English | Deutsch | Español | Português
 Benutzerkennung:
 Passwort:
Registrieren
 About:   Dediziert  | Erweitert  | Standard  | Wiederkehrend  | Risikolos  | Desktop  | Basis  | Einmalig  | Sicherheits Siegel  | FAQ
  Preis/Funktionszusammenfassung  | Bestellen  | Neue Anfälligkeiten  | Vertraulichkeit  | Anfälligkeiten Suche
 Anfälligkeitssuche        Suche in 72151 CVE Beschreibungen
und 38907 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.801130
Kategorie:Buffer overflow
Titel:Mozilla Firefox Multiple Vulnerabilities Nov-09 (Win)
Zusammenfassung:Check for the version of Firefox
Beschreibung:
Overview: This host is installed with Mozilla Firefox browser and is prone to
multiple vulnerabilities.

Vulnerability Insight:
Muliple flaw are due to following errors,
- An array indexing error exists when allocating space for floating point
numbers. This can be exploited to trigger a memory corruption when a
specially crafted floating point number is processed.
- An error in the form history functionality can be exploited to disclose
history entries via a specially crafted web page that triggers the automatic
filling of form fields.
- When parsing regular expressions used in Proxy Auto-configuration. This can
be exploited to cause a crash or potentially execute arbitrary code via
specially crafted configured PAC files.
- When processing GIF, color maps can be exploited to cause a heap based
buffer overflow and potentially execute arbitrary code via a specially
crafted GIF file.
- An error in the 'XPCVariant::VariantDataToJS()' XPCOM utility, which can be
exploited to execute arbitrary JavaScript code with chrome privileges.
- An error in the implementation of the JavaScript 'document.getSelection()'
can be exploited to read text selected on a web page in a different domain.
- An error when downloading files can be exploited to display different file
names in the download dialog title bar and download dialog body. This can
be exploited to obfuscate file names via a right-to-left override character
and potentially trick a user into running an executable file.
- Multiple unspecified errors in the browser engines can be exploited to cause
crash or potentially execute arbitrary code.

Impact:
Successful exploitation will let attacker to disclose sensitive information,
bypass certain security restrictions, manipulate certain data, or compromise
a user's system.

Impact Level: Application/System

Affected Software/OS:
Firefox version 3.0 before 3.0.15 and 3.5 before 3.5.4 on Windows.

Fix: Upgrade to Firefox version 3.0.15 or 3.5.4
http://www.mozilla.com/en-US/firefox/all.html

