|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200503-30] Mozilla Suite: Multiple vulnerabilities Vulnerability Assessment Details
|
[GLSA-200503-30] Mozilla Suite: Multiple vulnerabilities |
||
Mozilla Suite: Multiple vulnerabilities Detailed Explanation for this Vulnerability Assessment The remote host is affected by the vulnerability described in GLSA-200503-30 (Mozilla Suite: Multiple vulnerabilities) Impact The GIF heap overflow could be triggered by a malicious GIF image that would end up executing arbitrary code with the rights of the user running Mozilla. The other overflow issues, while not thought to be exploitable, would have the same impact By setting up malicious websites and convincing users to follow untrusted links or obey very specific drag-and-drop or download instructions, attackers may leverage the various spoofing issues to fake other websites to get access to confidential information, push users to download malicious files or make them interact with their browser preferences The temporary directory issue permits local attackers to overwrite arbitrary files with the rights of another local user Workaround There is no known workaround at this time. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1156 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0230 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0231 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0232 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0233 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0255 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0399 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0401 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0527 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0578 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0584 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0585 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0588 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0590 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0591 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0592 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0593 http://www.mozilla.org/projects/security/known-vulnerabilities.html Solution: All Mozilla Suite users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=www-client/mozilla-1.7.6" All Mozilla Suite binary users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=www-client/mozilla-bin-1.7.6" Network Security Threat Level: Medium Networks Security ID: Vulnerability Assessment Copyright: (C) 2005 Michel Arboi |
||
Cables, Connectors |
Vintage Compaq 141649-004 2 Button PS/2 Gray Mouse M-S34 - FAST SHIPPING - NEW
$8.99
$4.99
Drakware ADB2USB - vintage Apple ADB to USB keyboard adapter
$29.95
Vintage 93073U6 MAXTOR 30GB 3.5" IDE Hard Drive
$24.95
Vintage Microsoft Wheel Mouse Optical Mouse Black (Factory Sealed Retail Box)
$49.99
RARE NEW RETAIL BOX VINTAGE AST BTC 5140M WINDOWS PS2 KEYBOARD FCC E5XK8M104M10U
$29.95
NEW Manufacture OLD STYLE Oval 3 Prong Power Cord HP style 125V 7A 875W Vintage
$39.95
Vintage Macintosh Canvas Carry-On Bag Rainbow Apple (2 of 4)
$29.99
Vintage Apple Newton MessagePad 120 (H0131)
$150.00
Vintage Varian Data Machines Data 620/i Front Control Panel Console
$2996.00
|
||
No Discussions have been posted on this vulnerability. |