---------------------------------------------------------------------- Bist Du interessiert an einem neuen Job in IT-Sicherheit? Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT- Sicherheit: http://secunia.com/secunia_vacancies/ ---------------------------------------------------------------------- TITLE: Fedora update for mozilla SECUNIA ADVISORY ID: SA16779 VERIFY ADVISORY: http://secunia.com/advisories/16779/ CRITICAL: Highly critical IMPACT: DoS, System access WHERE: >From remote OPERATING SYSTEM: Fedora Core 4 http://secunia.com/product/5251/ Fedora Core 3 http://secunia.com/product/4222/ DESCRIPTION: Fedora has issued an update for mozilla. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or to compromise a user's system. For more information: SA16767 SOLUTION: Apply updated packages. Fedora Core 3: http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/ 06e17c6028502048323b02d7ff9d59b4 SRPMS/mozilla-1.7.10-1.3.2.src.rpm b4d8302d016bb81af7f9bb5939c055d0 x86_64/mozilla-1.7.10-1.3.2.x86_64.rpm 424742831025ce3e0d17cef8324b7f41 x86_64/mozilla-nspr-1.7.10-1.3.2.x86_64.rpm 9a7ef782f2b60d6bc78e3545bc3a5e6c x86_64/mozilla-nspr-devel-1.7.10-1.3.2.x86_64.rpm 53f99acae7525c07dded462523144e0a x86_64/mozilla-nss-1.7.10-1.3.2.x86_64.rpm 97472852f74cf09a6a8407e7e3f731f6 x86_64/mozilla-nss-devel-1.7.10-1.3.2.x86_64.rpm 8eddea5ce7d9d47a4c7f5eefb2ef2ae2 x86_64/mozilla-devel-1.7.10-1.3.2.x86_64.rpm d6a3168a04fa5983eb864bc4c61cf1ad x86_64/mozilla-mail-1.7.10-1.3.2.x86_64.rpm 83cd83387e54efa1d5fef4cd038c4d2d x86_64/mozilla-chat-1.7.10-1.3.2.x86_64.rpm 9d8cb41a1d46f8ce4b252c3df531aa1e x86_64/mozilla-js-debugger-1.7.10-1.3.2.x86_64.rpm 658f1bb2368431e44be3fe50db19ec5d x86_64/mozilla-dom-inspector-1.7.10-1.3.2.x86_64.rpm c2afc4080cca4a45fbe42b74cbfe69f8 x86_64/debug/mozilla-debuginfo-1.7.10-1.3.2.x86_64.rpm 194e0ef4b161387897729d7edef996df x86_64/mozilla-nspr-1.7.10-1.3.2.i386.rpm e08421fc25692f832b7044bcf0101f73 x86_64/mozilla-nss-1.7.10-1.3.2.i386.rpm 6514c4e91521e86fed53128b267673c7 i386/mozilla-1.7.10-1.3.2.i386.rpm 194e0ef4b161387897729d7edef996df i386/mozilla-nspr-1.7.10-1.3.2.i386.rpm b3d721c87a275315f46ad4bcd2910e0e i386/mozilla-nspr-devel-1.7.10-1.3.2.i386.rpm e08421fc25692f832b7044bcf0101f73 i386/mozilla-nss-1.7.10-1.3.2.i386.rpm f02f5be7053f9806f64bd42f3193cfc9 i386/mozilla-nss-devel-1.7.10-1.3.2.i386.rpm e9183d1ef57b9999980de318fae7be68 i386/mozilla-devel-1.7.10-1.3.2.i386.rpm d499b6e6170033ec28fa2cd9b6548fb6 i386/mozilla-mail-1.7.10-1.3.2.i386.rpm d469f6a420bbc48448eabb3892d16e42 i386/mozilla-chat-1.7.10-1.3.2.i386.rpm 0d0e1ad6a15156da6ec62da999de5eed i386/mozilla-js-debugger-1.7.10-1.3.2.i386.rpm 39c8d0d976d87d86bed44b1136ec1272 i386/mozilla-dom-inspector-1.7.10-1.3.2.i386.rpm c7a91e7aca4db4452c25cc7e2389c4fb i386/debug/mozilla-debuginfo-1.7.10-1.3.2.i386.rpm Fedora Core 4: http://download.fedora.redhat.com/pub/fedora/linux/core/updates/4/ 