Upstream information

CVE-2006-4567 at MITRE

Description

Mozilla Firefox before 1.5.0.7 and Thunderbird before 1.5.0.7 makes it easy for users to accept self-signed certificates for the auto-update mechanism, which might allow remote user-assisted attackers to use DNS spoofing to trick users into visiting a malicious site and accepting a malicious certificate for the Mozilla update site, which can then be used to install arbitrary code on the next update.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having low severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 2.6
Vector AV:N/AC:H/Au:N/C:N/I:P/A:N
Access Vector Network
Access Complexity High
Authentication None
Confidentiality Impact None
Integrity Impact Partial
Availability Impact None
SUSE Bugzilla entry: 205678 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE LINUX 10.0
SUSE LINUX 9.2
SUSE LINUX 9.3
  • MozillaFirefox >= 1.5.0.7-1.1
  • MozillaFirefox-translations >= 1.5.0.7-1.1
SUSE LINUX 10.1
  • MozillaFirefox >= 1.5.0.7-1.2
  • MozillaFirefox-translations >= 1.5.0.7-1.2
SUSE LINUX 10.0
SUSE LINUX 9.2
SUSE LINUX 9.3
  • MozillaThunderbird >= 1.5.0.7-0.1
SUSE LINUX 10.1
  • MozillaThunderbird >= 1.5.0.7-0.1
  • MozillaThunderbird-translations >= 1.5.0.7-0.1
Novell Linux Desktop 9 for x86
Novell Linux Desktop 9 for x86_64
  • MozillaFirefox >= 1.5.0.7-1.2
  • MozillaFirefox-translations >= 1.5.0.7-1.2
sles10.s390x
sled10.x86
sles10.ia64
ZYPP Patch Nr: 2088