![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.58802 |
Kategorie: | FreeBSD Local Security Checks |
Titel: | FreeBSD Ports: firefox |
Zusammenfassung: | The remote host is missing an update to the system; as announced in the referenced advisory. |
Beschreibung: | Summary: The remote host is missing an update to the system as announced in the referenced advisory. Vulnerability Insight: The following packages are affected: firefox linux-firefox seamonkey linux-seamonkey linux-firefox-devel linux-seamonkey-devel firefox-ja linux-mozilla-devel linux-mozilla mozilla CVE-2006-4965 Apple QuickTime 7.1.3 Player and Plug-In allows remote attackers to execute arbitrary JavaScript code and possibly conduct other attacks via a QuickTime Media Link (QTL) file with an embed XML element and a qtnext parameter that identifies resources outside of the original domain. Solution: Update your system with the appropriate patches or software upgrades. CVSS Score: 5.0 CVSS Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2006-4965 http://lists.apple.com/archives/Security-announce/2007/Mar/msg00000.html BugTraq ID: 20138 http://www.securityfocus.com/bid/20138 Bugtraq: 20060920 Backdooring MP3 files (plus QuickTime issues and Cross-context Scripting) (Google Search) http://www.securityfocus.com/archive/1/446750/100/0/threaded Bugtraq: 20061207 New MySpace worm could be on its way (Google Search) http://www.securityfocus.com/archive/1/453756/100/0/threaded Bugtraq: 20070912 0DAY: QuickTime pwns Firefox (Google Search) http://www.securityfocus.com/archive/1/479179/100/0/threaded CERT/CC vulnerability note: VU#751808 http://www.kb.cert.org/vuls/id/751808 http://www.gnucitizen.org/blog/0day-quicktime-pwns-firefox http://www.gnucitizen.org/blog/backdooring-mp3-files/ http://www.gnucitizen.org/blog/myspace-quicktime-worm-follow-up http://www.securitytracker.com/id?1018687 http://secunia.com/advisories/22048 http://secunia.com/advisories/27414 http://securityreason.com/securityalert/1631 http://www.vupen.com/english/advisories/2007/3155 |
Copyright | Copyright (C) 2008 E-Soft Inc. |
Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |