|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200503-10] Mozilla Firefox: Various vulnerabilities Vulnerability Assessment Details
|
[GLSA-200503-10] Mozilla Firefox: Various vulnerabilities |
||
Mozilla Firefox: Various vulnerabilities Detailed Explanation for this Vulnerability Assessment The remote host is affected by the vulnerability described in GLSA-200503-10 (Mozilla Firefox: Various vulnerabilities) Impact By setting up malicious websites and convincing users to follow untrusted links or obey very specific drag-and-drop or download instructions, attackers may leverage the various spoofing issues to fake other websites to get access to confidential information, push users to download malicious files or make them interact with their browser preferences. The temporary directory issue permits local attackers to overwrite arbitrary files with the rights of another local user. The overflow issues, while not thought to be exploitable, may permit a malicious downloaded page to execute arbitrary code with the rights of the user viewing the page. Workaround There is no known workaround at this time. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1156 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0230 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0231 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0232 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0233 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0255 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0527 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0578 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0584 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0585 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0586 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0588 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0589 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0590 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0591 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0592 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0593 http://www.mozilla.org/projects/security/known-vulnerabilities.html Solution: All Firefox users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-www/mozilla-firefox-1.0.1" All Firefox binary users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-www/mozilla-firefox-bin-1.0.1" Network Security Threat Level: Medium Networks Security ID: Vulnerability Assessment Copyright: (C) 2005 Michel Arboi |
||
Cables, Connectors |
Dell PowerEdge R640 Server | 2x Gold 6132 28 Cores | H730p | Choose RAM / DRIVES
$3480.00
DELL PowerEdge R730 Server 2x E5-2690v3 2.6GHz =24 Cores 32GB H730 4xRJ45
$274.00
Dell PowerEdge R720XD Xeon E5-2680 V2 2.8GHz 20 Cores 256GB RAM 12x4TB
$510.00
Dell PowerEdge R730XD 28 Core Server 2X Xeon E5-2680 V4 H730 128GB RAM No HDD
$389.99
Dell PowerEdge R730, 2 sinks, SystemBoard, 8 trays,H330,Idrac 8 exp, 2x750w Psu
$135.00
Dell Poweredge R730xd 2.5in 2x E5-2690 v3 2.6ghz 24-Cores 64gb H730 2x 750w
$189.99
Dell PowerEdge R720 Server - 2x8c CPU,256Gb RAM, 128Gb SSD/3x600Gb SAS, Proxmox
$340.00
DELL PowerEdge R730 16SFF Server 2x E5-2690v4 =28 Cores No RAM/ HDD H730 4xRJ45
$232.97
Dell R630 8 Port SFF Server 2x E5-2680v4 28C H730P 128GB 2x Trays RJ-45 ENT
$345.00
DELL PowerEdge R630 8SFF Server 2x E5-2690v4 2.6GHz =28 Cores 256GB H730 4xRJ45
$600.00
|
||
No Discussions have been posted on this vulnerability. |