Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.4.2018.3591.2
Category:SuSE Local Security Checks
Title:SUSE: Security Advisory (SUSE-SU-2018:3591-2)
Summary:The remote host is missing an update for the 'MozillaFirefox, MozillaFirefox-branding-SLE, llvm4, mozilla-nspr, mozilla-nss, apache2-mod_nss' package(s) announced via the SUSE-SU-2018:3591-2 advisory.
Description:Summary:
The remote host is missing an update for the 'MozillaFirefox, MozillaFirefox-branding-SLE, llvm4, mozilla-nspr, mozilla-nss, apache2-mod_nss' package(s) announced via the SUSE-SU-2018:3591-2 advisory.

Vulnerability Insight:
This update for MozillaFirefox to ESR 60.2.2 fixes several issues.

These general changes are part of the version 60 release.
New browser engine with speed improvements

Redesigned graphical user interface elements

Unified address and search bar for new installations

New tab page listing top visited, recently visited and recommended pages

Support for configuration policies in enterprise deployments via JSON
files

Support for Web Authentication, allowing the use of USB tokens for
authentication to web sites

The following changes affect compatibility:
Now exclusively supports extensions built using the WebExtension API.

Unsupported legacy extensions will no longer work in Firefox 60 ESR

TLS certificates issued by Symantec before June 1st, 2016 are no longer
trusted The 'security.pki.distrust_ca_policy' preference can be set to 0
to reinstate trust in those certificates

The following issues affect performance:
new format for storing private keys, certificates and certificate trust
If the user home or data directory is on a network file system, it is
recommended that users set the following environment variable to avoid
slowdowns: NSS_SDB_USE_CACHE=yes This setting is not recommended for
local, fast file systems.

These security issues were fixed:
CVE-2018-12381: Dragging and dropping Outlook email message results in
page navigation (bsc#1107343).

CVE-2017-16541: Proxy bypass using automount and autofs (bsc#1107343).

CVE-2018-12376: Various memory safety bugs (bsc#1107343).

CVE-2018-12377: Use-after-free in refresh driver timers (bsc#1107343).

CVE-2018-12378: Use-after-free in IndexedDB (bsc#1107343).

CVE-2018-12379: Out-of-bounds write with malicious MAR file
(bsc#1107343).

CVE-2018-12386: Type confusion in JavaScript allowed remote code
execution (bsc#1110506)

CVE-2018-12387: Array.prototype.push stack pointer vulnerability may
enable exploits in the sandboxed content process (bsc#1110507)

CVE-2018-12385: Crash in TransportSecurityInfo due to cached data
(bsc#1109363)

CVE-2018-12383: Setting a master password did not delete unencrypted
previously stored passwords (bsc#1107343)

This update for mozilla-nspr to version 4.19 fixes the follwing issues Added TCP Fast Open functionality

A socket without PR_NSPR_IO_LAYER will no longer trigger an assertion
when polling

This update for mozilla-nss to version 3.36.4 fixes the follwing issues Connecting to a server that was recently upgraded to TLS 1.3 would
result in a SSL_RX_MALFORMED_SERVER_HELLO error.

Fix a rare bug with PKCS#12 files.

Replaces existing vectorized ChaCha20 code with verified HACL*
implementation.

TLS 1.3 support has been updated to draft -23.

Added formally verified implementations of non-vectorized Chacha20 and
non-vectorized Poly1305 64-bit.

The following CA certificates were Removed: OU = Security Communication
EV RootCA1 CN = CA Disig Root R1 CN = DST ACES CA X6 ... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'MozillaFirefox, MozillaFirefox-branding-SLE, llvm4, mozilla-nspr, mozilla-nss, apache2-mod_nss' package(s) on SUSE Linux Enterprise Desktop 12-SP4, SUSE Linux Enterprise Server 12-SP4, SUSE Linux Enterprise Software Development Kit 12-SP4.

Solution:
Please install the updated package(s).

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2017-16541
Common Vulnerability Exposure (CVE) ID: CVE-2018-12376
Common Vulnerability Exposure (CVE) ID: CVE-2018-12377
Common Vulnerability Exposure (CVE) ID: CVE-2018-12378
Common Vulnerability Exposure (CVE) ID: CVE-2018-12379
Common Vulnerability Exposure (CVE) ID: CVE-2018-12381
Common Vulnerability Exposure (CVE) ID: CVE-2018-12383
Common Vulnerability Exposure (CVE) ID: CVE-2018-12385
Common Vulnerability Exposure (CVE) ID: CVE-2018-12386
Common Vulnerability Exposure (CVE) ID: CVE-2018-12387
CopyrightCopyright (C) 2021 Greenbone Networks GmbH

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2024 E-Soft Inc. All rights reserved.