|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Slackware Local Security Checks >> SSA-2005-085-01 Mozilla/Firefox/Thunderbird Vulnerability Assessment Details
|
SSA-2005-085-01 Mozilla/Firefox/Thunderbird |
||
SSA-2005-085-01 Mozilla/Firefox/Thunderbird Detailed Explanation for this Vulnerability Assessment New Mozilla packages are available for Slackware 9.1, 10.0, 10.1, and -current to fix various security issues and bugs. See the Mozilla site for a complete list of the issues patched: http://www.mozilla.org/projects/security/known-vulnerabilities.html#Mozilla Also updated are Firefox and Thunderbird in Slackware -current, and GAIM in Slackware 9.1, 10.0, and 10.1 (which uses the Mozilla NSS libraries). New versions of the mozilla-tests symlink creation package are also out for Slackware 9.1, 10.0, and 10.1. Just a little note on Slackware security -- I believe the state of Slackware right now is quite secure. I know there have been issues announced and fixed elsewhere, and I am assessing the reality of them (to be honest, it seems the level of proof needed to announce a security hole these days has fallen close to zero -- where are the proof-of-concept exploits?) It is, as always, my firm intent to keep Slackware as secure as it can possibly be. I'm still getting back up to speed (and I do not believe that anything exploitable in real life is being permited to slide), but I'm continuing to look over the various reports and would welcome input at security@slackware.com if you feel anything important has been overlooked and is in need of attention. Please remember that I do read BugTraq and many other security lists. I am not asking for duplicates of BugTraq posts unless you have additional proof or information on the issues, or can explain how an issue affects your own servers. This will help me to priorite any work that remains to be done. Thanks in advance for any helpful comments. Networks Security ID: Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Michel Arboi |
||
Cables, Connectors |
ASUS H110M-R Motherboard Intel 6th/7th Gen LGA1151 DDR4 Micro-ATX i/o shield
$42.00
MSI B450M-A PRO MAX II AM4 AMD B450 SATA 6Gb/s Micro ATX Motherboard
$69.99
ASROCK Micro ATX Motherboard B250M PRO4 Chipset Intel 250, DDR4, LGA 1151
$64.99
Asrock Z390 Phantom Gaming 4S/AC Wifi 8th/9th Gen Intel 1151 Motherboard Bulk
$99.00
MSI MAG Z590 TOMAHAWK WIFI Intel LGA1200 PCIE 4.0 WiFi 6E ATX Motherboard
$119.99
Gigabyte Ultra Durable B550 GAMING X V2 Desktop Motherboard
$99.99
ASUS Q87M-E/CSM Intel Q87 Chipset DDR3 mATX LGA1150 Motherboard Tested
$48.95
ASUS H110M-C LGA 1151 DDR4 SDRAM MSIP-REM-MSQ-H110M-C Desktop Motherboard
$43.95
Asus X99-A II Foxconn LGA2011 ATX Motherboard - Motherboard Only
$112.50
GIGABYTE MB10-Datto Motherboard Xeon D-1521- SR2DF 2.40 GHz- Open Box
$121.50
|
||
No Discussions have been posted on this vulnerability. |