Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Security Week: March 30th, 2015
Linux Advisory Watch: March 27th, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

Debian: New Mozilla Firefox packages fix several vulnerabilities Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
Debian Several security related problems have been discovered in Mozilla and derived products like Mozilla Firefox. The Common Vulnerabilities and Exposures project identifies the following vulnerabilities: CVE-2006-3805 CVE-2006-3806 CVE-2006-3807 CVE-2006-3808 CVE-2006-3809 CVE-2006-3811
- --------------------------------------------------------------------------
Debian Security Advisory DSA 1161-1                                       Martin Schulze
August 29th, 2006             
- --------------------------------------------------------------------------

Package        : mozilla-firefox
Vulnerability  : several
Problem type   : remote
Debian-specific: no
CVE IDs        : CVE-2006-3805 CVE-2006-3806 CVE-2006-3807 CVE-2006-3808
                 CVE-2006-3809 CVE-2006-3811
CERT advisories: VU#655892 VU#687396 VU#876420
BugTraq ID     : 19181

Several security related problems have been discovered in Mozilla and
derived products like Mozilla Firefox.  The Common Vulnerabilities and
Exposures project identifies the following vulnerabilities:


    The Javascript engine might allow remote attackers to execute
    arbitrary code.  [MFSA-2006-50]


    Multiple integer overflows in the Javascript engine might allow
    remote attackers to execute arbitrary code.  [MFSA-2006-50]


    Specially crafted Javascript allows remote attackers to execute
    arbitrary code.  [MFSA-2006-51]


    Remote AutoConfig (PAC) servers could execute code with elevated
    privileges via a specially crafted PAC script.  [MFSA-2006-52]


    Scripts with the UniversalBrowserRead privilege could gain
    UniversalXPConnect privileges and possibly execute code or obtain
    sensitive data.  [MFSA-2006-53]


    Multiple vulnerabilities allow remote attackers to cause a denial
    of service (crash) and possibly execute arbitrary code.

For the stable distribution (sarge) these problems have been fixed in
version 1.0.4-2sarge10.

For the unstable distribution (sid) these problems have been fixed in
version 1.5.dfsg+

We recommend that you upgrade your mozilla-firefox package.

Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given at the end of this advisory:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.1 alias sarge
- --------------------------------

  Source archives:
      Size/MD5 checksum:     1003 09583ca7a6bd470e092c5226528ae80c
      Size/MD5 checksum:   419119 3618884176a92d3ac97022e074188e77
      Size/MD5 checksum: 40212297 8e4ba81ad02c7986446d4e54e978409d

  Alpha architecture:
      Size/MD5 checksum: 11176644 0b0ab73f6c4deebad034c9c5f604d3a0
      Size/MD5 checksum:   169796 fbfddc6581dd0c7389a6445ecb0ec3f9
      Size/MD5 checksum:    61598 b07ab088199007de44282145a7721fc3

  AMD64 architecture:
      Size/MD5 checksum:  9405310 33590c4e5998a0b7fa9a26b281e7da3c
      Size/MD5 checksum:   164566 aceef401edf65c2633f27aad978396dc
      Size/MD5 checksum:    60122 d5250c9fb83f1b7c67123a1bf2191840

  ARM architecture:
      Size/MD5 checksum:  8228178 aed4e4dbbeefc391454e3f7aebc63a15
      Size/MD5 checksum:   156018 440374f401628e71f4f01057e0418c2c
      Size/MD5 checksum:    55444 02d92e0752b89ff7b049252b6c327300

  Intel IA-32 architecture:
      Size/MD5 checksum:  8904976 b2441882b3107c287ce1cf4414b7440f
      Size/MD5 checksum:   159774 18cb2b3db08016bc6c4526574f3b72de
      Size/MD5 checksum:    56992 00e9d8fc0cf7b22666627876851a365b

  Intel IA-64 architecture:
      Size/MD5 checksum: 11638750 9e7e3b0aee30e3a80a0eec0515d81258
      Size/MD5 checksum:   170104 d6dc6f919293d517ef990cb46060d115
      Size/MD5 checksum:    64798 9532185c638659206c6627f5857698ff

  HP Precision architecture:
      Size/MD5 checksum: 10281754 c5ec2b8d56096c9efb0efab75dcc9171
      Size/MD5 checksum:   167484 9e8718e775368564fc6f691e214f651c
      Size/MD5 checksum:    60578 65426b32ec4d7f2f7fb397aadae7b173

  Motorola 680x0 architecture:
      Size/MD5 checksum:  8180240 2786b8b54f2748023752d1aec5899fe2
      Size/MD5 checksum:   158648 869e3cacfa86e6cc68fcb9d98f081607
      Size/MD5 checksum:    56246 2f14d625a593d86ef0c13c8b7f1391e5

  Big endian MIPS architecture:
      Size/MD5 checksum:  9939504 c18bb8875373e0e1dd707ad9a6778d87
      Size/MD5 checksum:   157580 8ebfe5494e67be102f9ef48f9af06d82
      Size/MD5 checksum:    57268 a4bd50f5614dace6e1d524372b4d3435

  Little endian MIPS architecture:
      Size/MD5 checksum:  9814412 363c45d54885eee9c6f4c6e0116a68ed
      Size/MD5 checksum:   157128 cb46a82ef943f94f10c0224efdb2a336
      Size/MD5 checksum:    57090 6971eb188d7dbdf22b032c91ae145111

  PowerPC architecture:
      Size/MD5 checksum:  8576282 1c61ed7a704bed95e6186e5fc1ffb25a
      Size/MD5 checksum:   158190 3ab95e22b86f243140f22687feed25af
      Size/MD5 checksum:    59370 5cc17f0992b7425b0f8c55422683f453

  IBM S/390 architecture:
      Size/MD5 checksum:  9643386 9d62f4ad6fb018b9f6dc3b1e48e11aba
      Size/MD5 checksum:   165116 ab405fffa91e4ac0ab18891dfb763d28
      Size/MD5 checksum:    59560 c7d8aec75403e3fde0e812bac573383a

  Sun Sparc architecture:
      Size/MD5 checksum:  8667678 c65257545e9562877989ca3275df27c0
      Size/MD5 checksum:   158394 94580d49c505b103d2b60b69022af5ab
      Size/MD5 checksum:    55812 c0f3f408ea170b5c3b2f6e4542c52b5c

  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list:
< Prev   Next >


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Weekend Edition
FBI Quietly Removes Recommendation To Encrypt Your Phone
And the prize for LEAST SECURE BROWSER goes to ... Chrome!
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.