Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200503-10] Mozilla Firefox: Various vulnerabilities


Vulnerability Assessment Details

[GLSA-200503-10] Mozilla Firefox: Various vulnerabilities

Vulnerability Assessment Summary
Mozilla Firefox: Various vulnerabilities

Detailed Explanation for this Vulnerability Assessment
The remote host is affected by the vulnerability described in GLSA-200503-10
(Mozilla Firefox: Various vulnerabilities)

Impact

By setting up malicious websites and convincing users to
follow untrusted links or obey very specific drag-and-drop or download
instructions, attackers may leverage the various spoofing issues to
fake other websites to get access to confidential information, push
users to download malicious files or make them interact with their
browser preferences.
The temporary directory issue permits
local attackers to overwrite arbitrary files with the rights of another
local user.
The overflow issues, while not thought to be
exploitable, may permit a malicious downloaded page to execute arbitrary
code with the rights of the user viewing the page.

Workaround

There is no known workaround at this time.

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1156
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0230
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0231
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0232
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0233
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0255
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0527
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0578
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0584
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0585
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0586
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0588
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0589
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0590
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0591
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0592
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0593
http://www.mozilla.org/projects/security/known-vulnerabilities.html


Solution:
All Firefox users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-www/mozilla-firefox-1.0.1"
All Firefox binary users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-www/mozilla-firefox-bin-1.0.1"


Network Security Threat Level: Medium


Networks Security ID:

Vulnerability Assessment Copyright: (C) 2005 Michel Arboi

Cables, Connectors

Motorola MVME1600-011 VME CPU Board 01-W3066F-01E Warranty
$875.0
Motorola MVME1600-011 VME CPU Board  01-W3066F-01E     Warranty pictureIntel Core i5 4310M 2.7GHz CPU Processor 3MB Cache SR1L2
$82.99
Intel Core i5 4310M 2.7GHz CPU Processor 3MB Cache SR1L2 pictureThermalTake TR2 Socket AM2 Processor CPU Heatsink and Fan 3-Pin / 3-Wire (2)
$42.89
ThermalTake TR2 Socket AM2 Processor CPU Heatsink and Fan 3-Pin / 3-Wire (2) pictureIntel Core i5-6500 Quad-Core (BX80662I56500) Processor
$125.0
Intel Core i5-6500 Quad-Core (BX80662I56500) Processor picture


Discussions

No Discussions have been posted on this vulnerability.