Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Detailed Explanation for this Vulnerability Assessment
Multiple security vulnerabilities have been identified in the
mozilla-firefox web browser. These vulnerabilities could permit an
attacker to execute code on the victim's machine via specially crafted
Heap overrun in XBM image processing
Denial of service (crash) and possible execution of arbitrary
code via Unicode sequences with "zero-width non-joiner"
XMLHttpRequest header spoofing
Object spoofing using XBL
Privilege escalation using about: scheme
Chrome window spoofing permiting windows to be created without
UI components such as a URL bar or status bar that could be
used to carry out phishing attacks
For the stable distribution (sarge), these problems have been fixed in
For the unstable distribution (sid), these problems have been fixed in
We recommend that you upgrade your mozilla-firefox package.
Solution : http://www.debian.org/security/2005/dsa-838
Network Security Threat Level: High
Networks Security ID:
Vulnerability Assessment Copyright: This script is (C) 2007 Michel Arboi
|Dell PowerEdge R410 2x X5650 2.66GHz 6 Core 16GB 4x 146GB 15K SAS PERC 6/i
|Dell PowerEdge R710 2x X5680 3.33GHz 6 Core 32GB 6x 3TB 7.2K SAS PERC H700
|Dell PowerEdge R410 2x L5640 2.26GHz 6 Core 32GB 4x 146GB 15K SAS PERC 6/i
|Dell PowerEdge R410 2x E5620 2.4GHz Quad Core 32GB 4x 450GB 15K SAS PERC 6/i
No Discussions have been posted on this vulnerability.