GLSA-200408-22 : Mozilla, Firefox, Thunderbird, Galeon, Epiphany: New releases fix vulnerabilities

This script is Copyright (C) 2004-2015 Tenable Network Security, Inc.

Synopsis :

The remote Gentoo host is missing one or more security-related

Description :

The remote host is affected by the vulnerability described in GLSA-200408-22
(Mozilla, Firefox, Thunderbird, Galeon, Epiphany: New releases fix vulnerabilities)

Mozilla, Galeon, Epiphany, Mozilla Firefox and Mozilla Thunderbird
contain the following vulnerabilities:
All Mozilla tools use libpng for graphics. This library contains a
buffer overflow which may lead to arbitrary code execution.
If a user imports a forged Certificate Authority (CA) certificate,
it may overwrite and corrupt the valid CA already installed on the
Mozilla, Mozilla Firefox, and other gecko-based browsers also contain a
bug in their caching which may allow the SSL icon to remain visible,
even when the site in question is an insecure site.

Impact :

Users of Mozilla, Mozilla Firefox, and other gecko-based browsers are
susceptible to SSL certificate spoofing, a Denial of Service against
legitimate SSL sites, crashes, and arbitrary code execution. Users of
Mozilla Thunderbird are susceptible to crashes and arbitrary code
execution via malicious e-mails.

Workaround :

There is no known workaround for most of these vulnerabilities. All
users are advised to upgrade to the latest available version.

See also :

Solution :

All users should upgrade to the latest stable version:
# emerge sync
# emerge -pv your-version
# emerge your-version

Risk factor :

Critical / CVSS Base Score : 10.0
Public Exploit Available : true

Family: Gentoo Local Security Checks

Nessus Plugin ID: 14578 (gentoo_GLSA-200408-22.nasl)

Bugtraq ID:

CVE ID: CVE-2004-0597

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now