|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200612-07] Mozilla Firefox: Multiple vulnerabilities Vulnerability Assessment Details
|
[GLSA-200612-07] Mozilla Firefox: Multiple vulnerabilities |
||
Mozilla Firefox: Multiple vulnerabilities Detailed Explanation for this Vulnerability Assessment The remote host is affected by the vulnerability described in GLSA-200612-07 (Mozilla Firefox: Multiple vulnerabilities) Mozilla Firefox improperly handles Script objects while they are being executed. Mozilla Firefox has also been found to be vulnerable to various possible buffer overflows. Lastly, the binary release of Mozilla Firefox is vulnerable to a low exponent RSA signature forgery issue because it is bundled with a vulnerable version of NSS. Impact A possible hacker could entice a user to view specially crafted JavaScript and execute arbitrary code with the rights of the user running Mozilla Firefox. A possible hacker could also entice a user to view a specially crafted web page that causes a buffer overflow and again executes arbitrary code. It is also possible for a possible hacker to make up SSL/TLS certificates that would not be detected as invalid by the binary release of Mozilla Firefox, raising the possibility for Man-in-the-Middle attacks. Workaround There is no known workaround at this time. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5462 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5463 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5464 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5747 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5748 Solution: All Mozilla Firefox users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-1.5.0.8" All Mozilla Firefox binary release users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-bin-1.5.0.8" Network Security Threat Level: Medium Networks Security ID: Vulnerability Assessment Copyright: (C) 2006 Michel Arboi |
||
Cables, Connectors |
Vintage 1980 Intel 2920 Analog Signal Processor Design Handbook Retro Computer
$27.95
One of a kind Donner 3500 Analog Computer with 2 Multi-Computer contrrol Units
$12500.00
Soviet Union Baltik analog computer ZX Spectrum USSR
$118.00
Honeywell Analog Flight Computer from 1965 lots of Germanium parts USA Made.
$250.00
Soviet Union KVANT analog computer ZX Spectrum USSR
$120.00
Computer Continuum Analog Interface
$89.00
Analog Computing Magazine - December 1985 no. 37 special holiday issue
$9.50
Soundpool Analog Out 4 Analog output expander for Atari Falcon 030 computers.
$100.00
Extron RGB-160XI Analog Computer Video 60-378-01
$187.06
ESI MAYA22 Professional USB Audio Interface w/ XLR, RCA & DI Inputs for PC & Mac
$28.01
|
||
No Discussions have been posted on this vulnerability. |