Vulnerability Scanning Solutions, LLC.
Our Process
What We Scan For
Sample Report
Client List
Contact Us
What We Scan For
Family: Gentoo Local Security Checks --> Category: infos

[GLSA-200503-30] Mozilla Suite: Multiple vulnerabilities Vulnerability Scan

Vulnerability Scan Summary
Mozilla Suite: Multiple vulnerabilities

Detailed Explanation for this Vulnerability Test
The remote host is affected by the vulnerability described in GLSA-200503-30
(Mozilla Suite: Multiple vulnerabilities)


The GIF heap overflow could be triggered by a malicious GIF
image that would end up executing arbitrary code with the rights of the
user running Mozilla. The other overflow issues, while not thought to
be exploitable, would have the same impact
By setting up
malicious websites and convincing users to follow untrusted links or
obey very specific drag-and-drop or download instructions, attackers
may leverage the various spoofing issues to fake other websites to get
access to confidential information, push users to download malicious
files or make them interact with their browser preferences
temporary directory issue allows local attackers to overwrite arbitrary
files with the rights of another local user


There is no known workaround at this time.


All Mozilla Suite users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=www-client/mozilla-1.7.6"
All Mozilla Suite binary users should upgrade to the latest
# emerge --sync
# emerge --ask --oneshot --verbose ">=www-client/mozilla-bin-1.7.6"

Threat Level: Medium

Click HERE for more information and discussions on this network vulnerability scan.


P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.