References:
http://secunia.com/secunia_research/2009-35/
http://www.mozilla.org/security/announce/2009/mfsa2009-52.html
http://www.mozilla.org/security/announce/2009/mfsa2009-55.html
http://www.mozilla.org/security/announce/2009/mfsa2009-56.html
http://www.mozilla.org/security/announce/2009/mfsa2009-57.html
http://www.mozilla.org/security/announce/2009/mfsa2009-59.html
http://www.mozilla.org/security/announce/2009/mfsa2009-61.html
http://www.mozilla.org/security/announce/2009/mfsa2009-62.html
Querverweis: BugTraq ID: 36851
BugTraq ID: 36853
BugTraq ID: 36856
BugTraq ID: 36855
BugTraq ID: 36857
BugTraq ID: 36858
BugTraq ID: 36867
BugTraq ID: 36871
Common Vulnerability Exposure (CVE) ID: CVE-2009-3370
http://www.mandriva.com/security/advisories?name=MDVSA-2009:294
http://sunsolve.sun.com/search/document.do?assetkey=1-26-272909-1
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10836
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6455
http://www.vupen.com/english/advisories/2009/3334
Common Vulnerability Exposure (CVE) ID: CVE-2009-3373
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10684
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6548
Common Vulnerability Exposure (CVE) ID: CVE-2009-3372
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10977
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6347
Common Vulnerability Exposure (CVE) ID: CVE-2009-0689
http://securityreason.com/achievement_securityalert/63
http://securityreason.com/achievement_securityalert/72
http://securityreason.com/achievement_securityalert/73
http://securityreason.com/achievement_securityalert/71
http://securityreason.com/achievement_securityalert/77
http://securityreason.com/achievement_securityalert/78
http://securityreason.com/achievement_securityalert/69
http://securityreason.com/achievement_securityalert/76
http://securityreason.com/achievement_securityalert/75
http://securityreason.com/achievement_securityalert/81
Bugtraq: 20091120 K-Meleon 1.5.3 Remote Array Overrun (Arbitrary code execution) (Google Search)
http://www.securityfocus.com/archive/1/archive/1/507977/100/0/threaded
Bugtraq: 20091120 SeaMonkey 1.1.8 Remote Array Overrun (Arbitrary code execution) (Google Search)
http://www.securityfocus.com/archive/1/archive/1/507979/100/0/threaded
Bugtraq: 20091210 Camino 1.6.10 Remote Array Overrun (Arbitrary code execution) (Google Search)
http://www.securityfocus.com/archive/1/archive/1/508423/100/0/threaded
Bugtraq: 20091210 Flock 2.5.2 Remote Array Overrun (Arbitrary code execution) (Google Search)
http://www.securityfocus.com/archive/1/archive/1/508417/100/0/threaded
http://secunia.com/secunia_research/2009-35/
http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html
http://lists.apple.com/archives/security-announce/2010/Jun/msg00003.html
http://www.mandriva.com/security/advisories?name=MDVSA-2009:330
http://www.redhat.com/support/errata/RHSA-2009-1601.html
http://www.redhat.com/support/errata/RHSA-2010-0153.html
http://www.redhat.com/support/errata/RHSA-2010-0154.html
RedHat Security Advisories: RHSA-2014:0311
http://rhn.redhat.com/errata/RHSA-2014-0311.html
RedHat Security Advisories: RHSA-2014:0312
http://rhn.redhat.com/errata/RHSA-2014-0312.html
SuSE Security Announcement: SUSE-SR:2009:018 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00004.html
SuSE Security Announcement: SUSE-SR:2010:013 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html
http://www.ubuntu.com/usn/USN-915-1
BugTraq ID: 35510
http://www.securityfocus.com/bid/35510
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6528
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9541
http://securitytracker.com/id?1022478
http://secunia.com/advisories/37431
http://secunia.com/advisories/37682
http://secunia.com/advisories/37683
http://secunia.com/advisories/38066
http://secunia.com/advisories/39001
http://secunia.com/advisories/38977
http://www.vupen.com/english/advisories/2009/3297
http://www.vupen.com/english/advisories/2009/3299
http://www.vupen.com/english/advisories/2010/0094
http://www.vupen.com/english/advisories/2010/0648
http://www.vupen.com/english/advisories/2010/0650
Common Vulnerability Exposure (CVE) ID: CVE-2009-3374
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6565
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9789
Common Vulnerability Exposure (CVE) ID: CVE-2009-3375
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10440
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:5935
Common Vulnerability Exposure (CVE) ID: CVE-2009-3376
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11218
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6541
Common Vulnerability Exposure (CVE) ID: CVE-2009-3380
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6580
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9463
CopyrightCopyright (C) 2009 Greenbone Networks GmbH

Dies ist nur einer von 38907 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.

Registrierung eines neuen Benutzers
Email:
Benutzerkennung:
Passwort:
Bitte schicken Sie mir den monatlichen Newsletter, der mich über die neuesten Services, Verbesserungen und Umfragen informiert.
Bitte schicken Sie mir eine Anfälligkeitstest Benachrichtigung, wenn ein neuer Test hinzugefügt wird.
   Datenschutz
Anmeldung für registrierte Benutzer
 
Benutzerkennung:   
Passwort:  

 Benutzerkennung oder Passwort vergessen?
Email/Benutzerkennung:




Startseite | Über uns | Kontakt | Partnerprogramme | Datenschutz | Mailinglisten | Missbrauch
Sicherheits Überprüfungen | Verwaltete DNS | Netzwerk Überwachung | Webseiten Analysator | Internet Recherche Berichte
Web Sonde | Whois

© 1998-2014 E-Soft Inc. Alle Rechte vorbehalten.