|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> SuSE Local Security Checks >> SUSE-SA:2005:028: Mozilla. Mozilla Firefox Vulnerability Assessment Details
|
SUSE-SA:2005:028: Mozilla. Mozilla Firefox |
||
Check for the version of the Mozilla. Mozilla Firefox package Detailed Explanation for this Vulnerability Assessment The remote host is missing the patch for the advisory SUSE-SA:2005:028 (Mozilla. Mozilla Firefox). Several problems have been fixed with the security update releases of the Mozilla Firefox 1.0.3 web browser and the Mozilla Suite 1.7.7. This security update contains those security fixes. The Firefox packages have been directly upgraded to the version 1.0.3, for the Mozilla Suite packages the fixes up to version 1.7.7 have been back ported. Updates are currently provided for: Mozilla Firefox: SUSE Linux 9.0 up to 9.3, Novell Linux Desktop 9 Mozilla Suite: SUSE Linux 9.2 and 9.3 Fixes of the Mozilla Suite for older products (SUSE Linux 8.2 - 9.1, SUSE Linux Enterprise Server 8 and 9, SUSE Linux Desktop 1.0) are being worked on. Following security issues have been fixed: - MFSA 2005-33,CVE-2005-0989: A flaw in the Javascript regular expression handling of Mozilla based browser can lead to disclosure of browser memory, potentially exposing private data from web pages viewed or passwords or similar data sent to other web pages. This flaw could also crash the browser. - MFSA 2005-34,CVE-2005-0752: With manual Plugin install it was possible for the Plugin to execute javascript code with the installing users rights. - MFSA 2005-35,CVE-2005-1153: Showing blocked javascript: pop up uses wrong privilege context, this could be used for a privilege escalation (installing malicious tests). - MFSA 2005-36,CVE-2005-1154: Cross-site scripting through global scope pollution, this could lead to a possible hacker being able to run code in foreign websites context, potentially sniffing information or performing actions in that context. - MFSA 2005-37,CVE-2005-1155,'firelinking': Code execution through javascript: favicons, which could be used for a privilege escalation. - MFSA 2005-38,CVE-2005-1157,CVE-2005-1156,'firesearching': Search Plugin cross-site scripting. - MFSA 2005-39,CVE-2005-1158: Arbitrary code execution from Firefox sidebar panel II. - MFSA 2005-40,CVE-2005-1159: Missing Install object instance checks. - MFSA 2005-41,CVE-2005-1160: Privilege escalation via DOM property overrides. Solution : http://www.suse.de/security/advisories/2005_28_mozilla_firefox.html Network Security Threat Level: High Networks Security ID: Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security |
||
Cables, Connectors |
VINTAGE DEC Digital RK11-D DISK CONTROL M7255 PDP 11 (B1)
$129.99
Vintage DEC/CLEARPOINT INC. -QRAM-2 SAB-1 1MB Q-BUS MEMORY MSV11-QA (B2)
$129.99
VINTAGE DEC DIGITAL H866 MEM BUS TERM 100 OHM
$229.00
DEC DIGITAL Equipment Corp VT220-D2 Vintage CRT Terminal
$215.00
Digital Equipment Corporation DEC-2000 Vintage Keyboard - NOS NEW in Plastic
$129.95
DEC PDP 8/M PDP 8M / 4 avail / Vintage Digital Equipment Corp /Also DEC PDP 12
$5775.00
Vintage DEC Digital RX 180 AB Dual 5.25" Disk Drive
$149.00
Rare Vintage DEC DIGITAL DFO3 modem with manual Powers up but UNTESTED
$69.95
Vintage DEC/The Redac mini cabinet front panel Digital Equipment Corp. 19"
$269.99
VINTAGE DEC DIGITAL RA81 READ/WRITE 5415253 Circuit board (B18)
$119.99
|
||
No Discussions have been posted on this vulnerability. |