This script is Copyright (C) 2005-2014 Tenable Network Security, Inc.
The remote Red Hat host is missing a security update.
An updated firefox package that fixes various security bugs is now
available for Red Hat Enterprise Linux 4.
This update has been rated as having important security impact by the
Red Hat Security Response Team.
Mozilla Firefox is an open source Web browser.
A bug was found in the way Firefox handled synthetic events. It is
possible that Web content could generate events such as keystrokes or
mouse clicks that could be used to steal data or execute malicious
(cve.mitre.org) has assigned the name CVE-2005-2260 to this issue.
controls. It is possible for a malicious webpage to leverage this
A bug was found in the way Firefox set an image as the desktop
wallpaper. If a user chooses the 'Set As Wallpaper...' context menu
item on a specially crafted image, it is possible for an attacker to
execute arbitrary code on a victim's machine. (CVE-2005-2262)
A bug was found in the way Firefox installed its extensions. If a user
can be tricked into visiting a malicious webpage, it may be possible
to obtain sensitive information such as cookies or passwords.
A bug was found in the way Firefox handled the _search target. It is
open webpage. (CVE-2005-2264)
functions. It is possible for a malicious web page to crash the
A bug was found in the way Firefox handled multiple frame domains. It
is possible for a frame as part of a malicious website to inject
content into a frame that belongs to another domain. This issue was
previously fixed as CVE-2004-0718 but was accidentally disabled.
A bug was found in the way Firefox handled child frames. It is
possible for a malicious framed page to steal sensitive information
from its parent page. (CVE-2005-2266)
A bug was found in the way Firefox opened URLs from media players. If
with access to the currently open webpage. (CVE-2005-2267)
A design flaw was found in the way Firefox displayed alerts and
Application] which prevented a user from knowing which site created
A bug was found in the way Firefox handled DOM node names. It is
possible for a malicious site to overwrite a DOM node name, allowing
A bug was found in the way Firefox cloned base objects. It is possible
for Web content to navigate up the prototype chain to gain access to
privileged chrome objects. (CVE-2005-2270)
Users of Firefox are advised to upgrade to this updated package that
contains Firefox version 1.0.6 and is not vulnerable to these issues.
See also :
Update the affected firefox package.
Risk factor :
High / CVSS Base Score : 7.5
Public Exploit Available : true
Family: Red Hat Local Security Checks
Nessus Plugin ID: 19268 ()
CVE ID: CVE-2004-0718CVE-2005-1937CVE-2005-2114CVE-2005-2260CVE-2005-2261CVE-2005-2262CVE-2005-2263CVE-2005-2264CVE-2005-2265CVE-2005-2266CVE-2005-2267CVE-2005-2268CVE-2005-2269CVE-2005-2270
Upgrade to Nessus Professional today!
Start your free Nessus Cloud trial now!
Begin Free Trial
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.