![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.884230 |
Kategorie: | CentOS Local Security Checks |
Titel: | CentOS: Security Advisory for firefox (CESA-2022:5479) |
Zusammenfassung: | The remote host is missing an update for the 'firefox'; package(s) announced via the CESA-2022:5479 advisory. |
Beschreibung: | Summary: The remote host is missing an update for the 'firefox' package(s) announced via the CESA-2022:5479 advisory. Vulnerability Insight: Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 91.11 ESR. Security Fix(es): * Mozilla: CSP sandbox header without `allow-scripts` can be bypassed via retargeted javascript: URI (CVE-2022-34468) * Mozilla: Use-after-free in nsSHistory (CVE-2022-34470) * Mozilla: A popup window could be resized in a way to overlay the address bar with web content (CVE-2022-34479) * Mozilla: Memory safety bugs fixed in Firefox 102 and Firefox ESR 91.11 (CVE-2022-34484) * Mozilla: Undesired attributes could be set as part of prototype pollution (CVE-2022-2200) * Mozilla: CSP bypass enabling stylesheet injection (CVE-2022-31744) * Mozilla: Unavailable PAC file resulted in OCSP requests being blocked (CVE-2022-34472) * Mozilla: Potential integer overflow in ReplaceElementsAt (CVE-2022-34481) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Affected Software/OS: 'firefox' package(s) on CentOS 7. Solution: Please install the updated package(s). CVSS Score: 10.0 CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2022-2200 https://bugzilla.mozilla.org/show_bug.cgi?id=1771381 https://www.mozilla.org/security/advisories/mfsa2022-24/ https://www.mozilla.org/security/advisories/mfsa2022-25/ https://www.mozilla.org/security/advisories/mfsa2022-26/ Common Vulnerability Exposure (CVE) ID: CVE-2022-31744 https://bugzilla.mozilla.org/show_bug.cgi?id=1757604 https://www.mozilla.org/security/advisories/mfsa2022-20/ Common Vulnerability Exposure (CVE) ID: CVE-2022-34468 https://bugzilla.mozilla.org/show_bug.cgi?id=1768537 Common Vulnerability Exposure (CVE) ID: CVE-2022-34470 https://bugzilla.mozilla.org/show_bug.cgi?id=1765951 Common Vulnerability Exposure (CVE) ID: CVE-2022-34472 https://bugzilla.mozilla.org/show_bug.cgi?id=1770123 Common Vulnerability Exposure (CVE) ID: CVE-2022-34479 https://bugzilla.mozilla.org/show_bug.cgi?id=1745595 Common Vulnerability Exposure (CVE) ID: CVE-2022-34481 https://bugzilla.mozilla.org/show_bug.cgi?id=1497246 Common Vulnerability Exposure (CVE) ID: CVE-2022-34484 https://bugzilla.mozilla.org/buglist.cgi?bug_id=1763634%2C1772651 |
Copyright | Copyright (C) 2022 Greenbone Networks GmbH |
Dies ist nur einer von 146377 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |