Secunia Security Advisory - Fedora has issued an update for mozilla. This fixes some vulnerabilities and a weakness, which can be exploited by malicious people to cause a DoS (Denial of Service), conduct cross-site scripting attacks, and potentially compromise a user's system.
bbf30d00f2b6284d32791931cedaa955c06639a72e406ebe95e891935be79aa5
TITLE:
Fedora update for mozilla
SECUNIA ADVISORY ID:
SA18709
VERIFY ADVISORY:
http://secunia.com/advisories/18709/
CRITICAL:
Highly critical
IMPACT:
Cross Site Scripting, DoS, System access
WHERE:
>From remote
OPERATING SYSTEM:
Fedora Core 4
http://secunia.com/product/5251/
DESCRIPTION:
Fedora has issued an update for mozilla. This fixes some
vulnerabilities and a weakness, which can be exploited by malicious
people to cause a DoS (Denial of Service), conduct cross-site
scripting attacks, and potentially compromise a user's system.
For more information:
SA17944
SA18703
SOLUTION:
Apply updated packages.
Fedora Core 4:
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/4/
2d63b67eca3a37cfd58d0fe898c94b7f07428f3f
SRPMS/mozilla-1.7.12-1.5.2.src.rpm
5792fd158f6c9de07b6fc33dac63f63964fc5372
ppc/mozilla-1.7.12-1.5.2.ppc.rpm
22fb55e6c03609948e71645750e446dbcf7a6342
ppc/mozilla-nspr-1.7.12-1.5.2.ppc.rpm
c4e5209f64788a1f68cfceaecb9e86d706d2dc4a
ppc/mozilla-nspr-devel-1.7.12-1.5.2.ppc.rpm
866ece106827a85431f4dd769f477707ce5726f4
ppc/mozilla-nss-1.7.12-1.5.2.ppc.rpm
372ac7c5d9c7092db5e89b1b2c32ff655ed4bc13
ppc/mozilla-nss-devel-1.7.12-1.5.2.ppc.rpm
bfb343549a0f61a3e4af02ce1eb504970a95b84a
ppc/mozilla-devel-1.7.12-1.5.2.ppc.rpm
83653b993a3c1f939f1228746bab5999f4aa641e
ppc/mozilla-mail-1.7.12-1.5.2.ppc.rpm
925c0ac3ea1b2bd90442cbebaf17b64a5bde7ff4
ppc/mozilla-chat-1.7.12-1.5.2.ppc.rpm
c904061f97fa70e2dbddfde39a9fafe365c998a6
ppc/mozilla-js-debugger-1.7.12-1.5.2.ppc.rpm
a809b5149d1386bd63e231f73d8053608fcda795
ppc/mozilla-dom-inspector-1.7.12-1.5.2.ppc.rpm
fe503337dacdf1a458f8a6b1b3537d32352eb410
ppc/debug/mozilla-debuginfo-1.7.12-1.5.2.ppc.rpm
1eb5c26cea0db6e73fe6dfc17ff2213d01c580cf
x86_64/mozilla-1.7.12-1.5.2.x86_64.rpm
a7f7bedc70223aa12d694dcf391c162898618bc1
x86_64/mozilla-nspr-1.7.12-1.5.2.x86_64.rpm
8ff7d0c8475d443365aa6e6b8d4a20ffe8b6f8c9
x86_64/mozilla-nspr-devel-1.7.12-1.5.2.x86_64.rpm
ecbbdaebf5f0926db5b06abeb28cd7f26f644f4e
x86_64/mozilla-nss-1.7.12-1.5.2.x86_64.rpm
d7949c70bc730ce4fa9670a90b2870169e35c574
x86_64/mozilla-nss-devel-1.7.12-1.5.2.x86_64.rpm
0c39728a2e6ef28c87159aaa95189ec3bc7b0e0e
x86_64/mozilla-devel-1.7.12-1.5.2.x86_64.rpm
ce814bf566fe2e8b0fcd78ef8f2b77ec3041620d
x86_64/mozilla-mail-1.7.12-1.5.2.x86_64.rpm
36ff9cdd4d72510eaedd2e98eaae4d2d67b2f27a
x86_64/mozilla-chat-1.7.12-1.5.2.x86_64.rpm
73e3a60f9e9e7ef2d613ecbd7a516e0347fd52c2
x86_64/mozilla-js-debugger-1.7.12-1.5.2.x86_64.rpm
0da54002f43f92b6810b408b1d0fca9f81eba5cc
x86_64/mozilla-dom-inspector-1.7.12-1.5.2.x86_64.rpm
aec63cc8952bcdeedca64d5c13bbaaaa9accef74
x86_64/debug/mozilla-debuginfo-1.7.12-1.5.2.x86_64.rpm
f5f1cf060f250fd274e560e55dd2ee1c866218e5
i386/mozilla-1.7.12-1.5.2.i386.rpm
15beac21ff0ff6b43117b5d128a81834d8d755d5
i386/mozilla-nspr-1.7.12-1.5.2.i386.rpm
51525231e79de34a335acf40b47bbf800b1d85ab
i386/mozilla-nspr-devel-1.7.12-1.5.2.i386.rpm
6d65ad231025054b6797828346d679d111019523
i386/mozilla-nss-1.7.12-1.5.2.i386.rpm
f54042f6f450db77d4ffbc83cd87864c683cd7dc
i386/mozilla-nss-devel-1.7.12-1.5.2.i386.rpm
93ee64fdfbc8eb4fcdf4c7317f859d98c72963f3
i386/mozilla-devel-1.7.12-1.5.2.i386.rpm
61027b28a80358a0cb874f3e4ebfeb29b0a34a1b
i386/mozilla-mail-1.7.12-1.5.2.i386.rpm
350263359cdbe1959e0f24299109cb1d7efc1e5a
i386/mozilla-chat-1.7.12-1.5.2.i386.rpm
e15edc081719380528c5e17b166c05191e98d168
i386/mozilla-js-debugger-1.7.12-1.5.2.i386.rpm
020cf3c6252e44adb37e3680a6e7ae7216e8670e
i386/mozilla-dom-inspector-1.7.12-1.5.2.i386.rpm
c9ea96428af2ef0a90c0f509e1ba48670cc4471a
i386/debug/mozilla-debuginfo-1.7.12-1.5.2.i386.rpm
OTHER REFERENCES:
SA17944:
http://secunia.com/advisories/17944/
SA18703:
http://secunia.com/advisories/18703/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------