Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200703-05] Mozilla Suite: Multiple vulnerabilities


Vulnerability Assessment Details

[GLSA-200703-05] Mozilla Suite: Multiple vulnerabilities

Vulnerability Assessment Summary
Mozilla Suite: Multiple vulnerabilities

Detailed Explanation for this Vulnerability Assessment
The remote host is affected by the vulnerability described in GLSA-200703-05
(Mozilla Suite: Multiple vulnerabilities)


Several vulnerabilities ranging from code execution with elevated
rights to information leaks affect the Mozilla Suite.

Impact

A remote attacker could entice a user to browse to a specially crafted
website or open a specially crafted mail that could trigger some of the
vulnerabilities, potentially permiting execution of arbitrary code,
denials of service, information leaks, or cross-site scripting attacks
leading to the robbery of cookies of authentication credentials.

Workaround

Most of the issues, but not all of them, can be prevented by disabling
the HTML rendering in the mail client and JavaScript on every
application.

References:
http://www.mozilla.org/projects/security/known-vulnerabilities.html#Mozilla


Solution:
The Mozilla Suite is no longer supported and has been masked after some
necessary changes on all the other ebuilds which used to depend on it.
Mozilla Suite users should unmerge www-client/mozilla or
www-client/mozilla-bin, and switch to a supported product, like
SeaMonkey, Thunderbird or Firefox.
# emerge --unmerge "www-client/mozilla"
# emerge --unmerge "www-client/mozilla-bin"


Network Security Threat Level: Medium


Networks Security ID:

Vulnerability Assessment Copyright: (C) 2007 Michel Arboi

Cables, Connectors


Vintage 5362 IBM System/36 Mini-Computer Mainframe 5291 2, CRT Terminal DM12N501 picture

Vintage 5362 IBM System/36 Mini-Computer Mainframe 5291 2, CRT Terminal DM12N501

$249.99



IBM Type 4869 External 5 1/4in Floppy Disk Drive Mainframe Collection - UNTESTED picture

IBM Type 4869 External 5 1/4in Floppy Disk Drive Mainframe Collection - UNTESTED

$65.00



6 Vintage Computer Tape Reels mainframe 3200 5000 data ibm magnetic processor picture

6 Vintage Computer Tape Reels mainframe 3200 5000 data ibm magnetic processor

$99.00



VINTAGE IBM Type 4869 External 5 1/4

VINTAGE IBM Type 4869 External 5 1/4" ~ Floppy Disk Drive Mainframe ~

$159.99



IBM Type 4869 External 5 1/4in Floppy Disk Drive Mainframe Collection picture

IBM Type 4869 External 5 1/4in Floppy Disk Drive Mainframe Collection

$145.99



Vintage Family owned Atari 1200xl computer sold as is tested turns on with cable picture

Vintage Family owned Atari 1200xl computer sold as is tested turns on with cable

$299.99



Digital DEC LK201BA Terminal Keyboard RJ11 Connection Mainframe picture

Digital DEC LK201BA Terminal Keyboard RJ11 Connection Mainframe

$44.95



VINTAGE CPU IBM MCM POWER7 - MAINFRAME PROCESSOR picture

VINTAGE CPU IBM MCM POWER7 - MAINFRAME PROCESSOR

$59.00



Commodore Amiga 500 Computer w/Mouse and Amiga A520 RF Modulator As Is Untested picture

Commodore Amiga 500 Computer w/Mouse and Amiga A520 RF Modulator As Is Untested

$299.99



Sage MAS 90 Software for Windows Financial Reporting Mainframe Collection picture

Sage MAS 90 Software for Windows Financial Reporting Mainframe Collection

$339.99



Discussions

No Discussions have been posted on this vulnerability.