Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> SuSE Local Security Checks >> SUSE-SA:2005:028: Mozilla. Mozilla Firefox


Vulnerability Assessment Details

SUSE-SA:2005:028: Mozilla. Mozilla Firefox

Vulnerability Assessment Summary
Check for the version of the Mozilla. Mozilla Firefox package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory SUSE-SA:2005:028 (Mozilla. Mozilla Firefox).


Several problems have been fixed with the security update releases
of the Mozilla Firefox 1.0.3 web browser and the Mozilla Suite 1.7.7.

This security update contains those security fixes. The Firefox
packages have been directly upgraded to the version 1.0.3, for
the Mozilla Suite packages the fixes up to version 1.7.7 have been
back ported.

Updates are currently provided for:

Mozilla Firefox: SUSE Linux 9.0 up to 9.3, Novell Linux Desktop 9
Mozilla Suite: SUSE Linux 9.2 and 9.3

Fixes of the Mozilla Suite for older products (SUSE Linux 8.2 - 9.1,
SUSE Linux Enterprise Server 8 and 9, SUSE Linux Desktop 1.0) are
being worked on.

Following security issues have been fixed:
- MFSA 2005-33,CVE-2005-0989:
A flaw in the Javascript regular expression handling of Mozilla
based browser can lead to disclosure of browser memory, potentially
exposing private data from web pages viewed or passwords or
similar data sent to other web pages. This flaw could also crash
the browser.

- MFSA 2005-34,CVE-2005-0752:
With manual Plugin install it was possible for the Plugin to
execute javascript code with the installing users rights.

- MFSA 2005-35,CVE-2005-1153:
Showing blocked javascript: pop up uses wrong privilege context,
this could be used for a privilege escalation (installing malicious
tests).

- MFSA 2005-36,CVE-2005-1154:
Cross-site scripting through global scope pollution, this could
lead to a possible hacker being able to run code in foreign websites
context, potentially sniffing information or performing actions
in that context.

- MFSA 2005-37,CVE-2005-1155,'firelinking':
Code execution through javascript: favicons, which could be used
for a privilege escalation.

- MFSA 2005-38,CVE-2005-1157,CVE-2005-1156,'firesearching':
Search Plugin cross-site scripting.

- MFSA 2005-39,CVE-2005-1158:
Arbitrary code execution from Firefox sidebar panel II.

- MFSA 2005-40,CVE-2005-1159:
Missing Install object instance checks.

- MFSA 2005-41,CVE-2005-1160:
Privilege escalation via DOM property overrides.


Solution : http://www.suse.de/security/advisories/2005_28_mozilla_firefox.html
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors

HP Z440 NVIDIA M2000 1 X E5-1603 V3 64GB RAM 1 x 1TB HDD
$2050.0
HP Z440  NVIDIA M2000 1 X E5-1603 V3 64GB RAM  1 x 1TB HDD pictureDell Vostro 3500 Intel Core i3 2.4GHz 8GB RAM 500GB HDD 15.6" *USED BARE BONES*
$49.99
Dell Vostro 3500 Intel Core i3 2.4GHz 8GB RAM 500GB HDD 15.6 Dell Latitude E6420 14" Intel i5 2.3GHz 8GB RAM 320GB HDD Wins7 Pro Office 2007
$140.0
 Dell Latitude E6420 14HP ProDesk 600 G1 DM Desktop Mini Core i3-4360T 3.20GHz 4GB Ram 500GB HD Win 8.1
$189.99
HP ProDesk 600 G1 DM Desktop Mini Core i3-4360T 3.20GHz 4GB Ram 500GB HD Win 8.1 picture


Discussions

No Discussions have been posted on this vulnerability.