English | Deutsch | Español | Português
 Benutzerkennung:
 Passwort:
Registrieren
 About:   Dediziert  | Erweitert  | Standard  | Wiederkehrend  | Risikolos  | Desktop  | Basis  | Einmalig  | Sicherheits Siegel  | FAQ
  Preis/Funktionszusammenfassung  | Bestellen  | Neue Anfälligkeiten  | Vertraulichkeit  | Anfälligkeiten Suche
 Anfälligkeitssuche        Suche in 75516 CVE Beschreibungen
und 39786 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.56236
Kategorie:Red Hat Local Security Checks
Titel:RedHat Security Advisory RHSA-2006:0200
Zusammenfassung:Redhat Security Advisory RHSA-2006:0200
Beschreibung:
The remote host is missing updates announced in
advisory RHSA-2006:0200.

Mozilla Firefox is an open source Web browser.

Igor Bukanov discovered a bug in the way Firefox's Javascript interpreter
derefernces objects. If a user visits a malicious web page, Firefox could
crash or execute arbitrary code as the user running Firefox. The Common
Vulnerabilities and Exposures project assigned the name CVE-2006-0292 to
this issue.

moz_bug_r_a4 discovered a bug in Firefox's XULDocument.persist() function.
A malicious web page could inject arbitrary RDF data into a user's
localstore.rdf file, which can cause Firefox to execute arbitrary
javascript when a user runs Firefox. (CVE-2006-0296)

A denial of service bug was found in the way Firefox saves history
information. If a user visits a web page with a very long title, it is
possible Firefox will crash or take a very long time the next time it is
run. (CVE-2005-4134)

This update also fixes a bug when using XSLT to transform documents.
Passing DOM Nodes as parameters to functions expecting an xsl:param could
cause Firefox to throw an exception.

Users of Firefox are advised to upgrade to this updated package, which
contains backported patches to correct these issues.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2006-0200.html

