Free vulnerability management software
Mageni is a free, open-source, and powerful vulnerability management platform that takes the pain out of cybersecurity and vulnerability management.
Download Now
Debian Security Advisory DSA 1704-1 (xulrunner)
Information
Severity
Severity
Family
Family
CVSSv2 Base
CVSSv2 Base
CVSSv2 Vector
CVSSv2 Vector
Solution Type
Solution Type
Created
Created
Modified
Modified
Summary
The remote host is missing an update to xulrunner announced via advisory DSA 1704-1.
Insight
Insight
Several remote vulnerabilities have been discovered in Xulrunner, a runtime environment for XUL applications. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2008-5500 Jesse Ruderman discovered that the layout engine is vulnerable to DoS attacks that might trigger memory corruption and an integer overflow. (MFSA 2008-60) CVE-2008-5503 Boris Zbarsky discovered that an information disclosure attack could be performed via XBL bindings. (MFSA 2008-61) CVE-2008-5506 Marius Schilder discovered that it is possible to obtain sensible data via a XMLHttpRequest. (MFSA 2008-64) CVE-2008-5507 Chris Evans discovered that it is possible to obtain sensible data via a JavaScript URL. (MFSA 2008-65) CVE-2008-5508 Chip Salzenberg discovered possible phishing attacks via URLs with leading whitespaces or control characters. (MFSA 2008-66) CVE-2008-5511 It was discovered that it is possible to perform cross-site scripting attacks via an XBL binding to an unloaded document. (MFSA 2008-68) CVE-2008-5512 It was discovered that it is possible to run arbitrary JavaScript with chrome privileges via unknown vectors. (MFSA 2008-68) For the stable distribution (etch) these problems have been fixed in version 1.8.0.15~pre080614i-0etch1. For the testing distribution (lenny) and the unstable distribution (sid) these problems have been fixed in version 1.9.0.5-1. We recommend that you upgrade your xulrunner packages.
Solution
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201704-1
Common Vulnerabilities and Exposures (CVE)
Ease with a few clicks your vulnerability scanning, assessment and management process
Mageni is a free and open-source vulnerability management software. Download it now.
1. Download Multipass
2. Launch a multipass instance
3. Install Mageni
1. If you don’t have it already, install Brew. Then, to install Multipass simply execute:
2. Launch a multipass instance
2. Install Mageni
1. Download the installer for Windows
2. Ensure your network is private
3. Run the installer
4. Launch a multipass instance
5. Log into the multipass instance
6. Install Mageni