Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Detailed Explanation for this Vulnerability Assessment
Multiple security vulnerabilities have been identified in the
mozilla-firefox web browser. These vulnerabilities could permit an
attacker to execute code on the victim's machine via specially crafted
Heap overrun in XBM image processing
Denial of service (crash) and possible execution of arbitrary
code via Unicode sequences with "zero-width non-joiner"
XMLHttpRequest header spoofing
Object spoofing using XBL
Privilege escalation using about: scheme
Chrome window spoofing permiting windows to be created without
UI components such as a URL bar or status bar that could be
used to carry out phishing attacks
For the stable distribution (sarge), these problems have been fixed in
For the unstable distribution (sid), these problems have been fixed in
We recommend that you upgrade your mozilla-firefox package.
Solution : http://www.debian.org/security/2005/dsa-838
Network Security Threat Level: High
Networks Security ID:
Vulnerability Assessment Copyright: This script is (C) 2007 Michel Arboi
|Juniper Networks MAG2600
|Juniper Networks J4350 Series Service Router J-4350-JB JX-1DS3-S
|NEW Juniper QFX-SFP-10GE-SR 10GbE SFP+ 850nm for up to 300m Free Overnight Ship
|Juniper Netscreen NS-ISG-FAN Fan Module for ISG-1000 ISG-2000
No Discussions have been posted on this vulnerability.