Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> SuSE Local Security Checks >> SUSE-SA:2006:048: MozillaFirefox,MozillaThunderbird,Seamonkey


Vulnerability Assessment Details

SUSE-SA:2006:048: MozillaFirefox,MozillaThunderbird,Seamonkey

Vulnerability Assessment Summary
Check for the version of the MozillaFirefox,MozillaThunderbird,Seamonkey package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory SUSE-SA:2006:048 (MozillaFirefox,MozillaThunderbird,Seamonkey).


To fix various security problems we released update packages that
bring Mozilla Firefox to version 1.5.0.6, MozillaThunderdbird to
version 1.5.0.5 and the Seamonkey Suite to version 1.0.3.



Solution : http://www.suse.de/security/http://www.novell.com/linux/security/advisories/2006_48_seamonkey.html
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2007 Tenable Network Security

Cables, Connectors

(2X) Vintage Digital Equipment Corporation DEC 2MB 18-bit Parity Memory RAM SIMM
$0.99
(2X) Vintage Digital Equipment Corporation DEC 2MB 18-bit Parity Memory RAM SIMM picture6 inch silicon wafer of 64K bit memory chips + Vintage DEC 14 inch hard disc
$75.0
6 inch silicon wafer of 64K bit memory chips  + Vintage DEC 14 inch hard disc  pictureDEC M5922 MASS BUS TRANSCEIVER PORT A SIDE 2 COMPUTER VINTAGE
$55.95
DEC M5922 MASS BUS TRANSCEIVER PORT A SIDE 2 COMPUTER VINTAGE pictureDEC LS11 INTERFACE M7258 94VO BOARD COMPUTER VINTAGE
$55.95
DEC LS11 INTERFACE M7258 94VO BOARD COMPUTER VINTAGE picture


Discussions

No Discussions have been posted on this vulnerability.