English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 61204 CVE descriptions
and 32582 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.57184
Category:Ubuntu Local Security Checks
Title:Ubuntu USN-323-1 (mozilla)
Summary:Ubuntu USN-323-1 (mozilla)
Description:
The remote host is missing an update to mozilla
announced via advisory USN-323-1.

A security issue affects the following Ubuntu releases:

Ubuntu 5.04
Ubuntu 5.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

For details on the issues addressed with this update, please
visit the referenced advisories.

Solution:
The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.04:
mozilla-browser 2:1.7.13-0ubuntu05.04.1
mozilla-mailnews 2:1.7.13-0ubuntu05.04.1
mozilla-psm 2:1.7.13-0ubuntu05.04.1

Ubuntu 5.10:
mozilla-browser 2:1.7.13-0ubuntu5.10.1
mozilla-mailnews 2:1.7.13-0ubuntu5.10.1
mozilla-psm 2:1.7.13-0ubuntu5.10.1

After a standard system upgrade you need to restart Mozilla to effect
the necessary changes.

http://www.securityspace.com/smysecure/catid.html?in=USN-323-1

Risk factor : Critical
Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2006-2775
Bugtraq: 20060602 rPSA-2006-0091-1 firefox thunderbird (Google Search)
http://www.securityfocus.com/archive/1/archive/1/435795/100/0/threaded
Debian Security Information: DSA-1118 (Google Search)
http://www.debian.org/security/2006/dsa-1118
Debian Security Information: DSA-1120 (Google Search)
http://www.debian.org/security/2006/dsa-1120
Debian Security Information: DSA-1134 (Google Search)
http://www.debian.org/security/2006/dsa-1134
http://www.gentoo.org/security/en/glsa/glsa-200606-12.xml
http://www.gentoo.org/security/en/glsa/glsa-200606-21.xml
HPdes Security Advisory: HPSBUX02153
http://www.securityfocus.com/archive/1/archive/1/446658/100/200/threaded
HPdes Security Advisory: SSRT061181
HPdes Security Advisory: HPSBUX02156
http://www.securityfocus.com/archive/1/archive/1/446657/100/200/threaded
HPdes Security Advisory: SSRT061236
http://www.mandriva.com/security/advisories?name=MDKSA-2006:143
http://www.mandriva.com/security/advisories?name=MDKSA-2006:145
http://www.mandriva.com/security/advisories?name=MDKSA-2006:146
SuSE Security Announcement: SUSE-SA:2006:035 (Google Search)
http://www.novell.com/linux/security/advisories/2006_35_mozilla.html
http://www.ubuntulinux.org/support/documentation/usn/usn-296-1
http://www.ubuntulinux.org/support/documentation/usn/usn-297-1
http://www.ubuntulinux.org/support/documentation/usn/usn-296-2
http://www.ubuntulinux.org/support/documentation/usn/usn-297-3
http://www.ubuntulinux.org/support/documentation/usn/usn-323-1
CERT/CC vulnerability note: VU#243153
http://www.kb.cert.org/vuls/id/243153
Cert/CC Advisory: TA06-153A
http://www.us-cert.gov/cas/techalerts/TA06-153A.html
BugTraq ID: 18228
http://www.securityfocus.com/bid/18228
http://www.vupen.com/english/advisories/2006/2106
http://www.vupen.com/english/advisories/2006/3748
http://www.vupen.com/english/advisories/2006/3749
http://www.vupen.com/english/advisories/2008/0083
http://securitytracker.com/id?1016202
http://securitytracker.com/id?1016214
http://secunia.com/advisories/20376
http://secunia.com/advisories/20382
http://secunia.com/advisories/20561
http://secunia.com/advisories/20709
http://secunia.com/advisories/21183
http://secunia.com/advisories/21176
http://secunia.com/advisories/21178
http://secunia.com/advisories/21188
http://secunia.com/advisories/21210
http://secunia.com/advisories/21324
http://secunia.com/advisories/21532
http://secunia.com/advisories/21607
http://secunia.com/advisories/22065
http://secunia.com/advisories/22066
XForce ISS Database: mozilla-xul-code-execution(26846)
