English | Deutsch | Español | Português
 ID de Usuario:
 Contraseña:
Nuevo usuario
 Acerca de:   Dedicada | Avanzada | Estándar | Periódica | Sin Riesgo | Escritorio | Básica | Individual | Sello | FAQ
  Resumen de Precio/Funciones | Ordenar  | Nuevas Vulnerabilidades | Confidencialidad | Búsqueda de Vulnerabilidad
 Búsqueda de    
Vulnerabilidad   
    Buscar 76783 Descripciones CVE y
40246 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.58120
Categoría:Debian Local Security Checks
Título:Debian Security Advisory DSA 1265-1 (mozilla)
Resumen:Debian Security Advisory DSA 1265-1 (mozilla)
Descripción:The remote host is missing an update to mozilla
announced via advisory DSA 1265-1.

Several security related problems have been discovered in Mozilla and
derived products. The Common Vulnerabilities and Exposures project
identifies the following vulnerabilities:

CVE-2006-6497

Several vulnerabilities in the layout engine allow remote
attackers to cause a denial of service and possibly permit them to
execute arbitrary code. [MFSA 2006-68]

CVE-2006-6498

Several vulnerabilities in the JavaScript engine allow remote
attackers to cause a denial of service and possibly permit them to
execute arbitrary code. [MFSA 2006-68]

CVE-2006-6499

A bug in the js_dtoa function allows remote attackers to cause a
denial of service. [MFSA 2006-68]

CVE-2006-6501

shutdown discovered a vulnerability that allows remote attackers
to gain privileges and install malicious code via the watch
JavaScript function. [MFSA 2006-70]

CVE-2006-6502

Steven Michaud discovered a programming bug that allows remote
attackers to cause a denial of service. [MFSA 2006-71]

CVE-2006-6503

moz_bug_r_a4 reported that the src attribute of an IMG element
could be used to inject JavaScript code. [MFSA 2006-72]

CVE-2006-6505

Georgi Guninski discovered several heap-based buffer overflows
that allow remote attackers to execute arbitrary code. [MFSA 2006-74]

For the stable distribution (sarge) these problems have been fixed in
version 1.7.8-1sarge10.

For the unstable distribution (sid) these problems have been fixed in
version 1.0.7-1 of iceape.

We recommend that you upgrade your Mozilla and Iceape packages.

