Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.58802
Kategorie:FreeBSD Local Security Checks
Titel:FreeBSD Ports: firefox
Zusammenfassung:The remote host is missing an update to the system; as announced in the referenced advisory.
Beschreibung:Summary:
The remote host is missing an update to the system
as announced in the referenced advisory.

Vulnerability Insight:
The following packages are affected:

firefox
linux-firefox
seamonkey
linux-seamonkey
linux-firefox-devel
linux-seamonkey-devel
firefox-ja
linux-mozilla-devel
linux-mozilla
mozilla

CVE-2006-4965
Apple QuickTime 7.1.3 Player and Plug-In allows remote attackers to
execute arbitrary JavaScript code and possibly conduct other attacks
via a QuickTime Media Link (QTL) file with an embed XML element and a
qtnext parameter that identifies resources outside of the original
domain.

Solution:
Update your system with the appropriate patches or
software upgrades.

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:P/A:N

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2006-4965
http://lists.apple.com/archives/Security-announce/2007/Mar/msg00000.html
BugTraq ID: 20138
http://www.securityfocus.com/bid/20138
Bugtraq: 20060920 Backdooring MP3 files (plus QuickTime issues and Cross-context Scripting) (Google Search)
http://www.securityfocus.com/archive/1/446750/100/0/threaded
Bugtraq: 20061207 New MySpace worm could be on its way (Google Search)
http://www.securityfocus.com/archive/1/453756/100/0/threaded
Bugtraq: 20070912 0DAY: QuickTime pwns Firefox (Google Search)
http://www.securityfocus.com/archive/1/479179/100/0/threaded
CERT/CC vulnerability note: VU#751808
http://www.kb.cert.org/vuls/id/751808
http://www.gnucitizen.org/blog/0day-quicktime-pwns-firefox
http://www.gnucitizen.org/blog/backdooring-mp3-files/
http://www.gnucitizen.org/blog/myspace-quicktime-worm-follow-up
http://www.securitytracker.com/id?1018687
http://secunia.com/advisories/22048
http://secunia.com/advisories/27414
http://securityreason.com/securityalert/1631
http://www.vupen.com/english/advisories/2007/3155
CopyrightCopyright (C) 2008 E-Soft Inc.

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.