1d6b02e9261710f5e616b72cb3fbdf4b SRPMS/mozilla-1.7.10-1.5.2.src.rpm 5e194697142bc226ed1ce0c41a5ddda0 ppc/mozilla-1.7.10-1.5.2.ppc.rpm 31d53f89d85f6fc3d8d60ad98c6568b0 ppc/mozilla-nspr-1.7.10-1.5.2.ppc.rpm 2b4dbf64efb561e84d8134b3af1e3a0a ppc/mozilla-nspr-devel-1.7.10-1.5.2.ppc.rpm 8be61c121fda6b13f73fd555cf420506 ppc/mozilla-nss-1.7.10-1.5.2.ppc.rpm 662a531f38a64f67c419c3a0763aaf3c ppc/mozilla-nss-devel-1.7.10-1.5.2.ppc.rpm 0aaebac17278c986fac95e1c47c0b956 ppc/mozilla-devel-1.7.10-1.5.2.ppc.rpm 7ada3163823634334efaf2f27cc3776e ppc/mozilla-mail-1.7.10-1.5.2.ppc.rpm a3da6d543b8710aa486da1c063661fa1 ppc/mozilla-chat-1.7.10-1.5.2.ppc.rpm 09143e44abe449408641e899a663f413 ppc/mozilla-js-debugger-1.7.10-1.5.2.ppc.rpm d584b675a9a2822d54cae26e8419d13f ppc/mozilla-dom-inspector-1.7.10-1.5.2.ppc.rpm 03ad29822cb3a905971b9256d34b9c54 ppc/debug/mozilla-debuginfo-1.7.10-1.5.2.ppc.rpm 777e16069910a62c8c924dbd69dd15f9 x86_64/mozilla-1.7.10-1.5.2.x86_64.rpm 5081128320f7eed4e51cd65c6ce4aec5 x86_64/mozilla-nspr-1.7.10-1.5.2.x86_64.rpm 9af31723823ab0318b4d824e119769aa x86_64/mozilla-nspr-devel-1.7.10-1.5.2.x86_64.rpm ad2712e72e7d00c3a4d04803fbeb11d3 x86_64/mozilla-nss-1.7.10-1.5.2.x86_64.rpm 26922858fe93126d4195bbe4c6ea8f37 x86_64/mozilla-nss-devel-1.7.10-1.5.2.x86_64.rpm 488cddf6ee8b8c460ea236071db19d2e x86_64/mozilla-devel-1.7.10-1.5.2.x86_64.rpm 5fad9772204d9dc041edf878d9aea8ec x86_64/mozilla-mail-1.7.10-1.5.2.x86_64.rpm 24399336a0c068b632e82d3cfd77464d x86_64/mozilla-chat-1.7.10-1.5.2.x86_64.rpm 07260782b92a8421211122d9b4d57ab6 x86_64/mozilla-js-debugger-1.7.10-1.5.2.x86_64.rpm a5c70168463c4bee098d452aa57f56ef x86_64/mozilla-dom-inspector-1.7.10-1.5.2.x86_64.rpm d97a582f6d709d87c9a8f751de3d9e24 x86_64/debug/mozilla-debuginfo-1.7.10-1.5.2.x86_64.rpm 68181cf3f0c2d04edfb0ac3d6bdbc9e1 x86_64/mozilla-nspr-1.7.10-1.5.2.i386.rpm 2a273cc86ab79cb35f75b125364f3435 x86_64/mozilla-nss-1.7.10-1.5.2.i386.rpm 79bcb2d3ccbcd172e139e84bc1561711 i386/mozilla-1.7.10-1.5.2.i386.rpm 68181cf3f0c2d04edfb0ac3d6bdbc9e1 i386/mozilla-nspr-1.7.10-1.5.2.i386.rpm 0c08b231ed117ed1f44b26821a83fda4 i386/mozilla-nspr-devel-1.7.10-1.5.2.i386.rpm 2a273cc86ab79cb35f75b125364f3435 i386/mozilla-nss-1.7.10-1.5.2.i386.rpm b6c56269e7770b542f8f378720d4f947 i386/mozilla-nss-devel-1.7.10-1.5.2.i386.rpm 353254b90d373794ca2832530abaa8cc i386/mozilla-devel-1.7.10-1.5.2.i386.rpm c0a7c67c2dd49e7ee1bc598532d8ed30 i386/mozilla-mail-1.7.10-1.5.2.i386.rpm 16bac1eef7fa4abf022390c7d83f129e i386/mozilla-chat-1.7.10-1.5.2.i386.rpm df29a03ebd9c0e0b3c7863f71d8f63dc i386/mozilla-js-debugger-1.7.10-1.5.2.i386.rpm a04ce07f139d9bb62c9a9e5ddbfb0dca i386/mozilla-dom-inspector-1.7.10-1.5.2.i386.rpm 4741343dc1e022f88b230af69976a42c i386/debug/mozilla-debuginfo-1.7.10-1.5.2.i386.rpm OTHER REFERENCES: SA16767: http://secunia.com/advisories/16767/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------