Lucene search

K
gentooGentoo FoundationGLSA-200604-18
HistoryApr 28, 2006 - 12:00 a.m.

Mozilla Suite: Multiple vulnerabilities

2006-04-2800:00:00
Gentoo Foundation
security.gentoo.org
16

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.975 High

EPSS

Percentile

100.0%

Background

The Mozilla Suite is a popular all-in-one web browser that includes a mail and news reader.

Description

Several vulnerabilities were found in Mozilla Suite. Version 1.7.13 was released to fix them.

Impact

A remote attacker could craft malicious web pages or emails that would leverage these issues to inject and execute arbitrary script code with elevated privileges, steal local files, cookies or other information from web pages or emails, and spoof content. Some of these vulnerabilities might even be exploited to execute arbitrary code with the rights of the user running the client.

Workaround

There are no known workarounds for all the issues at this time.

Resolution

All Mozilla Suite users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=www-client/mozilla-1.7.13"

All Mozilla Suite binary users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=www-client/mozilla-bin-1.7.13"
OSVersionArchitecturePackageVersionFilename
Gentooanyallwww-client/mozilla< 1.7.13UNKNOWN
Gentooanyallwww-client/mozilla-bin< 1.7.13UNKNOWN

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.975 High

EPSS

Percentile

100.0%