Solution:
http://www.securityspace.com/smysecure/catid.html?in=DSA%201265-1
Referencia Cruzada: BugTraq ID: 21668
Common Vulnerability Exposure (CVE) ID: CVE-2006-6497
Bugtraq: 20070102 rPSA-2006-0234-2 firefox thunderbird (Google Search)
http://www.securityfocus.com/archive/1/archive/1/455728/100/200/threaded
Bugtraq: 20061222 rPSA-2006-0234-1 firefox (Google Search)
http://www.securityfocus.com/archive/1/archive/1/455145/100/0/threaded
Debian Security Information: DSA-1253 (Google Search)
http://www.debian.org/security/2007/dsa-1253
Debian Security Information: DSA-1258 (Google Search)
http://www.debian.org/security/2007/dsa-1258
Debian Security Information: DSA-1265 (Google Search)
http://www.debian.org/security/2007/dsa-1265
http://fedoranews.org/cms/node/2297
http://fedoranews.org/cms/node/2338
http://security.gentoo.org/glsa/glsa-200701-02.xml
http://www.gentoo.org/security/en/glsa/glsa-200701-03.xml
http://www.gentoo.org/security/en/glsa/glsa-200701-04.xml
HPdes Security Advisory: HPSBUX02153
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742
HPdes Security Advisory: SSRT061181
http://www.mandriva.com/security/advisories?name=MDKSA-2007:010
http://www.mandriva.com/security/advisories?name=MDKSA-2007:011
RedHat Security Advisories: RHSA-2006:0758
http://rhn.redhat.com/errata/RHSA-2006-0758.html
RedHat Security Advisories: RHSA-2006:0759
http://rhn.redhat.com/errata/RHSA-2006-0759.html
RedHat Security Advisories: RHSA-2006:0760
http://rhn.redhat.com/errata/RHSA-2006-0760.html
SGI Security Advisory: 20061202-01-P
ftp://patches.sgi.com/support/free/security/advisories/20061202-01-P.asc
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102885-1
SuSE Security Announcement: SUSE-SA:2006:080 (Google Search)
http://www.novell.com/linux/security/advisories/2006_80_mozilla.html
SuSE Security Announcement: SUSE-SA:2007:006 (Google Search)
http://www.novell.com/linux/security/advisories/2007_06_mozilla.html
http://www.ubuntu.com/usn/usn-398-1
http://www.ubuntu.com/usn/usn-398-2
http://www.ubuntu.com/usn/usn-400-1
Cert/CC Advisory: TA06-354A
http://www.us-cert.gov/cas/techalerts/TA06-354A.html
CERT/CC vulnerability note: VU#606260
http://www.kb.cert.org/vuls/id/606260
CERT/CC vulnerability note: VU#427972
http://www.kb.cert.org/vuls/id/427972
http://www.securityfocus.com/bid/21668
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11691
http://www.vupen.com/english/advisories/2006/5068
http://www.vupen.com/english/advisories/2007/1463
http://www.vupen.com/english/advisories/2008/0083
http://securitytracker.com/id?1017398
http://securitytracker.com/id?1017405
http://securitytracker.com/id?1017406
http://secunia.com/advisories/23433
http://secunia.com/advisories/23439
http://secunia.com/advisories/23440
http://secunia.com/advisories/23282
http://secunia.com/advisories/23420
http://secunia.com/advisories/23422
http://secunia.com/advisories/23468
http://secunia.com/advisories/23514
http://secunia.com/advisories/23589
http://secunia.com/advisories/23601
http://secunia.com/advisories/23545
http://secunia.com/advisories/23591
http://secunia.com/advisories/23598
http://secunia.com/advisories/23614
http://secunia.com/advisories/23618
http://secunia.com/advisories/23692
http://secunia.com/advisories/23672
http://secunia.com/advisories/23988
http://secunia.com/advisories/24078
http://secunia.com/advisories/24390
http://secunia.com/advisories/24948
Common Vulnerability Exposure (CVE) ID: CVE-2006-6498
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102955-1
CERT/CC vulnerability note: VU#447772
http://www.kb.cert.org/vuls/id/447772
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10661
http://www.vupen.com/english/advisories/2007/2106
http://secunia.com/advisories/25556
Common Vulnerability Exposure (CVE) ID: CVE-2006-6499
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102846-1
http://www.vupen.com/english/advisories/2007/1124
Common Vulnerability Exposure (CVE) ID: CVE-2006-6501
CERT/CC vulnerability note: VU#263412
http://www.kb.cert.org/vuls/id/263412
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9746
http://securitytracker.com/id?1017403
http://securitytracker.com/id?1017404
http://securitytracker.com/id?1017407
Common Vulnerability Exposure (CVE) ID: CVE-2006-6502
CERT/CC vulnerability note: VU#428500
http://www.kb.cert.org/vuls/id/428500
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9626
http://securitytracker.com/id?1017411
http://securitytracker.com/id?1017412
http://securitytracker.com/id?1017413
Common Vulnerability Exposure (CVE) ID: CVE-2006-6503
CERT/CC vulnerability note: VU#405092
http://www.kb.cert.org/vuls/id/405092
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10895
http://securitytracker.com/id?1017414
http://securitytracker.com/id?1017415
http://securitytracker.com/id?1017416
Common Vulnerability Exposure (CVE) ID: CVE-2006-6505
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102800-1
CERT/CC vulnerability note: VU#887332
http://www.kb.cert.org/vuls/id/887332
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11565
http://www.vupen.com/english/advisories/2007/0573
http://securitytracker.com/id?1017419
http://securitytracker.com/id?1017420
http://secunia.com/advisories/24108
CopyrightCopyright (c) 2007 E-Soft Inc. http://www.securityspace.com

Esta es sólo una de 40246 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.

Registro de Nuevo Usuario
Email:
Usuario:
Contraseña:
Envíeme por email sus boletines mensuales, informándome los últimos servicios, mejoras y encuestas.
Por favor envíeme por email un anuncio de prueba de vulnerabilidades siempre que se agregue una nueva prueba.
   Privacidad
Ingreso de Usuario Registrado
 
Usuario:   
Contraseña:  

 ¿Olvidó su usuario o contraseña??
Email/ID de Usario:




Principal | Acerca de Nosotros | Contáctenos | Programas de Asociado | Developer APIs | Privacidad | Listas de Correo | Abuso
Auditorías de Seguridad | DNS Administrado | Monitoreo de Red | Analizador de Sitio | Informes de Investigación de Internet
Prueba de Web | Whois

© 1998-2014 E-Soft Inc. Todos los derechos reservados.