Executive Summary
Summary | |
---|---|
Title | Updated Mozilla packages fix security issues |
Informations | |||
---|---|---|---|
Name | RHSA-2004:110 | First vendor Publication | 2004-03-29 |
Vendor | RedHat | Last vendor Modification | 2004-03-29 |
Severity (Vendor) | N/A | Revision | 01 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 6.8 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Problem Description: |
Original Source
Url : https://rhn.redhat.com/errata/RHSA-2004-110.html |
CAPEC : Common Attack Pattern Enumeration & Classification
Id | Name |
---|---|
CAPEC-26 | Leveraging Race Conditions |
CAPEC-29 | Leveraging Time-of-Check and Time-of-Use (TOCTOU) Race Conditions |
CWE : Common Weakness Enumeration
% | Id | Name |
---|
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:10838 | |||
Oval ID: | oval:org.mitre.oval:def:10838 | ||
Title: | Mozilla before 1.4.2 executes Javascript events in the context of a new page while it is being loaded, allowing it to interact with the previous page (zombie document) and enable cross-domain and cross-site scripting (XSS) attacks, as demonstrated using onmousemove events. | ||
Description: | Mozilla before 1.4.2 executes Javascript events in the context of a new page while it is being loaded, allowing it to interact with the previous page (zombie document) and enable cross-domain and cross-site scripting (XSS) attacks, as demonstrated using onmousemove events. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2004-0191 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:11462 | |||
Oval ID: | oval:org.mitre.oval:def:11462 | ||
Title: | Multiple vulnerabilities in multiple vendor implementations of the Secure/Multipurpose Internet Mail Extensions (S/MIME) protocol allow remote attackers to cause a denial of service and possibly execute arbitrary code via an S/MIME email message containing certain unexpected ASN.1 constructs, as demonstrated using the NISSC test suite. | ||
Description: | Multiple vulnerabilities in multiple vendor implementations of the Secure/Multipurpose Internet Mail Extensions (S/MIME) protocol allow remote attackers to cause a denial of service and possibly execute arbitrary code via an S/MIME email message containing certain unexpected ASN.1 constructs, as demonstrated using the NISSC test suite. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2003-0564 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:872 | |||
Oval ID: | oval:org.mitre.oval:def:872 | ||
Title: | Red Hat S/MIME Protocol Denial of Service Vulnerability | ||
Description: | Multiple vulnerabilities in multiple vendor implementations of the Secure/Multipurpose Internet Mail Extensions (S/MIME) protocol allow remote attackers to cause a denial of service and possibly execute arbitrary code via an S/MIME email message containing certain unexpected ASN.1 constructs, as demonstrated using the NISSC test suite. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2003-0564 | Version: | 2 |
Platform(s): | Red Hat Linux 9 | Product(s): | mozilla |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:874 | |||
Oval ID: | oval:org.mitre.oval:def:874 | ||
Title: | Red Hat Mozilla Zombie Document Vulnerability | ||
Description: | Mozilla before 1.4.2 executes Javascript events in the context of a new page while it is being loaded, allowing it to interact with the previous page (zombie document) and enable cross-domain and cross-site scripting (XSS) attacks, as demonstrated using onmousemove events. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2004-0191 | Version: | 2 |
Platform(s): | Red Hat Linux 9 | Product(s): | mozilla |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:914 | |||
Oval ID: | oval:org.mitre.oval:def:914 | ||
Title: | Red Hat Enterprise 3 S/MIME Protocol Denial of Service Vulnerability | ||
Description: | Multiple vulnerabilities in multiple vendor implementations of the Secure/Multipurpose Internet Mail Extensions (S/MIME) protocol allow remote attackers to cause a denial of service and possibly execute arbitrary code via an S/MIME email message containing certain unexpected ASN.1 constructs, as demonstrated using the NISSC test suite. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2003-0564 | Version: | 2 |
Platform(s): | Red Hat Enterprise Linux 3 | Product(s): | |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:937 | |||
Oval ID: | oval:org.mitre.oval:def:937 | ||
Title: | Red Hat Enterprise 3 Mozilla Zombie Document Vulnerability | ||
Description: | Mozilla before 1.4.2 executes Javascript events in the context of a new page while it is being loaded, allowing it to interact with the previous page (zombie document) and enable cross-domain and cross-site scripting (XSS) attacks, as demonstrated using onmousemove events. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2004-0191 | Version: | 2 |
Platform(s): | Red Hat Enterprise Linux 3 | Product(s): | |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
4197 | Mozilla / NSS S/MIME Implementation |
4062 | Mozilla Zombie Document XSS Mozilla contains a flaw that allows a remote cross site scripting attack. This flaw exists because of a design error that allows event handlers in a web document from one domain to be executed in the context of another. . This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity. |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2004-07-31 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2004-021.nasl - Type : ACT_GATHER_INFO |
2004-07-06 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2004-110.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2016-04-26 13:48:50 |
|
2014-02-17 11:48:26 |
|