Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.1.10.2020.0461
Kategorie:Mageia Linux Local Security Checks
Titel:Mageia: Security Advisory (MGASA-2020-0461)
Zusammenfassung:The remote host is missing an update for the 'firefox, firefox-l10n, nss' package(s) announced via the MGASA-2020-0461 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'firefox, firefox-l10n, nss' package(s) announced via the MGASA-2020-0461 advisory.

Vulnerability Insight:
When a BigInt was right-shifted the backing store was not properly cleared,
allowing uninitialized memory to be read (CVE-2020-16042).

Certain blit values provided by the user were not properly constrained leading
to a heap buffer overflow in WebGL on some video drivers (CVE-2020-26971).

Certain input to the CSS Sanitizer confused it, resulting in incorrect
components being removed. This could have been used as a sanitizer bypass
(CVE-2020-26973).

When flex-basis was used on a table wrapper, a StyleGenericFlexBasis object
could have been incorrectly cast to the wrong type. This resulted in a heap
user-after-free, memory corruption, and a potentially exploitable crash
(CVE-2020-26974).

Using techniques that built on the slipstream research, a malicious webpage
could have exposed both an internal network's hosts as well as services running
on the user's local machine (CVE-2020-26978).

When an extension with the proxy permission registered to receive ,
the proxy.onRequest callback was not triggered for view-source URLs. While web
content cannot navigate to such URLs, a user opening View Source could have
inadvertently leaked their IP address (CVE-2020-35111).

Mozilla developer Christian Holler reported memory safety bugs present in
Firefox ESR 78.5. Some of these bugs showed evidence of memory corruption and
we presume that with enough effort some of these could have been exploited to
run arbitrary code (CVE-2020-35113).

Affected Software/OS:
'firefox, firefox-l10n, nss' package(s) on Mageia 7.

Solution:
Please install the updated package(s).

CVSS Score:
6.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2020-16042
https://chromereleases.googleblog.com/2020/12/stable-channel-update-for-desktop.html
https://crbug.com/1151890
Common Vulnerability Exposure (CVE) ID: CVE-2020-26971
https://bugzilla.mozilla.org/show_bug.cgi?id=1663466
https://www.mozilla.org/security/advisories/mfsa2020-54/
https://www.mozilla.org/security/advisories/mfsa2020-55/
https://www.mozilla.org/security/advisories/mfsa2020-56/
Common Vulnerability Exposure (CVE) ID: CVE-2020-26973
https://bugzilla.mozilla.org/show_bug.cgi?id=1680084
Common Vulnerability Exposure (CVE) ID: CVE-2020-26974
https://bugzilla.mozilla.org/show_bug.cgi?id=1681022
Common Vulnerability Exposure (CVE) ID: CVE-2020-26978
https://bugzilla.mozilla.org/show_bug.cgi?id=1677047
Common Vulnerability Exposure (CVE) ID: CVE-2020-35111
https://bugzilla.mozilla.org/show_bug.cgi?id=1657916
Common Vulnerability Exposure (CVE) ID: CVE-2020-35113
https://bugzilla.mozilla.org/buglist.cgi?bug_id=1664831%2C1673589
CopyrightCopyright (C) 2022 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.