diff options
author | Simon L. B. Nielsen <simon@FreeBSD.org> | 2005-02-26 14:25:31 +0000 |
---|---|---|
committer | Simon L. B. Nielsen <simon@FreeBSD.org> | 2005-02-26 14:25:31 +0000 |
commit | 77260025a25998eeea7e641043afa0534558451e (patch) | |
tree | 834940fa3449a1e1444962dbe270196873e1f24c /security | |
parent | 3d17564db2c2481009f9b8ca37cb23964e7aaa5e (diff) | |
download | ports-77260025a25998eeea7e641043afa0534558451e.tar.gz ports-77260025a25998eeea7e641043afa0534558451e.zip |
Notes
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 87 |
1 files changed, 87 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 084fd5ea8db6..85e448fc042e 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -32,6 +32,93 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="cbfde1cd-87eb-11d9-aa18-0001020eed82"> + <topic>mozilla & firefox -- arbitrary code execution vulnerability</topic> + <affects> + <package> + <name>firefox</name> + <range><lt>1.0.1,1</lt></range> + </package> + <package> + <name>mozilla</name> + <range><lt>1.7.6,2</lt></range> + </package> + <package> + <name>linux-mozilla</name> + <name>linux-mozilla-devel</name> + <range><lt>1.7.6</lt></range> + </package> + <package> + <name>netscape7</name> + <range><ge>0</ge></range> + </package> + <package> + <!-- These ports are obsolete. --> + <name>de-linux-mozillafirebird</name> + <name>el-linux-mozillafirebird</name> + <name>ja-linux-mozillafirebird-gtk1</name> + <name>ja-mozillafirebird-gtk2</name> + <name>linux-mozillafirebird</name> + <name>ru-linux-mozillafirebird</name> + <name>zhCN-linux-mozillafirebird</name> + <name>zhTW-linux-mozillafirebird</name> + <range><ge>0</ge></range> + </package> + <package> + <!-- These package names are obsolete. --> + <name>de-linux-netscape</name> + <name>de-netscape7</name> + <name>fr-linux-netscape</name> + <name>fr-netscape7</name> + <name>ja-linux-netscape</name> + <name>ja-netscape7</name> + <name>linux-netscape</name> + <name>linux-phoenix</name> + <name>mozilla+ipv6</name> + <name>mozilla-embedded</name> + <name>mozilla-firebird</name> + <name>mozilla-gtk1</name> + <name>mozilla-gtk2</name> + <name>mozilla-gtk</name> + <name>mozilla-thunderbird</name> + <name>phoenix</name> + <name>pt_BR-netscape7</name> + <range><ge>0</ge></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>A Mozilla Foundation Security Advisory reports:</p> + <blockquote cite="http://www.mozilla.org/security/announce/mfsa2005-27.html"> + <p>Plugins (such as flash) can be used to load privileged + content into a frame. Once loaded various spoofs can be + applied to get the user to interact with the privileged + content. Michael Krax's "Fireflashing" example + demonstrates that an attacker can open about:config in a + frame, hide it with an opacity setting, and if the + attacker can get the victim to click at a particular spot + (design some kind of simple game) you could toggle boolean + preferences, some of which would make further attacks + easier.</p> + <p>The "firescrolling" example demonstrates arbitrary code + execution (in this case downloading a file) by convincing + the user to scroll twice.</p> + </blockquote> + <p><strong>Workaround:</strong> Disable JavaScript.</p> + </body> + </description> + <references> + <cvename>CAN-2005-0527</cvename> + <url>http://www.mikx.de/fireflashing/</url> + <url>http://www.mikx.de/firescrolling/</url> + <url>http://www.mozilla.org/security/announce/mfsa2005-27.html</url> + </references> + <dates> + <discovery>2005-02-24</discovery> + <entry>2005-02-26</entry> + </dates> + </vuln> + <vuln vid="32d4f0f1-85c3-11d9-b6dc-0007e900f747"> <topic>mkbold-mkitalic -- format string vulnerability</topic> <affects> |