This script is Copyright (C) 2006-2013 Tenable Network Security, Inc.
The remote Debian host is missing a security-related update.
The latest security updates of Mozilla introduced a regression that
led to a dysfunctional attachment panel which warrants a correction to
fix this issue. For reference please find below the original advisory
Several security related problems have been discovered in Mozilla
and derived products. The Common Vulnerabilities and Exposures
project identifies the following vulnerabilities :
Mozilla team members discovered several crashes during
testing of the browser engine showing evidence of
memory corruption which may also lead to the execution
of arbitrary code. The last bit of this problem will
be corrected with the next update. You can prevent any
execute arbitrary code. [MFSA-2006-50]
might allow remote attackers to execute arbitrary
to execute arbitrary code. [MFSA-2006-51]
Remote Proxy AutoConfig (PAC) servers could execute
code with elevated privileges via a specially crafted
PAC script. [MFSA-2006-52]
Scripts with the UniversalBrowserRead privilege could
gain UniversalXPConnect privileges and possibly
execute code or obtain sensitive data. [MFSA-2006-53]
A cross-site scripting vulnerability allows remote
attackers to inject arbitrary web script or HTML.
See also :
Upgrade the mozilla package.
For the stable distribution (sarge) these problems have been fixed in
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 7.7
Public Exploit Available : true