Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
SuSE Update for mozilla,MozillaFirefox,MozillaThunderbird SUSE-SA:2007:036
Information
Severity
Severity
Family
Family
CVSSv2 Base
CVSSv2 Base
CVSSv2 Vector
CVSSv2 Vector
Solution Type
Solution Type
Created
Created
Modified
Modified
Summary
Check for the Version of mozilla,MozillaFirefox,MozillaThunderbird
Insight
Insight
Various Mozilla family browsers have been updated to their current security release versions. The Mozilla Seamonkey suite was brought to security update version 1.0.9. The Mozilla Firefox browser was brought to security update version 1.5.0.12 on Novell Linux Desktop 9 and 2.0.0.4 on SUSE Linux Enterprise 10, SUSE Linux 10.0, 10.1 and openSUSE 10.2. The Mozilla Thunderbird mailreader was brought to security update version 1.5.0.12 on SUSE Linux 10.0, 10.1 and openSUSE 10.2. Note that most of the packages were released some weeks ago already, only MozillaFirefox for SLE10 Service Pack 1 was missing and released today. The following security issues have been fixed: - CVE-2007-2871: Chris Thomas demonstrated that XUL popups opened by web content could be placed outside the boundaries of the content area. This could be used to spoof or hide parts of the browser chrome such as the location bar. - CVE-2007-2870: Mozilla contributor moz_bug_r_a4 demonstrated that the addEventListener method could be used to inject script into another site in violation of the browser's same-origin policy. This could be used to access or modify private or valuable information from that other site. - CVE-2007-1558: Gaƫtan Leurent informed us of a weakness in APOP authentication that could allow an attacker to recover the first part of your mail password if the attacker could interpose a malicious mail server on your network masquerading as your legitimate mail server. With normal settings it could take several hours for the attacker to gather enough data to recover just a few characters of the password. This result was presented at the Fast Software Encryption 2007 conference. - CVE-2007-1362: Nicolas Derouet reported two problems with cookie handling in Mozilla clients. Insufficient length checks could be use to exhaust browser memory and so to crash the browser or at least slow it done by a large degree. The second issue was that the cookie path and name values were not checked for the presence of the delimiter used for internal cookie storage, and if present this confused future interpretation of the cookie data. This is not considered to be exploitable. - CVE-2007-2869: Marcel repor ... Description truncated, for more information please check the Reference URL
Affected Software
Affected Software
mozilla,MozillaFirefox,MozillaThunderbird on SUSE LINUX 10.1, openSUSE 10.2, SuSE Linux Enterprise Server 8, SUSE SLES 9, Novell Linux Desktop 9, Open Enterprise Server, Novell Linux POS 9, SUSE Linux Enterprise Desktop 10 SP1, SUSE Linux Enterprise Server 10 SP1
Solution
Solution
Please Install the Updated Packages.