Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Check for the version of the firefox package
Detailed Explanation for this Vulnerability Assessment
The remote host is missing the patch for the advisory FEDORA-2005-246 (firefox).
Mozilla Firefox is an open-source web browser, designed for standards
compliance, performance and portability.
A buffer overflow bug was found in the way Firefox processes GIF
images. It is possible for a possible hacker to create a specially crafted
GIF image, which when viewed by a victim will execute arbitrary code
as the victim. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CVE-2005-0399 to this issue.
A bug was found in the way Firefox processes XUL content. If a
web page can trick a user into dragging an object, it is possible to
load malicious XUL content. The Common Vulnerabilities and Exposures
project (cve.mitre.org) has assigned the name CVE-2005-0401 to this
A bug was found in the way Firefox bookmarks content to the sidebar.
If a user can be tricked into bookmarking a malicious web page into
the sidebar panel, that page could execute arbitrary programs. The
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the
name CVE-2005-0402 to this issue.
Users of Firefox are advised to upgrade to this updated package which
contains Firefox version 1.0.2 and is not vulnerable to these issues.
Additionally, there was a bug found in the way Firefox rendered some
fonts, notably the Tahoma font while italicized. This issue has been
filed as Bug 150041 (bugzilla.redhat.com). This updated package
contains a fix for this issue.
Solution : Get the newest Fedora Updates
Network Security Threat Level: High
Networks Security ID:
Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security
|HP ProLiant MicroServer Gen8 - Intel Celeron (2.3 GHz/2-core) 4GB MEM, 3TB HDD
|HP ProLiant MicroServer Gen8 Xeon 1265L V2 16GB RAM Diskless
|HPE MicroServer Gen10 Plus iLO Enablement Kit
|HP ProLiant N40L Micro Server - QZ160A - Good condition, graphics card included
No Discussions have been posted on this vulnerability.