Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.1.10.2015.0028
Categoría:Mageia Linux Local Security Checks
Título:Mageia: Security Advisory (MGASA-2015-0028)
Resumen:The remote host is missing an update for the 'iceape' package(s) announced via the MGASA-2015-0028 advisory.
Descripción:Summary:
The remote host is missing an update for the 'iceape' package(s) announced via the MGASA-2015-0028 advisory.

Vulnerability Insight:
Updated iceape packages fix security issues:

Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox
before 35.0, Firefox ESR 31.x before 31.4, Thunderbird before 31.4, and
SeaMonkey before 2.32 allow remote attackers to cause a denial of service
(memory corruption and application crash) or possibly execute arbitrary code via
unknown vectors. (CVE-2014-8634)

Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox
before 35.0 and SeaMonkey before 2.32 allow remote attackers to cause a denial
of service (memory corruption and application crash) or possibly execute
arbitrary code via unknown vectors. (CVE-2014-8635)

Mozilla Firefox before 35.0 and SeaMonkey before 2.32 do not properly initialize
memory for BMP images, which allows remote attackers to obtain sensitive
information from process memory via a crafted web page that triggers the
rendering of malformed BMP data within a CANVAS element. (CVE-2014-8637)

The navigator.sendBeacon implementation in Mozilla Firefox before 35.0, Firefox
ESR 31.x before 31.4, Thunderbird before 31.4, and SeaMonkey before 2.32 omits
the CORS Origin header, which allows remote attackers to bypass intended CORS
access-control checks and conduct cross-site request forgery (CSRF) attacks via
a crafted web site. (CVE-2014-8638)

Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, Thunderbird before
31.4, and SeaMonkey before 2.32 do not properly interpret Set-Cookie headers
within responses that have a 407 (aka Proxy Authentication Required) status
code, which allows remote HTTP proxy servers to conduct session fixation attacks
by providing a cookie name that corresponds to the session cookie of the origin
server.(CVE-2014-8639)

The mozilla::dom::AudioParamTimeline::AudioNodeInputValue function in the Web
Audio API implementation in Mozilla Firefox before 35.0 and SeaMonkey before
2.32 does not properly restrict timeline operations, which allows remote
attackers to cause a denial of service (uninitialized-memory read and
application crash) via crafted API calls. (CVE-2014-8640)

Use-after-free vulnerability in the WebRTC implementation in Mozilla Firefox
before 35.0, Firefox ESR 31.x before 31.4, and SeaMonkey before 2.32 allows
remote attackers to execute arbitrary code via crafted track data.
(CVE-2014-8641)

Mozilla Firefox before 35.0 and SeaMonkey before 2.32 do not consider the
id-pkix-ocsp-nocheck extension in deciding whether to trust an OCSP responder,
which makes it easier for remote attackers to obtain sensitive information by
sniffing the network during a session in which there was an incorrect decision
to accept a compromised and revoked certificate. (CVE-2014-8642)

The XrayWrapper implementation in Mozilla Firefox before 35.0 and SeaMonkey
before 2.32 does not properly interact with a DOM object that has a named
getter, which might allow remote attackers to execute arbitrary ... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'iceape' package(s) on Mageia 4.

Solution:
Please install the updated package(s).

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2014-8634
BugTraq ID: 72049
http://www.securityfocus.com/bid/72049
Debian Security Information: DSA-3127 (Google Search)
http://www.debian.org/security/2015/dsa-3127
Debian Security Information: DSA-3132 (Google Search)
http://www.debian.org/security/2015/dsa-3132
https://security.gentoo.org/glsa/201504-01
RedHat Security Advisories: RHSA-2015:0046
http://rhn.redhat.com/errata/RHSA-2015-0046.html
RedHat Security Advisories: RHSA-2015:0047
http://rhn.redhat.com/errata/RHSA-2015-0047.html
http://www.securitytracker.com/id/1031533
http://www.securitytracker.com/id/1031534
http://secunia.com/advisories/62237
http://secunia.com/advisories/62242
http://secunia.com/advisories/62250
http://secunia.com/advisories/62253
http://secunia.com/advisories/62259
http://secunia.com/advisories/62273
http://secunia.com/advisories/62274
http://secunia.com/advisories/62283
http://secunia.com/advisories/62293
http://secunia.com/advisories/62304
http://secunia.com/advisories/62313
http://secunia.com/advisories/62315
http://secunia.com/advisories/62316
http://secunia.com/advisories/62418
http://secunia.com/advisories/62446
http://secunia.com/advisories/62657
http://secunia.com/advisories/62790
SuSE Security Announcement: SUSE-SU-2015:0171 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00032.html
SuSE Security Announcement: SUSE-SU-2015:0173 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00033.html
SuSE Security Announcement: SUSE-SU-2015:0180 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00036.html
SuSE Security Announcement: openSUSE-SU-2015:0077 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00014.html
SuSE Security Announcement: openSUSE-SU-2015:0133 (Google Search)
http://lists.opensuse.org/opensuse-updates/2015-01/msg00071.html
SuSE Security Announcement: openSUSE-SU-2015:0192 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00002.html
SuSE Security Announcement: openSUSE-SU-2015:1266 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
http://www.ubuntu.com/usn/USN-2460-1
XForce ISS Database: firefox-cve20148634-code-exec(99955)
https://exchange.xforce.ibmcloud.com/vulnerabilities/99955
Common Vulnerability Exposure (CVE) ID: CVE-2014-8635
BugTraq ID: 72050
http://www.securityfocus.com/bid/72050
Common Vulnerability Exposure (CVE) ID: CVE-2014-8636
BugTraq ID: 72041
http://www.securityfocus.com/bid/72041
http://packetstormsecurity.com/files/130972/Firefox-Proxy-Prototype-Privileged-Javascript-Injection.html
https://community.rapid7.com/community/metasploit/blog/2015/03/23/r7-2015-04-disclosure-mozilla-firefox-proxy-prototype-rce-cve-2014-8636
XForce ISS Database: firefox-cve20148636-sec-bypass(99964)
https://exchange.xforce.ibmcloud.com/vulnerabilities/99964
Common Vulnerability Exposure (CVE) ID: CVE-2014-8637
BugTraq ID: 72048
http://www.securityfocus.com/bid/72048
XForce ISS Database: firefox-cve20148637-info-disc(99957)
https://exchange.xforce.ibmcloud.com/vulnerabilities/99957
Common Vulnerability Exposure (CVE) ID: CVE-2014-8638
BugTraq ID: 72047
http://www.securityfocus.com/bid/72047
XForce ISS Database: firefox-cve20148638-csrf(99958)
https://exchange.xforce.ibmcloud.com/vulnerabilities/99958
Common Vulnerability Exposure (CVE) ID: CVE-2014-8639
BugTraq ID: 72046
http://www.securityfocus.com/bid/72046
XForce ISS Database: firefox-cve20148639-session-hijacking(99959)
https://exchange.xforce.ibmcloud.com/vulnerabilities/99959
Common Vulnerability Exposure (CVE) ID: CVE-2014-8640
BugTraq ID: 72045
http://www.securityfocus.com/bid/72045
XForce ISS Database: firefox-cve20148640-info-disc(99960)
https://exchange.xforce.ibmcloud.com/vulnerabilities/99960
Common Vulnerability Exposure (CVE) ID: CVE-2014-8641
BugTraq ID: 72044
http://www.securityfocus.com/bid/72044
XForce ISS Database: firefox-cve20148641-dos(99961)
https://exchange.xforce.ibmcloud.com/vulnerabilities/99961
Common Vulnerability Exposure (CVE) ID: CVE-2014-8642
BugTraq ID: 72042
http://www.securityfocus.com/bid/72042
XForce ISS Database: firefox-cve20148642-sec-bypass(99963)
https://exchange.xforce.ibmcloud.com/vulnerabilities/99963
CopyrightCopyright (C) 2022 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.