![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.14197 |
Category: | Windows |
Title: | Firefox Cache File |
Summary: | NOSUMMARY |
Description: | Description: The remote host is using Firefox, an alternative web browser. The remote version of this software contains a security issue which may allow an attacker to execute arbitrary code on this host. The security vulnerability is due to the fact that Firefox stores cached HTML documents with a known file name, and to the fact that it's possible to force Firefox to open cached files as HTML documents by appending a NULL byte after the file name. An attacker may combine these two flaws to execute arbitrary code on the remote host. Solution : Upgrade to Firefox 0.9.2 Risk factor : High |
Cross-Ref: |
BugTraq ID: 10709 Common Vulnerability Exposure (CVE) ID: CVE-2004-0760 BugTraq ID: 15495 http://www.securityfocus.com/bid/15495 http://marc.info/?l=bugtraq&m=109900315219363&w=2 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11090 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1227 http://www.redhat.com/support/errata/RHSA-2004-421.html SCO Security Bulletin: SCOSA-2005.49 ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.49/SCOSA-2005.49.txt SuSE Security Announcement: SUSE-SA:2004:036 (Google Search) http://www.novell.com/linux/security/advisories/2004_36_mozilla.html XForce ISS Database: mozilla-modify-mime-type(16691) https://exchange.xforce.ibmcloud.com/vulnerabilities/16691 |
Copyright | This script is Copyright (C) 2004 Tenable Network Security |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |