Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.122350
Category:Oracle Linux Local Security Checks
Title:Oracle: Security Advisory (ELSA-2010-0501)
Summary:The remote host is missing an update for the 'devhelp, esc, firefox, gnome-python2-extras, totem, xulrunner, yelp' package(s) announced via the ELSA-2010-0501 advisory.
Description:Summary:
The remote host is missing an update for the 'devhelp, esc, firefox, gnome-python2-extras, totem, xulrunner, yelp' package(s) announced via the ELSA-2010-0501 advisory.

Vulnerability Insight:
devhelp:

[0.12-21]
- Rebuild againstt xulrunner

esc:

[1.1.0-12]
- Rebuild for xulrunner update

firefox:

[3.6.4-8.0.1.el5]
- Add firefox-oracle-default-prefs.js and firefox-oracle-default-bookmarks.html
and remove the corresponding Red Hat ones

[3.6.4-8]
- Fixing NVR

[3.6.4-7]
- Update to 3.6.4 build7
- Disable checking for updates since they can't be applied

[3.6.4-6]
- Update to 3.6.4 build6

[3.6.4-5]
- Update to 3.6.4 build5

[3.6.4-4]
- Update to 3.6.4 build4

[3.6.4-3]
- Update to 3.6.4 build 3

[3.6.4-2]
- Update to 3.6.4 build 2

[3.6.4-1]
- Update to 3.6.4

[3.6.3-3]
- Fixed language packs (#581392)

[3.6.3-2]
- Fixed multilib conflict

[3.6.3-1]
- Rebase to 3.6.3

gnome-python2-extras:

[2.14.2-7]
- rebuild against xulrunner

totem:

[2.16.7-7]
- rebuild againstt new xulrunner

xulrunner:

[1.9.2.4-9.0.1]
- Added xulrunner-oracle-default-prefs.js and removed the corresponding
RedHat one.

[1.9.2.4-9]
- Update to 1.9.2.4 build 7

[1.9.2.4-8]
- Update to 1.9.2.4 build 6

[1.9.2.4-7]
- Update to 1.9.2.4 build 5

[1.9.2.4-6]
- Update to 1.9.2.4 build 4
- Fixed mozbz#546270 patch

[1.9.2.4-5]
- Update to 1.9.2.4 build 3

[1.9.2.4-4]
- Update to 1.9.2.4 build 2
- Enabled oopp

[1.9.2.4-3]
- Disabled libnotify

[1.9.2.4-2]
- Disabled oopp, causes TEXTREL

[1.9.2.4-1]
- Update to 1.9.2.4

[1.9.2.3-3]
- fixed js-config.h multilib conflict
- fixed file list

[1.9.2.3-2]
- Added fix for rhbz#555760 - Firefox Javascript anomily,
landscape print orientation reverts to portrait (mozbz#546270)

[1.9.2.3-1]
- Update to 1.9.2.3

[1.9.2.2-1]
- Rebase to 1.9.2.2

yelp:

[2.16.0-26]
- rebuild againstt xulrunner

[2.16.0-25]
- rebuild againstt xulrunner
- added xulrunner fix
- added -fno-strict-aliasing to build flags

Affected Software/OS:
'devhelp, esc, firefox, gnome-python2-extras, totem, xulrunner, yelp' package(s) on Oracle Linux 5.

Solution:
Please install the updated package(s).

