordi Chancel discovered that Firefox did not properly display invalid URLs
for a blank page. If a user were tricked into accessing a malicious
website, an attacker could exploit this to spoof the location bar, such as
in a phishing attack. (CVE-2009-3985)

David Keeler, Bob Clary, and Dan Kaminsky discovered several flaws in third
party media libraries. If a user were tricked into opening a crafted media
file, a remote attacker could cause a denial of service or possibly execute
arbitrary code with the privileges of the user invoking the program.
(CVE-2009-3388, CVE-2009-3389)


Updated packages for Ubuntu 9.10:

  Source archives:

          Size/MD5:   128283 e6e585514715e6e0ea1f5e427003aba2
          Size/MD5:     2940 277090a9a34de65d4bd9e3007a7b0c3d
          Size/MD5: 44871653 05996e1ba09042927eac601539a8c7b8
          Size/MD5:    61296 afbb9a81915423c2ea000066f4f6625c
          Size/MD5:     2910 bff790ef4f78da09fdc85a1f8ebc194e
          Size/MD5: 44411868 b56ec5c4b8c8314f3b7ebf07184da99b

  Architecture independent packages:

          Size/MD5:    73344 6bb91b215cb7c1ead091f3edfa2c1f9e
          Size/MD5:    73198 c4107546848d57c0a9a3bb262522cc52
          Size/MD5:    73194 c2e5377ff999bcee36dd599200047127
          Size/MD5:    73194 30c50d5807c87dc169f3fff3c39dd2ea
          Size/MD5:    73262 072e36bbd65e89d425916f2d7aaabf0d
          Size/MD5:    73360 0f75bae5badbfa61aeb0ffb82eefb8b2
          Size/MD5:    73220 7b36cd1515fd777378c64c28c4b1613d
          Size/MD5:     8936 68ab29aa9fdf09502fdc3e741dc13b09
          Size/MD5:    73216 9f953bd3a41a1bc421841419c9650744
          Size/MD5:     8934 1d763e3687427393c201c0de8b67c687
          Size/MD5:    73400 ca39fe5b1db93235ad4b3ead5c3fa094
          Size/MD5:    73204 521fafab126b71d311e6bf80e34f7466
          Size/MD5:    73218 d62fff05452351b1aea056c5a51debc9
          Size/MD5:    73224 fa0388bb5bf340394801bcb6fb3df15f
          Size/MD5:    73206 8be962d5c33ad39f8fc572649f231df7
          Size/MD5:    73186 b0408aa7ccd59562186da946ec6bd83c
          Size/MD5:    73202 3018b32b3bf7fd85352c810d49f1c2dd
          Size/MD5:    73220 d0727b00ef738ad4cdfd356d3780b211
          Size/MD5:    73188 73d296edec799ab1337cd9754f5d8887
          Size/MD5:    73212 71a0035378073b365fe81bb354dbde30

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

          Size/MD5:   207734 1613ca49dd1382cea351a7e996bf1f78
          Size/MD5:   206378 5a21bb8c6fe26c0169f0f9cd5b716d28
          Size/MD5:   469950 1d7c1c3912cfab80d9dcc19aa112c15a
          Size/MD5:    73286 019d3bf5157850f7a5c5efa75c3bf587
          Size/MD5:    93522 efebd4a31956aa3ff08dc9af11e0d298
          Size/MD5:   960384 a3911256c31c5772860b9d2be8737916
          Size/MD5: 59835276 690d8bbac079bc5b7cbf27b13c82d060
          Size/MD5:  4793576 cbb107a37d57d51ce8adf5b1f0f12012
          Size/MD5:    47778 262c6c29cd3c57f73514cc34b5ad6b30
          Size/MD5:    70544 c71cd6dc64312dd40c54687c66838780
          Size/MD5:  9101464 938f246f7ee35152f8187c41d2bd2a34
          Size/MD5:    26760 6e953abdc55fbd2dc04d90a2248deca8
          Size/MD5:  5589612 66824dd66655a95061e38aaeb2fe51c5

  i386 architecture (x86 compatible Intel/AMD):

