SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   libxslt Vendors:   Gnome Development Team
(Oracle Issues Fix for libxlst for Solaris) Mozilla Firefox Multiple Flaws Let Remote Users Execute Arbitrary Code, Access Information, and Access Restricted Resources
SecurityTracker Alert ID:  1028183
SecurityTracker URL:  http://securitytracker.com/id/1028183
CVE Reference:   CVE-2011-1202   (Links to External Site)
Date:  Feb 20 2013
Impact:   Disclosure of system information, Disclosure of user information, Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   Multiple vulnerabilities were reported in Mozilla Firefox. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain information from web forms. A remote user can access restricted resources. libxslt on Solaris is affected by one vulnerability.

A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system [CVE-2011-0069, CVE-2011-0070, CVE-2011-0072, CVE-2011-0074, CVE-2011-0075, CVE-2011-0077, CVE-2011-0078, CVE-2011-0079, CVE-2011-0080, CVE-2011-0081]. The code will run with the privileges of the target user.

Mozilla developers Boris Zbarsky, Gary Kwong, Jesse Ruderman, Michael Wu, Nils, Scoobidiver, Bob Clary, Henri Sivonen, Marco Bonardo, Mats Palmgren, and Ted Mielczarek, the web development team of Alcidion, Ian Beer, and Aki Helin reported these vulnerabilities.

A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a use-after-free or dangling pointer error and execute arbitrary code on the target system [CVE-2011-0065, CVE-2011-0066, CVE-2011-0073].

regenrecht reported these vulnerabilities.

A remote user can create a specially crafted Java applet that, when loaded by the target user, will access form information from the form history on the target user's browser [CVE-2011-0067]. Firefox version 4 is not affected.

Paul Stone reported this vulnerability.

A remote user can exploit the Java Embedding Plugin (JEP) shipped with the Mac OS X versions of Firefox to obtain elevated privileges on the target user's system [CVE-2011-0076]. Firefox version 4 is not affected.

David Remahl of Apple Product Security reported this vulnerability.

A remote user can exploit the 'resource:' protocol to conduct directory traversal attacks against Windows-based systems to load resources from non-permitted locations [CVE-2011-0071]. Firefox version 4 is not affected.

Soroush Dalili reported this vulnerability.

A remote user can create specially crafted HTML that, when loaded by the target user, will exploit flaws in the WebGL feature and the WebGLES libraries to execute arbitrary code on the target user's system [CVE-2011-0068].

Nils, Mozilla researcher Christoph Diehl, and Yuri Ko reported these vulnerabilities.

A user can invoke the XSLT generate-id() function to obtain an address of an object on the heap [CVE-2011-1202].

Chris Evans of the Chrome Security Team reported this vulnerability.

Impact:   A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

A remote user can obtain information from web forms.

A remote user can access restricted resources.

Solution:   Oracle has issued a fix for CVE-2011-1202 for libxslt on Solaris (11.1.4.5).

The Oracle advisory is available at:

https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_libxslt

Cause:   Access control error, Boundary error
Underlying OS:  UNIX (Solaris - SunOS)
Underlying OS Comments:  11.1

Message History:   This archive entry is a follow-up to the message listed below.
Apr 29 2011 Mozilla Firefox Multiple Flaws Let Remote Users Execute Arbitrary Code, Access Information, and Access Restricted Resources



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC