Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Detailed Explanation for this Vulnerability Assessment
Multiple security vulnerabilities have been identified in the
mozilla-firefox web browser. These vulnerabilities could permit an
attacker to execute code on the victim's machine via specially crafted
Heap overrun in XBM image processing
Denial of service (crash) and possible execution of arbitrary
code via Unicode sequences with "zero-width non-joiner"
XMLHttpRequest header spoofing
Object spoofing using XBL
Privilege escalation using about: scheme
Chrome window spoofing permiting windows to be created without
UI components such as a URL bar or status bar that could be
used to carry out phishing attacks
For the stable distribution (sarge), these problems have been fixed in
For the unstable distribution (sid), these problems have been fixed in
We recommend that you upgrade your mozilla-firefox package.
Solution : http://www.debian.org/security/2005/dsa-838
Network Security Threat Level: High
Networks Security ID:
Vulnerability Assessment Copyright: This script is (C) 2007 Michel Arboi
|Seagate Barracuda 1 TB 7200RPM SATA 32 MB Cache 3.5-Inch Bare Drive
|DELL T7910 WORKSTATION TWO E5-2699V4 2.2GHz 192GB 1TB SSD NVS315
|DELL T7910 WORKSTATION TWO E5-2637V3 3.5GHZ 48GB 2 X 1TB SATA QUADRO P5000
|DELL T7910 WORKSTATION E5-2640V4 2.4GHz 24GB 2 X 1TB SSD QUADRO K6000
No Discussions have been posted on this vulnerability.