http://xforce.iss.net/xforce/xfdb/26846
Common Vulnerability Exposure (CVE) ID: CVE-2006-2776
http://www.redhat.com/support/errata/RHSA-2006-0578.html
http://www.redhat.com/support/errata/RHSA-2006-0610.html
http://www.redhat.com/support/errata/RHSA-2006-0611.html
RedHat Security Advisories: RHSA-2006:0609
http://rhn.redhat.com/errata/RHSA-2006-0609.html
http://www.redhat.com/support/errata/RHSA-2006-0594.html
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102800-1
CERT/CC vulnerability note: VU#575969
http://www.kb.cert.org/vuls/id/575969
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9849
http://www.vupen.com/english/advisories/2007/0573
http://secunia.com/advisories/21134
http://secunia.com/advisories/21269
http://secunia.com/advisories/21270
http://secunia.com/advisories/21336
http://secunia.com/advisories/21631
http://secunia.com/advisories/24108
XForce ISS Database: mozilla-contentdefined-code-execution(26848)
http://xforce.iss.net/xforce/xfdb/26848
Common Vulnerability Exposure (CVE) ID: CVE-2006-2777
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102763-1
CERT/CC vulnerability note: VU#237257
http://www.kb.cert.org/vuls/id/237257
http://www.vupen.com/english/advisories/2007/0058
http://secunia.com/advisories/20394
XForce ISS Database: mozilla-nsiselectionprivate-code-execution(26853)
http://xforce.iss.net/xforce/xfdb/26853
Common Vulnerability Exposure (CVE) ID: CVE-2006-2778
CERT/CC vulnerability note: VU#421529
http://www.kb.cert.org/vuls/id/421529
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9703
XForce ISS Database: mozilla-crypto-signtext-bo(26849)
http://xforce.iss.net/xforce/xfdb/26849
Common Vulnerability Exposure (CVE) ID: CVE-2006-2779
Debian Security Information: DSA-1159 (Google Search)
http://www.debian.org/security/2006/dsa-1159
Debian Security Information: DSA-1160 (Google Search)
http://www.debian.org/security/2006/dsa-1160
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102943-1
http://sunsolve.sun.com/search/document.do?assetkey=1-66-200387-1
CERT/CC vulnerability note: VU#466673
http://www.kb.cert.org/vuls/id/466673
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9762
http://www.vupen.com/english/advisories/2007/3488
http://secunia.com/advisories/21654
http://secunia.com/advisories/21634
http://secunia.com/advisories/27216
XForce ISS Database: mozilla-browserengine-memory-corruption(26843)
http://xforce.iss.net/xforce/xfdb/26843
Common Vulnerability Exposure (CVE) ID: CVE-2006-2780
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11305
Common Vulnerability Exposure (CVE) ID: CVE-2006-2781
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10247
XForce ISS Database: mozilla-vcard-doublefree-memory-corruption(26850)
http://xforce.iss.net/xforce/xfdb/26850
Common Vulnerability Exposure (CVE) ID: CVE-2006-2782
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10429
XForce ISS Database: mozilla-firefox-textbox-file-access(26851)
http://xforce.iss.net/xforce/xfdb/26851
Common Vulnerability Exposure (CVE) ID: CVE-2006-2783
http://lists.apple.com/archives/security-announce/2008//Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10772
http://secunia.com/advisories/35379
http://www.vupen.com/english/advisories/2008/2094/references
http://secunia.com/advisories/31074
http://www.vupen.com/english/advisories/2009/1522
XForce ISS Database: mozilla-bom-utf8-xss(26852)
http://xforce.iss.net/xforce/xfdb/26852
Common Vulnerability Exposure (CVE) ID: CVE-2006-2784
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9768
XForce ISS Database: mozilla-pluginspage-code-execution(26847)
http://xforce.iss.net/xforce/xfdb/26847
Common Vulnerability Exposure (CVE) ID: CVE-2006-2785
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10545
XForce ISS Database: mozilla-viewimage-xss(26845)
http://xforce.iss.net/xforce/xfdb/26845
Common Vulnerability Exposure (CVE) ID: CVE-2006-2786
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9966
XForce ISS Database: mozilla-http-response-smuggling(26844)
http://xforce.iss.net/xforce/xfdb/26844
Common Vulnerability Exposure (CVE) ID: CVE-2006-2787
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9491
XForce ISS Database: mozilla-valueof-sandbox-bypass(26842)
http://xforce.iss.net/xforce/xfdb/26842
Common Vulnerability Exposure (CVE) ID: CVE-2006-1729
Debian Security Information: DSA-1044 (Google Search)
http://www.debian.org/security/2006/dsa-1044
Debian Security Information: DSA-1046 (Google Search)
http://www.debian.org/security/2006/dsa-1046
Debian Security Information: DSA-1051 (Google Search)
http://www.debian.org/security/2006/dsa-1051
http://www.redhat.com/archives/fedora-announce-list/2006-April/msg00153.html
http://www.redhat.com/archives/fedora-announce-list/2006-April/msg00154.html
http://www.securityfocus.com/archive/1/archive/1/436296/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/436338/100/0/threaded
http://www.gentoo.org/security/en/glsa/glsa-200604-12.xml
http://www.gentoo.org/security/en/glsa/glsa-200604-18.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2006:075
http://www.mandriva.com/security/advisories?name=MDKSA-2006:076
http://www.redhat.com/support/errata/RHSA-2006-0328.html
http://www.redhat.com/support/errata/RHSA-2006-0329.html
SCO Security Bulletin: SCOSA-2006.26
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.26/SCOSA-2006.26.txt
SGI Security Advisory: 20060404-01-U
ftp://patches.sgi.com/support/free/security/advisories/20060404-01-U.asc
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102550-1
http://sunsolve.sun.com/search/document.do?assetkey=1-26-228526-1
SuSE Security Announcement: SUSE-SA:2006:021 (Google Search)
http://lists.suse.com/archive/suse-security-announce/2006-Apr/0003.html
http://www.ubuntulinux.org/support/documentation/usn/usn-275-1
http://www.ubuntulinux.org/support/documentation/usn/usn-271-1
BugTraq ID: 17516
http://www.securityfocus.com/bid/17516
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10922
http://www.vupen.com/english/advisories/2006/1356
http://www.vupen.com/english/advisories/2006/3391
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:1929
http://secunia.com/advisories/19631
http://secunia.com/advisories/19649
http://secunia.com/advisories/19759
http://secunia.com/advisories/19794
http://secunia.com/advisories/19811
http://secunia.com/advisories/19852
http://secunia.com/advisories/19862
http://secunia.com/advisories/19863
http://secunia.com/advisories/19902
http://secunia.com/advisories/19941
http://secunia.com/advisories/19714
http://secunia.com/advisories/19721
http://secunia.com/advisories/19746
http://secunia.com/advisories/21033
http://secunia.com/advisories/21622
http://secunia.com/advisories/19696
http://secunia.com/advisories/19729
XForce ISS Database: mozilla-textbox-file-access(25823)
http://xforce.iss.net/xforce/xfdb/25823
Common Vulnerability Exposure (CVE) ID: CVE-2005-0752
http://www.redhat.com/support/errata/RHSA-2005-383.html
BugTraq ID: 13228
http://www.securityfocus.com/bid/13228
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:100024
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10279
http://secunia.com/advisories/14938
CopyrightCopyright (c) 2006 E-Soft Inc. http://www.securityspace.com

This is only one of 32582 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2014 E-Soft Inc. All rights reserved.