Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Mozilla Suite: Multiple vulnerabilities
Detailed Explanation for this Vulnerability Assessment
The remote host is affected by the vulnerability described in GLSA-200703-05
(Mozilla Suite: Multiple vulnerabilities)
Several vulnerabilities ranging from code execution with elevated
rights to information leaks affect the Mozilla Suite.
A remote attacker could entice a user to browse to a specially crafted
website or open a specially crafted mail that could trigger some of the
vulnerabilities, potentially permiting execution of arbitrary code,
denials of service, information leaks, or cross-site scripting attacks
leading to the robbery of cookies of authentication credentials.
Most of the issues, but not all of them, can be prevented by disabling
The Mozilla Suite is no longer supported and has been masked after some
necessary changes on all the other ebuilds which used to depend on it.
Mozilla Suite users should unmerge www-client/mozilla or
www-client/mozilla-bin, and switch to a supported product, like
SeaMonkey, Thunderbird or Firefox.
# emerge --unmerge "www-client/mozilla"
# emerge --unmerge "www-client/mozilla-bin"
Network Security Threat Level: Medium
Networks Security ID:
Vulnerability Assessment Copyright: (C) 2007 Michel Arboi
|Thermaltake Muse R‑Duo RAID N0006USU
|HP DL360 G7 64bit VT Server 2x Hexa-Core 3.06GHz / 96GB Ram / 4x 300GB SAS RAID5
|HP DL360 G7 64-bit VT Server 2x Hexa-Core 3.46GHz / 24GB / 4x 72GB 15K SAS RAID5
|Dell Precision T3600 Xeon QC E5-1603 2.8GHz 32GB 2x 250GB Quadro 2000 H310 Raid*
No Discussions have been posted on this vulnerability.