|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200703-05] Mozilla Suite: Multiple vulnerabilities Vulnerability Assessment Details
|
[GLSA-200703-05] Mozilla Suite: Multiple vulnerabilities |
||
Mozilla Suite: Multiple vulnerabilities Detailed Explanation for this Vulnerability Assessment The remote host is affected by the vulnerability described in GLSA-200703-05 (Mozilla Suite: Multiple vulnerabilities) Several vulnerabilities ranging from code execution with elevated rights to information leaks affect the Mozilla Suite. Impact A remote attacker could entice a user to browse to a specially crafted website or open a specially crafted mail that could trigger some of the vulnerabilities, potentially permiting execution of arbitrary code, denials of service, information leaks, or cross-site scripting attacks leading to the robbery of cookies of authentication credentials. Workaround Most of the issues, but not all of them, can be prevented by disabling the HTML rendering in the mail client and JavaScript on every application. References: http://www.mozilla.org/projects/security/known-vulnerabilities.html#Mozilla Solution: The Mozilla Suite is no longer supported and has been masked after some necessary changes on all the other ebuilds which used to depend on it. Mozilla Suite users should unmerge www-client/mozilla or www-client/mozilla-bin, and switch to a supported product, like SeaMonkey, Thunderbird or Firefox. # emerge --unmerge "www-client/mozilla" # emerge --unmerge "www-client/mozilla-bin" Network Security Threat Level: Medium Networks Security ID: Vulnerability Assessment Copyright: (C) 2007 Michel Arboi |
||
Cables, Connectors |
Juniper Networks EX3300-48P 48-Port PoE+ 4x SFP+ Network Switch w/ Power Cord
$43.95
JUNIPER EX4550-32F-AFO 32-PORT ETHERNET SWITCH 2x POWER SUPPLY - TESTED
$299.99
Juniper Networks EX4300-48T 48 Port Gigabit 4 QSFP 40G 2xPSU AFO Network Switch
$89.00
Juniper QFX5100-48S-3AFO Switch 48 x 10Gb SFP+, 6x QSFP 40GE, Dual AC Power
$499.00
Juniper EX4600-40F-AFI 24 SFP+/SFP Ports 4 QSFP+ Ports Dual AC Switch
$999.00
JUNIPER EX3400-48P 48x 1GB PoE+ RJ-45 4x 10GB SFP+ 2x 40GB QSFP+, DUAL AC POWER
$210.00
Juniper EX3300-48P, 48 Port PoE+ Gigabit Network Switch w/ Power cord
$54.99
Juniper EX3400-48P 48-Ports PoE+ 4x SFP+ and 2x QSFP+ Managed Switch Tested
$205.00
Juniper Networks EX3300 EX3300-48P 48-Port Gigabit PoE+ Switch
$40.23
New Factory Sealed Juniper EX2300-48P Networks 48-Port Managed Ethernet Sealed
$499.00
|
||
No Discussions have been posted on this vulnerability. |