Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Check for the version of the MozillaFirefox,mozilla package
Detailed Explanation for this Vulnerability Assessment
The remote host is missing the patch for the advisory SUSE-SA:2006:021 (MozillaFirefox,mozilla).
A number of security issues have been fixed in the Mozilla browser
suite and the Mozilla Firefox browser.
These problems could be used by remote attackers to gain rights,
gain access to confidential information or to cause denial of service
The updates of the Firefox packages bring it up to Firefox 1.0.8 fix level.
The updates of the Mozilla suite bring it up to Mozilla 1.7.13 fix level.
Mozilla Thunderbird is also affected by some of the listed issues, but
updates will be provided later due to unrelated problems. Most of them
can be worked around by turning Java Script in Mails off (which is the
default for Thunderbird).
Full details of all issues can be found on:
List of issues that were fixed:
Privilege escalation through Print Preview
Privilege escalation using crypto.generateCRMFRequest
File stealing by changing input type
CSS Letter-Spacing Heap Overflow Vulnerability
Cross-site scripting using .valueOf.call()
Mozilla Firefox Tag Order Vulnerability
Cross-site scripting through window.controllers
Accessing XBL compilation scope via valueOf.call()
Privilege escalation via XBL.method.eval
Downloading executables with 'Save Image As...'
Secure-site spoof (requires security warning dialog)
Crashes with evidence of memory corruption (rv:1.8)
We wish to thank the Mozilla Developers and the various bug reporters
for reporting and fixing those issues.
Solution : http://www.suse.de/security/advisories/2006_04_20.html
Network Security Threat Level: High
Networks Security ID:
Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security
|HP ProLiant MicroServer Turion II Neo N54L 2.2ghz / 4gb RAM / 2x 250gb / Sound
|Super Micro Chasis with 14 Blade Server 28 Xeon CPUs Inlcuded 96GB Ram Included
|SUPERMICRO MBD-X9SCM-F-O LGA 1155 Intel C204 Micro ATX Intel Xeon E3 Server
|HP ProLiant Microserver #3, N54L @2.2GHz, 8GB, 180GB-SSD, 4x2TB HDD, RAID, Win10
No Discussions have been posted on this vulnerability.