Сами вы троян Это совершенно безобидная вешалка для Нетскейповских броузеров )))))
Описание (лень переводить, но, думаю, сами все поймете):
"Mozilla is an open-source Web browser for Microsoft Windows and Linux platforms. Mozilla versions prior to 1.7.6, Firefox versions prior to 1.0.2, and Thunderbird versions prior to 1.0.2 are vulnerable to a heap-based buffer overflow, caused by a vulnerability in the GIF image processing library. By sending a specially-crafted GIF image, a remote attacker could overflow a buffer and execute arbitrary code on the system."
"How to remove this vulnerability Jump to the top of this document
For Firefox:
Upgrade to the latest version of Firefox (1.0.2 or later), available from the Mozilla Firefox Download Web page. See References.
For Mozilla:
Upgrade to the latest version of Mozilla Suite (1.7.6 or later), available from the Mozilla Suite Download Web page. See References.
For Thunderbird:
Upgrade to the latest version of Thunderbird (1.0.2 or later), available from the Mozilla CVS Repository Web site. See References.
For Gentoo Linux:
Upgrade to the latest version of Mozilla (1.7.6 or later), as listed in Gentoo Linux Security Advisory GLSA 200503-30. See References.
For Gentoo Linux:
Upgrade to the latest version of Mozilla Firefox and Mozilla Firefox bin (1.0.2 or later), as listed in Gentoo Linux Security Advisory GLSA 200503-31. See References.
For Gentoo Linux:
Upgrade to the latest version of Mozilla Thunderbird and Mozilla Thunderbird bin (1.0.2 or later), as listed in Gentoo Linux Security Advisory GLSA 200503-32. See References.
For other distributions:
Contact your vendor for upgrade or patch information."
Ссылки на более подробную информацию и заплатки:
"Internet Security Systems Protection Advisory March 23, 2005
Mozilla Foundation GIF Overflow
http://xforce.iss.net/xforce/alerts/id/191
Security Advisory RHSA-2005:335-07
mozilla security update
https://rhn.redhat.com/errata/RHSA-2005-335.html
Security Advisory RHSA-2005:337-02
thunderbird security update
https://rhn.redhat.com/errata/RHSA-2005-337.html
CIAC INFORMATION BULLETIN P-168
Mozilla Security Update
http://www.ciac.org/ciac/bulletins/p-168.shtml
US-CERT Vulnerability Note VU#557948
Mozilla products vulnerable to heap overflow via specially crafted GIF file
http://www.kb.cert.org/vuls/id/557948
Gentoo Linux Security Advisory GLSA 200503-32
Mozilla Thunderbird: Multiple vulnerabilities
http://www.gentoo.org/security/en/g...a-200503-32.xml
Gentoo Linux Security Advisory GLSA 200503-31
Mozilla Firefox: Multiple vulnerabilities
http://www.gentoo.org/security/en/g...a-200503-31.xml
Gentoo Linux Security Advisory GLSA 200503-30
Mozilla Suite: Multiple vulnerabilities
http://www.gentoo.org/security/en/g...a-200503-30.xml
CIAC INFORMATION BULLETIN P-160
GIF Heap Overflow Parsing Netscape Extension 2
http://www.ciac.org/ciac/bulletins/p-160.shtml
Mozilla Web site
Firefox - Rediscover the web
http://www.mozilla.org/products/firefox/
Mozilla Web site
Thunderbird - Reclaim Your Inbox
http://www.mozilla.org/products/thunderbird/
Mozilla Suite Download Web page
Mozilla Suite - The All-in-One Internet Application
http://www.mozilla.org/products/mozilla1.x/
Mozilla Foundation Security Advisory 2005-30
GIF heap overflow parsing Netscape extension 2
http://www.mozilla.org/security/ann...fsa2005-30.html
Common Vulnerabilities and Exposures
Heap-based buffer overflow in GIF2.cpp in Firefox before 1.0.2, Mozilla before to 1.7.6, and Thunderbird before 1.0.2, and possibly other applications that use the same library, allows remote attackers to execute arbitrary code via a GIF image with a crafted Netscape extension 2 block and buffer size.
http://cve.mitre.org/cgi-bin/cvenam...e=CVE-2005-0399
BugTraq
Mozilla GIF Image Processing Library Remote Heap Overflow Vulnerability
http://www.securityfocus.com/bid/12881 "
__________________
Дело не в тебе
Адрес поста | Один пост | Сообщить модератору | IP: Logged