Bug 715384 (CVE-2011-2486)

Summary: CVE-2011-2486 nspluginwrapper: NPNVprivateModeBool variable not forwarded
Product: [Other] Security Response Reporter: Josh Bressers <bressers>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: stransky, tdosek
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard: public=20110325,reported=20110523,source=redhat,impact=low,cvss2=2.6/AV:N/AC:H/Au:N/C:P/I:N/A:N,rhel-5/nspluginwrapper=wontfix,rhel-6/nspluginwrapper=affected
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2015-02-26 18:03:17 EST Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---
Bug Depends On: 870073, 870074    
Bug Blocks: 712354, 870103    

Description Josh Bressers 2011-06-22 14:07:22 EDT
nspluginwrapper forwards variable values requested via NPN_GetValue from
firefox to the plugins it wraps around. One of the variables,
NPNVprivateModeBool, is used to tell the plugin if firefox is in private
browsing mode. The flash plugin (when it is wrapped by nspluginwrapper)
queries the browser via nsplugin wrapper and changes its behaviour
accordingly. However, the nspluginwrapper versions in RHEL-5 and RHEL-6 do
not implement this variable and simply return an error:

*** NSPlugin Viewer *** WARNING: unhandled variable 18 (<unknown variable>) in NPN_GetValue()

where the enum 18 is NPNVprivateModeBool. As a result, the flash player may
continue to run as if the browser is not in private mode.

The fix for this issue can be found here:
Comment 1 Martin Stransky 2011-06-22 16:09:52 EDT
Yeah, that's for me.
Comment 2 Josh Bressers 2011-06-28 12:13:04 EDT
The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw.
Comment 3 Tomas Dosek 2012-09-11 02:41:54 EDT
Raising priority and severity of the case, as we have a customer affected by this issue.

Versions of packages used in their environment:

Comment 8 errata-xmlrpc 2012-11-13 09:06:26 EST
This issue has been addressed in following products:

  Red Hat Enterprise Linux 6

Via RHSA-2012:1459 https://rhn.redhat.com/errata/RHSA-2012-1459.html
Comment 9 Vincent Danen 2015-02-26 18:03:17 EST

Red Hat Enterprise Linux 5 is now in Production 3 Phase of the support and maintenance life cycle. This has been rated as having Low security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.