|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200503-30] Mozilla Suite: Multiple vulnerabilities Vulnerability Assessment Details
|
[GLSA-200503-30] Mozilla Suite: Multiple vulnerabilities |
||
Mozilla Suite: Multiple vulnerabilities Detailed Explanation for this Vulnerability Assessment The remote host is affected by the vulnerability described in GLSA-200503-30 (Mozilla Suite: Multiple vulnerabilities) Impact The GIF heap overflow could be triggered by a malicious GIF image that would end up executing arbitrary code with the rights of the user running Mozilla. The other overflow issues, while not thought to be exploitable, would have the same impact By setting up malicious websites and convincing users to follow untrusted links or obey very specific drag-and-drop or download instructions, attackers may leverage the various spoofing issues to fake other websites to get access to confidential information, push users to download malicious files or make them interact with their browser preferences The temporary directory issue permits local attackers to overwrite arbitrary files with the rights of another local user Workaround There is no known workaround at this time. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1156 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0230 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0231 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0232 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0233 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0255 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0399 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0401 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0527 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0578 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0584 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0585 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0588 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0590 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0591 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0592 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0593 http://www.mozilla.org/projects/security/known-vulnerabilities.html Solution: All Mozilla Suite users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=www-client/mozilla-1.7.6" All Mozilla Suite binary users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=www-client/mozilla-bin-1.7.6" Network Security Threat Level: Medium Networks Security ID: Vulnerability Assessment Copyright: (C) 2005 Michel Arboi |
||
Cables, Connectors |
IBUYPOWER I-SERIES G236A654 | CORE I5-9400F | 256GB | 8GB | WIN10H | REFURBISHED
$324.99
i5 GTX 1080 16GB RAM 512GB SSD + 3TB HD Liquid-Cooled Gaming Computer RGB Remote
$495.00
UPGRADED Apple MacBook Pro 16 inch 8 Core i9 16GB 1TB SSD 2019/2020 A2141 5500M
$850.00
SGIN 17.3" Laptop 8GB RAM 512GB SSD Celeron Quad-Core Up to 2.6GHz HD 1080P
$229.00
Dell Precision 7670, Intel Core i7-12850HX, 32GB RAM 2TB SSD, RTX A2000 8GB
$186.00
AMD Ryzen 7 5700X3D 8-Core 16-Thread 4.1GHz Socket AM4 CPU
$194.99
Intel Xeon E5-2667 V2 LGA 2011 3.3GHz 8 Core 130W 25MB 8GT/s CPU Processor
$11.99
OPEN BOX Apple Mac Mini 3.2 GHz M1 8-Core 256GB SSD 16GB RAM 8C GPU 2020 A2348
$450.00
Custom RGB Gaming Desktop PC Intel Core i7 3.40 Quad 32 GB SSD Nvidia RTX 3060
$616.00
HP Pavilion TP01-2137C Desktop Ryzen 5 5600G AMD Radeon 12GB 1TB HDD+256GB SSD
$266.00
|
||
No Discussions have been posted on this vulnerability. |