Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Slackware Local Security Checks >> SSA-2005-269-01 Mozilla/Firefox


Vulnerability Assessment Details

SSA-2005-269-01 Mozilla/Firefox

Vulnerability Assessment Summary
SSA-2005-269-01 Mozilla/Firefox

Detailed Explanation for this Vulnerability Assessment

New Mozilla and Firefox packages are available for Slackware 10.0, 10.1,
10.2, and -current to fix security issues:

MFSA 2005-59 Command-line handling on Linux permits shell execution
MFSA 2005-58 Firefox 1.0.7 / Mozilla Suite 1.7.12 Vulnerability Fixes
MFSA 2005-57 IDN heap overrun using soft-hyphens

More details about these issues may be found on the Mozilla web site:

http://www.mozilla.org/projects/security/known-vulnerabilities.html#Mozilla
http://www.mozilla.org/projects/security/known-vulnerabilities.html#Firefox




Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Michel Arboi

Cables, Connectors

Intel Xeon E5670 SLBV7 2.93GHz LGA1366 Hex Core CPU Processors
$41.98
Intel Xeon E5670 SLBV7 2.93GHz LGA1366 Hex Core CPU Processors pictureLot of 17 Intel Pentium Core CPU i3 SR05C i5 SR00Q 2400 C2Q XEON - AS-IS DAMAGED
$0.01
Lot of 17 Intel Pentium Core CPU i3 SR05C i5 SR00Q 2400 C2Q XEON - AS-IS DAMAGED pictureSUPERMICRO P4DP6 MOTHERBOARD W/INTEL XEON 01
$149.99
SUPERMICRO P4DP6 MOTHERBOARD W/INTEL XEON 01 pictureIntel Xeon E7-4870 10-Core CPU Processor (2.4GHz,30MB,3200MHz,LGA1567) - SLC3T
$49.95
Intel Xeon E7-4870 10-Core CPU Processor (2.4GHz,30MB,3200MHz,LGA1567) - SLC3T picture


Discussions

No Discussions have been posted on this vulnerability.