Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Slackware Local Security Checks >> SSA-2005-085-01 Mozilla/Firefox/Thunderbird


Vulnerability Assessment Details

SSA-2005-085-01 Mozilla/Firefox/Thunderbird

Vulnerability Assessment Summary
SSA-2005-085-01 Mozilla/Firefox/Thunderbird

Detailed Explanation for this Vulnerability Assessment

New Mozilla packages are available for Slackware 9.1, 10.0, 10.1, and -current
to fix various security issues and bugs. See the Mozilla site for a complete
list of the issues patched:

http://www.mozilla.org/projects/security/known-vulnerabilities.html#Mozilla

Also updated are Firefox and Thunderbird in Slackware -current, and GAIM in
Slackware 9.1, 10.0, and 10.1 (which uses the Mozilla NSS libraries).

New versions of the mozilla-tests symlink creation package are also out for
Slackware 9.1, 10.0, and 10.1.

Just a little note on Slackware security -- I believe the state of Slackware
right now is quite secure. I know there have been issues announced and fixed
elsewhere, and I am assessing the reality of them (to be honest, it seems the
level of proof needed to announce a security hole these days has fallen close
to zero -- where are the proof-of-concept exploits?) It is, as always, my
firm intent to keep Slackware as secure as it can possibly be. I'm still
getting back up to speed (and I do not believe that anything exploitable in
real life is being permited to slide), but I'm continuing to look over the
various reports and would welcome input at security@slackware.com if you feel
anything important has been overlooked and is in need of attention. Please
remember that I do read BugTraq and many other security lists. I am not
asking for duplicates of BugTraq posts unless you have additional proof or
information on the issues, or can explain how an issue affects your own
servers. This will help me to priorite any work that remains to be done.
Thanks in advance for any helpful comments.




Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Michel Arboi

Cables, Connectors

HP ProLiant MicroServer G7 N54L NHP 250GB US Svr with 16GB RAM
$199.99
HP ProLiant MicroServer G7 N54L NHP 250GB US Svr with 16GB RAM pictureHPE ProLiant MicroServer Gen10 Ultra Micro Tower Server 873830S01
$466.78
HPE ProLiant MicroServer Gen10 Ultra Micro Tower Server 873830S01 pictureHP ProLiant Ultra Micro Tower MicroServer System AMD Athlon II NEO N36L
$125.0
HP ProLiant Ultra Micro Tower MicroServer System AMD Athlon II NEO N36L pictureHP ProLiant MicroServer G7 N40L NHP US Svr With 8gb Memory
$149.99
HP ProLiant MicroServer G7 N40L NHP US Svr With 8gb Memory picture


Discussions

No Discussions have been posted on this vulnerability.