USN-811-1: Firefox and Xulrunner vulnerability
8 August 2009
Firefox and Xulrunner vulnerability
Releases
Packages
Details
Juan Pablo Lopez Yacubian discovered that Firefox did not properly display
invalid URLs. If a user were tricked into accessing a malicious website, an
attacker could exploit this to spoof the location bar, such as in a
phishing attack. Furthermore, if the malicious website had a valid SSL
certificate, Firefox would display the spoofed page as trusted.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 9.04
-
firefox-3.0
-
3.0.13+nobinonly-0ubuntu0.9.04.1
-
abrowser
-
3.0.13+nobinonly-0ubuntu0.9.04.1
-
xulrunner-1.9
-
1.9.0.13+nobinonly-0ubuntu0.9.04.1
Ubuntu 8.10
-
firefox-3.0
-
3.0.13+nobinonly-0ubuntu0.8.10.1
-
abrowser
-
3.0.13+nobinonly-0ubuntu0.8.10.1
-
xulrunner-1.9
-
1.9.0.13+nobinonly-0ubuntu0.8.10.1
Ubuntu 8.04
After a standard system upgrade you need to restart Firefox and any
applications that use xulrunner, such as Epiphany, to effect the necessary
changes.