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2008-5913
BugTraq ID: 33276
http://www.securityfocus.com/bid/33276
http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043369.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043405.html
http://www.mandriva.com/security/advisories?name=MDVSA-2010:125
http://arstechnica.com/news.ars/post/20090113-new-method-of-phishmongering-could-fool-experienced-users.html
http://www.darkreading.com/security/attacks/showArticle.jhtml?articleID=212900161
http://www.infoworld.com/article/09/01/13/Browser_bug_could_allow_phishing_without_email_1.html
http://www.trusteer.com/files/In-session-phishing-advisory-2.pdf
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11139
http://www.redhat.com/support/errata/RHSA-2010-0500.html
http://www.redhat.com/support/errata/RHSA-2010-0501.html
http://secunia.com/advisories/40326
http://secunia.com/advisories/40401
http://secunia.com/advisories/40481
SuSE Security Announcement: SUSE-SA:2010:030 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-07/msg00005.html
http://ubuntu.com/usn/usn-930-1
http://www.ubuntu.com/usn/usn-930-2
http://www.vupen.com/english/advisories/2010/1551
http://www.vupen.com/english/advisories/2010/1557
http://www.vupen.com/english/advisories/2010/1592
http://www.vupen.com/english/advisories/2010/1640
http://www.vupen.com/english/advisories/2010/1773
Common Vulnerability Exposure (CVE) ID: CVE-2009-5017
http://sirdarckcat.blogspot.com/2009/10/couple-of-unicode-issues-on-php-and.html
Common Vulnerability Exposure (CVE) ID: CVE-2010-0182
BugTraq ID: 39479
http://www.securityfocus.com/bid/39479
http://www.mandriva.com/security/advisories?name=MDVSA-2010:070
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7618
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9375
http://secunia.com/advisories/39397
SuSE Security Announcement: SUSE-SR:2010:013 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html
http://ubuntu.com/usn/usn-921-1
http://www.vupen.com/english/advisories/2010/0748
http://www.vupen.com/english/advisories/2010/0849
XForce ISS Database: firefox-xmldocumentload-weak-security(57396)
https://exchange.xforce.ibmcloud.com/vulnerabilities/57396
Common Vulnerability Exposure (CVE) ID: CVE-2010-1121
http://dvlabs.tippingpoint.com/blog/2010/02/15/pwn2own-2010
http://news.cnet.com/8301-27080_3-20001126-245.html
http://twitter.com/thezdi/statuses/11005277222
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10924
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6844
http://www.securitytracker.com/id?1023817
http://secunia.com/advisories/40323
Common Vulnerability Exposure (CVE) ID: CVE-2010-1125
Bugtraq: 20100313 ...because you can't get enough of clickjacking (Google Search)
http://www.securityfocus.com/archive/1/510070/100/0/threaded
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10386
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13962
http://www.securitytracker.com/id?1024138
Common Vulnerability Exposure (CVE) ID: CVE-2010-1196
BugTraq ID: 41050
http://www.securityfocus.com/bid/41050
BugTraq ID: 41087
http://www.securityfocus.com/bid/41087
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11424
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14017
http://www.securitytracker.com/id?1024139
XForce ISS Database: firefox-nsgenericdomdatanode-bo(59665)
https://exchange.xforce.ibmcloud.com/vulnerabilities/59665
Common Vulnerability Exposure (CVE) ID: CVE-2010-1197
BugTraq ID: 41103
http://www.securityfocus.com/bid/41103
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10168
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14186
http://www.redhat.com/support/errata/RHSA-2010-0499.html
http://www.vupen.com/english/advisories/2010/1556
XForce ISS Database: firefox-contentdisposition-security-bypass(59667)
https://exchange.xforce.ibmcloud.com/vulnerabilities/59667
Common Vulnerability Exposure (CVE) ID: CVE-2010-1198
BugTraq ID: 41102
http://www.securityfocus.com/bid/41102
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10990
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14176
XForce ISS Database: firefox-plugin-instances-code-exec(59664)
https://exchange.xforce.ibmcloud.com/vulnerabilities/59664
Common Vulnerability Exposure (CVE) ID: CVE-2010-1199
BugTraq ID: 41082
http://www.securityfocus.com/bid/41082
Bugtraq: 20100623 ZDI-10-113: Mozilla Firefox XSLT Sort Remote Code Execution Vulnerability (Google Search)
http://www.securityfocus.com/archive/1/511972/100/0/threaded
http://www.exploit-db.com/exploits/14949
http://www.zerodayinitiative.com/advisories/ZDI-10-113
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10885
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13287
XForce ISS Database: firefox-xslt-node-code-execution(59666)
https://exchange.xforce.ibmcloud.com/vulnerabilities/59666
Common Vulnerability Exposure (CVE) ID: CVE-2010-1200
BugTraq ID: 41090
http://www.securityfocus.com/bid/41090
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10816
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14326
XForce ISS Database: firefox-seamonkey-browser-code-exec(59659)
https://exchange.xforce.ibmcloud.com/vulnerabilities/59659
Common Vulnerability Exposure (CVE) ID: CVE-2010-1202
BugTraq ID: 41094
http://www.securityfocus.com/bid/41094
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10889
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14308
XForce ISS Database: firefox-javascript-ce(59661)
https://exchange.xforce.ibmcloud.com/vulnerabilities/59661
Common Vulnerability Exposure (CVE) ID: CVE-2010-1203
BugTraq ID: 41099
http://www.securityfocus.com/bid/41099
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10401
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8317
XForce ISS Database: mozilla-firefox-javascript-ce(59662)
https://exchange.xforce.ibmcloud.com/vulnerabilities/59662
CopyrightCopyright (C) 2015 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.