Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.55205
Category:Debian Local Security Checks
Title:Debian: Security Advisory (DSA-779-2)
Summary:The remote host is missing an update for the Debian 'mozilla-firefox' package(s) announced via the DSA-779-2 advisory.
Description:Summary:
The remote host is missing an update for the Debian 'mozilla-firefox' package(s) announced via the DSA-779-2 advisory.

Vulnerability Insight:
We experienced that the update for Mozilla Firefox from DSA 779-1 unfortunately was a regression in several cases. Since the usual praxis of backporting apparently does not work, this update is basically version 1.0.6 with the version number rolled back, and hence still named 1.0.4-*. For completeness below is the original advisory text:

Several problems have been discovered in Mozilla Firefox, a lightweight web browser based on Mozilla. The Common Vulnerabilities and Exposures project identifies the following problems:

CAN-2005-2260

The browser user interface does not properly distinguish between user-generated events and untrusted synthetic events, which makes it easier for remote attackers to perform dangerous actions that normally could only be performed manually by the user.

CAN-2005-2261

XML scripts ran even when Javascript disabled.

CAN-2005-2262

The user can be tricked to executing arbitrary JavaScript code by using a JavaScript URL as wallpaper.

CAN-2005-2263

It is possible for a remote attacker to execute a callback function in the context of another domain (i.e. frame).

CAN-2005-2264

By opening a malicious link in the sidebar it is possible for remote attackers to steal sensitive information.

CAN-2005-2265

Missing input sanitising of InstallVersion.compareTo() can cause the application to crash.

CAN-2005-2266

Remote attackers could steal sensitive information such as cookies and passwords from web sites by accessing data in alien frames.

CAN-2005-2267

By using standalone applications such as Flash and QuickTime to open a javascript: URL, it is possible for a remote attacker to steal sensitive information and possibly execute arbitrary code.

CAN-2005-2268

It is possible for a Javascript dialog box to spoof a dialog box from a trusted site and facilitates phishing attacks.

CAN-2005-2269

Remote attackers could modify certain tag properties of DOM nodes that could lead to the execution of arbitrary script or code.

CAN-2005-2270

The Mozilla browser family does not properly clone base objects, which allows remote attackers to execute arbitrary code.

The old stable distribution (woody) is not affected by these problems.

For the stable distribution (sarge) these problems have been fixed in version 1.0.4-2sarge3.

For the unstable distribution (sid) these problems have been fixed in version 1.0.6-1.

We recommend that you upgrade your Mozilla Firefox packages.

Affected Software/OS:
'mozilla-firefox' package(s) on Debian 3.1.

Solution:
Please install the updated package(s).

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2005-2260
14242
http://www.securityfocus.com/bid/14242
16043
http://secunia.com/advisories/16043
16044
http://secunia.com/advisories/16044
16059
http://secunia.com/advisories/16059
ADV-2005-1075
http://www.vupen.com/english/advisories/2005/1075
DSA-810
http://www.debian.org/security/2005/dsa-810
FLSA:160202
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=160202
P-252
http://www.ciac.org/ciac/bulletins/p-252.shtml
RHSA-2005:586
http://www.redhat.com/support/errata/RHSA-2005-586.html
RHSA-2005:587
http://www.redhat.com/support/errata/RHSA-2005-587.html
SUSE-SA:2005:045
http://www.novell.com/linux/security/advisories/2005_45_mozilla.html
SUSE-SR:2005:018
http://www.novell.com/linux/security/advisories/2005_18_sr.html
http://bugzilla.mozilla.org/show_bug.cgi?id=289940
http://www.mozilla.org/security/announce/mfsa2005-45.html
http://www.networksecurity.fi/advisories/netscape-multiple-issues.html
oval:org.mitre.oval:def:100013
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100013
oval:org.mitre.oval:def:10132
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10132
oval:org.mitre.oval:def:1226
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1226
oval:org.mitre.oval:def:742
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A742
Common Vulnerability Exposure (CVE) ID: CVE-2005-2261
19823
http://secunia.com/advisories/19823
RHSA-2005:601
http://www.redhat.com/support/errata/RHSA-2005-601.html
SUSE-SA:2006:022
http://www.novell.com/linux/security/advisories/2006_04_25.html
http://www.mozilla.org/security/announce/mfsa2005-46.html
https://bugzilla.mozilla.org/show_bug.cgi?id=292589
https://bugzilla.mozilla.org/show_bug.cgi?id=292591
oval:org.mitre.oval:def:100012
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100012
oval:org.mitre.oval:def:10947
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10947
oval:org.mitre.oval:def:1348
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1348
oval:org.mitre.oval:def:808
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A808
Common Vulnerability Exposure (CVE) ID: CVE-2005-2262
http://www.mikx.de/firewalling/
http://www.mozilla.org/security/announce/mfsa2005-47.html
http://www.securiteam.com/securitynews/5ZP0E0UGAK.html
oval:org.mitre.oval:def:100011
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100011
oval:org.mitre.oval:def:11097
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11097
Common Vulnerability Exposure (CVE) ID: CVE-2005-2263
http://www.mozilla.org/security/announce/mfsa2005-48.html
https://bugzilla.mozilla.org/show_bug.cgi?id=293331
oval:org.mitre.oval:def:100010
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100010
oval:org.mitre.oval:def:100016
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100016
oval:org.mitre.oval:def:11629
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11629
oval:org.mitre.oval:def:1281
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1281
oval:org.mitre.oval:def:1311
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1311
Common Vulnerability Exposure (CVE) ID: CVE-2005-2264
http://www.mozilla.org/security/announce/mfsa2005-49.html
https://bugzilla.mozilla.org/show_bug.cgi?id=294074
oval:org.mitre.oval:def:100009
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100009
oval:org.mitre.oval:def:9887
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9887
Common Vulnerability Exposure (CVE) ID: CVE-2005-2265
http://www.mozilla.org/security/announce/mfsa2005-50.html
https://bugzilla.mozilla.org/show_bug.cgi?id=295854
oval:org.mitre.oval:def:100008
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100008
oval:org.mitre.oval:def:10397
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10397
oval:org.mitre.oval:def:417
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A417
oval:org.mitre.oval:def:781
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A781
Common Vulnerability Exposure (CVE) ID: CVE-2005-2266
15549
http://secunia.com/advisories/15549
15551
http://secunia.com/advisories/15551
15553
http://secunia.com/advisories/15553
http://www.mozilla.org/security/announce/mfsa2005-52.html
mozilla-frame-topfocus-xss(21332)
https://exchange.xforce.ibmcloud.com/vulnerabilities/21332
oval:org.mitre.oval:def:100107
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100107
oval:org.mitre.oval:def:10712
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10712
oval:org.mitre.oval:def:1415
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1415
oval:org.mitre.oval:def:773
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A773
Common Vulnerability Exposure (CVE) ID: CVE-2005-2267
1014469
http://securitytracker.com/id?1014469
http://www.mozilla.org/security/announce/mfsa2005-53.html
https://bugzilla.mozilla.org/show_bug.cgi?id=298255
oval:org.mitre.oval:def:100006
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100006
oval:org.mitre.oval:def:1073
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1073
oval:org.mitre.oval:def:11334
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11334
oval:org.mitre.oval:def:1172
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1172
Common Vulnerability Exposure (CVE) ID: CVE-2005-2268
15489
http://secunia.com/advisories/15489
http://secunia.com/multiple_browsers_dialog_origin_vulnerability_test/
http://www.mozilla.org/security/announce/mfsa2005-54.html
oval:org.mitre.oval:def:100005
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100005
oval:org.mitre.oval:def:10517
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10517
oval:org.mitre.oval:def:1268
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1268
oval:org.mitre.oval:def:1313
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1313
Common Vulnerability Exposure (CVE) ID: CVE-2005-2269
http://www.mozilla.org/security/announce/mfsa2005-55.html
https://bugzilla.mozilla.org/show_bug.cgi?id=298892
oval:org.mitre.oval:def:100004
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100004
oval:org.mitre.oval:def:1258
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1258
oval:org.mitre.oval:def:729
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A729
oval:org.mitre.oval:def:9777
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9777
Common Vulnerability Exposure (CVE) ID: CVE-2005-2270
1014470
http://securitytracker.com/id?1014470
VU#652366
http://www.kb.cert.org/vuls/id/652366
http://www.mozilla.org/security/announce/mfsa2005-56.html
https://bugzilla.mozilla.org/show_bug.cgi?id=294795
https://bugzilla.mozilla.org/show_bug.cgi?id=294799
https://bugzilla.mozilla.org/show_bug.cgi?id=295011
https://bugzilla.mozilla.org/show_bug.cgi?id=296397
oval:org.mitre.oval:def:100003
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100003
oval:org.mitre.oval:def:11751
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11751
oval:org.mitre.oval:def:550
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A550
oval:org.mitre.oval:def:817
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A817
CopyrightCopyright (C) 2008 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.