![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.1.10.2023.0171 |
Categoría: | Mageia Linux Local Security Checks |
Título: | Mageia: Security Advisory (MGASA-2023-0171) |
Resumen: | The remote host is missing an update for the 'firefox, firefox-l10n, nss, rootcerts' package(s) announced via the MGASA-2023-0171 advisory. |
Descripción: | Summary: The remote host is missing an update for the 'firefox, firefox-l10n, nss, rootcerts' package(s) announced via the MGASA-2023-0171 advisory. Vulnerability Insight: In multiple cases browser prompts could have been obscured by popups controlled by content. These could have led to potential user confusion and spoofing attacks (CVE-2023-32205). An out-of-bounds read could have led to a crash in the RLBox Expat driver (CVE-2023-32206). A missing delay in popup notifications could have made it possible for an attacker to trick a user into granting permissions (CVE-2023-32207). A type checking bug would have led to invalid wasm code being compiled, causing a content process crash (CVE-2023-32211). An attacker could have positioned a datalist element to obscure the address bar (CVE-2023-32212). When reading a file, an uninitialized value could have been used as read limit, causing memory corruption in FileReader::DoReadData() (CVE-2023-32213). Mozilla developers and community members Gabriele Svelto, Andrew Osmond, Emily McDonough, Sebastian Hengst, Andrew McCreight and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox ESR 102.10. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code (CVE-2023-32215). Affected Software/OS: 'firefox, firefox-l10n, nss, rootcerts' package(s) on Mageia 8. Solution: Please install the updated package(s). CVSS Score: 10.0 CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2023-32205 https://security.gentoo.org/glsa/202312-03 https://security.gentoo.org/glsa/202401-10 https://bugzilla.mozilla.org/show_bug.cgi?id=1753339 https://bugzilla.mozilla.org/show_bug.cgi?id=1753341 https://www.mozilla.org/security/advisories/mfsa2023-16/ https://www.mozilla.org/security/advisories/mfsa2023-17/ https://www.mozilla.org/security/advisories/mfsa2023-18/ Common Vulnerability Exposure (CVE) ID: CVE-2023-32206 https://bugzilla.mozilla.org/show_bug.cgi?id=1824892 Common Vulnerability Exposure (CVE) ID: CVE-2023-32207 https://bugzilla.mozilla.org/show_bug.cgi?id=1826116 Common Vulnerability Exposure (CVE) ID: CVE-2023-32211 https://bugzilla.mozilla.org/show_bug.cgi?id=1823379 Common Vulnerability Exposure (CVE) ID: CVE-2023-32212 https://bugzilla.mozilla.org/show_bug.cgi?id=1826622 Common Vulnerability Exposure (CVE) ID: CVE-2023-32213 https://bugzilla.mozilla.org/show_bug.cgi?id=1826666 Common Vulnerability Exposure (CVE) ID: CVE-2023-32215 https://bugzilla.mozilla.org/buglist.cgi?bug_id=1540883%2C1751943%2C1814856%2C1820210%2C1821480%2C1827019%2C1827024%2C1827144%2C1827359%2C1830186 |
Copyright | Copyright (C) 2023 Greenbone AG |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |