Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Detailed Explanation for this Vulnerability Assessment
Multiple security vulnerabilities have been identified in the
mozilla-firefox web browser. These vulnerabilities could permit an
attacker to execute code on the victim's machine via specially crafted
Heap overrun in XBM image processing
Denial of service (crash) and possible execution of arbitrary
code via Unicode sequences with "zero-width non-joiner"
XMLHttpRequest header spoofing
Object spoofing using XBL
Privilege escalation using about: scheme
Chrome window spoofing permiting windows to be created without
UI components such as a URL bar or status bar that could be
used to carry out phishing attacks
For the stable distribution (sarge), these problems have been fixed in
For the unstable distribution (sid), these problems have been fixed in
We recommend that you upgrade your mozilla-firefox package.
Solution : http://www.debian.org/security/2005/dsa-838
Network Security Threat Level: High
Networks Security ID:
Vulnerability Assessment Copyright: This script is (C) 2007 Michel Arboi
|Lenovo RD540 Case and Motherboard 03T7724, No Heatsinks, CPU, Memory, PSU *117
|Samsung Laptop Motherboard Intel Ci3-2367M CPU BA92-11561B LOTUS13-TSP TESTED
|Gateway GT5404 Intel D945GCLG1 Motherboard Pentium D 2.8GHz CPU Fan TESTED
|Gateway Desktop Motherboard 718142-208 Celeron 400Mhz 128MG RAM TESTED
No Discussions have been posted on this vulnerability.