remote code execution, remote denial of service
Please Install the Updated Packages.
The Mozilla suite of browsers received security updates. Following updates are included in this update: Mozilla Firefox was updated on SUSE Linux Enterprise 10 and 11 to the 3.6.17 security release. Mozilla Firefox was updated on openSUSE 11.4 to the 4.0.1 security release. Mozilla Thunderbird was updated on openSUSE to the 3.1.10 security release. Mozilla Seamonkey was updated on openSUSE to the 2.0.14 security release. Mozilla XULRunner 1.9.1 was updated to 220.127.116.11. Mozilla XULRunner 1.9.2 was updated to 18.104.22.168. Following security issues were fixed: MFSA 2011-12: Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code. Mozilla developers Boris Zbarsky, Gary Kwong, Jesse Ruderman, Michael Wu, Nils, Scoobidiver, and Ted Mielczarek reported memory safety issues which affected Firefox 4. CVE-2011-0079 Mozilla developer Scoobidiver reported a memory safety issue which affected Firefox 4 and Firefox 3.6 CVE-2011-0081 The web development team of Alcidion reported a crash that affected Firefox 4, Firefox 3.6 and Firefox 3.5. CVE-2011-0069 Ian Beer reported a crash that affected Firefox 4, Firefox 3.6 and Firefox 3.5. CVE-2011-0070 Mozilla developers Bob Clary, Henri Sivonen, Marco Bonardo, Mats Palmgren and Jesse Ruderman reported memory safety issues which affected Firefox 3.6 and Firefox 3.5. CVE-2011-0080 Aki Helin reported memory safety issues which affected Firefox 3.6 and Firefox 3.5. CVE-2011-0075 Ian Beer reported memory safety issues which affected Firefox 3.6 and Firefox 3.5. CVE-2011-0078 Martin Barbella reported a memory safety issue which affected Firefox 3.6 and Firefox 3.5. CVE-2011-0072 CVE-2011-0073: Security researcher regenrecht reported several dangling pointer vulnerabilities via TippingPoint's Zero Day Initiative. Firefox 4 was not affected by these issues. CVE-2011-0067: Security researcher Paul Stone reported that a Java applet could be used to mimic interaction with form autocomplete controls and steal entries from the form history. Firefox 4 was not affected by this issue. CVE-2011-0076: David Remahl of Apple Product Security reported that the Java Embedding Plugin (JEP) shipped with the Mac OS X version ... Description truncated, for more information please check the Reference URL
MozillaFirefox,seamonkey,MozillaThunderbird on openSUSE 11.2, openSUSE 11.3
Updated on 2015-03-25
CVSS Base Score: 10.0