Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Fedora Local Security Checks >> Fedora Core 5 2006-487: mozilla


Vulnerability Assessment Details

Fedora Core 5 2006-487: mozilla

Vulnerability Assessment Summary
Check for the version of the mozilla package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory FEDORA-2006-487 (mozilla).

Mozilla is an open-source web browser, designed for standards
compliance, performance and portability.

Update Information:

Updated mozilla packages that fix several security bugs are
now available.

This update has been rated as having critical security
impact by the Fedora Security Response Team.

Mozilla is an open source Web browser, advanced email and
newsgroup client, IRC chat client, and HTML editor.

Several bugs were found in the way Mozilla processes
malformed JavaScript. A malicious web page could modify the
content of a different open web page, possibly stealing
sensitive information or conducting a cross-site scripting
attack. (CVE-2006-1731, CVE-2006-1732, CVE-2006-1741)

Several bugs were found in the way Mozilla processes certain
JavaScript actions. A malicious web page could execute
arbitrary JavaScript instructions with the permissions of
'chrome', permiting the page to steal sensitive information
or install browser malware. (CVE-2006-1727, CVE-2006-1728,
CVE-2006-1733, CVE-2006-1734, CVE-2006-1735, CVE-2006-1742)

Several bugs were found in the way Mozilla processes
malformed web pages. A carefully crafted malicious web page
could cause the execution of arbitrary code as the user
running Mozilla. (CVE-2006-0748, CVE-2006-0749,
CVE-2006-1730, CVE-2006-1737, CVE-2006-1738, CVE-2006-1739,
CVE-2006-1790)

A bug was found in the way Mozilla displays the secure site
icon. If a browser is configured to display the non-default
secure site modal warning dialog, it may be possible to
trick a user into believing they are viewing a secure site.
(CVE-2006-1740)

A bug was found in the way Mozilla permits JavaScript
mutation events on 'input' form elements. A malicious web
page could be created in such a way that when a user submits
a form, an arbitrary file could be uploaded to the attacker.
(CVE-2006-1729)

A bug was found in the way Mozilla executes in-line mail
forwarding. If a user can be tricked into forwarding a
maliciously crafted mail message as in-line content, it is
possible for the message to execute JavaScript with the
permissions of 'chrome'. (CVE-2006-0884)

Users of Mozilla are advised to upgrade to these updated
packages containing Mozilla version 1.7.13 which corrects
these issues.



Solution : Get the newest Fedora Updates
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2007 Tenable Network Security

Cables, Connectors

Seagate ST32000444SS 2Tb SAS 9JX248-080
$42.0
Seagate ST32000444SS 2Tb SAS 9JX248-080 pictureMacbook Air 11'' 13'' A1465 A1466 2012 512GB SSD Hard Drive Samsung
$219.0
Macbook Air 11'' 13'' A1465 A1466 2012 512GB SSD Hard Drive Samsung  pictureSeagate ST2000NM0023 2Tb SAS drive possible Netapp Dell # CWCCM 9Z275-041
$70.0
Seagate ST2000NM0023 2Tb SAS drive possible Netapp Dell # CWCCM 9Z275-041 pictureSeagate ST9160310AS 160GB P/N: 9EV132-188 F/W: 0303 WU FREE STANDARD SHIPPING
$12.95
Seagate ST9160310AS 160GB P/N: 9EV132-188 F/W: 0303 WU   FREE STANDARD SHIPPING  picture


Discussions

No Discussions have been posted on this vulnerability.