Contribuez à SecuObs en envoyant des bitcoins ou des dogecoins.
Nouveaux articles (fr): 1pwnthhW21zdnQ5WucjmnF3pk9puT5fDF
Amélioration du site: 1hckU85orcGCm8A9hk67391LCy4ECGJca

Contribute to SecuObs by sending bitcoins or dogecoins.

Chercher :
Newsletter :  


Revues :
- Presse
- Presse FR
- Vidéos
- Twitter
- Secuobs





Sommaires :
- Tendances
- Failles
- Virus
- Concours
- Reportages
- Acteurs
- Outils
- Breves
- Infrastructures
- Livres
- Tutoriels
- Interviews
- Podcasts
- Communiques
- USBsploit
- Commentaires


Revue Presse:
- Tous
- Francophone
- Par mot clé
- Par site
- Le tagwall


Top bi-hebdo:
- Ensemble
- Articles
- Revue
- Videos
- Twitter
- Auteurs


Articles :
- Par mot clé
- Par auteur
- Par organisme
- Le tagwall


Videos :
- Toutes
- Par mot clé
- Par site
- Le tagwall


Twitter :
- Tous
- Par mot clé
- Par compte
- Le tagwall


Commentaires :
- Breves
- Virus
- Failles
- Outils
- Tutoriels
- Tendances
- Acteurs
- Reportages
- Infrastructures
- Interviews
- Concours
- Livres
- Communiques


RSS/XML :
- Articles
- Commentaires
- Revue
- Revue FR
- Videos
- Twitter


RSS SecuObs :
- sécurité
- exploit
- windows
- attaque
- outil
- microsoft


RSS Revue :
- security
- microsoft
- windows
- hacker
- attack
- network


RSS Videos :
- curit
- security
- biomet
- metasploit
- biometric
- cking


RSS Twitter :
- security
- linux
- botnet
- attack
- metasploit
- cisco


RSS Comments :
- Breves
- Virus
- Failles
- Outils
- Tutoriels
- Tendances
- Acteurs
- Reportages
- Infrastructures
- Interviews
- Concours
- Livres
- Communiques


RSS OPML :
- Français
- International











Revue de presse francophone :
- Appaloosa AppDome nouent un partenariat pour accompagner les entreprises dans le déploiement et la protection des applications mobiles
- D-Link offre une avec un routeur VPN sans fil AC
- 19 mai Paris Petit-Déjeuner Coreye Développer son business à l'abri des cyberattaques
- POYNTING PRESENTE LA NOUVELLE ANTENNE OMNI-291, SPECIALE MILIEU MARITIME, CÔTIER ET MILIEU HUMIDE
- Flexera Software Les utilisateurs français de PC progressent dans l'application de correctifs logiciels, mais des défis de tailles subsistent
- Riverbed lance SD-WAN basé sur le cloud
- Fujitsu multi-récompensé VMware lui décerne plusieurs Partner Innovation Awards à l'occasion du Partner Leadership Summit
- Zscaler Private Access sécuriser l'accès à distance en supprimant les risques inhérents aux réseaux privés virtuels
- QNAP annonce la sortie de QTS 4.2.1
- Une enquête réalisée par la société de cyber sécurité F-Secure a décelé des milliers de vulnérabilités graves, potentiellement utilisables par des cyber criminels pour infiltrer l'infrastru
- Trouver le juste équilibre entre une infrastructure dédiée et cloud le dilemme de la distribution numérique
- 3 juin - Fleurance - Cybersécurité Territoires
- Cyber-assurances Seules 40 pourcents des entreprises françaises sont couvertes contre les violations de sécurité et les pertes de données
- Des étudiants de l'ESIEA inventent CheckMyHTTPS un logiciel qui vérifie que vos connexions WEB sécurisées ne sont pas interceptées
- Les produits OmniSwitch d'Alcatel-Lucent Enterprise ALE gagnent en sécurité pour lutter contre les cyber-attaques modernes

