rPath Security Advisory: 2008-0051-1
Published: 2008-02-08
Products:
    rPath Linux 1

Rating: Major
Exposure Level Classification:
    Indirect User Deterministic Unauthorized Access
Updated Versions:
    [EMAIL PROTECTED]:1/2.0.0.12-0.1-1

rPath Issue Tracking System:
    https://issues.rpath.com/browse/RPL-2233

References:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0594
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0593
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0592
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0591
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0419
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0418
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0417
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0415
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0414
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0413
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0412
    
http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox2.0.0.12

Description:
    Previous versions of the firefox package are vulnerable to several
    types of attacks, some of which are understood to allow compromised
    or malicious sites to run arbitrary code as the user running firefox.

http://wiki.rpath.com/Advisories:rPSA-2008-0051

Copyright 2008 rPath, Inc.
This file is distributed under the terms of the MIT License.
A copy is available at http://www.rpath.com/permanent/mit-license.html

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Reply via email to