Korean
<< Back
VID 14202
Severity 40
Port 22
Protocol TCP
Class LSC
Detailed Description The remote system does not apply RHSA-2015-0988 which is Firefox security update. The system which does not apply the update is affected by the following vulnerabilities :

- Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2015-2708, CVE-2015-0797, CVE-2015-2710, CVE-2015-2713)

- A heap-based buffer overflow flaw was found in the way Firefox processed compressed XML data. An attacker could create specially crafted compressed XML content that, when processed by Firefox, could cause it to crash or execute arbitrary code with the privileges of the user running Firefox. (CVE-2015-2716)

Note: This check solely relied on the Firefox RPM version of the remote system to assess this vulnerability, so this might be a false positive.

* References:
https://rhn.redhat.com/errata/RHSA-2015-0988.html
https://www.redhat.com/security/data/cve/CVE-2015-0797.html
https://www.redhat.com/security/data/cve/CVE-2015-2708.html
https://www.redhat.com/security/data/cve/CVE-2015-2710.html
https://www.redhat.com/security/data/cve/CVE-2015-2713.html
https://www.redhat.com/security/data/cve/CVE-2015-2716.html

* Platforms Affected:
Red Hat Enterprise Linux Server (v. 5)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Server (v. 7)
Recommendation Update the affected packages.
Launch the graphical update tool through
Applications -> System Tools -> Software Update

For a command line interface, use the following command to update the operating system:
# yum update

To install firefox package, use the following command:
# yum install firefox
Related URL CVE-2015-0797,CVE-2015-2708,CVE-2015-2710,CVE-2015-2713,CVE-2015-2716 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)