Dernier articles de SecuObs :
- DIP, solution de partage d'informations automatisée
- Sqreen, protection applicative intelligente de nouvelle génération
- Renaud Bidou (Deny All): "L'innovation dans le domaine des WAFs s'oriente vers plus de bon sens et d'intelligence, plus de flexibilité et plus d'ergonomie"
- Mises à jour en perspective pour le système Vigik
- Les russes ont-ils pwn le système AEGIS ?
- Le ministère de l'intérieur censure une conférence au Canada
- Saut d'air gap, audit de firmware et (in)sécurité mobile au programme de Cansecwest 2014
- GCHQ: Le JTRIG torpille Anonymous qui torpille le JTRIG (ou pas)
- #FIC2014: Entrée en territoire inconnu
- Le Sénat investit dans les monnaies virtuelles

Revue de presse internationale :
- VEHICLE CYBERSECURITY DOT and Industry Have Efforts Under Way, but DOT Needs to Define Its Role in Responding to a Real-world Attack
- Demand letter served on poll body over disastrous Comeleak breach
- The Minimin Aims To Be The Simplest Theremin
- Hacking group PLATINUM used Windows own patching system against it
- Hacker With Victims in 100 Nations Gets 7 Years in Prison
- HPR2018 How to make Komboucha Tea
- Circuit Bender Artist bends Fresnel Lens for Art
- FBI Director Suggests iPhone Hacking Method May Remain Secret
- 2016 Hack Miami Conference May 13-15, 2016
- 8-bit Video Wall Made From 160 Gaming Keyboards
- In An Era Of Decline, News Sites Can t Afford Poor Web Performance
- BeautifulPeople.com experiences data breach 1m affected
- Swedish Air Space Infringed, Aircraft Not Required
- Why cybercriminals attack healthcare more than any other industry
- Setting the Benchmark in the Network Security Forensics Industry

Annuaire des videos
- FUZZING ON LINE PART THREE
- Official Maltego tutorial 5 Writing your own transforms
- Official Maltego tutorial 6 Integrating with SQL DBs
- Official Maltego tutorial 3 Importing CSVs spreadsheets
- install zeus botnet
- Eloy Magalhaes
- Official Maltego tutorial 1 Google s websites
- Official Maltego tutorial 4 Social Networks
- Blind String SQL Injection
- backdoor linux root from r57 php shell VPS khg crew redc00de
- How To Attaque Pc With Back Track 5 In Arabique
- RSA Todd Schomburg talks about Roundup Ready lines available in 2013
- Nessus Diagnostics Troubleshooting
- Panda Security Vidcast Panda GateDefender Performa Parte 2 de 2
- MultiPyInjector Shellcode Injection

Revue Twitter
- RT @fpalumbo: Cisco consistently leading the way ? buys vCider to boost its distributed cloud vision #CiscoONE
- @mckeay Looks odd... not much to go on (prob some slideshow/vid app under Linux)
- [SuggestedReading] Using the HTML5 Fullscreen API for Phishing Attacks
- RT @BrianHonan: Our problems are not technical but cultural. OWASP top 10 has not changed over the years @joshcorman #RSAC
- RT @mikko: Wow. Apple kernels actually have a function called PE_i_can_has_debugger:
- [Blog Spam] Metasploit and PowerShell payloads
- PinkiePie Strikes Again, Compromises Google Chrome in Pwnium Contest at Hack in the Box: For the second time thi...
- @mikko @fslabs y'all wldn't happen to have lat/long data sets for other botnets, wld you? Doing some research (free/open info rls when done)
- RT @nickhacks: Want to crash a remote host running Snow Leopard? Just use: nmap -P0 -6 --script=targets-ipv6-multicast-mld #wishiwaskidding
- An inexpensive proxy service called is actually a front for #malware distribution -

Mini-Tagwall
Revue de presse : security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone

+ de mots clés pour la revue de presse

Annuaires des videos : curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit

+ de mots clés pour les videos

Revue Twitter : security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall

+ de mots clés pour la revue Twitter

Top bi-hebdo des articles de SecuObs
- [Ettercap – Partie 2] Ettercap par l'exemple - Man In the Middle et SSL sniffing
- [Infratech - release] version 0.6 de Bluetooth Stack Smasher
- [IDS Snort Windows – Partie 2] Installation et configuration
- [Infratech - vulnérabilité] Nouvelle version 0.8 de Bluetooth Stack Smasher
- Mises à jour en perspective pour le système Vigik
- USBDumper 2 nouvelle version nouvelles fonctions !
- EFIPW récupère automatiquement le mot de passe BIOS EFI des Macbook Pro avec processeurs Intel
- La sécurité des clés USB mise à mal par USBDUMPER
- Une faille critique de Firefox expose les utilisateurs de Tor Browser Bundle
- Installation sécurisée d'Apache Openssl, Php4, Mysql, Mod_ssl, Mod_rewrite, Mod_perl , Mod_security

Top bi-hebdo de la revue de presse
- StackScrambler and the Tale of a Packet Parsing Bug

Top bi-hebdo de l'annuaire des videos
- DC++ Botnet. How To DDos A Hub With Fake IPs.
- Comment creer un server botnet!!!!(Réseau de pc zombies)
- Defcon 14 Hard Drive Recovery Part 3

Top bi-hebdo de la revue Twitter
- RT @secureideas: I believe that all the XSS flaws announced are fixed in CVS. Will test again tomorrow if so, release 1.4.3. #BASESnort
- Currently, we do not support 100% of the advanced PDF features found in Adobe Reader... At least that's a good idea.
- VPN (google): German Foreign Office Selects Orange Business for Terrestrial Wide: Full
- @DisK0nn3cT Not really, mostly permission issues/info leak...they've had a couple of XSS vulns but nothing direct.
- Swatting phreaker swatted and heading to jail: A 19-year-old American has been sentenced to eleven years in pris..
- RT @fjserna You are not a true hacker if the calc.exe payload is not the scientific one... infosuck.org/0x0035.png

Top des articles les plus commentés
- [Metasploit 2.x – Partie 1] Introduction et présentation
- Microsoft !Exploitable un nouvel outil gratuit pour aider les développeurs à évaluer automatiquement les risques
- Webshag, un outil d'audit de serveur web
- Les navigateurs internet, des mini-systèmes d’exploitation hors de contrôle ?
- Yellowsn0w un utilitaire de déblocage SIM pour le firmware 2.2 des Iphone 3G
- CAINE un Live[CD|USB] pour faciliter la recherche légale de preuves numériques de compromission
- Nessus 4.0 placé sous le signe de la performance, de l'unification et de la personnalisation
- [Renforcement des fonctions de sécurité du noyau Linux – Partie 1] Présentation
- [IDS Snort Windows – Partie 1] Introduction aux IDS et à SNORT
- Origami pour forger, analyser et manipuler des fichiers PDF malicieux



[Message Precedent sur la mailing][Message Suivant sur la mailing][Precedent dans le fil][Prochain dans le fil][Index par Date][Index par fil] [SA33869] Ubuntu update for firefox-3.0 and xulrunner-1.9


Did you know that a change in our assessment rating, exploit code
availability, or if an updated patch is released by the vendor, is
not part of this mailing-list?

Click here to learn more:
link://[click]





TITLE: Ubuntu update for firefox-3.0 and xulrunner-1.9

SECUNIA ADVISORY ID: SA33869

VERIFY ADVISORY: link://[click]

CRITICAL: Highly critical

IMPACT: Security Bypass, Cross Site Scripting, Exposure of system information, Exposure of sensitive information, DoS, System access

WHERE: From remote

OPERATING SYSTEM: Ubuntu Linux 8.04 link://[click] Ubuntu Linux 8.10 link://[click]

DESCRIPTION: Ubuntu has issued an update for firefox-3.0 and xulrunner-1.9. This fixes some vulnerabilities, which can be exploited by malicious, local users to potentially disclose sensitive information, and by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, disclose sensitive information, or potentially to compromise a user's system.

For more information: SA33799 SOLUTION: Apply updated packages.

-- 8.04 LTS -- Source archives: link://[click] Size/MD5: 105962 9d1dd815f6901881c9d0c7e02ba4a75b link://[click] Size/MD5: 2711 61ba06fa21dae6e6828921f22540d243 link://[click] Size/MD5: 11180629 f7306d068c261f95c284fba5a75a6c71 link://[click] Size/MD5: 77638 2173124c73ad3095d97bf8960ec855a5 link://[click] Size/MD5: 2776 a3dcb8b8fd26e1d802e9971a46e7e1f3 link://[click] Size/MD5: 41504221 c3b32d6f68af24a75e4c902cb2ddbc09 Architecture independent packages: link://[click] Size/MD5: 65864 9dc2bf09e6fc28741544c4bfc5904738 link://[click] Size/MD5: 65876 8e290cff0732bac4b1ce1728b06f028b link://[click] Size/MD5: 65840 30c689f5ecf7ec430353d713057cd971 link://[click] Size/MD5: 65818 0cdaaf28707b274a5f73a54d8b1fa965 link://[click] Size/MD5: 65978 f962ffb3ed9dd6573956304e7cf1a4df link://[click] Size/MD5: 65890 322b798cd164a5ce68de2866e1dc1162 link://[click] Size/MD5: 65836 0a000e41e94f5e60a83ded055748296a link://[click] Size/MD5: 8968 61ba17d1e482222ac49f5f5a7d5d3913 link://[click] Size/MD5: 8964 2ad2759d85a104116cb36831b028ce07 link://[click] Size/MD5: 65870 aac931ab3ca46e329a4955a5bf6e76a3 link://[click] Size/MD5: 65828 a62f716f84713ecfa1a33408e3872bd2 link://[click] Size/MD5: 65818 10dc6e5214d80b1624114c37bb86f738 link://[click] Size/MD5: 8946 c8fb67a942b0d7d77aae0222f5e29887 link://[click] Size/MD5: 65844 5b4ed7aa2e26b77b6c95bb44d3869750 link://[click] Size/MD5: 8934 ec245ae15b0ba68b501af7a188e20c78 link://[click] Size/MD5: 65806 726700c8e49d8e2ece5c84262ab82849 link://[click] Size/MD5: 125468 591ac192642c55dd439ee6dd1d4a1a62 link://[click] Size/MD5: 235298 194d01564975da1065f994fda7ec9c3a amd64 architecture (Athlon64, Opteron, EM64T Xeon): link://[click] Size/MD5: 9028 a575ef97892b265117c921490478c749 link://[click] Size/MD5: 29740 49d84b67f840254959132b1568ae46be link://[click] Size/MD5: 1091924 5eb7c34ffbc5cac1ec3428fb6ff81daa link://[click] Size/MD5: 4450518 8268133a51caf767e6bd3b7974e9c6f2 link://[click] Size/MD5: 48682 da2d1192a88c460a80fee528be093d73 link://[click] Size/MD5: 9062436 75bb3c5a7a40c2c09832a5db61c5f320 i386 architecture (x86 compatible Intel/AMD): link://[click] Size/MD5: 9026 dcb3ffe9961637a24f4a92900bf506cb link://[click] Size/MD5: 25686 5c83329675e0bec00f0e1f6fa263be35 link://[click] Size/MD5: 1071068 4d6756aa7b216b50e8357dd6469147f5 link://[click] Size/MD5: 4437824 3285afec7e972337675f9771f64ed668 link://[click] Size/MD5: 38588 44673073b942d11924cdf56ba3df690b link://[click] Size/MD5: 7813284 273b331b31de831a4a39d25a49d999a4 lpia architecture (Low Power Intel Architecture): link://[click] Size/MD5: 9024 795d386d153f97be00bb1a426fc15330 link://[click] Size/MD5: 25304 de597f7551e871e1f57fe7e1a31774a3 link://[click] Size/MD5: 1069414 9851027bd003573746541269877bb84d link://[click] Size/MD5: 4428972 a940da665b7b409066cf234921180a97 link://[click] Size/MD5: 37546 16eb7adda58ba8ac943b7815ef7a3871 link://[click] Size/MD5: 7696132 9283cdb44b3215147e0abdc0620ec4d3 powerpc architecture (Apple Macintosh G3/G4/G5): link://[click] Size/MD5: 9030 891e46ef9a1aef332d3df52dcfb8d19c link://[click] Size/MD5: 27506 72d42ec8e4060dc2d642810b84be4077 link://[click] Size/MD5: 1084224 96e261886e771af178fb932dc7f269b8 link://[click] Size/MD5: 4028840 ff6de6d173949cc34bafcd2fa4b64b84 link://[click] Size/MD5: 43668 ce09a7ed59b34d9ac1a227dc1f7cff8a link://[click] Size/MD5: 8616998 a18d048f4b68e41a60044f3804044ab9 -- Ubuntu 8.10 -- Source archives: link://[click] Size/MD5: 123854 5eb9af8cc607c980d141364a77065c17 link://[click] Size/MD5: 2766 99c48d12708f9cf8ca1255ab0d2a39ef link://[click] Size/MD5: 11180629 f7306d068c261f95c284fba5a75a6c71 link://[click] Size/MD5: 251224 fa9a4f293ca4d0d5045f9680d53d5c96 link://[click] Size/MD5: 2794 c42552247a5657a41d07d7ce5203ecc1 link://[click] Size/MD5: 41504221 c3b32d6f68af24a75e4c902cb2ddbc09 Architecture independent packages: link://[click] Size/MD5: 68878 ed90d727a49bbadd3503458c4d1bd922 link://[click] Size/MD5: 68782 87ffabc6b89b467f305649830ffa9c82 link://[click] Size/MD5: 68792 78dd805c6027aeac6d99d87487e67d08 link://[click] Size/MD5: 68756 8394edd832cb58014187941a43999ef5 link://[click] Size/MD5: 68742 9537b48d032b9cd82856940efc0964a4 link://[click] Size/MD5: 68872 2b3bc01c0502214b21069538107d727b link://[click] Size/MD5: 68800 ea0d87d1e8f07f08ba34d3562a31c4c6 link://[click] Size/MD5: 68752 27d56b3630cbd6b3fa79e9da1cce611a link://[click] Size/MD5: 8968 67da562edf4df7832aeb222a56a2c0d9 link://[click] Size/MD5: 8958 2644e20ea755ee36e04e271c9d1ba1bc link://[click] Size/MD5: 68772 ceceabc7ab558738da2323a66f8897e8 link://[click] Size/MD5: 68744 dc3fee0726ee341fbb6ddfcd9ec1f1cf link://[click] Size/MD5: 68732 b00be3635032695f79604b02c57c8faa link://[click] Size/MD5: 8944 6db5ec69884f667e8369fbcc49cc8304 link://[click] Size/MD5: 68760 454aca37921589c3b74a2448a4073ff7 link://[click] Size/MD5: 8934 f1bcff624ea0c0386c55062bff9c9e68 link://[click] Size/MD5: 68726 9436faf6054364b44eebf32c559f950a link://[click] Size/MD5: 127760 c8126a5db486c695e71b428b9c571ad1 link://[click] Size/MD5: 237822 b440b3b72dc00feb81657173c73984ca amd64 architecture (Athlon64, Opteron, EM64T Xeon): link://[click] Size/MD5: 198336 6361e539637def42f67396cd216c49c3 link://[click] Size/MD5: 201764 8536462b9963d3f0cb07c31e3894adc6 link://[click] Size/MD5: 68838 e1e9d7e140bb2c79997cbf2f1fa30bbd link://[click] Size/MD5: 88232 fa2bdb12ff9a8d7e8c754888e4bb8f3b link://[click] Size/MD5: 906364 da574c215590f93a8bd1b9e455ec9e2f link://[click] Size/MD5: 4984526 634e691770102d04f85a6cf6db487304 link://[click] Size/MD5: 47064 c8af5dafb7823bae2fee3fa801dd3105 link://[click] Size/MD5: 8733332 1c85a4e3e06ac189438341268439bf61 link://[click] Size/MD5: 22494 735532b1360ede105f56598f41cb8a70 i386 architecture (x86 compatible Intel/AMD): link://[click] Size/MD5: 203608 ea24117110d1cfff534ab76f3ca862b5 link://[click] Size/MD5: 202138 076232931f266edb189416e974266a98 link://[click] Size/MD5: 68840 ef9f3612a61220022a280e370f527b16 link://[click] Size/MD5: 84282 acc9e8b502808b65d5a30be04be42302 link://[click] Size/MD5: 885350 6665202fe8c152f48cbf1591ebed93f3 link://[click] Size/MD5: 4954618 d73cb09470917f27e4d1e8b8eacb79ce link://[click] Size/MD5: 39454 0f044675aab70caa5e0f610c829f687d link://[click] Size/MD5: 7563740 61a5e2807bbe5caba44968ac181ef140 link://[click] Size/MD5: 22498 42b3898fefda9a5c6098b2a22d859f4f lpia architecture (Low Power Intel Architecture): link://[click] Size/MD5: 198084 7ff37decf8a4a57940785671c7c4707c link://[click] Size/MD5: 201306 32cc39b567f1d22cd023481779c246cd link://[click] Size/MD5: 68778 4c271575af18ed49ca16bd7999eca2ad link://[click] Size/MD5: 84300 056ad9092a7f0a270edcad48141af0d8 link://[click] Size/MD5: 884652 56d9c0316fa92c8ccf74fea4250c41b0 link://[click] Size/MD5: 4955706 560a919e63e36fc4b3fb52208e291d93 link://[click] Size/MD5: 38452 6da3195179b5a5379e2fb7c4fa74eee1 link://[click] Size/MD5: 7464230 f81a06670d47cde0eaa511cfb47cac06 link://[click] Size/MD5: 22312 d4aba0c381a3fb4fecfbc0d71aa01b95 powerpc architecture (Apple Macintosh G3/G4/G5): link://[click] Size/MD5: 203610 25bc60c85ae5e082a0c4f3b2f37f4255 link://[click] Size/MD5: 201974 df219ab232cc417f097bb845a73f6a62 link://[click] Size/MD5: 68844 72965f097fd6d0f6fd6b3d8b5c8b9aec link://[click] Size/MD5: 85698 a5f825d00ec30299aa30d042ae4932a6 link://[click] Size/MD5: 898222 add6ae49c0b4118adaf6b21ba632c66d link://[click] Size/MD5: 4533050 47146ffecd0b0db849497637b0a0bb6b link://[click] Size/MD5: 42408 0b6c4c6e1591a7e45d40760947fe64b6 link://[click] Size/MD5: 8273998 5c8b6e55a9a4cf2af73299279619fd5e link://[click] Size/MD5: 22500 3823abc3a2f63be4d1ba8c0deb264836 sparc architecture (Sun SPARC/UltraSPARC): link://[click] Size/MD5: 203600 21e5f298ce9eebf6961ed5df9c492d4c link://[click] Size/MD5: 201972 fb3fcbf79a27708ab8e0a76140f07c79 link://[click] Size/MD5: 68842 94c43c32c310476e8c0168c694b783ce link://[click] Size/MD5: 83394 531ccc5cf4f71116ab32b6baca072e72 link://[click] Size/MD5: 886646 481460e1a6a961fe08b7144845ae86bc link://[click] Size/MD5: 4519408 a545337a375ebc4d9eb4ec1115a7b8b1 link://[click] Size/MD5: 37870 ce67b9084164ebfdb2fea7f76b19af79 link://[click] Size/MD5: 8092686 5cdd2e017bb05cb2d2ec424752a770d0 link://[click] Size/MD5: 22504 d7d84e7d9443d8fc01822bdfd3035872

ORIGINAL ADVISORY: link://[click] OTHER REFERENCES: SA33799: link://[click]

About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: link://[click]

Definitions: (Criticality, Where etc.) link://[click]

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link.

Secunia NEVER sends attached files with advisories.

Secunia does not advise people to install third party patches, only use those supplied by the vendor.




Archives de la liste de diffusion Secunia
Archives de la liste de diffusion Full Disclosure





SecuToolBox :

Mini-Tagwall des articles publiés sur SecuObs :

Mini-Tagwall de l'annuaire video :

Mini-Tagwall des articles de la revue de presse :

Mini-Tagwall des Tweets de la revue Twitter :