Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Windows >> Mozilla SOAPParameter Integer Overlow


Vulnerability Assessment Details

Mozilla SOAPParameter Integer Overlow

Vulnerability Assessment Summary
Acertains the version of Mozilla

Detailed Explanation for this Vulnerability Assessment

The remote host is using Mozilla an alternative web browser.

The remote version of this software is vulnerable to an integer overflow
in the SOAPParameter object constructor. A possible hacker may exploit this flow
to corrupt the process memory and possibly to execute arbitrary code on
the remote host.

To exploit this flaw, a possible hacker would need to set up a rogue website
and lure a victim on the remote host into visiting it.

Solution : Upgrade to Mozilla 1.7.1
Network Security Threat Level: High

Networks Security ID: 10843

Vulnerability Assessment Copyright: This script is Copyright (C) 2004-2006 Tenable Network Security

Cables, Connectors

QNAP TS-453Be QTS-Linux Multimedia NAS 6tb NAS Server 2x3000gb WD Red NAS Drives
$785.0
QNAP TS-453Be QTS-Linux Multimedia NAS 6tb NAS Server 2x3000gb WD Red NAS Drives pictureNetgear FR114P Firewall Parallel Print Server Linux Mac Windows /netgear p/s
$9.0
Netgear FR114P Firewall Parallel Print Server Linux Mac Windows /netgear p/s pictureLevel One FBR-1415TX Router Print Server Parallel/USB WIN/MAC/LINUX
$4.99
Level One FBR-1415TX Router Print Server Parallel/USB WIN/MAC/LINUX pictureToshiba Magnia Sg20 Sg-20 Vpn-Server Proxyserver Mailfilter Printserver Linux
$112.91
Toshiba Magnia Sg20 Sg-20 Vpn-Server Proxyserver Mailfilter Printserver Linux picture


Discussions

No Discussions have been posted on this vulnerability.