Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA866] DSA-866-1 mozilla


Vulnerability Assessment Details

[DSA866] DSA-866-1 mozilla

Vulnerability Assessment Summary
DSA-866-1 mozilla

Detailed Explanation for this Vulnerability Assessment

Several security-related problems have been discovered in Mozilla and
derived programs. The Common Vulnerabilities and Exposures project
identifies the following problems:
Tom Ferris discovered a bug in the IDN hostname handling of
Mozilla that permits remote attackers to cause a denial of service
and possibly execute arbitrary code via a hostname with dashes.
A buffer overflow permits remote attackers to execute arbitrary
code via an XBM image file that ends in a large number of spaces
instead of the expected end tag.
Mats Palmgren discovered a buffer overflow in the Unicode string
parser that permits a specially crafted Unicode sequence to
overflow a buffer and cause arbitrary code to be executed.
Remote attackers could spoof HTTP headers of XML HTTP requests
via XMLHttpRequest and possibly use the client to exploit
vulnerabilities in servers or proxies.
Remote attackers could spoof DOM objects via an XBL control that
implements an internal XPCOM interface.
Georgi Guninski discovered an integer overflow in the JavaScript
engine that might permit remote attackers to execute arbitrary
code.
Remote attackers could execute Javascript code with chrome
rights via an about: page such as about:mozilla.
Remote attackers could spawn windows without user interface
components such as the address and status bar that could be used
to conduct spoofing or phishing attacks.
Peter Zelezny discovered that shell metacharacters are not
properly escaped when they are passed to a shell script and permit
the execution of arbitrary commands, e.g. when a malicious URL is
automatically copied from another program into Mozilla as default
browser.
For the stable distribution (sarge) these problems have been fixed in
version 1.7.8-1sarge3.
For the unstable distribution (sid) these problems have been fixed in
version 1.7.12-1.
We recommend that you upgrade your mozilla package.


Solution : http://www.debian.org/security/2005/dsa-866
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is (C) 2007 Michel Arboi

Cables, Connectors


Juniper Networks 740-061405 JNP-QSFP-100G-SR4 OM3 QSFP28 100GE 850nm100m 1PCS picture

Juniper Networks 740-061405 JNP-QSFP-100G-SR4 OM3 QSFP28 100GE 850nm100m 1PCS

$150.00



Factory new Sealed SRX-GP-16GE-PoE Juniper Networks expansion module picture

Factory new Sealed SRX-GP-16GE-PoE Juniper Networks expansion module

$79.00



Juniper Networks EX3300-48P 48-Port PoE+ 4x SFP+ Network Switch w/ Power Cord picture

Juniper Networks EX3300-48P 48-Port PoE+ 4x SFP+ Network Switch w/ Power Cord

$43.95



Juniper Networks EX3300 EX3300-48P 48-Port Gigabit PoE+ Switch picture

Juniper Networks EX3300 EX3300-48P 48-Port Gigabit PoE+ Switch

$40.10



Juniper Networks EX4300-48T 48 Port Gigabit 4 QSFP 40G 2xPSU AFO Network Switch picture

Juniper Networks EX4300-48T 48 Port Gigabit 4 QSFP 40G 2xPSU AFO Network Switch

$89.00



JUNIPER EX3400-48P 48x 1GB PoE+ RJ-45 4x 10GB SFP+ 2x 40GB QSFP+, DUAL AC POWER picture

JUNIPER EX3400-48P 48x 1GB PoE+ RJ-45 4x 10GB SFP+ 2x 40GB QSFP+, DUAL AC POWER

$210.00



Juniper QFX5100-48S-3AFO Switch 48 x 10Gb SFP+, 6x QSFP 40GE, Dual AC Power picture

Juniper QFX5100-48S-3AFO Switch 48 x 10Gb SFP+, 6x QSFP 40GE, Dual AC Power

$499.00



Juniper Networks EX2300 -24P 24 Port Gigabit PoE Network Switch picture

Juniper Networks EX2300 -24P 24 Port Gigabit PoE Network Switch

$149.00



Juniper PD-4OC192-SON-XFP 710-013264 Four line-rate OC-192c/ STM-64 IPUIA01MTA picture

Juniper PD-4OC192-SON-XFP 710-013264 Four line-rate OC-192c/ STM-64 IPUIA01MTA

$675.00



 New Factory Sealed Juniper EX2300-48P Networks 48-Port Managed Ethernet Sealed picture

New Factory Sealed Juniper EX2300-48P Networks 48-Port Managed Ethernet Sealed

$499.00



Discussions

No Discussions have been posted on this vulnerability.