![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.703201 |
Category: | Debian Local Security Checks |
Title: | Debian: Security Advisory (DSA-3201-1) |
Summary: | The remote host is missing an update for the Debian 'iceweasel' package(s) announced via the DSA-3201-1 advisory. |
Description: | Summary: The remote host is missing an update for the Debian 'iceweasel' package(s) announced via the DSA-3201-1 advisory. Vulnerability Insight: Multiple security issues have been found in Iceweasel, Debian's version of the Mozilla Firefox web browser. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2015-0817 ilxu1a reported a flaw in Mozilla's implementation of typed array bounds checking in JavaScript just-in-time compilation (JIT) and its management of bounds checking for heap access. This flaw can be leveraged into the reading and writing of memory allowing for arbitrary code execution on the local system. CVE-2015-0818 Mariusz Mlynski discovered a method to run arbitrary scripts in a privileged context. This bypassed the same-origin policy protections by using a flaw in the processing of SVG format content navigation. For the stable distribution (wheezy), these problems have been fixed in version 31.5.3esr-1~ deb7u1. For the unstable distribution (sid), these problems have been fixed in version 31.5.3esr-1. We recommend that you upgrade your iceweasel packages. Affected Software/OS: 'iceweasel' package(s) on Debian 7. Solution: Please install the updated package(s). CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2015-0817 BugTraq ID: 73263 http://www.securityfocus.com/bid/73263 Debian Security Information: DSA-3201 (Google Search) http://www.debian.org/security/2015/dsa-3201 https://security.gentoo.org/glsa/201504-01 RedHat Security Advisories: RHSA-2015:0718 http://rhn.redhat.com/errata/RHSA-2015-0718.html http://www.securitytracker.com/id/1031958 SuSE Security Announcement: SUSE-SU-2015:0593 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00029.html SuSE Security Announcement: SUSE-SU-2015:0630 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00035.html SuSE Security Announcement: openSUSE-SU-2015:0567 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00026.html SuSE Security Announcement: openSUSE-SU-2015:0636 (Google Search) http://lists.opensuse.org/opensuse-updates/2015-03/msg00096.html http://www.ubuntu.com/usn/USN-2538-1 Common Vulnerability Exposure (CVE) ID: CVE-2015-0818 BugTraq ID: 73265 http://www.securityfocus.com/bid/73265 http://www.securitytracker.com/id/1031959 |
Copyright | Copyright (C) 2015 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |