|
|
[ Message Precedent sur la mailing][ Message Suivant sur la mailing][ Precedent dans le fil][ Prochain dans le fil][ Index par Date][ Index par fil]
[SA33900] Ubuntu update for firefox
Did you know that a change in our assessment rating, exploit code
availability, or if an updated patch is released by the vendor, is
not part of this mailing-list?
Click here to learn more:
link://[click]
TITLE:
Ubuntu update for firefox
SECUNIA ADVISORY ID:
SA33900
VERIFY ADVISORY:
link://[click]
CRITICAL:
Moderately critical
IMPACT:
Security Bypass, Exposure of sensitive information
WHERE:
From remote
OPERATING SYSTEM:
Ubuntu Linux 7.10
link://[click]
DESCRIPTION:
Ubuntu has issued an update for firefox. This fixes some
vulnerabilities, which can be exploited by malicious people to bypass
certain security restrictions and disclose sensitive information.
For more information:
SA33799
SOLUTION:
Apply updated packages.
-- Ubuntu 7.10 --
Source archives:
link://[click]
Size/MD5: 194096 3b0eb4a53c8a6f101d8e802172b35470
link://[click]
Size/MD5: 2410 1a4f7e3c168867fe00d15a9ab0fddbd0
link://[click]
Size/MD5: 37773218 99f6660ed9a5123b99deb71a4e542beb
Architecture independent packages:
link://[click]
Size/MD5: 201368 31cb5c6d1a08cc7ba16bb639c91a0aaf
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
link://[click]
Size/MD5: 78163666 58624d232e8d4cfefd8aa0b3930f1645
link://[click]
Size/MD5: 3409228 2c70383c7fdb1c47dff030bcfc19c667
link://[click]
Size/MD5: 98652 96c04d01cb85d0e7bf7f6bd0a462217d
link://[click]
Size/MD5: 67370 d7c39e5768ab583dfd378dd8caaec8ad
link://[click]
Size/MD5: 10514542 e2848c8d832da591ee6738b6c83e46fe
i386 architecture (x86 compatible Intel/AMD):
link://[click]
Size/MD5: 77307750 06d768c4f6ff11b0e9a767d9430d1167
link://[click]
Size/MD5: 3389432 6d0f9551aad0bf24730ce9e8bd0e43a8
link://[click]
Size/MD5: 91414 0e6b2a8b84b703e83daff329bec2aaa8
link://[click]
Size/MD5: 66320 509349c58bd38c4c8d5c3f01c5f854d8
link://[click]
Size/MD5: 9263558 5071f73cd799d6be6694ffc325ece112
lpia architecture (Low Power Intel Architecture):
link://[click]
Size/MD5: 77589024 34b1054c205c40487c6fb63a07b7f8ea
link://[click]
Size/MD5: 3387598 9f72cfde2387f9728124f32e82adab69
link://[click]
Size/MD5: 92266 b52a5d27e848f2b49642accce30457a1
link://[click]
Size/MD5: 66600 60206314a39b88285db5ff69efa2079c
link://[click]
Size/MD5: 9116162 08e770ab94d22ad21731033bb9569bc9
powerpc architecture (Apple Macintosh G3/G4/G5):
link://[click]
Size/MD5: 80783090 7e7d643e7fba65302c52f6c250b826ac
link://[click]
Size/MD5: 3202874 ac1e5d66c385ddc6c52ac47d54408624
link://[click]
Size/MD5: 96388 1d752d1304bae4438e69e7176c853df7
link://[click]
Size/MD5: 67654 de86db9d630be0c23ac80d17bdc21552
link://[click]
Size/MD5: 10317856 2b66401173a009cfdc915156c3eafa7c
ORIGINAL ADVISORY:
link://[click]
OTHER REFERENCES:
SA33799:
link://[click]
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
link://[click]
Definitions: (Criticality, Where etc.)
link://[click]
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
Archives de la liste de diffusion Secunia
Archives de la liste de diffusion Full Disclosure
| Mini-Tagwall des articles publiés sur SecuObs : | | | | sécurité, exploit, windows, attaque, outil, microsoft, réseau, audit, metasploit, vulnérabilité, système, virus, internet, usbsploit, données, source, linux, protocol, présentation, scanne, réseaux, scanner, bluetooth, conférence, reverse, shell, meterpreter, vista, rootkit, détection, mobile, security, malicieux, engineering, téléphone, paquet, trames, https, noyau, utilisant, intel, wishmaster, google, sysun, libre |
| Mini-Tagwall de l'annuaire video : | | | | curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit, exploit, lockpicking, linux, attack, wireshark, vmware, rootkit, conference, network, shmoocon, backtrack, virus, conficker, elcom, etter, elcomsoft, server, meterpreter, openvpn, ettercap, openbs, iphone, shell, openbsd, iptables, securitytube, deepsec, source, office, systm, openssh, radio |
| Mini-Tagwall des articles de la revue de presse : | | | | security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone, server, inject, patch, apple, twitter, mobile, virus, ebook, facebook, vulnérabilité, crypt, source, linux, password, intel, research, virtual, phish, access, tutorial, trojan, social, privacy, firefox, adobe, overflow, office, cisco, conficker, botnet, pirate, sécurité |
| Mini-Tagwall des Tweets de la revue Twitter : | | | | security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall, network, twitter, vmware, windows, microsoft, compliance, vulnerability, python, engineering, source, kernel, crypt, social, overflow, nessus, crack, hacker, virus, iphone, patch, virtual, javascript, malware, conficker, pentest, research, email, password, adobe, apache, proxy, backtrack |
|
|
|
|
|