[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Full-disclosure] SCOSA-2006.26 UnixWare 7.1.3 UnixWare 7.1.4 : Mozilla Multiple Vulnerabilities
- To: security-announce@xxxxxxxxxxxx
- Subject: [Full-disclosure] SCOSA-2006.26 UnixWare 7.1.3 UnixWare 7.1.4 : Mozilla Multiple Vulnerabilities
- From: SCO Security Advisories <security@xxxxxxx>
- Date: Wed, 12 Jul 2006 17:04:44 -0700
--
Dr. Ronald Joe Record
SCO Security Officer
rr@xxxxxxx
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
SCO Security Advisory
Subject: UnixWare 7.1.3 UnixWare 7.1.4 : Mozilla Multiple
Vulnerabilities
Advisory number: SCOSA-2006.26
Issue date: 2006 July 12
Cross reference: fz533443 fz533769
______________________________________________________________________________
1. Problem Description
The Mozilla 1.7.13 browser contains fixes for several security
issues resolved by Mozilla.org developers since the release
of Mozilla 1.7.12.
For a complete listing of the security issues
fixed in Mozilla 1.7.13 see Mozilla.org's
Known Vulnerabilities in Mozilla page at
http://www.mozilla.org/projects/security/known-vulnerabilities.html#Mozilla
2. Vulnerable Supported Versions
System Binaries
----------------------------------------------------------------------
UnixWare 7.1.3 Mozilla
UnixWare 7.1.4 Mozilla
3. Solution
The proper solution is to install the latest packages.
4. UnixWare 7.1.3
4.1 Location of Fixed Binaries
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.26
4.2 Verification
MD5 (mozilla-1.7.13.pkg) = bdda3fc54e1f43f708a0620aa4cb0248
md5 is available for download from
ftp://ftp.sco.com/pub/security/tools
4.3 Installing Fixed Binaries
Upgrade the affected binaries with the following sequence:
Read and follow the installation instructions at
ftp://ftp.sco.com/pub/unixware7/714/other/mozilla_1_7_13/UW7.README.html
Download mozilla-1.7.13.pkg to the /var/spool/pkg directory.
# pkgadd -d /var/spool/pkg/mozilla-1.7.13.pkg
5. UnixWare 7.1.4
5.1 Location of Fixed Binaries
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.26
5.2 Verification
MD5 (mozilla-1.7.13.pkg) = bdda3fc54e1f43f708a0620aa4cb0248
md5 is available for download from
ftp://ftp.sco.com/pub/security/tools
5.3 Installing Fixed Binaries
Upgrade the affected binaries with the following sequence:
Read and follow the installation instructions at
ftp://ftp.sco.com/pub/unixware7/714/other/mozilla_1_7_13/UW7.README.html
Download mozilla-1.7.13.pkg to the /var/spool/pkg directory.
# pkgadd -d /var/spool/pkg/mozilla-1.7.13.pkg
6. References
Specific references for this advisory:
http://www.mozilla.org/projects/security/known-vulnerabilities.html#Mozilla
SCO security resources:
http://www.sco.com/support/security/index.html
SCO security advisories via email
http://www.sco.com/support/forums/security.html
This security fix closes SCO incidents fz533443 fz533769.
7. Disclaimer
SCO is not responsible for the misuse of any of the information
we provide on this website and/or through our security
advisories. Our advisories are a service to our customers intended
to promote secure installation and use of SCO products.
______________________________________________________________________________
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (SCO_SV)
iD8DBQFEtYchaqoBO7ipriERAl20AKCRMrds2pJbbUtDMYqbCeAzg5KppACfXHcU
BLBcZNfK7yaBjaWPwyiDVuE=
=wr8R
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/