[USN-1197-3] Firefox and Xulrunner vulnerability

Micah Gersten micah at canonical.com
Wed Sep 7 04:18:07 UTC 2011


==========================================================================
Ubuntu Security Notice USN-1197-3
September 07, 2011

firefox, xulrunner-1.9.2 vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 11.04
- Ubuntu 10.10
- Ubuntu 10.04 LTS

Summary:

A certificate authority issued fraudulent certificates.

Software Description:
- firefox: Mozilla Open Source web browser
- xulrunner-1.9.2: Mozilla Gecko runtime environment

Details:

USN-1197-1 partially addressed an issue with Dutch Certificate Authority
DigiNotar mis-issuing fraudulent certificates. This update actively
distrusts the DigiNotar root certificate as well as several intermediary
certificates. Also included in this list of distrusted certificates are the
Staat der Nederlanden root certificates.

Original advisory details:

 It was discovered that Dutch Certificate Authority DigiNotar, had
 mis-issued multiple fraudulent certificates. These certificates could allow
 an attacker to perform a "man in the middle" (MITM) attack which would make
 the user believe their connection is secure, but is actually being
 monitored.
 
 For the protection of its users, Mozilla has removed the DigiNotar
 certificate. Sites using certificates issued by DigiNotar will need to seek
 another certificate vendor.
 
 We are currently aware of a regression that blocks one of two Staat der
 Nederlanden root certificates which are believed to still be secure. This
 regression is being tracked at https://launchpad.net/bugs/838322.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 11.04:
  firefox                         6.0.2+build2+nobinonly-0ubuntu0.11.04.1

Ubuntu 10.10:
  firefox                         3.6.22+build2+nobinonly-0ubuntu0.10.10.1
  xulrunner-1.9.2                 1.9.2.22+build2+nobinonly-0ubuntu0.10.10.1

Ubuntu 10.04 LTS:
  firefox                         3.6.22+build2+nobinonly-0ubuntu0.10.04.1
  xulrunner-1.9.2                 1.9.2.22+build2+nobinonly-0ubuntu0.10.04.1

After a standard system upgrade you need to restart Firefox and any
applications that use Xulrunner to effect the necessary changes.

References:
  http://www.ubuntu.com/usn/usn-1197-3
  http://www.ubuntu.com/usn/usn-1197-1
  https://launchpad.net/bugs/838322

Package Information:
  https://launchpad.net/ubuntu/+source/firefox/6.0.2+build2+nobinonly-0ubuntu0.11.04.1
  https://launchpad.net/ubuntu/+source/firefox/3.6.22+build2+nobinonly-0ubuntu0.10.10.1
  https://launchpad.net/ubuntu/+source/xulrunner-1.9.2/1.9.2.22+build2+nobinonly-0ubuntu0.10.10.1
  https://launchpad.net/ubuntu/+source/firefox/3.6.22+build2+nobinonly-0ubuntu0.10.04.1
  https://launchpad.net/ubuntu/+source/xulrunner-1.9.2/1.9.2.22+build2+nobinonly-0ubuntu0.10.04.1



-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 198 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20110906/d4e797c2/attachment.sig>


More information about the ubuntu-security-announce mailing list