![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.1.10.2023.0171 |
Kategorie: | Mageia Linux Local Security Checks |
Titel: | Mageia: Security Advisory (MGASA-2023-0171) |
Zusammenfassung: | The remote host is missing an update for the 'firefox, firefox-l10n, nss, rootcerts' package(s) announced via the MGASA-2023-0171 advisory. |
Beschreibung: | Summary: The remote host is missing an update for the 'firefox, firefox-l10n, nss, rootcerts' package(s) announced via the MGASA-2023-0171 advisory. Vulnerability Insight: In multiple cases browser prompts could have been obscured by popups controlled by content. These could have led to potential user confusion and spoofing attacks (CVE-2023-32205). An out-of-bounds read could have led to a crash in the RLBox Expat driver (CVE-2023-32206). A missing delay in popup notifications could have made it possible for an attacker to trick a user into granting permissions (CVE-2023-32207). A type checking bug would have led to invalid wasm code being compiled, causing a content process crash (CVE-2023-32211). An attacker could have positioned a datalist element to obscure the address bar (CVE-2023-32212). When reading a file, an uninitialized value could have been used as read limit, causing memory corruption in FileReader::DoReadData() (CVE-2023-32213). Mozilla developers and community members Gabriele Svelto, Andrew Osmond, Emily McDonough, Sebastian Hengst, Andrew McCreight and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox ESR 102.10. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code (CVE-2023-32215). Affected Software/OS: 'firefox, firefox-l10n, nss, rootcerts' package(s) on Mageia 8. Solution: Please install the updated package(s). CVSS Score: 10.0 CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2023-32205 https://security.gentoo.org/glsa/202312-03 https://security.gentoo.org/glsa/202401-10 https://bugzilla.mozilla.org/show_bug.cgi?id=1753339 https://bugzilla.mozilla.org/show_bug.cgi?id=1753341 https://www.mozilla.org/security/advisories/mfsa2023-16/ https://www.mozilla.org/security/advisories/mfsa2023-17/ https://www.mozilla.org/security/advisories/mfsa2023-18/ Common Vulnerability Exposure (CVE) ID: CVE-2023-32206 https://bugzilla.mozilla.org/show_bug.cgi?id=1824892 Common Vulnerability Exposure (CVE) ID: CVE-2023-32207 https://bugzilla.mozilla.org/show_bug.cgi?id=1826116 Common Vulnerability Exposure (CVE) ID: CVE-2023-32211 https://bugzilla.mozilla.org/show_bug.cgi?id=1823379 Common Vulnerability Exposure (CVE) ID: CVE-2023-32212 https://bugzilla.mozilla.org/show_bug.cgi?id=1826622 Common Vulnerability Exposure (CVE) ID: CVE-2023-32213 https://bugzilla.mozilla.org/show_bug.cgi?id=1826666 Common Vulnerability Exposure (CVE) ID: CVE-2023-32215 https://bugzilla.mozilla.org/buglist.cgi?bug_id=1540883%2C1751943%2C1814856%2C1820210%2C1821480%2C1827019%2C1827024%2C1827144%2C1827359%2C1830186 |
Copyright | Copyright (C) 2023 Greenbone AG |
Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |