Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Detailed Explanation for this Vulnerability Assessment
Multiple security vulnerabilities have been identified in the
mozilla-firefox web browser. These vulnerabilities could permit an
attacker to execute code on the victim's machine via specially crafted
Heap overrun in XBM image processing
Denial of service (crash) and possible execution of arbitrary
code via Unicode sequences with "zero-width non-joiner"
XMLHttpRequest header spoofing
Object spoofing using XBL
Privilege escalation using about: scheme
Chrome window spoofing permiting windows to be created without
UI components such as a URL bar or status bar that could be
used to carry out phishing attacks
For the stable distribution (sarge), these problems have been fixed in
For the unstable distribution (sid), these problems have been fixed in
We recommend that you upgrade your mozilla-firefox package.
Solution : http://www.debian.org/security/2005/dsa-838
Network Security Threat Level: High
Networks Security ID:
Vulnerability Assessment Copyright: This script is (C) 2007 Michel Arboi
|Promise Technology Pegasus2 R4 Thunderbolt RAID Storage Array w/ 4x 2TB (8TB)
|NewerTech 1TB Guardian Maximus mini Quad Interface RAID Drive
|Lenovo Think Server RAID 510i AnyRAID Adapter Storage Controller 4XB0F28691 ZZ
|Lenovo Think Server RAID 720ix AnyRAID Adapter with Expander 4XB0F28694 ZZ
No Discussions have been posted on this vulnerability.