RHEL 2.1 / 3 / 4 : mozilla (RHSA-2005:435)

High Nessus Plugin ID 18388

Synopsis

The remote Red Hat host is missing one or more security updates.

Description

Updated mozilla packages that fix various security bugs are now available.

This update has been rated as having important security impact by the Red Hat Security Response Team.

[Updated 24 May 2005] This erratum now includes updated devhelp packages which are required to satisfy a dependency on systems that have devhelp packages installed.

Mozilla is an open source Web browser, advanced email and newsgroup client, IRC chat client, and HTML editor.

Several bugs were found in the way Mozilla executes JavaScript code.
JavaScript executed from a web page should run with a restricted access level, preventing dangerous actions. It is possible that a malicious web page could execute JavaScript code with elevated privileges, allowing access to protected data and functions. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2005-1476, CVE-2005-1477, CVE-2005-1531, and CVE-2005-1532 to these issues.

Users of Mozilla are advised to upgrade to this updated package, which contains Mozilla version 1.7.8 to correct these issues.

Solution

Update the affected packages.

See Also

https://access.redhat.com/security/cve/cve-2005-1476

https://access.redhat.com/security/cve/cve-2005-1477

https://access.redhat.com/security/cve/cve-2005-1531

https://access.redhat.com/security/cve/cve-2005-1532

https://www.mozilla.org/en-US/security/known-vulnerabilities/

https://access.redhat.com/errata/RHSA-2005:435

Plugin Details

Severity: High

ID: 18388

File Name: redhat-RHSA-2005-435.nasl

Version: 1.27

Type: local

Agent: unix

Published: 2005/05/28

Updated: 2019/09/17

Dependencies: 12634

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 7.5

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:devhelp, p-cpe:/a:redhat:enterprise_linux:devhelp-devel, p-cpe:/a:redhat:enterprise_linux:galeon, p-cpe:/a:redhat:enterprise_linux:mozilla, p-cpe:/a:redhat:enterprise_linux:mozilla-chat, p-cpe:/a:redhat:enterprise_linux:mozilla-devel, p-cpe:/a:redhat:enterprise_linux:mozilla-dom-inspector, p-cpe:/a:redhat:enterprise_linux:mozilla-js-debugger, p-cpe:/a:redhat:enterprise_linux:mozilla-mail, p-cpe:/a:redhat:enterprise_linux:mozilla-nspr, p-cpe:/a:redhat:enterprise_linux:mozilla-nspr-devel, p-cpe:/a:redhat:enterprise_linux:mozilla-nss, p-cpe:/a:redhat:enterprise_linux:mozilla-nss-devel, cpe:/o:redhat:enterprise_linux:2.1, cpe:/o:redhat:enterprise_linux:3, cpe:/o:redhat:enterprise_linux:4

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2005/05/24

Vulnerability Publication Date: 2005/05/09

Reference Information

CVE: CVE-2005-1476, CVE-2005-1477, CVE-2005-1531, CVE-2005-1532

RHSA: 2005:435