Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Check for the version of the firefox package
Detailed Explanation for this Vulnerability Assessment
The remote host is missing the patch for the advisory FEDORA-2005-246 (firefox).
Mozilla Firefox is an open-source web browser, designed for standards
compliance, performance and portability.
A buffer overflow bug was found in the way Firefox processes GIF
images. It is possible for a possible hacker to create a specially crafted
GIF image, which when viewed by a victim will execute arbitrary code
as the victim. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CVE-2005-0399 to this issue.
A bug was found in the way Firefox processes XUL content. If a
web page can trick a user into dragging an object, it is possible to
load malicious XUL content. The Common Vulnerabilities and Exposures
project (cve.mitre.org) has assigned the name CVE-2005-0401 to this
A bug was found in the way Firefox bookmarks content to the sidebar.
If a user can be tricked into bookmarking a malicious web page into
the sidebar panel, that page could execute arbitrary programs. The
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the
name CVE-2005-0402 to this issue.
Users of Firefox are advised to upgrade to this updated package which
contains Firefox version 1.0.2 and is not vulnerable to these issues.
Additionally, there was a bug found in the way Firefox rendered some
fonts, notably the Tahoma font while italicized. This issue has been
filed as Bug 150041 (bugzilla.redhat.com). This updated package
contains a fix for this issue.
Solution : Get the newest Fedora Updates
Network Security Threat Level: High
Networks Security ID:
Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security
|DELL POWEREDGE R630 10 BAY TWO E5-2623V4 2.6GHZ 768GB 2TB SAS 12G H330
|DELL POWEREDGE R430 SERVER TWO E5-2630V3 2.4GHZ 32GB NO HDD H730P
|DELL POWEREDGE R730XD SERVER 12 BAY E5-2697V4 2.3GHz 192GB 4 X 4TB SATA 900GB 10
|DELL POWEREDGE R720XD SERVER 3.5 TWO E5-2609 2.40GHZ 48GB 5 X 4TB SATA H710
No Discussions have been posted on this vulnerability.