Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.50658
Kategorie:Mandrake Local Security Checks
Titel:Mandrake Security Advisory MDKSA-2004:021 (mozilla)
Zusammenfassung:NOSUMMARY
Beschreibung:Description:

The remote host is missing an update to mozilla
announced via advisory MDKSA-2004:021.

A number of vulnerabilities were discovered in Mozilla 1.4:

A malicious website could gain access to a user's authentication
credentials to a proxy server.

Script.prototype.freeze/thaw could allow an attacker to run
arbitrary code on your computer.

A vulnerability was also discovered in the NSS security suite which
ships with Mozilla. The S/MIME implementation would allow remote
attackers to cause a Denial of Service and possibly execute arbitrary
code via an S/MIME email message containing certain unexpected ASN.1
constructs, which was demonstrated using the NISCC test suite. NSS
version 3.9 corrects these problems and has been included in this
package (which shipped with NSS 3.8).

Finally, Corsaire discovered that a number of HTTP user agents
contained a flaw in how they handle cookies. This flaw could
allow an attacker to avoid the path restrictions specified by a
cookie's originator. According to their advisory:

The cookie specifications detail a path argument that can be used to
restrict the areas of a host that will be exposed to a cookie. By
using standard traversal techniques this functionality can be
subverted, potentially exposing the cookie to scrutiny and use in
further attacks.

As well, a bug with Mozilla and Finnish keyboards has been corrected.

The updated packages are patched to correct these vulnerabilities.

Affected versions: 9.2

Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

http://www.securityspace.com/smysecure/catid.html?in=MDKSA-2004:021
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0594
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0564
http://www.kb.cert.org/vuls/id/428230
http://bugzilla.mozilla.org/show_bug.cgi?id=220122
http://bugzilla.mozilla.org/show_bug.cgi?id=221526
http://bugzilla.mozilla.org/show_bug.cgi?id=213012
http://www.uniras.gov.uk/vuls/2003/006489/smime.htm

Risk factor : High

CVSS Score:
7.5

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2003-0594
http://lists.grok.org.uk/pipermail/full-disclosure/2004-March/018475.html
http://www.mandriva.com/security/advisories?name=MDKSA-2004:021
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A873
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A917
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9826
http://www.redhat.com/support/errata/RHSA-2004-112.html
http://archives.neohapsis.com/archives/vulnwatch/2004-q1/0056.html
Common Vulnerability Exposure (CVE) ID: CVE-2003-0564
BugTraq ID: 8981
http://www.securityfocus.com/bid/8981
CERT/CC vulnerability note: VU#428230
http://www.kb.cert.org/vuls/id/428230
http://marc.info/?l=bugtraq&m=109900315219363&w=2
HPdes Security Advisory: SSRT4722
http://marc.info/?l=bugtraq&m=108448379429944&w=2
http://www.uniras.gov.uk/vuls/2003/006489/smime.htm
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11462
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A872
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A914
http://www.redhat.com/support/errata/RHSA-2004-110.html
SGI Security Advisory: 20040402-01-U
ftp://patches.sgi.com/support/free/security/advisories/20040402-01-U.asc
XForce ISS Database: smime-asn1-bo(13603)
https://exchange.xforce.ibmcloud.com/vulnerabilities/13603
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.