LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: December 19th, 2014
Linux Advisory Watch: December 12th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Foresight: firefox Print E-mail
User Rating:      How can I rate this item?
Posted by Bill Keys   
Multiple vulnerabilities have been fixed in firefox, the most serious of which is thought to allow unauthorized remote execution of abitrary code at the permission level of the user running firefox.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Foresight Linux Essential Advisory: 2008-0001-1
Published: 2008-02-11

Rating: Moderate

Updated Versions:
   firefox=/foresight.rpath.org@fl:1-devel//1/2.0.0.12-1-1
   group-dist=/foresight.rpath.org@fl:1-devel//1/1.4.2-0.7-3

References:
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5947
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5959
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5960
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0412
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0413
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0414
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0415
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0417
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0418
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0419
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0591
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0592
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0594
   http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox2.0.0.10
   http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox2.0.0.12

Description:
   Multiple vulnerabilities have been fixed in firefox, the most serious of
   which is thought to allow unauthorized remote execution of abitrary code at
   the permission level of the user running firefox.

- ---

Copyright 2008 Foresight Linux Project
This file is distributed under the terms of the MIT License.
A copy is available at http://www.foresightlinux.org/permanent/mit-license.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.8 (GNU/Linux)

iQIcBAEBAgAGBQJHsOGjAAoJENfwEn07iAtZ65QP/28Y3XJ8ibMj1gYGMJnrn1dm
FQoMaTW0pTEpRX85Wxi9Yd37NIlra+d6yaRa87mya1SRB0G4MZf1q+0qrCfeBtS0
KVD152N5CZZxL/YaEZ2eE3kwQ9jhUGBpHJPG20SHarLCDWCag9/3M8nO9iJnGKPN
YmeWkk3VuzqVFYDys9dRRTNiKdPl8iJd+N8t/or5Ds4PUmUgPzWukoTF7DeKLbom
h3IxYU8SqJ+uKYJBYu/svAUlGFfuNRu/VKahp/jG20r9RYW05nJ7E+Ltyv1/IGER
jTFYn0Vl+5CniVijYDTmSYK8SeCymrB75TGYYeSoLknI5uthO5PiWYHUkaSywjra
XHCpcHUt6oh+d64hK9YwyYgl3TYRprzhIIirZnXp4MsbQj8/6zclqPefJKphGsd0
iXzBlizYjZ9tUTyJDe4hrkEB3nOvmP6IfylmxvyTUlXSQi2TSZ4/RDA2pB0THOwY
6owUCuDhJNStNelKXw7TAy4xK3Pdk2GIx5ZjSGPGfTHzYyK0+Cy9tLjH1t5L7B+j
8Wtt/98Bgd2FcwCVRkrulhd0hEyb8Vz+YkW3wN8oVNGJl43czSu1hRjDZLTnQ61G
sYvbqCwagmMQHOVN0n0aw+LrFHu5NM5Su3j9ssVE677Yz7ETlvuxYAmKUGP/RfeQ
S7TdhnoAW144TwGMGEAp
=67ci
-----END PGP SIGNATURE-----
_______________________________________________
Foresight-security-announce mailing list
Foresight-security-announce@lists.rpath.org
http://lists.rpath.org/mailman/listinfo/foresight-security-announce
 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
The Difference Between Wi-Fi Security Protocols: WPA2-AES vs WPA2-TKIP
Segmenting for security: Five steps to protect your network
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.