|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> SuSE Local Security Checks >> SUSE-SA:2005:045: mozilla,MozillaFirefox,epiphany,galeon Vulnerability Assessment Details
|
SUSE-SA:2005:045: mozilla,MozillaFirefox,epiphany,galeon |
||
Check for the version of the mozilla,MozillaFirefox,epiphany,galeon package Detailed Explanation for this Vulnerability Assessment The remote host is missing the patch for the advisory SUSE-SA:2005:045 (mozilla,MozillaFirefox,epiphany,galeon). Various security vulnerabilities in the mozilla browser suite and the Mozilla Firefox browser have been reported and fixed upstream. The Mozilla suite browser has been updated to a security fix level of Mozilla 1.7.11, the Mozilla Firefox browser has been updated to a fix level of Firefox 1.0.6. Security relevant bugs that are fixed include (but are not limited to): MFSA 2005-56 Code execution through shared function objects MFSA 2005-55 XHTML node spoofing MFSA 2005-54 Javascript prompt origin spoofing MFSA 2005-52 Same origin violation: frame calling top.focus() MFSA 2005-51 The return of frame-injection spoofing MFSA 2005-50 Possibly exploitable crash in InstallVersion.compareTo() MFSA 2005-49 Stealing of sensitive information via _search and the Firefox sidebar MFSA 2005-48 Same-origin violation with InstallTrigger callback MFSA 2005-47 'Set as wallpaper' javascript: privilege escalation MFSA 2005-46 XBL scripts ran even when Javascript disabled MFSA 2005-45 Content-generated event vulnerabilities This update also upgrades the version of the Mozilla suite for the following products: * SUSE Linux Desktop 1.0: The original Mozilla 1.4 branch browser is upgraded to the Mozilla 1.7 branch version. We were not able to port the galeon web browser included in SUSE Linux Desktop 1.0 to support Mozilla 1.7 in time, so we no longer support it. The galeon package on SUSE Linux Desktop 1.0 is removed by this update. * SUSE Linux Enterprise Server 8: The original Mozilla 1.4 branch browser is upgraded to the Mozilla 1.7 branch version. * SUSE Linux Enterprise Server 9: The Mozilla version 1.6 shipped with GA of the SUSE Linux Enterprise Server 9 was replaced by the Mozilla 1.7 branch version in Service Pack 2. * SUSE Linux 8.2, 9.0, 9.1: The Mozilla version 1.4 and 1.6 contained in the SUSE Linux versions 8.2 up to 9.1 was replaced by the Mozilla 1.7 branch version. We were not able to port the galeon and the epiphany web browsers included in SUSE Linux 9.0 up to 9.1 to support Mozilla 1.7 in time, so we will no longer support it. The galeon and epiphany packages on SUSE Linux 9.0 and 9.1 are removed by this update. Solution : http://www.suse.de/security/advisories/2005_45_mozilla.html Network Security Threat Level: High Networks Security ID: Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security |
||
Cables, Connectors |
Dell R640 8x 2.5" SFF iDRAC 2x 25GbE SFP28- Wholesale Custom Build Your Server
$313.99
Dell PowerEdge R730XD Server 2x E5-2620 V4=16 Cores | H330 | 32GB RAM | 2x trays
$258.99
Dell R640 8x 2.5" SFF Server iDRAC - Wholesale Custom Build Your Server
$260.99
Dell Poweredge R730 2x Xeon E5-2670 v3 2.3ghz 24-Cores 32gb H730 iDracEnt
$174.99
Dell PowerEdge R630 Server 2x E5-2697v3 2.60Ghz 28-Core 128GB H730P Rails
$295.00
Dell Poweredge R630 2x Xeon E5-2680 v3 2.5ghz 24-Cores 32gb 180GB SSD 495w
$169.99
Dell PowerEdge R630 Server 8 Bay - Pick RAM Drives RAID PSUs - All Inc 2x12c CPU
$390.00
TYAN GT86C-B5630 1U SERVER 1x XEON SCALABLE 2ND GEN 12x RAM SLOT 12x 3.5"
$154.00
Dell PowerEdge R730XD Server 2x E5-2660 V4 = 28 Cores H730 128GB RAM 4x trays
$368.99
Dell Poweredge R720xd 2x Xeon E5-2690 v2 3GHz 20-Cores 256GB H710 26x Trays
$304.99
|
||
No Discussions have been posted on this vulnerability. |