Risk factor : High
Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2005-4134
http://marc.theaimsgroup.com/?l=full-disclosure&m=113405896025702&w=2
http://marc.theaimsgroup.com/?l=full-disclosure&m=113404911919629&w=2
http://www.mozilla.org/security/history-title.html
http://www.networksecurity.fi/advisories/netscape-history.html
Debian Security Information: DSA-1044 (Google Search)
http://www.debian.org/security/2006/dsa-1044
Debian Security Information: DSA-1046 (Google Search)
http://www.debian.org/security/2006/dsa-1046
Debian Security Information: DSA-1051 (Google Search)
http://www.debian.org/security/2006/dsa-1051
http://www.redhat.com/archives/fedora-announce-list/2006-February/msg00005.html
http://www.redhat.com/archives/fedora-announce-list/2006-February/msg00006.html
http://www.securityfocus.com/archive/1/archive/1/425978/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/425975/100/0/threaded
http://www.gentoo.org/security/en/glsa/glsa-200604-12.xml
http://www.gentoo.org/security/en/glsa/glsa-200604-18.xml
HPdes Security Advisory: HPSBUX02122
http://www.securityfocus.com/archive/1/archive/1/438730/100/0/threaded
HPdes Security Advisory: SSRT061158
http://www.mandriva.com/security/advisories?name=MDKSA-2006:036
http://www.mandriva.com/security/advisories?name=MDKSA-2006:037
http://www.redhat.com/support/errata/RHSA-2006-0199.html
http://www.redhat.com/support/errata/RHSA-2006-0200.html
SCO Security Bulletin: SCOSA-2006.26
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.26/SCOSA-2006.26.txt
SGI Security Advisory: 20060201-01-U
ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102550-1
http://sunsolve.sun.com/search/document.do?assetkey=1-26-228526-1
http://www.ubuntulinux.org/support/documentation/usn/usn-275-1
http://www.ubuntulinux.org/support/documentation/usn/usn-271-1
BugTraq ID: 15773
http://www.securityfocus.com/bid/15773
BugTraq ID: 16476
http://www.securityfocus.com/bid/16476
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11382
http://www.vupen.com/english/advisories/2005/2805
http://www.vupen.com/english/advisories/2006/0413
http://www.vupen.com/english/advisories/2006/3391
http://www.osvdb.org/21533
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:1619
http://securitytracker.com/id?1015328
http://secunia.com/advisories/17934
http://secunia.com/advisories/17944
http://secunia.com/advisories/17946
http://secunia.com/advisories/18700
http://secunia.com/advisories/18704
http://secunia.com/advisories/18708
http://secunia.com/advisories/18709
http://secunia.com/advisories/18705
http://secunia.com/advisories/18706
http://secunia.com/advisories/19230
http://secunia.com/advisories/19759
http://secunia.com/advisories/19852
http://secunia.com/advisories/19862
http://secunia.com/advisories/19863
http://secunia.com/advisories/19902
http://secunia.com/advisories/19941
http://secunia.com/advisories/19746
http://secunia.com/advisories/21033
http://secunia.com/advisories/21622
Common Vulnerability Exposure (CVE) ID: CVE-2006-0292
http://www.gentoo.org/security/en/glsa/glsa-200605-09.xml
HPdes Security Advisory: HPSBUX02156
http://www.securityfocus.com/archive/1/archive/1/446657/100/200/threaded
HPdes Security Advisory: SSRT061236
http://www.mandriva.com/security/advisories?name=MDKSA-2006:078
http://www.redhat.com/support/errata/RHSA-2006-0330.html
SuSE Security Announcement: SUSE-SA:2006:022 (Google Search)
http://www.novell.com/linux/security/advisories/2006_04_25.html
SuSE Security Announcement: SUSE-SA:2006:004 (Google Search)
http://www.ubuntulinux.org/support/documentation/usn/usn-276-1
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10016
http://www.vupen.com/english/advisories/2006/3749
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:670
http://securitytracker.com/id?1015570
http://secunia.com/advisories/18703
http://secunia.com/advisories/19821
http://secunia.com/advisories/19823
http://secunia.com/advisories/19950
http://secunia.com/advisories/19780
http://secunia.com/advisories/20051
http://secunia.com/advisories/22065
XForce ISS Database: mozilla-javascript-memory-corruption(24430)
http://xforce.iss.net/xforce/xfdb/24430
Common Vulnerability Exposure (CVE) ID: CVE-2006-0296
Cert/CC Advisory: TA06-038A
http://www.us-cert.gov/cas/techalerts/TA06-038A.html
CERT/CC vulnerability note: VU#592425
http://www.kb.cert.org/vuls/id/592425
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11803
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:1493
XForce ISS Database: mozilla-xuldocument-command-execution(24434)
http://xforce.iss.net/xforce/xfdb/24434
CopyrightCopyright (c) 2006 E-Soft Inc. http://www.securityspace.com

Dies ist nur einer von 39786 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.

Registrierung eines neuen Benutzers
Email:
Benutzerkennung:
Passwort:
Bitte schicken Sie mir den monatlichen Newsletter, der mich über die neuesten Services, Verbesserungen und Umfragen informiert.
Bitte schicken Sie mir eine Anfälligkeitstest Benachrichtigung, wenn ein neuer Test hinzugefügt wird.
   Datenschutz
Anmeldung für registrierte Benutzer
 
Benutzerkennung:   
Passwort:  

 Benutzerkennung oder Passwort vergessen?
Email/Benutzerkennung:




Startseite | Über uns | Kontakt | Partnerprogramme | Datenschutz | Mailinglisten | Missbrauch
Sicherheits Überprüfungen | Verwaltete DNS | Netzwerk Überwachung | Webseiten Analysator | Internet Recherche Berichte
Web Sonde | Whois

© 1998-2014 E-Soft Inc. Alle Rechte vorbehalten.