![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.72561 |
Category: | Mandrake Local Security Checks |
Title: | Mandriva Security Advisory MDVSA-2012:170 (firefox) |
Summary: | NOSUMMARY |
Description: | Description: The remote host is missing an update to firefox announced via advisory MDVSA-2012:170. Multiple security issue were identified and fixed in mozilla firefox: Mozilla Firefox before 16.0.2, Firefox ESR 10.x before 10.0.10, Thunderbird before 16.0.2, Thunderbird ESR 10.x before 10.0.10, and SeaMonkey before 2.13.2 do not prevent use of the valueOf method to shadow the location object (aka window.location), which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via vectors involving a plugin (CVE-2012-4194). The nsLocation::CheckURL function in Mozilla Firefox before 16.0.2, Firefox ESR 10.x before 10.0.10, Thunderbird before 16.0.2, Thunderbird ESR 10.x before 10.0.10, and SeaMonkey before 2.13.2 does not properly determine the calling document and principal in its return value, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted web site, and makes it easier for remote attackers to execute arbitrary JavaScript code by leveraging certain add-on behavior (CVE-2012-4195). Mozilla Firefox before 16.0.2, Firefox ESR 10.x before 10.0.10, Thunderbird before 16.0.2, Thunderbird ESR 10.x before 10.0.10, and SeaMonkey before 2.13.2 allow remote attackers to bypass the Same Origin Policy and read the Location object via a prototype property-injection attack that defeats certain protection mechanisms for this object (CVE-2012-4196). The mozilla firefox packages has been upgraded to the latest version which is unaffected by these security flaws. Affected: Enterprise Server 5.0 Solution: To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2012:170 http://www.mozilla.org/security/announce/2012/mfsa2012-90.html Risk factor : High |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2012-4194 BugTraq ID: 56301 http://www.securityfocus.com/bid/56301 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16918 RedHat Security Advisories: RHSA-2012:1407 http://rhn.redhat.com/errata/RHSA-2012-1407.html RedHat Security Advisories: RHSA-2012:1413 http://rhn.redhat.com/errata/RHSA-2012-1413.html http://secunia.com/advisories/51121 http://secunia.com/advisories/51123 http://secunia.com/advisories/51127 http://secunia.com/advisories/51144 http://secunia.com/advisories/51146 http://secunia.com/advisories/51147 http://secunia.com/advisories/51165 http://secunia.com/advisories/55318 SuSE Security Announcement: SUSE-SU-2012:1426 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00025.html SuSE Security Announcement: openSUSE-SU-2012:1412 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00019.html http://www.ubuntu.com/usn/USN-1620-1 http://www.ubuntu.com/usn/USN-1620-2 Common Vulnerability Exposure (CVE) ID: CVE-2012-4195 BugTraq ID: 56302 http://www.securityfocus.com/bid/56302 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16856 Common Vulnerability Exposure (CVE) ID: CVE-2012-4196 BugTraq ID: 56306 http://www.securityfocus.com/bid/56306 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16962 |
Copyright | Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com |
This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |