exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 16953

Secunia Security Advisory 16953
Posted Sep 27, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Mandriva has issued an update for mozilla. This fixes some vulnerabilities, which can be exploited by malicious people to conduct spoofing attacks, manipulate certain data, bypass certain security restrictions, and compromise a user's system.

tags | advisory, spoof, vulnerability
systems | linux, mandriva
SHA-256 | 6b35ecdb0318d94ac61ca03059634e0b57108d190768d1277d491c5fc9efe115

Secunia Security Advisory 16953

Change Mirror Download


TITLE:
Mandriva update for mozilla

SECUNIA ADVISORY ID:
SA16953

VERIFY ADVISORY:
http://secunia.com/advisories/16953/

CRITICAL:
Highly critical

IMPACT:
System access, Manipulation of data, Spoofing, Security Bypass

WHERE:
>From remote

OPERATING SYSTEM:
Mandrakelinux 10.1
http://secunia.com/product/4198/

DESCRIPTION:
Mandriva has issued an update for mozilla. This fixes some
vulnerabilities, which can be exploited by malicious people to
conduct spoofing attacks, manipulate certain data, bypass certain
security restrictions, and compromise a user's system.

For more information:
SA16917

SOLUTION:
Apply updated packages.

Mandrakelinux 10.1:

98862a59fbf6d6eb5db05dd89cdd7a56
10.1/RPMS/libnspr4-1.7.8-0.3.101mdk.i586.rpm
7b75d7436ddc167dc64b5361fbdf6851
10.1/RPMS/libnspr4-devel-1.7.8-0.3.101mdk.i586.rpm
9e8eb18bea99ae419f5a1cab5ffef6b2
10.1/RPMS/libnss3-1.7.8-0.3.101mdk.i586.rpm
7427a69600ffffa87f60603b3c603935
10.1/RPMS/libnss3-devel-1.7.8-0.3.101mdk.i586.rpm
fe4003cfd5775a11a789dbb56282cea6
10.1/RPMS/mozilla-1.7.8-0.3.101mdk.i586.rpm
b66c918e364a92ed461e598164adac76
10.1/RPMS/mozilla-devel-1.7.8-0.3.101mdk.i586.rpm
1b5d1b456686b187ae7c3388a9591247
10.1/RPMS/mozilla-dom-inspector-1.7.8-0.3.101mdk.i586.rpm
839c117682b0d888963511e88eaba2e9
10.1/RPMS/mozilla-enigmail-1.7.8-0.3.101mdk.i586.rpm
a11a7c6afcb7c3fd2044c8b2f9a8bbc2
10.1/RPMS/mozilla-enigmime-1.7.8-0.3.101mdk.i586.rpm
53eb2dc1a62352b2e17438c89418c527
10.1/RPMS/mozilla-irc-1.7.8-0.3.101mdk.i586.rpm
0c249773876d3b8bf77c675f897bb6ff
10.1/RPMS/mozilla-js-debugger-1.7.8-0.3.101mdk.i586.rpm
f6cfd1650616de8edf2c158ca8648c56
10.1/RPMS/mozilla-mail-1.7.8-0.3.101mdk.i586.rpm
f521e0837986889581f026f734d1703f
10.1/RPMS/mozilla-spellchecker-1.7.8-0.3.101mdk.i586.rpm
5c5d9bcb713136927980c374d8719ed4
10.1/SRPMS/mozilla-1.7.8-0.3.101mdk.src.rpm

Mandrakelinux 10.1/X86_64:

ce6e99481e523896aea8cc1e91c51523
x86_64/10.1/RPMS/lib64nspr4-1.7.8-0.3.101mdk.x86_64.rpm
fadccb049a886a1ddf8cf03920ea120f
x86_64/10.1/RPMS/lib64nspr4-devel-1.7.8-0.3.101mdk.x86_64.rpm
98862a59fbf6d6eb5db05dd89cdd7a56
x86_64/10.1/RPMS/libnspr4-1.7.8-0.3.101mdk.i586.rpm
df7c4331144029e67bd9493571626aff
x86_64/10.1/RPMS/lib64nss3-1.7.8-0.3.101mdk.x86_64.rpm
bdd269e07644d46d4e380878bf0746e8
x86_64/10.1/RPMS/lib64nss3-devel-1.7.8-0.3.101mdk.x86_64.rpm
9e8eb18bea99ae419f5a1cab5ffef6b2
x86_64/10.1/RPMS/libnss3-1.7.8-0.3.101mdk.i586.rpm
da3d352c690a7fc91cb83dc49819cd2a
x86_64/10.1/RPMS/mozilla-1.7.8-0.3.101mdk.x86_64.rpm
b13b4dc501a6eff651a4ef6d3b371b44
x86_64/10.1/RPMS/mozilla-devel-1.7.8-0.3.101mdk.x86_64.rpm
5b13733c766009ebfd0aca606ac224f2
x86_64/10.1/RPMS/mozilla-dom-inspector-1.7.8-0.3.101mdk.x86_64.rpm
3dfab88b55900580d0588fd7c8a6e219
x86_64/10.1/RPMS/mozilla-enigmail-1.7.8-0.3.101mdk.x86_64.rpm
e5892c4a8bd56b4a9cea3e8e21bc83b5
x86_64/10.1/RPMS/mozilla-enigmime-1.7.8-0.3.101mdk.x86_64.rpm
84946972d12ce8109d41f9bbcc99a796
x86_64/10.1/RPMS/mozilla-irc-1.7.8-0.3.101mdk.x86_64.rpm
ee060262c82cd51501b9645d9bb93c91
x86_64/10.1/RPMS/mozilla-js-debugger-1.7.8-0.3.101mdk.x86_64.rpm
30cfa0281f3f6a2b6d25bfb1132f7b0d
x86_64/10.1/RPMS/mozilla-mail-1.7.8-0.3.101mdk.x86_64.rpm
fb3f368becb9ebe11c16dd41a299e59a
x86_64/10.1/RPMS/mozilla-spellchecker-1.7.8-0.3.101mdk.x86_64.rpm
5c5d9bcb713136927980c374d8719ed4
x86_64/10.1/SRPMS/mozilla-1.7.8-0.3.101mdk.src.rpm

ORIGINAL ADVISORY:
http://www.mandriva.com/security/advisories?name=MDKSA-2005:170

OTHER REFERENCES:
SA16917:
http://secunia.com/advisories/16917/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close