TITLE: Fedora update for mozilla SECUNIA ADVISORY ID: SA16964 VERIFY ADVISORY: http://secunia.com/advisories/16964/ CRITICAL: Highly critical IMPACT: Security Bypass, Spoofing, Manipulation of data, System access WHERE: >From remote OPERATING SYSTEM: Fedora Core 3 http://secunia.com/product/4222/ Fedora Core 4 http://secunia.com/product/5251/ DESCRIPTION: Fedora has issued an update for mozilla. This fixes some vulnerabilities, which can be exploited by malicious people to conduct spoofing attacks, manipulate certain data, bypass certain security restrictions, and compromise a user's system. For more information: SA16917 SOLUTION: Apply updated packages. Fedora Core 3: http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/ 63bd78810cf5b5536353633a747c30a2 SRPMS/mozilla-1.7.12-1.3.1.src.rpm e284cf3bf15bbd75a034403803780f7b x86_64/mozilla-1.7.12-1.3.1.x86_64.rpm 03de6b7b8717b06cd340a4ef24e77968 x86_64/mozilla-nspr-1.7.12-1.3.1.x86_64.rpm 4f0845e48ac3dc090328f8ccc4d05223 x86_64/mozilla-nspr-devel-1.7.12-1.3.1.x86_64.rpm 7592b2aaa765de6b2663dd1e874c92b7 x86_64/mozilla-nss-1.7.12-1.3.1.x86_64.rpm 626844eb2fe11ea77d995774754f9031 x86_64/mozilla-nss-devel-1.7.12-1.3.1.x86_64.rpm 51836f29a3241931115639aafacdbada x86_64/mozilla-devel-1.7.12-1.3.1.x86_64.rpm 5977fc3d3e271f470cde62c3c65654aa x86_64/mozilla-mail-1.7.12-1.3.1.x86_64.rpm 6a8720bf69cd9d5de1e441fa78b11f7d x86_64/mozilla-chat-1.7.12-1.3.1.x86_64.rpm 726a24bc7f7d89f8ecf16425b82f46fc x86_64/mozilla-js-debugger-1.7.12-1.3.1.x86_64.rpm 8365d36d8a9a3ff32214d539ee6e2851 x86_64/mozilla-dom-inspector-1.7.12-1.3.1.x86_64.rpm 6a48abbf3dffac1559bd832727534848 x86_64/debug/mozilla-debuginfo-1.7.12-1.3.1.x86_64.rpm 4b13cf4c6680ffcacef3c32c7216835c x86_64/mozilla-nspr-1.7.12-1.3.1.i386.rpm 7a6d96394cb522bb87fddb8b1f1de2bc x86_64/mozilla-nss-1.7.12-1.3.1.i386.rpm 196301d969606f6b24539fe115b20c85 i386/mozilla-1.7.12-1.3.1.i386.rpm 4b13cf4c6680ffcacef3c32c7216835c i386/mozilla-nspr-1.7.12-1.3.1.i386.rpm 108c926ed91f44c61413323079682120 i386/mozilla-nspr-devel-1.7.12-1.3.1.i386.rpm 7a6d96394cb522bb87fddb8b1f1de2bc i386/mozilla-nss-1.7.12-1.3.1.i386.rpm d5297a5613453214304e8f066a174736 i386/mozilla-nss-devel-1.7.12-1.3.1.i386.rpm f6822735fb99eab4f77d5cf9e5310aaa i386/mozilla-devel-1.7.12-1.3.1.i386.rpm f2b13215621464fd2d1121b3df958d7a i386/mozilla-mail-1.7.12-1.3.1.i386.rpm 045f61a21038fc15eb78ca700677e70d i386/mozilla-chat-1.7.12-1.3.1.i386.rpm 0d4d7b682ccffc4aa61c0468cb4e5096 i386/mozilla-js-debugger-1.7.12-1.3.1.i386.rpm be245dfb92cb4b610f2349888fceefa4 i386/mozilla-dom-inspector-1.7.12-1.3.1.i386.rpm f5d066e3bd2b12a561ec1f54399aef99 i386/debug/mozilla-debuginfo-1.7.12-1.3.1.i386.rpm Fedora Core 4: http://download.fedora.redhat.com/pub/fedora/linux/core/updates/4/ 15996667d8d7ff6f716f9a3b3fd73a46 SRPMS/mozilla-1.7.12-1.5.1.src.rpm 6e5d4465c6818212dc200884a6772efc ppc/mozilla-1.7.12-1.5.1.ppc.rpm 554fab19cd517dac6af547fc9f8a0cab ppc/mozilla-nspr-1.7.12-1.5.1.ppc.rpm d96547c7855f990aea45008176c94151 ppc/mozilla-nspr-devel-1.7.12-1.5.1.ppc.rpm eb943304ee62ad1c21323d48cffac07f ppc/mozilla-nss-1.7.12-1.5.1.ppc.rpm 388bf012368737e2e9abd8fdae61cd10 ppc/mozilla-nss-devel-1.7.12-1.5.1.ppc.rpm 73a56b8de2ed1ce21ce934d7b4fc0030 ppc/mozilla-devel-1.7.12-1.5.1.ppc.rpm f0e2bb8447868c5310506cdf4e59f610 ppc/mozilla-mail-1.7.12-1.5.1.ppc.rpm b6d8b972a810d6be63c9e49acb311a63 ppc/mozilla-chat-1.7.12-1.5.1.ppc.rpm 19bb5d74ed7f347b0bff67b9e2687426 ppc/mozilla-js-debugger-1.7.12-1.5.1.ppc.rpm 87dc66737ae9ff2d01f0900c02a34c92 ppc/mozilla-dom-inspector-1.7.12-1.5.1.ppc.rpm af43d44627d556682f070afe5b0fcc88 ppc/debug/mozilla-debuginfo-1.7.12-1.5.1.ppc.rpm 7834b3634d54f4ab835c77e247a56b6f x86_64/mozilla-1.7.12-1.5.1.x86_64.rpm 06bf1c0ffd94de4dd3abe534f6c62448 x86_64/mozilla-nspr-1.7.12-1.5.1.x86_64.rpm aaea1e31b0d1818d9165928c716f81d7 x86_64/mozilla-nspr-devel-1.7.12-1.5.1.x86_64.rpm 2986c7d17771826b0ce3802b2322cbef x86_64/mozilla-nss-1.7.12-1.5.1.x86_64.rpm fd477dad54c6b764730db8255854d8c4 x86_64/mozilla-nss-devel-1.7.12-1.5.1.x86_64.rpm fba077cce640223cab879d41e5916c99 x86_64/mozilla-devel-1.7.12-1.5.1.x86_64.rpm 5f8e89073c0fb61e9cfe1f36789a3933 x86_64/mozilla-mail-1.7.12-1.5.1.x86_64.rpm 99932f0cd7bc71c5300f7b83021e8bc5 x86_64/mozilla-chat-1.7.12-1.5.1.x86_64.rpm 891fff494775baeef27bd3137684eeec x86_64/mozilla-js-debugger-1.7.12-1.5.1.x86_64.rpm ac1e58cffbe7b5cb163c056da0a0f282 x86_64/mozilla-dom-inspector-1.7.12-1.5.1.x86_64.rpm 7e0ea761ff2e9caea8c42b082c13f604 x86_64/debug/mozilla-debuginfo-1.7.12-1.5.1.x86_64.rpm 47c89bff509e46e4b54041aac04f2137 x86_64/mozilla-nspr-1.7.12-1.5.1.i386.rpm ae517ab122351d6ada9e9289b1c1ef3d x86_64/mozilla-nss-1.7.12-1.5.1.i386.rpm 9b9ca33577a785f0e36ed2092ed97555 i386/mozilla-1.7.12-1.5.1.i386.rpm 47c89bff509e46e4b54041aac04f2137 i386/mozilla-nspr-1.7.12-1.5.1.i386.rpm 9c409c087a06ccec4ba0b404ca2e1b1d i386/mozilla-nspr-devel-1.7.12-1.5.1.i386.rpm ae517ab122351d6ada9e9289b1c1ef3d i386/mozilla-nss-1.7.12-1.5.1.i386.rpm d74dd6b014102d3a6f9e0fafae217edf i386/mozilla-nss-devel-1.7.12-1.5.1.i386.rpm 4b3cacd4a3c274c008d55aae107d108a i386/mozilla-devel-1.7.12-1.5.1.i386.rpm b24a2919fafa1f4e314e5a26ef65280f i386/mozilla-mail-1.7.12-1.5.1.i386.rpm 86ac5ce35a97c750eeb38764553a7653 i386/mozilla-chat-1.7.12-1.5.1.i386.rpm 74b1fd6aea19fd037e5ccec3c94c70c7 i386/mozilla-js-debugger-1.7.12-1.5.1.i386.rpm 30d339600011964baec08ce5d895f42d i386/mozilla-dom-inspector-1.7.12-1.5.1.i386.rpm d7c08369f13113f9195097969107549e i386/debug/mozilla-debuginfo-1.7.12-1.5.1.i386.rpm OTHER REFERENCES: SA16917: http://secunia.com/advisories/16917/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------