|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200507-14] Mozilla Firefox: Multiple vulnerabilities Vulnerability Assessment Details
|
[GLSA-200507-14] Mozilla Firefox: Multiple vulnerabilities |
||
Mozilla Firefox: Multiple vulnerabilities Detailed Explanation for this Vulnerability Assessment The remote host is affected by the vulnerability described in GLSA-200507-14 (Mozilla Firefox: Multiple vulnerabilities) The following vulnerabilities were found and fixed in Mozilla Firefox: "moz_bug_r_a4" and "shutdown" discovered that Firefox was improperly cloning base objects (MFSA 2005-56). Michael Krax reported that Firefox was not correctly handling JavaScript URLs from external applications (MFSA 2005-53), and that the "Set as wallpaper" function in versions 1.0.3 and 1.0.4 could be abused to load JavaScript (MFSA 2005-47). Several researchers reported ways to trick Firefox into accepting events generated by web content (MFSA 2005-45). Kohei Yoshino discovered a new way to inject script from the sidebar panel using data: (MFSA 2005-49). "moz_bug_r_a4" reported that Firefox failed to validate XHTML DOM nodes properly (MFSA 2005-55), and that XBL scripts ran even when Javascript is disabled (MFSA 2005-46). "shutdown" discovered a possibly exploitable crash in InstallVersion.compareTo (MFSA 2005-50). Finally, Secunia discovered that a child frame can call top.focus() even if the framing page comes from a different origin and has overridden the focus() routine (MFSA 2005-52), and that the frame injection spoofing bug fixed in 1.0.2 was mistakenly reintroduced in 1.0.3 and 1.0.4 (MFSA 2005-51). Impact A remote attacker could craft malicious web pages that would leverage these issues to inject and execute arbitrary script code with elevated rights, steal cookies or other information from web pages, or spoof content. Workaround There are no known workarounds for all the issues at this time. References: http://www.mozilla.org/projects/security/known-vulnerabilities.html#Firefox Solution: All Mozilla Firefox users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-1.0.5" All Mozilla Firefox binary users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-bin-1.0.5" Network Security Threat Level: Medium Networks Security ID: Vulnerability Assessment Copyright: (C) 2005 Michel Arboi |
||
Cables, Connectors |
Lot 10x SanDisk Cruzer ULTRA USB 3.0 16GB USB flash thumb drive SDCZ48-016G 16
$34.99
SanDisk 128GB Ultra Flair USB 3.0 Flash Drive - SDCZ73-128G-G46
$12.99
SanDisk 512GB Ultra Drive Dual Go USB Type-C Flash Drive Green SDDDC3-512G-G46G
$49.99
SanDisk 256GB Ultra Dual Drive USB Type-C, USB 3.1 Flash Drive - SDDDC2-256G-G46
$21.99
64GB USB 3.0 Flash Drive USB Memory Stick High Speed Retractable USB Thumb Drive
$6.99
New TESLA OEM Model S,3,X,Y USB Flash Drive for Dashcam & Sentry Mode 128GB
$18.99
2TB USB 3.0 Flash Drive Memory Photo Stick for iPhone Android iPad Type C 3 IN1
$13.98
Mechanical Style Flash Drive USB 3.0 High Speed 16TB Large Capacity Waterproof
$8.39
USB Flash Drive Memory Stick Pendrive Thumb Drive 4GB, 8GB, 32GB, 64GB 128GB LOT
$249.37
SanDisk Cruzer Glide USB 3.0 16GB 32GB 64GB 128GB 256GB Flash Drive Memory Lot
$276.48
|
||
No Discussions have been posted on this vulnerability. |