|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200503-30] Mozilla Suite: Multiple vulnerabilities Vulnerability Assessment Details
|
[GLSA-200503-30] Mozilla Suite: Multiple vulnerabilities |
||
Mozilla Suite: Multiple vulnerabilities Detailed Explanation for this Vulnerability Assessment The remote host is affected by the vulnerability described in GLSA-200503-30 (Mozilla Suite: Multiple vulnerabilities) Impact The GIF heap overflow could be triggered by a malicious GIF image that would end up executing arbitrary code with the rights of the user running Mozilla. The other overflow issues, while not thought to be exploitable, would have the same impact By setting up malicious websites and convincing users to follow untrusted links or obey very specific drag-and-drop or download instructions, attackers may leverage the various spoofing issues to fake other websites to get access to confidential information, push users to download malicious files or make them interact with their browser preferences The temporary directory issue permits local attackers to overwrite arbitrary files with the rights of another local user Workaround There is no known workaround at this time. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1156 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0230 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0231 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0232 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0233 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0255 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0399 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0401 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0527 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0578 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0584 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0585 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0588 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0590 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0591 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0592 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0593 http://www.mozilla.org/projects/security/known-vulnerabilities.html Solution: All Mozilla Suite users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=www-client/mozilla-1.7.6" All Mozilla Suite binary users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=www-client/mozilla-bin-1.7.6" Network Security Threat Level: Medium Networks Security ID: Vulnerability Assessment Copyright: (C) 2005 Michel Arboi |
||
Cables, Connectors |
A-Tech 32GB 2x 16GB PC4-21300 Laptop SODIMM 260-Pin DDR4 2666 MHz Memory RAM Kit
$53.98
CRUCIAL DDR3 1600MHz 2x 8GB 16GB PC3-12800 Desktop Memory RAM DIMM 240pins
$18.50
CORSAIR VENGEANCE RGB DDR5 RAM 32GB (2x16GB) 6400MHz Black - NEW SEALED
$89.99
Team T-FORCE VULCAN Z 16GB (2 x 8GB) 288-Pin PC RAM DDR4 3200 (PC4 25600) Intel
$28.99
HyperX FURY DDR4 4GB 8GB 16GB 32GB 3200 2400 2666 Desktop RAM Memory DIMM 288pin
$31.50
Fanxiang DDR4 RAM 32GB 16GB x2 8GB x2 3200MHZ 3600MHZ UDIMM PC Desktop Memory
$46.99
Corsair Vengeance RGB Pro 32GB (4x8GB) DDR4 RAM 3600MHz (CMW32GX4M4D3600C18)
$65.00
Kingston HyperX Impact DDR3L 1600MHz 16GB (2x 8GB) PC3L-12800S Laptop Memory RAM
$19.95
HP Desktop PC i7 9th Gen, up to 64GB RAM, 4TB SSD, Windows 11/10 Pro WiFi BT
$199.00
A-Tech 8GB PC4-21300 Desktop DDR4 2666 MHz Non ECC 288-Pin DIMM Memory RAM 1x 8G
$16.99
|
||
No Discussions have been posted on this vulnerability. |