Búsqueda de    
Vulnerabilidad   
    Buscar 211766 Descripciones CVE y
97459 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.1.4.2014.1112.2
Categoría:SuSE Local Security Checks
Título:SUSE: Security Advisory (SUSE-SU-2014:1112-2)
Resumen:The remote host is missing an update for the 'MozillaFirefox' package(s) announced via the SUSE-SU-2014:1112-2 advisory.
Descripción:Summary:
The remote host is missing an update for the 'MozillaFirefox' package(s) announced via the SUSE-SU-2014:1112-2 advisory.

Vulnerability Insight:
Mozilla Firefox was updated to the 24.8.0ESR release, fixing security issues and bugs.

Only some of the published security advisories affect the Mozilla Firefox 24ESR codestream:

* MFSA 2014-72 / CVE-2014-1567: Security researcher regenrecht
reported, via TippingPoint's Zero Day Initiative, a use-after-free
during text layout when interacting with the setting of text
direction. This results in a use-after-free which can lead to
arbitrary code execution.
* MFSA 2014-67: Mozilla developers and community identified and fixed
several memory safety bugs in the browser engine used in Firefox and
other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code.
* Jan de Mooij reported a memory safety problem that affects Firefox
ESR 24.7, ESR 31 and Firefox 31. (CVE-2014-1562)

More information is referenced on:
[link moved to references] .

Security Issues:

* CVE-2014-1562
* CVE-2014-1567

Affected Software/OS:
'MozillaFirefox' package(s) on SUSE Linux Enterprise Server 11 SP1

Solution:
Please install the updated package(s).

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2014-1562
BugTraq ID: 69519
http://www.securityfocus.com/bid/69519
Debian Security Information: DSA-3018 (Google Search)
http://www.debian.org/security/2014/dsa-3018
Debian Security Information: DSA-3028 (Google Search)
http://www.debian.org/security/2014/dsa-3028
https://security.gentoo.org/glsa/201504-01
http://www.securitytracker.com/id/1030793
http://www.securitytracker.com/id/1030794
http://secunia.com/advisories/60148
http://secunia.com/advisories/60186
http://secunia.com/advisories/61114
http://secunia.com/advisories/61390
SuSE Security Announcement: SUSE-SU-2014:1107 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00005.html
SuSE Security Announcement: SUSE-SU-2014:1112 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00007.html
SuSE Security Announcement: SUSE-SU-2014:1120 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00012.html
SuSE Security Announcement: openSUSE-SU-2014:1098 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00003.html
SuSE Security Announcement: openSUSE-SU-2014:1099 (Google Search)
http://lists.opensuse.org/opensuse-updates/2014-09/msg00011.html
SuSE Security Announcement: openSUSE-SU-2015:0138 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html
SuSE Security Announcement: openSUSE-SU-2015:1266 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
Common Vulnerability Exposure (CVE) ID: CVE-2014-1567
BugTraq ID: 69520
http://www.securityfocus.com/bid/69520
CopyrightCopyright (C) 2021 Greenbone Networks GmbH

Esta es sólo una de 97459 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2021 E-Soft Inc. Todos los derechos reservados.