Description: | Description:
The remote host is missing an update to mozilla announced via advisory USN-361-1.
A security issue affects the following Ubuntu releases:
Ubuntu 5.04 Ubuntu 5.10
This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu.
Various flaws have been reported that allow an attacker to execute arbitrary code with user privileges by tricking the user into opening a malicious URL. (CVE-2006-2788, CVE-2006-3805, CVE-2006-3806, CVE-2006-3807, CVE-2006-3809, CVE-2006-3811, CVE-2006-4565, CVE-2006-4568, CVE-2006-4571)
A bug was found in the script handler for automatic proxy configuration. A malicious proxy could send scripts which could execute arbitrary code with the user's privileges. (CVE-2006-3808)
The NSS library did not sufficiently check the padding of PKCS #1 v1.5 signatures if the exponent of the public key is 3 (which is widely used for CAs). This could be exploited to forge valid signatures without the need of the secret key. (CVE-2006-4340)
Georgi Guninski discovered that even with JavaScript disabled, a malicous email could still execute JavaScript when the message is viewed, replied to, or forwarded by putting the script in a remote XBL file loaded by the message. (CVE-2006-4570)
Solution: The problem can be corrected by upgrading your system to the following package versions:
Ubuntu 5.04: libnspr4 2:1.7.13-0ubuntu05.04.2 libnss3 2:1.7.13-0ubuntu05.04.2 mozilla-browser 2:1.7.13-0ubuntu05.04.2 mozilla-mailnews 2:1.7.13-0ubuntu05.04.2 mozilla-psm 2:1.7.13-0ubuntu05.04.2
Ubuntu 5.10: libnspr4 2:1.7.13-0ubuntu5.10.2 libnss3 2:1.7.13-0ubuntu5.10.2 mozilla-browser 2:1.7.13-0ubuntu5.10.2 mozilla-mailnews 2:1.7.13-0ubuntu5.10.2 mozilla-psm 2:1.7.13-0ubuntu5.10.2
After a standard system upgrade you need to restart Mozilla to effect the necessary changes.
http://www.securityspace.com/smysecure/catid.html?in=USN-361-1
Risk factor : Critical
CVSS Score: 10.0
|