|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA866] DSA-866-1 mozilla Vulnerability Assessment Details
|
[DSA866] DSA-866-1 mozilla |
||
DSA-866-1 mozilla Detailed Explanation for this Vulnerability Assessment Several security-related problems have been discovered in Mozilla and derived programs. The Common Vulnerabilities and Exposures project identifies the following problems: Tom Ferris discovered a bug in the IDN hostname handling of Mozilla that permits remote attackers to cause a denial of service and possibly execute arbitrary code via a hostname with dashes. A buffer overflow permits remote attackers to execute arbitrary code via an XBM image file that ends in a large number of spaces instead of the expected end tag. Mats Palmgren discovered a buffer overflow in the Unicode string parser that permits a specially crafted Unicode sequence to overflow a buffer and cause arbitrary code to be executed. Remote attackers could spoof HTTP headers of XML HTTP requests via XMLHttpRequest and possibly use the client to exploit vulnerabilities in servers or proxies. Remote attackers could spoof DOM objects via an XBL control that implements an internal XPCOM interface. Georgi Guninski discovered an integer overflow in the JavaScript engine that might permit remote attackers to execute arbitrary code. Remote attackers could execute Javascript code with chrome rights via an about: page such as about:mozilla. Remote attackers could spawn windows without user interface components such as the address and status bar that could be used to conduct spoofing or phishing attacks. Peter Zelezny discovered that shell metacharacters are not properly escaped when they are passed to a shell script and permit the execution of arbitrary commands, e.g. when a malicious URL is automatically copied from another program into Mozilla as default browser. For the stable distribution (sarge) these problems have been fixed in version 1.7.8-1sarge3. For the unstable distribution (sid) these problems have been fixed in version 1.7.12-1. We recommend that you upgrade your mozilla package. Solution : http://www.debian.org/security/2005/dsa-866 Network Security Threat Level: High Networks Security ID: Vulnerability Assessment Copyright: This script is (C) 2007 Michel Arboi |
||
Cables, Connectors |
Samsung Galaxy Tab A8 10.5" SM-X200 128GB Wifi Only Tablet Open Box
$149.99
Case for Samsung Galaxy Tab A9+ 5G/A9 Plus 11"/A9 8.7"Shockproof Stand Full Body
$17.99
EXCELLENT SAMSUNG GALAXY TAB 4 10.1in SM-T537V 16GB WIFI VERIZON ANDROID TABLET
$37.99
Genuine Samsung Book Cover Keyboard for 14.6" Galaxy Tab S8 Ultra | S8 Ultra 5G
$89.99
Samsung Galaxy Tab E 8" 16GB Black SM-T377V (Verizon) Android Tablet IG1000
$30.35
Samsung USB 3.1 Flash Drive Bar Plus 256gb TITAN Gray
$24.10
Samsung Galaxy 12.4 Inch Slim Keyboard For S7+ | S7 FE | S8+ | S8+ 5G EF-DT730
$49.99
Samsung Galaxy Chromebook Go, 14-inch, 32GB, Unlocked All Carriers - Silver
$109.99
SAMSUNG 24" Monitor Full HD LED/LCD - GRADE A CONDITION - S24E650PL
$69.95
MICRON & SAMSUNG 256GB M.2 2280 PCIe SSD Solid State Drives (Set of 4)
$62.00
|
||
No Discussions have been posted on this vulnerability. |