what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2006.075

Mandriva Linux Security Advisory 2006.075
Posted Apr 26, 2006
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory MDKSA-2006-075: A number of vulnerabilities have been discovered in the Mozilla Firefox browser that could allow a remote attacker to craft malicious web pages that could take advantage of these issues to execute arbitrary code with elevated privileges, spoof content, and steal local files, cookies, or other information from web pages. As well, some of these vulnerabilities can be exploited to execute arbitrary code with the privileges of the user running the browser.

tags | advisory, remote, web, arbitrary, local, spoof, vulnerability
systems | linux, mandriva
SHA-256 | a70af2a3fc205558549900c096829a1357c6173cbbe5648f1f8f48bbc5ff12d3

Mandriva Linux Security Advisory 2006.075

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDKSA-2006:075
http://www.mandriva.com/security/
_______________________________________________________________________

Package : mozilla-firefox
Date : April 24, 2006
Affected: 2006.0
_______________________________________________________________________

Problem Description:

A number of vulnerabilities have been discovered in the Mozilla Firefox
browser that could allow a remote attacker to craft malicious web pages
that could take advantage of these issues to execute arbitrary code
with elevated privileges, spoof content, and steal local files,
cookies, or other information from web pages. As well, some of these
vulnerabilities can be exploited to execute arbitrary code with the
privileges of the user running the browser.

As well, two crasher bugs have been fixed as well.

The updated packages have been patched to fix these problems.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0748
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0749
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1728
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1729
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1730
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1731
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1732
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1733
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1734
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1735
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1736
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1737
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1738
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1739
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1740
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1742
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1790
https://bugzilla.mozilla.org/show_bug.cgi?id=275896
https://bugzilla.mozilla.org/show_bug.cgi?id=330900
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2006.0:
3780668e99350fecb7e1da24330b7bed 2006.0/RPMS/libnspr4-1.0.6-16.5.20060mdk.i586.rpm
e322c361441c540c473c17be628c56c5 2006.0/RPMS/libnspr4-devel-1.0.6-16.5.20060mdk.i586.rpm
5e7771258e4019de67912afd88201043 2006.0/RPMS/libnss3-1.0.6-16.5.20060mdk.i586.rpm
3b8d26864055478f01723e33a2dd060a 2006.0/RPMS/libnss3-devel-1.0.6-16.5.20060mdk.i586.rpm
9a5e293de59e94a574f596215c06d7a1 2006.0/RPMS/mozilla-firefox-1.0.6-16.5.20060mdk.i586.rpm
40de607b8c6fb7a9fcbe09cf194fa306 2006.0/RPMS/mozilla-firefox-devel-1.0.6-16.5.20060mdk.i586.rpm
70205ca1a829e0be5f571376c492dc93 2006.0/SRPMS/mozilla-firefox-1.0.6-16.5.20060mdk.src.rpm

Mandriva Linux 2006.0/X86_64:
bb30c3560134a888a041faa548e80a93 x86_64/2006.0/RPMS/lib64nspr4-1.0.6-16.5.20060mdk.x86_64.rpm
30e61853b74326055712d1021f15cec8 x86_64/2006.0/RPMS/lib64nspr4-devel-1.0.6-16.5.20060mdk.x86_64.rpm
271a6b04c6dbbc4e5eb814dd3c682801 x86_64/2006.0/RPMS/lib64nss3-1.0.6-16.5.20060mdk.x86_64.rpm
25c9a54f6f77823d37da854e55bac42d x86_64/2006.0/RPMS/lib64nss3-devel-1.0.6-16.5.20060mdk.x86_64.rpm
70f565e72131379186f742049453158c x86_64/2006.0/RPMS/mozilla-firefox-1.0.6-16.5.20060mdk.x86_64.rpm
6ca25ff70f4fb687bcce8d295b4e7a71 x86_64/2006.0/RPMS/mozilla-firefox-devel-1.0.6-16.5.20060mdk.x86_64.rpm
70205ca1a829e0be5f571376c492dc93 x86_64/2006.0/SRPMS/mozilla-firefox-1.0.6-16.5.20060mdk.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)

iD8DBQFETUw0mqjQ0CJFipgRAo/QAJ4qvjL82JiWa5Sttl3vh/mf8wFIkACff65l
c1jhuFefopIrhLAGO8poHA4=
=tQnr
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    25 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close