|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200507-14] Mozilla Firefox: Multiple vulnerabilities Vulnerability Assessment Details
|
[GLSA-200507-14] Mozilla Firefox: Multiple vulnerabilities |
||
Mozilla Firefox: Multiple vulnerabilities Detailed Explanation for this Vulnerability Assessment The remote host is affected by the vulnerability described in GLSA-200507-14 (Mozilla Firefox: Multiple vulnerabilities) The following vulnerabilities were found and fixed in Mozilla Firefox: "moz_bug_r_a4" and "shutdown" discovered that Firefox was improperly cloning base objects (MFSA 2005-56). Michael Krax reported that Firefox was not correctly handling JavaScript URLs from external applications (MFSA 2005-53), and that the "Set as wallpaper" function in versions 1.0.3 and 1.0.4 could be abused to load JavaScript (MFSA 2005-47). Several researchers reported ways to trick Firefox into accepting events generated by web content (MFSA 2005-45). Kohei Yoshino discovered a new way to inject script from the sidebar panel using data: (MFSA 2005-49). "moz_bug_r_a4" reported that Firefox failed to validate XHTML DOM nodes properly (MFSA 2005-55), and that XBL scripts ran even when Javascript is disabled (MFSA 2005-46). "shutdown" discovered a possibly exploitable crash in InstallVersion.compareTo (MFSA 2005-50). Finally, Secunia discovered that a child frame can call top.focus() even if the framing page comes from a different origin and has overridden the focus() routine (MFSA 2005-52), and that the frame injection spoofing bug fixed in 1.0.2 was mistakenly reintroduced in 1.0.3 and 1.0.4 (MFSA 2005-51). Impact A remote attacker could craft malicious web pages that would leverage these issues to inject and execute arbitrary script code with elevated rights, steal cookies or other information from web pages, or spoof content. Workaround There are no known workarounds for all the issues at this time. References: http://www.mozilla.org/projects/security/known-vulnerabilities.html#Firefox Solution: All Mozilla Firefox users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-1.0.5" All Mozilla Firefox binary users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-bin-1.0.5" Network Security Threat Level: Medium Networks Security ID: Vulnerability Assessment Copyright: (C) 2005 Michel Arboi |
||
Cables, Connectors |
A-Tech 8GB DDR3 1600 PC3-12800 Laptop SODIMM 204-Pin Memory RAM PC3L DDR3L 1x 8G
$13.99
Samsung 16GB 2Rx4 PC4-2133P DDR4-17000 1.2V RDIMM ECC Registered Server Memory
$16.29
HyperX FURY DDR3 8GB 16GB 32GB 1600 MHz PC3-12800 Desktop RAM Memory DIMM 240pin
$12.90
A-Tech 8GB PC3-12800 Desktop DDR3 1600 MHz Non ECC 240-Pin DIMM Memory RAM 1x 8G
$13.99
A-Tech 16GB 2 x 8GB PC3-12800 Laptop SODIMM DDR3 1600 Memory RAM PC3L 16G DDR3L
$27.98
Corsair Vengeance LPX 32GB PC4-25600 (DDR4-3200) Memory NEVER USED LOOSE STICKS
$40.00
Kingston HyperX FURY DDR3 8GB 16GB 32G 1600 1866 1333 Desktop Memory RAM DIMM
$13.25
8GB PC3L-12800S 1600MHz SODIMM DDR3 RAM | Grade A
$12.00
A-Tech 256GB 4x 64GB 4Rx4 PC4-19200 ECC Load Reduced LRDIMM Server Memory RAM
$287.96
A-Tech 64GB 4x 16GB 2Rx4 PC4-17000R DDR4 2133MHz ECC REG RDIMM Server Memory RAM
$87.96
|
||
No Discussions have been posted on this vulnerability. |