Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.850668
Kategorie:SuSE Local Security Checks
Titel:openSUSE: Security Advisory for MozillaFirefox (openSUSE-SU-2015:1390-1)
Zusammenfassung:The remote host is missing an update for the 'MozillaFirefox'; package(s) announced via the referenced advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'MozillaFirefox'
package(s) announced via the referenced advisory.

Vulnerability Insight:
- update to Firefox 40.0 (bnc#940806)

* Added protection against unwanted software downloads

* Suggested Tiles show sites of interest, based on categories from your
recent browsing history

* Hello allows adding a link to conversations to provide context
on what the conversation will be about

* New style for add-on manager based on the in-content preferences style

* Improved scrolling, graphics, and video playback performance with off
main thread compositing (GNU/Linux only)

* Graphic blocklist mechanism improved: Firefox version ranges can be
specified, limiting the number of devices blocked security fixes:

* MFSA 2015-79/CVE-2015-4473/CVE-2015-4474 Miscellaneous memory safety
hazards

* MFSA 2015-80/CVE-2015-4475 (bmo#1175396) Out-of-bounds read with
malformed MP3 file

* MFSA 2015-81/CVE-2015-4477 (bmo#1179484) Use-after-free in MediaStream
playback

* MFSA 2015-82/CVE-2015-4478 (bmo#1105914) Redefinition of
non-configurable JavaScript object properties

* MFSA 2015-83/CVE-2015-4479/CVE-2015-4480/CVE-2015-4493 Overflow issues
in libstagefright

* MFSA 2015-84/CVE-2015-4481 (bmo1171518) Arbitrary file overwriting
through Mozilla Maintenance Service with hard links (only affected
Windows)

* MFSA 2015-85/CVE-2015-4482 (bmo#1184500) Out-of-bounds write with
Updater and malicious MAR file (does not affect openSUSE RPM packages
which do not ship the updater)

* MFSA 2015-86/CVE-2015-4483 (bmo#1148732) Feed protocol with POST
bypasses mixed content protections

* MFSA 2015-87/CVE-2015-4484 (bmo#1171540) Crash when using shared
memory in JavaScript

* MFSA 2015-88/CVE-2015-4491 (bmo#1184009) Heap overflow in gdk-pixbuf
when scaling bitmap images

* MFSA 2015-89/CVE-2015-4485/CVE-2015-4486 (bmo#1177948, bmo#1178148)
Buffer overflows on Libvpx when decoding WebM video

* MFSA 2015-90/CVE-2015-4487/CVE-2015-4488/CVE-2015-4489 Vulnerabilities
found through code inspection

* MFSA 2015-91/CVE-2015-4490 (bmo#1086999) Mozilla Content Security
Policy allows for asterisk wildcards in violation of CSP specification

* MFSA 2015-92/CVE-2015-4492 (bmo#1185820) Use-after-free in
XMLHttpRequest with shared workers

- added mozilla-no-stdcxx-check.patch

- removed obsolete patches

* mozilla-add-glibcxx_use_cxx11_abi.patch

* firefox-multilocale-chrome.patch

- rebased patches

- requires version 40 of the branding package

- removed browser/searchplugins/ location as it's not valid anymore

- includes security update to Firefox 39.0.3 (bnc#940918)

* MFSA 2015-78/CVE-2015-4495 (bmo#1179262, bmo#1178058) Same origin
violation and local file stealing via PDF reader

Affected Software/OS:
MozillaFirefox on openSUSE 13.1

Solution:
Please install the updated package(s).

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2015-4473
Debian Security Information: DSA-3333 (Google Search)
http://www.debian.org/security/2015/dsa-3333
Debian Security Information: DSA-3410 (Google Search)
http://www.debian.org/security/2015/dsa-3410
https://security.gentoo.org/glsa/201605-06
RedHat Security Advisories: RHSA-2015:1586
http://rhn.redhat.com/errata/RHSA-2015-1586.html
RedHat Security Advisories: RHSA-2015:1682
http://rhn.redhat.com/errata/RHSA-2015-1682.html
http://www.securitytracker.com/id/1033247
http://www.securitytracker.com/id/1033372
SuSE Security Announcement: SUSE-SU-2015:1449 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html
SuSE Security Announcement: SUSE-SU-2015:1528 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.html
SuSE Security Announcement: SUSE-SU-2015:2081 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html
SuSE Security Announcement: openSUSE-SU-2015:1389 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html
SuSE Security Announcement: openSUSE-SU-2015:1390 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00015.html
SuSE Security Announcement: openSUSE-SU-2015:1453 (Google Search)
http://lists.opensuse.org/opensuse-updates/2015-08/msg00030.html
SuSE Security Announcement: openSUSE-SU-2015:1454 (Google Search)
http://lists.opensuse.org/opensuse-updates/2015-08/msg00031.html
http://www.ubuntu.com/usn/USN-2702-1
http://www.ubuntu.com/usn/USN-2702-2
http://www.ubuntu.com/usn/USN-2702-3
http://www.ubuntu.com/usn/USN-2712-1
Common Vulnerability Exposure (CVE) ID: CVE-2015-4474
Common Vulnerability Exposure (CVE) ID: CVE-2015-4475
BugTraq ID: 76294
http://www.securityfocus.com/bid/76294
Common Vulnerability Exposure (CVE) ID: CVE-2015-4477
SuSE Security Announcement: openSUSE-SU-2016:0876 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html
SuSE Security Announcement: openSUSE-SU-2016:0894 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html
Common Vulnerability Exposure (CVE) ID: CVE-2015-4478
Common Vulnerability Exposure (CVE) ID: CVE-2015-4479
http://www.zerodayinitiative.com/advisories/ZDI-15-456
Common Vulnerability Exposure (CVE) ID: CVE-2015-4480
Common Vulnerability Exposure (CVE) ID: CVE-2015-4481
https://www.exploit-db.com/exploits/37925/
Common Vulnerability Exposure (CVE) ID: CVE-2015-4482
Common Vulnerability Exposure (CVE) ID: CVE-2015-4483
BugTraq ID: 76510
http://www.securityfocus.com/bid/76510
Common Vulnerability Exposure (CVE) ID: CVE-2015-4484
Common Vulnerability Exposure (CVE) ID: CVE-2015-4485
Common Vulnerability Exposure (CVE) ID: CVE-2015-4486
Common Vulnerability Exposure (CVE) ID: CVE-2015-4487
Common Vulnerability Exposure (CVE) ID: CVE-2015-4488
Common Vulnerability Exposure (CVE) ID: CVE-2015-4489
Common Vulnerability Exposure (CVE) ID: CVE-2015-4490
Common Vulnerability Exposure (CVE) ID: CVE-2015-4491
Debian Security Information: DSA-3337 (Google Search)
http://www.debian.org/security/2015/dsa-3337
http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165703.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165732.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165730.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165701.html
https://security.gentoo.org/glsa/201512-05
RedHat Security Advisories: RHSA-2015:1694
http://rhn.redhat.com/errata/RHSA-2015-1694.html
SuSE Security Announcement: openSUSE-SU-2015:1500 (Google Search)
http://lists.opensuse.org/opensuse-updates/2015-09/msg00002.html
http://www.ubuntu.com/usn/USN-2722-1
Common Vulnerability Exposure (CVE) ID: CVE-2015-4492
BugTraq ID: 76297
http://www.securityfocus.com/bid/76297
Common Vulnerability Exposure (CVE) ID: CVE-2015-4493
Common Vulnerability Exposure (CVE) ID: CVE-2015-4495
BugTraq ID: 76249
http://www.securityfocus.com/bid/76249
https://www.exploit-db.com/exploits/37772/
https://security.gentoo.org/glsa/201512-10
RedHat Security Advisories: RHSA-2015:1581
http://rhn.redhat.com/errata/RHSA-2015-1581.html
http://www.securitytracker.com/id/1033216
SuSE Security Announcement: SUSE-SU-2015:1379 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00009.html
SuSE Security Announcement: SUSE-SU-2015:1380 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00010.html
http://www.ubuntu.com/usn/USN-2707-1
CopyrightCopyright (C) 2015 Greenbone Networks GmbH

Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.