Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.57155
Category:Debian Local Security Checks
Title:Debian: Security Advisory (DSA-1120)
Summary:The remote host is missing an update for the Debian 'mozilla-firefox' package(s) announced via the DSA-1120 advisory.
Description:Summary:
The remote host is missing an update for the Debian 'mozilla-firefox' package(s) announced via the DSA-1120 advisory.

Vulnerability Insight:
Several security related problems have been discovered in Mozilla. The Common Vulnerabilities and Exposures project identifies the following vulnerabilities:

CVE-2006-1942

Eric Foley discovered that a user can be tricked to expose a local file to a remote attacker by displaying a local file as image in connection with other vulnerabilities. [MFSA-2006-39]

CVE-2006-2775

XUL attributes are associated with the wrong URL under certain circumstances, which might allow remote attackers to bypass restrictions. [MFSA-2006-35]

CVE-2006-2776

Paul Nickerson discovered that content-defined setters on an object prototype were getting called by privileged user interface code, and 'moz_bug_r_a4' demonstrated that the higher privilege level could be passed along to the content-defined attack code. [MFSA-2006-37]

CVE-2006-2777

A vulnerability allows remote attackers to execute arbitrary code and create notifications that are executed in a privileged context. [MFSA-2006-43]

CVE-2006-2778

Mikolaj Habryn discovered a buffer overflow in the crypto.signText function that allows remote attackers to execute arbitrary code via certain optional Certificate Authority name arguments. [MFSA-2006-38]

CVE-2006-2779

Mozilla team members discovered several crashes during testing of the browser engine showing evidence of memory corruption which may also lead to the execution of arbitrary code. This problem has only partially been corrected. [MFSA-2006-32]

CVE-2006-2780

An integer overflow allows remote attackers to cause a denial of service and may permit the execution of arbitrary code. [MFSA-2006-32]

CVE-2006-2782

Chuck McAuley discovered that a text input box can be pre-filled with a filename and then turned into a file-upload control, allowing a malicious website to steal any local file whose name they can guess. [MFSA-2006-41, MFSA-2006-23, CVE-2006-1729]

CVE-2006-2783

Masatoshi Kimura discovered that the Unicode Byte-order-Mark (BOM) is stripped from UTF-8 pages during the conversion to Unicode before the parser sees the web page, which allows remote attackers to conduct cross-site scripting (XSS) attacks. [MFSA-2006-42]

CVE-2006-2784

Paul Nickerson discovered that the fix for CVE-2005-0752 can be bypassed using nested javascript: URLs, allowing the attacker to execute privileged code. [MFSA-2005-34, MFSA-2006-36]

CVE-2006-2785

Paul Nickerson demonstrated that if an attacker could convince a user to right-click on a broken image and choose 'View Image' from the context menu then he could get JavaScript to run. [MFSA-2006-34]

CVE-2006-2786

Kazuho Oku discovered that Mozilla's lenient handling of HTTP header syntax may allow remote attackers to trick the browser to interpret certain responses as if they were responses from two different sites. [MFSA-2006-33]

CVE-2006-2787

The Mozilla researcher 'moz_bug_r_a4' discovered that JavaScript run via EvalInSandbox can escape the ... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'mozilla-firefox' package(s) on Debian 3.1.

Solution:
Please install the updated package(s).

CVSS Score:
9.3

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2006-1942
BugTraq ID: 18228
http://www.securityfocus.com/bid/18228
Bugtraq: 20060418 Another flaw in Firefox 1.5.0.2: to open files from remote (Google Search)
http://www.securityfocus.com/archive/1/431267/100/0/threaded
Bugtraq: 20060505 Firefox 1.5.0.3 code execution exploit (Google Search)
http://www.securityfocus.com/archive/1/433138/100/0/threaded
Bugtraq: 20060507 Re: Firefox 1.5.0.3 code execution exploit (Google Search)
http://www.securityfocus.com/archive/1/433539/30/5070/threaded
Bugtraq: 20060602 rPSA-2006-0091-1 firefox thunderbird (Google Search)
http://www.securityfocus.com/archive/1/435795/100/0/threaded
Debian Security Information: DSA-1118 (Google Search)
http://www.debian.org/security/2006/dsa-1118
Debian Security Information: DSA-1120 (Google Search)
http://www.debian.org/security/2006/dsa-1120
Debian Security Information: DSA-1134 (Google Search)
http://www.debian.org/security/2006/dsa-1134
HPdes Security Advisory: HPSBUX02153
http://www.securityfocus.com/archive/1/446658/100/200/threaded
HPdes Security Advisory: SSRT061181
http://www.gavinsharp.com/tmp/ImageVuln.html
http://www.networksecurity.fi/advisories/netscape-view-image.html
http://www.osvdb.org/24713
http://securitytracker.com/id?1016202
http://secunia.com/advisories/19698
http://secunia.com/advisories/19988
http://secunia.com/advisories/20063
http://secunia.com/advisories/20376
http://secunia.com/advisories/21176
http://secunia.com/advisories/21183
http://secunia.com/advisories/21324
http://secunia.com/advisories/22066
SuSE Security Announcement: SUSE-SA:2006:035 (Google Search)
http://www.novell.com/linux/security/advisories/2006_35_mozilla.html
http://www.vupen.com/english/advisories/2006/2106
http://www.vupen.com/english/advisories/2006/3748
http://www.vupen.com/english/advisories/2008/0083
XForce ISS Database: firefox-viewimage-security-bypass(25925)
https://exchange.xforce.ibmcloud.com/vulnerabilities/25925
Common Vulnerability Exposure (CVE) ID: CVE-2006-2775
Cert/CC Advisory: TA06-153A
http://www.us-cert.gov/cas/techalerts/TA06-153A.html
CERT/CC vulnerability note: VU#243153
http://www.kb.cert.org/vuls/id/243153
http://www.gentoo.org/security/en/glsa/glsa-200606-12.xml
http://www.gentoo.org/security/en/glsa/glsa-200606-21.xml
HPdes Security Advisory: HPSBUX02156
http://www.securityfocus.com/archive/1/446657/100/200/threaded
HPdes Security Advisory: SSRT061236
http://www.mandriva.com/security/advisories?name=MDKSA-2006:143
http://www.mandriva.com/security/advisories?name=MDKSA-2006:145
http://www.mandriva.com/security/advisories?name=MDKSA-2006:146
http://securitytracker.com/id?1016214
http://secunia.com/advisories/20382
http://secunia.com/advisories/20561
http://secunia.com/advisories/20709
http://secunia.com/advisories/21178
http://secunia.com/advisories/21188
http://secunia.com/advisories/21210
http://secunia.com/advisories/21532
http://secunia.com/advisories/21607
http://secunia.com/advisories/22065
https://usn.ubuntu.com/296-1/
https://usn.ubuntu.com/296-2/
https://usn.ubuntu.com/297-1/
https://usn.ubuntu.com/297-3/
https://usn.ubuntu.com/323-1/
http://www.vupen.com/english/advisories/2006/3749
XForce ISS Database: mozilla-xul-code-execution(26846)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26846
Common Vulnerability Exposure (CVE) ID: CVE-2006-2776
CERT/CC vulnerability note: VU#575969
http://www.kb.cert.org/vuls/id/575969
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9849
http://www.redhat.com/support/errata/RHSA-2006-0578.html
http://www.redhat.com/support/errata/RHSA-2006-0594.html
RedHat Security Advisories: RHSA-2006:0609
http://rhn.redhat.com/errata/RHSA-2006-0609.html
http://www.redhat.com/support/errata/RHSA-2006-0610.html
http://www.redhat.com/support/errata/RHSA-2006-0611.html
http://secunia.com/advisories/21134
http://secunia.com/advisories/21269
http://secunia.com/advisories/21270
http://secunia.com/advisories/21336
http://secunia.com/advisories/21631
http://secunia.com/advisories/24108
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102800-1
http://www.vupen.com/english/advisories/2007/0573
XForce ISS Database: mozilla-contentdefined-code-execution(26848)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26848
Common Vulnerability Exposure (CVE) ID: CVE-2006-2777
CERT/CC vulnerability note: VU#237257
http://www.kb.cert.org/vuls/id/237257
http://secunia.com/advisories/20394
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102763-1
http://www.vupen.com/english/advisories/2007/0058
XForce ISS Database: mozilla-nsiselectionprivate-code-execution(26853)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26853
Common Vulnerability Exposure (CVE) ID: CVE-2006-2778
CERT/CC vulnerability note: VU#421529
http://www.kb.cert.org/vuls/id/421529
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9703
XForce ISS Database: mozilla-crypto-signtext-bo(26849)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26849
Common Vulnerability Exposure (CVE) ID: CVE-2006-2779
CERT/CC vulnerability note: VU#466673
http://www.kb.cert.org/vuls/id/466673
Debian Security Information: DSA-1159 (Google Search)
http://www.debian.org/security/2006/dsa-1159
Debian Security Information: DSA-1160 (Google Search)
http://www.debian.org/security/2006/dsa-1160
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9762
http://secunia.com/advisories/21634
http://secunia.com/advisories/21654
http://secunia.com/advisories/27216
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102943-1
http://sunsolve.sun.com/search/document.do?assetkey=1-66-200387-1
http://www.vupen.com/english/advisories/2007/3488
XForce ISS Database: mozilla-browserengine-memory-corruption(26843)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26843
Common Vulnerability Exposure (CVE) ID: CVE-2006-2780
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11305
Common Vulnerability Exposure (CVE) ID: CVE-2006-2782
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10429
XForce ISS Database: mozilla-firefox-textbox-file-access(26851)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26851
Common Vulnerability Exposure (CVE) ID: CVE-2006-2783
http://lists.apple.com/archives/security-announce/2008//Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10772
http://secunia.com/advisories/31074
http://secunia.com/advisories/35379
http://www.vupen.com/english/advisories/2008/2094/references
http://www.vupen.com/english/advisories/2009/1522
XForce ISS Database: mozilla-bom-utf8-xss(26852)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26852
Common Vulnerability Exposure (CVE) ID: CVE-2006-2784
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9768
XForce ISS Database: mozilla-pluginspage-code-execution(26847)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26847
Common Vulnerability Exposure (CVE) ID: CVE-2006-2785
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10545
XForce ISS Database: mozilla-viewimage-xss(26845)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26845
Common Vulnerability Exposure (CVE) ID: CVE-2006-2786
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9966
XForce ISS Database: mozilla-http-response-smuggling(26844)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26844
Common Vulnerability Exposure (CVE) ID: CVE-2006-2787
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9491
XForce ISS Database: mozilla-valueof-sandbox-bypass(26842)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26842
CopyrightCopyright (C) 2008 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.