English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 75803 CVE descriptions
and 40037 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.57046
Category:Ubuntu Local Security Checks
Title:Ubuntu USN-296-1 (firefox)
Summary:Ubuntu USN-296-1 (firefox)
Description:
The remote host is missing an update to firefox
announced via advisory USN-296-1.

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

For details, please visit the referenced advisories.

Solution:
The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
firefox 1.5.dfsg+1.5.0.4-0ubuntu6.06

After a standard system upgrade you need to restart Firefox to effect
the necessary changes.

http://www.securityspace.com/smysecure/catid.html?in=USN-296-1

Risk factor : Critical
Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2006-2775
Bugtraq: 20060602 rPSA-2006-0091-1 firefox thunderbird (Google Search)
http://www.securityfocus.com/archive/1/archive/1/435795/100/0/threaded
Debian Security Information: DSA-1118 (Google Search)
http://www.debian.org/security/2006/dsa-1118
Debian Security Information: DSA-1120 (Google Search)
http://www.debian.org/security/2006/dsa-1120
Debian Security Information: DSA-1134 (Google Search)
http://www.debian.org/security/2006/dsa-1134
http://www.gentoo.org/security/en/glsa/glsa-200606-12.xml
http://www.gentoo.org/security/en/glsa/glsa-200606-21.xml
HPdes Security Advisory: HPSBUX02153
http://www.securityfocus.com/archive/1/archive/1/446658/100/200/threaded
HPdes Security Advisory: SSRT061181
HPdes Security Advisory: HPSBUX02156
http://www.securityfocus.com/archive/1/archive/1/446657/100/200/threaded
HPdes Security Advisory: SSRT061236
http://www.mandriva.com/security/advisories?name=MDKSA-2006:143
http://www.mandriva.com/security/advisories?name=MDKSA-2006:145
http://www.mandriva.com/security/advisories?name=MDKSA-2006:146
SuSE Security Announcement: SUSE-SA:2006:035 (Google Search)
http://www.novell.com/linux/security/advisories/2006_35_mozilla.html
http://www.ubuntulinux.org/support/documentation/usn/usn-296-1
http://www.ubuntulinux.org/support/documentation/usn/usn-297-1
http://www.ubuntulinux.org/support/documentation/usn/usn-296-2
http://www.ubuntulinux.org/support/documentation/usn/usn-297-3
http://www.ubuntulinux.org/support/documentation/usn/usn-323-1
CERT/CC vulnerability note: VU#243153
http://www.kb.cert.org/vuls/id/243153
Cert/CC Advisory: TA06-153A
http://www.us-cert.gov/cas/techalerts/TA06-153A.html
BugTraq ID: 18228
http://www.securityfocus.com/bid/18228
http://www.vupen.com/english/advisories/2006/2106
http://www.vupen.com/english/advisories/2006/3748
http://www.vupen.com/english/advisories/2006/3749
http://www.vupen.com/english/advisories/2008/0083
http://securitytracker.com/id?1016202
http://securitytracker.com/id?1016214
http://secunia.com/advisories/20376
http://secunia.com/advisories/20382
http://secunia.com/advisories/20561
http://secunia.com/advisories/20709
http://secunia.com/advisories/21183
http://secunia.com/advisories/21176
http://secunia.com/advisories/21178
http://secunia.com/advisories/21188
http://secunia.com/advisories/21210
http://secunia.com/advisories/21324
http://secunia.com/advisories/21532
http://secunia.com/advisories/21607
http://secunia.com/advisories/22065
http://secunia.com/advisories/22066
XForce ISS Database: mozilla-xul-code-execution(26846)
http://xforce.iss.net/xforce/xfdb/26846
Common Vulnerability Exposure (CVE) ID: CVE-2006-2776
http://www.redhat.com/support/errata/RHSA-2006-0578.html
http://www.redhat.com/support/errata/RHSA-2006-0610.html
http://www.redhat.com/support/errata/RHSA-2006-0611.html
RedHat Security Advisories: RHSA-2006:0609
http://rhn.redhat.com/errata/RHSA-2006-0609.html
http://www.redhat.com/support/errata/RHSA-2006-0594.html
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102800-1
CERT/CC vulnerability note: VU#575969
http://www.kb.cert.org/vuls/id/575969
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9849
http://www.vupen.com/english/advisories/2007/0573
http://secunia.com/advisories/21134
http://secunia.com/advisories/21269
http://secunia.com/advisories/21270
http://secunia.com/advisories/21336
http://secunia.com/advisories/21631
http://secunia.com/advisories/24108
XForce ISS Database: mozilla-contentdefined-code-execution(26848)
http://xforce.iss.net/xforce/xfdb/26848
Common Vulnerability Exposure (CVE) ID: CVE-2006-2777
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102763-1
CERT/CC vulnerability note: VU#237257
http://www.kb.cert.org/vuls/id/237257
http://www.vupen.com/english/advisories/2007/0058
http://secunia.com/advisories/20394
XForce ISS Database: mozilla-nsiselectionprivate-code-execution(26853)
http://xforce.iss.net/xforce/xfdb/26853
Common Vulnerability Exposure (CVE) ID: CVE-2006-2778
CERT/CC vulnerability note: VU#421529
http://www.kb.cert.org/vuls/id/421529
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9703
XForce ISS Database: mozilla-crypto-signtext-bo(26849)
http://xforce.iss.net/xforce/xfdb/26849
Common Vulnerability Exposure (CVE) ID: CVE-2006-2779
Debian Security Information: DSA-1159 (Google Search)
http://www.debian.org/security/2006/dsa-1159
Debian Security Information: DSA-1160 (Google Search)
http://www.debian.org/security/2006/dsa-1160
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102943-1
http://sunsolve.sun.com/search/document.do?assetkey=1-66-200387-1
CERT/CC vulnerability note: VU#466673
http://www.kb.cert.org/vuls/id/466673
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9762
http://www.vupen.com/english/advisories/2007/3488
http://secunia.com/advisories/21654
http://secunia.com/advisories/21634
http://secunia.com/advisories/27216
XForce ISS Database: mozilla-browserengine-memory-corruption(26843)
http://xforce.iss.net/xforce/xfdb/26843
Common Vulnerability Exposure (CVE) ID: CVE-2006-2780
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11305
Common Vulnerability Exposure (CVE) ID: CVE-2006-2782
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10429
XForce ISS Database: mozilla-firefox-textbox-file-access(26851)
http://xforce.iss.net/xforce/xfdb/26851
Common Vulnerability Exposure (CVE) ID: CVE-2006-2783
http://lists.apple.com/archives/security-announce/2008//Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10772
http://secunia.com/advisories/35379
http://www.vupen.com/english/advisories/2008/2094/references
http://secunia.com/advisories/31074
http://www.vupen.com/english/advisories/2009/1522
XForce ISS Database: mozilla-bom-utf8-xss(26852)
http://xforce.iss.net/xforce/xfdb/26852
Common Vulnerability Exposure (CVE) ID: CVE-2006-2784
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9768
XForce ISS Database: mozilla-pluginspage-code-execution(26847)
http://xforce.iss.net/xforce/xfdb/26847
Common Vulnerability Exposure (CVE) ID: CVE-2006-2785
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10545
XForce ISS Database: mozilla-viewimage-xss(26845)
http://xforce.iss.net/xforce/xfdb/26845
Common Vulnerability Exposure (CVE) ID: CVE-2006-2786
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9966
XForce ISS Database: mozilla-http-response-smuggling(26844)
http://xforce.iss.net/xforce/xfdb/26844
Common Vulnerability Exposure (CVE) ID: CVE-2006-2787
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9491
XForce ISS Database: mozilla-valueof-sandbox-bypass(26842)
http://xforce.iss.net/xforce/xfdb/26842
Common Vulnerability Exposure (CVE) ID: CVE-2006-2788
Debian Security Information: DSA-1191 (Google Search)
http://www.us.debian.org/security/2006/dsa-1191
Debian Security Information: DSA-1192 (Google Search)
http://www.debian.org/security/2006/dsa-1192
Debian Security Information: DSA-1210 (Google Search)
http://www.debian.org/security/2006/dsa-1210
http://www.ubuntu.com/usn/usn-361-1
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11065
http://secunia.com/advisories/22247
http://secunia.com/advisories/22299
http://secunia.com/advisories/22342
http://secunia.com/advisories/22849
Common Vulnerability Exposure (CVE) ID: CVE-2006-1729
Debian Security Information: DSA-1044 (Google Search)
http://www.debian.org/security/2006/dsa-1044
Debian Security Information: DSA-1046 (Google Search)
http://www.debian.org/security/2006/dsa-1046
Debian Security Information: DSA-1051 (Google Search)
http://www.debian.org/security/2006/dsa-1051
http://www.redhat.com/archives/fedora-announce-list/2006-April/msg00153.html
http://www.redhat.com/archives/fedora-announce-list/2006-April/msg00154.html
http://www.securityfocus.com/archive/1/archive/1/436296/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/436338/100/0/threaded
http://www.gentoo.org/security/en/glsa/glsa-200604-12.xml
http://www.gentoo.org/security/en/glsa/glsa-200604-18.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2006:075
http://www.mandriva.com/security/advisories?name=MDKSA-2006:076
http://www.redhat.com/support/errata/RHSA-2006-0328.html
http://www.redhat.com/support/errata/RHSA-2006-0329.html
SCO Security Bulletin: SCOSA-2006.26
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.26/SCOSA-2006.26.txt
SGI Security Advisory: 20060404-01-U
ftp://patches.sgi.com/support/free/security/advisories/20060404-01-U.asc
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102550-1
http://sunsolve.sun.com/search/document.do?assetkey=1-26-228526-1
SuSE Security Announcement: SUSE-SA:2006:021 (Google Search)
http://lists.suse.com/archive/suse-security-announce/2006-Apr/0003.html
http://www.ubuntulinux.org/support/documentation/usn/usn-275-1
http://www.ubuntulinux.org/support/documentation/usn/usn-271-1
BugTraq ID: 17516
http://www.securityfocus.com/bid/17516
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10922
http://www.vupen.com/english/advisories/2006/1356
http://www.vupen.com/english/advisories/2006/3391
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:1929
http://secunia.com/advisories/19631
http://secunia.com/advisories/19649
http://secunia.com/advisories/19759
http://secunia.com/advisories/19794
http://secunia.com/advisories/19811
http://secunia.com/advisories/19852
http://secunia.com/advisories/19862
http://secunia.com/advisories/19863
http://secunia.com/advisories/19902
http://secunia.com/advisories/19941
http://secunia.com/advisories/19714
http://secunia.com/advisories/19721
http://secunia.com/advisories/19746
http://secunia.com/advisories/21033
http://secunia.com/advisories/21622
http://secunia.com/advisories/19696
http://secunia.com/advisories/19729
XForce ISS Database: mozilla-textbox-file-access(25823)
http://xforce.iss.net/xforce/xfdb/25823
Common Vulnerability Exposure (CVE) ID: CVE-2005-0752
http://www.redhat.com/support/errata/RHSA-2005-383.html
BugTraq ID: 13228
http://www.securityfocus.com/bid/13228
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:100024
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10279
http://secunia.com/advisories/14938
CopyrightCopyright (c) 2006 E-Soft Inc. http://www.securityspace.com

This is only one of 40037 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Developer APIs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2014 E-Soft Inc. All rights reserved.