          Size/MD5:   207738 c039abf03fbc6a753302f5b7fe7ef203
          Size/MD5:   206382 3f317de2efe459cd513f4eca3131363f
          Size/MD5:   465552 11ae74231a16c3c3c837b88835857c2b
          Size/MD5:    73286 9a26aa11cadca06542127ecf7d98a960
          Size/MD5:    89956 0b325c3447dbfe756b881e2f85b74f4f
          Size/MD5:   942542 6666eb55ba6f648d3371fc0199db9ead
          Size/MD5: 60238048 a69d17b3ef4f6618d139951a3299aab9
          Size/MD5:  4813856 43563159d4941b7b4e68f07143a25c22
          Size/MD5:    40556 bf3bf808d598da3e3712221bab0a735e
          Size/MD5:    70542 b44ae0426dc326d96c344d6a906fe5a7
          Size/MD5:  7994204 3eb3268ac127925f2b965f75eb952f07
          Size/MD5:    26756 e8222451fcc4aec5343b50d7abe99356
          Size/MD5:  5431184 4ce2960eaae184dcf85b2965a9d936d6

  lpia architecture (Low Power Intel Architecture):

          Size/MD5:   207730 15399ee490686fb8018fe06f7fcf719a
          Size/MD5:   206366 5f5be62ebc185edbdb4375744e7965cf
          Size/MD5:   465096 bb7ecfb8109e162eaa0b223da0b87fc4
          Size/MD5:    73278 3b1e9757a5ac0d18c2b2a9ddbd5f3205
          Size/MD5:    89416 e6d1194cea39a949f894ede9511e261c
          Size/MD5:   940510 c7047cbbc5a8bfa340321c40883e8608
          Size/MD5: 60262144 851b6755a85308f44e4e32d701346046
          Size/MD5:  4810046 574fe50a9ba72c9f16952945bb36cb39
          Size/MD5:    39698 0f13b2c6faec451c5d82394b9ce59924
          Size/MD5:    70544 6c4bddbe453e2e274b572c9a7e344f7f
          Size/MD5:  7884616 52ccc22d2411a7debef8a7488dd64e13
          Size/MD5:    26752 e84a9eee969be6fb220d4776fdf48fb4
          Size/MD5:  5423656 efcab77fd487da4a5bc9bb9931fed665

  powerpc architecture (Apple Macintosh G3/G4/G5):

          Size/MD5:   207744 07d5286d7a18daf031896ccb65919173
          Size/MD5:   206392 ce024bdfb55ff776d5bf86ad23423ad3
          Size/MD5:   483932 85b6745d35638c9d52831a828272d86d
          Size/MD5:    73286 181437d6bbc39dcb4c2b00cb83eb5e88
          Size/MD5:    92946 93d9aa9c78c7aed338fd2e8d7e8fd773
          Size/MD5:   963670 a88bda7c8d3392a1ee5850a740bb1a0c
          Size/MD5: 64984046 3bb584848dbbbacd9ef871eb77d7f66a
          Size/MD5:  4799684 5d5f58b1a95290551cd2b01fedef10d0
          Size/MD5:    47228 bfb33e8383dec81fb23304ffc28da2a3
          Size/MD5:    70550 fda2ec1ee66bb5e37cad8908e154eefc
          Size/MD5:  9731978 aee78cdc472f8ecd3c7540d440aa2519
          Size/MD5:    26758 40c8b4208ee853aa58145cbfe8a4bfc0
          Size/MD5:  5677152 8fa877f76e0bf6851ff1518c5953c0b8

  sparc architecture (Sun SPARC/UltraSPARC):

          Size/MD5:   207738 5e739eb29adde9acff9d126a24cda1a9
          Size/MD5:   206378 fe5fe728fa3ee9cb2b22e1758b2eb50b
          Size/MD5:   458598 f14f121df951e8dfb5b2f0d86ef37f70
          Size/MD5:    73280 b9e59ae2c1b122e643b03027b99338e5
          Size/MD5:    88618 1fcfdce155d4345a0180ed26b4b22de0
          Size/MD5:   941490 bfddb26ec184c08f581113a97395b40f
          Size/MD5: 59349048 14e2474623aca5024bda53fe189eeb2b
          Size/MD5:  4776708 999dc443f02df7551a9f1174a31d454b
          Size/MD5:    39118 617fbca067d180ec8ad4bb96d0d01462
          Size/MD5:    70548 334e92204957611650785befe66de3da
          Size/MD5:  8489668 489e67413a254f2fa6f5981b87278c0f
          Size/MD5:    26760 94ae36a7bf88255fddabedf7427f1063
          Size/MD5:  5400564 dd0934c63625b4afd9105618eb8cec66

Ubuntu 874-1: Firefox 3.5 and Xulrunner 1.9.1 vulnerabilities

December 18, 2009
Jesse Ruderman, Josh Soref, Martijn Wargers, Jose Angel, Olli Pettay, andDavid James discovered several flaws in the browser and JavaScript enginesof Firefox

Summary

Update Instructions

References

Severity
firefox-3.5, xulrunner-1.9.1 vulnerabilities

Package Information

Related News