![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.1.10.2017.0081 |
Category: | Mageia Linux Local Security Checks |
Title: | Mageia: Security Advisory (MGASA-2017-0081) |
Summary: | The remote host is missing an update for the 'firefox, firefox-l10n, nss, rootcerts, sqlite3' package(s) announced via the MGASA-2017-0081 advisory. |
Description: | Summary: The remote host is missing an update for the 'firefox, firefox-l10n, nss, rootcerts, sqlite3' package(s) announced via the MGASA-2017-0081 advisory. Vulnerability Insight: Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox (CVE-2017-5398, CVE-2017-5400, CVE-2017-5401, CVE-2017-5402, CVE-2017-5404, CVE-2017-5407, CVE-2017-5408, CVE-2017-5410, CVE-2017-5405). Also, the nss package has been updated to version 3.28.3, in which the Next Protocol Negotiation (NPN) extension has been replaced by the Application-Layer Protocol Negotiation (ALPN) extension and which now supports the Finite Field Diffie-Hellman Ephemeral Parameters (FFDHE) negotiation. Due to the nss update, the sqlite3 package has been updated to version 3.10.2. Additionally, an error in the nss package has been corrected, where it was failing to build against the system rootcerts package and instead was using a bundled version, which could have caused the rootcerts that NSS used to be outdated at times (mga#20053). The nss package has now been built against the latest rootcerts, which have also been updated. Affected Software/OS: 'firefox, firefox-l10n, nss, rootcerts, sqlite3' package(s) on Mageia 5. Solution: Please install the updated package(s). CVSS Score: 10.0 CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2017-5398 BugTraq ID: 96651 http://www.securityfocus.com/bid/96651 Debian Security Information: DSA-3805 (Google Search) https://www.debian.org/security/2017/dsa-3805 Debian Security Information: DSA-3832 (Google Search) https://www.debian.org/security/2017/dsa-3832 https://security.gentoo.org/glsa/201705-06 https://security.gentoo.org/glsa/201705-07 RedHat Security Advisories: RHSA-2017:0459 http://rhn.redhat.com/errata/RHSA-2017-0459.html RedHat Security Advisories: RHSA-2017:0461 http://rhn.redhat.com/errata/RHSA-2017-0461.html RedHat Security Advisories: RHSA-2017:0498 http://rhn.redhat.com/errata/RHSA-2017-0498.html http://www.securitytracker.com/id/1037966 Common Vulnerability Exposure (CVE) ID: CVE-2017-5400 BugTraq ID: 96654 http://www.securityfocus.com/bid/96654 Common Vulnerability Exposure (CVE) ID: CVE-2017-5401 BugTraq ID: 96677 http://www.securityfocus.com/bid/96677 Common Vulnerability Exposure (CVE) ID: CVE-2017-5402 BugTraq ID: 96664 http://www.securityfocus.com/bid/96664 Common Vulnerability Exposure (CVE) ID: CVE-2017-5404 https://www.exploit-db.com/exploits/41660/ Common Vulnerability Exposure (CVE) ID: CVE-2017-5405 BugTraq ID: 96693 http://www.securityfocus.com/bid/96693 Common Vulnerability Exposure (CVE) ID: CVE-2017-5407 Common Vulnerability Exposure (CVE) ID: CVE-2017-5408 Common Vulnerability Exposure (CVE) ID: CVE-2017-5410 |
Copyright | Copyright (C) 2022 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |