![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.1.10.2017.0361 |
Categoría: | Mageia Linux Local Security Checks |
Título: | Mageia: Security Advisory (MGASA-2017-0361) |
Resumen: | The remote host is missing an update for the 'firefox, firefox-l10n, nspr, nss' package(s) announced via the MGASA-2017-0361 advisory. |
Descripción: | Summary: The remote host is missing an update for the 'firefox, firefox-l10n, nspr, nss' package(s) announced via the MGASA-2017-0361 advisory. Vulnerability Insight: A use-after-free flaw was found in the TLS 1.2 implementation in the NSS library when client authentication was used. A malicious client could use this flaw to cause an application compiled against NSS to crash or, potentially, execute arbitrary code with the permission of the user running the application (CVE-2017-7805). Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox (CVE-2017-7810, CVE-2017-7793, CVE-2017-7818, CVE-2017-7819, CVE-2017-7824, CVE-2017-7814, CVE-2017-7823). Affected Software/OS: 'firefox, firefox-l10n, nspr, nss' package(s) on Mageia 5, Mageia 6. Solution: Please install the updated package(s). CVSS Score: 10.0 CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2017-7793 BugTraq ID: 101055 http://www.securityfocus.com/bid/101055 Debian Security Information: DSA-3987 (Google Search) https://www.debian.org/security/2017/dsa-3987 Debian Security Information: DSA-4014 (Google Search) https://www.debian.org/security/2017/dsa-4014 https://security.gentoo.org/glsa/201803-14 https://lists.debian.org/debian-lts-announce/2017/11/msg00000.html RedHat Security Advisories: RHSA-2017:2831 https://access.redhat.com/errata/RHSA-2017:2831 RedHat Security Advisories: RHSA-2017:2885 https://access.redhat.com/errata/RHSA-2017:2885 http://www.securitytracker.com/id/1039465 Common Vulnerability Exposure (CVE) ID: CVE-2017-7805 BugTraq ID: 101059 http://www.securityfocus.com/bid/101059 Debian Security Information: DSA-3998 (Google Search) https://www.debian.org/security/2017/dsa-3998 RedHat Security Advisories: RHSA-2017:2832 https://access.redhat.com/errata/RHSA-2017:2832 Common Vulnerability Exposure (CVE) ID: CVE-2017-7810 BugTraq ID: 101054 http://www.securityfocus.com/bid/101054 https://usn.ubuntu.com/3688-1/ Common Vulnerability Exposure (CVE) ID: CVE-2017-7814 Common Vulnerability Exposure (CVE) ID: CVE-2017-7818 Common Vulnerability Exposure (CVE) ID: CVE-2017-7819 Common Vulnerability Exposure (CVE) ID: CVE-2017-7823 Common Vulnerability Exposure (CVE) ID: CVE-2017-7824 BugTraq ID: 101053 http://www.securityfocus.com/bid/101053 |
Copyright | Copyright (C) 2022 Greenbone AG |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |