![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.884314 |
Kategorie: | CentOS Local Security Checks |
Titel: | CentOS: Security Advisory for firefox (CESA-2024:0600) |
Zusammenfassung: | The remote host is missing an update for the 'firefox'; package(s) announced via the CESA-2024:0600 advisory. |
Beschreibung: | Summary: The remote host is missing an update for the 'firefox' package(s) announced via the CESA-2024:0600 advisory. Vulnerability Insight: Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This Update upgrades Firefox to version 115.7.0 ESR. Security Fix(es): * Mozilla: Out of bounds write in ANGLE (CVE-2024-0741) * Mozilla: Failure to update user input timestamp (CVE-2024-0742) * Mozilla: Crash when listing printers on Linux (CVE-2024-0746) * Mozilla: Bypass of Content Security Policy when directive unsafe-inline was set (CVE-2024-0747) * Mozilla: Phishing site popup could show local origin in address bar (CVE-2024-0749) * Mozilla: Potential permissions request bypass via clickjacking (CVE-2024-0750) * Mozilla: Privilege escalation through devtools (CVE-2024-0751) * Mozilla: HSTS policy on subdomain could bypass policy of upper domain (CVE-2024-0753) * Mozilla: Memory safety bugs fixed in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7 (CVE-2024-0755) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Affected Software/OS: 'firefox' package(s) on CentOS 7. Solution: Please install the updated package(s). CVSS Score: 10.0 CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2024-0741 https://bugzilla.mozilla.org/show_bug.cgi?id=1864587 https://www.mozilla.org/security/advisories/mfsa2024-01/ https://www.mozilla.org/security/advisories/mfsa2024-02/ https://www.mozilla.org/security/advisories/mfsa2024-04/ https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html Common Vulnerability Exposure (CVE) ID: CVE-2024-0742 https://bugzilla.mozilla.org/show_bug.cgi?id=1867152 Common Vulnerability Exposure (CVE) ID: CVE-2024-0746 https://bugzilla.mozilla.org/show_bug.cgi?id=1660223 Common Vulnerability Exposure (CVE) ID: CVE-2024-0747 https://bugzilla.mozilla.org/show_bug.cgi?id=1764343 Common Vulnerability Exposure (CVE) ID: CVE-2024-0749 https://bugzilla.mozilla.org/show_bug.cgi?id=1813463 Common Vulnerability Exposure (CVE) ID: CVE-2024-0750 https://bugzilla.mozilla.org/show_bug.cgi?id=1863083 Common Vulnerability Exposure (CVE) ID: CVE-2024-0751 https://bugzilla.mozilla.org/show_bug.cgi?id=1865689 Common Vulnerability Exposure (CVE) ID: CVE-2024-0753 https://bugzilla.mozilla.org/show_bug.cgi?id=1870262 Common Vulnerability Exposure (CVE) ID: CVE-2024-0755 Memory safety bugs fixed in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7 https://bugzilla.mozilla.org/buglist.cgi?bug_id=1868456%2C1871445%2C1873701 |
Copyright | Copyright (C) 2024 Greenbone AG |
Dies ist nur einer von 146377 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |