[SUSE-Announcements] BES Auto Notification: New Fixlets Published in Fixlet Site: PatchesforSUSELinuxEnterprise

Notification of New SUSE Fixlet Messages suse-announcements at bigmail.bigfix.com
Tue Nov 10 03:10:07 PST 2009


Fixlet Site - PatchesforSUSELinuxEnterprise
Current Version: 270	Published: Mon, 09 Nov 2009 19:54:40  GMT

New Fixlets:
============

***************************************************************
Title: PATCH-B9110601 - Security update for mozilla-nspr - SLED10 SP2
Severity: <Unspecified>
Fixlet ID: 911060101
Fixlet Link: http://download.novell.com/Download?buildid=ZZGiKSDXywQ~

Fixlet Description: This update fixes a bug in the Mozilla NSPR helper libraries, which could be used by remote attackers to potentially execute code via javascript vectors.   MFSA 2009-59 / CVE-2009-1563: Security researcher Alin Rad Pop of Secunia Research reported a heap-based buffer overflow in Mozilla's string to floating point number conversion routines. Using this vulnerability an attacker could craft some malicious JavaScript code containing a very long string to be converted to a floating point number which would result in improper memory allocation and the execution of an arbitrary memory location. This vulnerability could thus be leveraged by the attacker to run arbitrary code on a victim's computer. Please see patch page for more detailed information.

***************************************************************
Title: PATCH-B9110601 - Security update for mozilla-nspr - SLES10 SP2
Severity: <Unspecified>
Fixlet ID: 911060103
Fixlet Link: http://download.novell.com/Download?buildid=iNfRsbJ5xVA~

Fixlet Description: This update fixes a bug in the Mozilla NSPR helper libraries, which could be used by remote attackers to potentially execute code via javascript vectors.   MFSA 2009-59 / CVE-2009-1563: Security researcher Alin Rad Pop of Secunia Research reported a heap-based buffer overflow in Mozilla's string to floating point number conversion routines. Using this vulnerability an attacker could craft some malicious JavaScript code containing a very long string to be converted to a floating point number which would result in improper memory allocation and the execution of an arbitrary memory location. This vulnerability could thus be leveraged by the attacker to run arbitrary code on a victim's computer. Please see patch page for more detailed information.

***************************************************************
Title: PATCH-B9110602 - Security update for mozilla-nspr - SLES10 SP3
Severity: <Unspecified>
Fixlet ID: 911060201
Fixlet Link: http://download.novell.com/Download?buildid=NHDpCnLtJ5o~

Fixlet Description: This update fixes a bug in the Mozilla NSPR helper libraries, which could be used by remote attackers to potentially execute code via javascript vectors.   MFSA 2009-59 / CVE-2009-1563: Security researcher Alin Rad Pop of Secunia Research reported a heap-based buffer overflow in Mozilla's string to floating point number conversion routines. Using this vulnerability an attacker could craft some malicious JavaScript code containing a very long string to be converted to a floating point number which would result in improper memory allocation and the execution of an arbitrary memory location. This vulnerability could thus be leveraged by the attacker to run arbitrary code on a victim's computer. Please see patch page for more detailed information.

***************************************************************
Title: PATCH-B9110602 - Security update for mozilla-nspr - SLED10 SP3
Severity: <Unspecified>
Fixlet ID: 911060203
Fixlet Link: http://download.novell.com/Download?buildid=-SxomlJlFzE~

Fixlet Description: This update fixes a bug in the Mozilla NSPR helper libraries, which could be used by remote attackers to potentially execute code via javascript vectors.   MFSA 2009-59 / CVE-2009-1563: Security researcher Alin Rad Pop of Secunia Research reported a heap-based buffer overflow in Mozilla's string to floating point number conversion routines. Using this vulnerability an attacker could craft some malicious JavaScript code containing a very long string to be converted to a floating point number which would result in improper memory allocation and the execution of an arbitrary memory location. This vulnerability could thus be leveraged by the attacker to run arbitrary code on a victim's computer. Please see patch page for more detailed information.



More information about the SUSE-Announcements mailing list