![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.50658 |
Kategorie: | Mandrake Local Security Checks |
Titel: | Mandrake Security Advisory MDKSA-2004:021 (mozilla) |
Zusammenfassung: | NOSUMMARY |
Beschreibung: | Description: The remote host is missing an update to mozilla announced via advisory MDKSA-2004:021. A number of vulnerabilities were discovered in Mozilla 1.4: A malicious website could gain access to a user's authentication credentials to a proxy server. Script.prototype.freeze/thaw could allow an attacker to run arbitrary code on your computer. A vulnerability was also discovered in the NSS security suite which ships with Mozilla. The S/MIME implementation would allow remote attackers to cause a Denial of Service and possibly execute arbitrary code via an S/MIME email message containing certain unexpected ASN.1 constructs, which was demonstrated using the NISCC test suite. NSS version 3.9 corrects these problems and has been included in this package (which shipped with NSS 3.8). Finally, Corsaire discovered that a number of HTTP user agents contained a flaw in how they handle cookies. This flaw could allow an attacker to avoid the path restrictions specified by a cookie's originator. According to their advisory: The cookie specifications detail a path argument that can be used to restrict the areas of a host that will be exposed to a cookie. By using standard traversal techniques this functionality can be subverted, potentially exposing the cookie to scrutiny and use in further attacks. As well, a bug with Mozilla and Finnish keyboards has been corrected. The updated packages are patched to correct these vulnerabilities. Affected versions: 9.2 Solution: To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. http://www.securityspace.com/smysecure/catid.html?in=MDKSA-2004:021 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0594 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0564 http://www.kb.cert.org/vuls/id/428230 http://bugzilla.mozilla.org/show_bug.cgi?id=220122 http://bugzilla.mozilla.org/show_bug.cgi?id=221526 http://bugzilla.mozilla.org/show_bug.cgi?id=213012 http://www.uniras.gov.uk/vuls/2003/006489/smime.htm Risk factor : High CVSS Score: 7.5 |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2003-0594 http://lists.grok.org.uk/pipermail/full-disclosure/2004-March/018475.html http://www.mandriva.com/security/advisories?name=MDKSA-2004:021 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A873 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A917 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9826 http://www.redhat.com/support/errata/RHSA-2004-112.html http://archives.neohapsis.com/archives/vulnwatch/2004-q1/0056.html Common Vulnerability Exposure (CVE) ID: CVE-2003-0564 BugTraq ID: 8981 http://www.securityfocus.com/bid/8981 CERT/CC vulnerability note: VU#428230 http://www.kb.cert.org/vuls/id/428230 http://marc.info/?l=bugtraq&m=109900315219363&w=2 HPdes Security Advisory: SSRT4722 http://marc.info/?l=bugtraq&m=108448379429944&w=2 http://www.uniras.gov.uk/vuls/2003/006489/smime.htm https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11462 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A872 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A914 http://www.redhat.com/support/errata/RHSA-2004-110.html SGI Security Advisory: 20040402-01-U ftp://patches.sgi.com/support/free/security/advisories/20040402-01-U.asc XForce ISS Database: smime-asn1-bo(13603) https://exchange.xforce.ibmcloud.com/vulnerabilities/13603 |
Copyright | Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com |
Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |