aboutsummaryrefslogtreecommitdiff
path: root/security
diff options
context:
space:
mode:
authorSimon L. B. Nielsen <simon@FreeBSD.org>2005-02-26 14:25:31 +0000
committerSimon L. B. Nielsen <simon@FreeBSD.org>2005-02-26 14:25:31 +0000
commit77260025a25998eeea7e641043afa0534558451e (patch)
tree834940fa3449a1e1444962dbe270196873e1f24c /security
parent3d17564db2c2481009f9b8ca37cb23964e7aaa5e (diff)
downloadports-77260025a25998eeea7e641043afa0534558451e.tar.gz
ports-77260025a25998eeea7e641043afa0534558451e.zip
Notes
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml87
1 files changed, 87 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 084fd5ea8db6..85e448fc042e 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -32,6 +32,93 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="cbfde1cd-87eb-11d9-aa18-0001020eed82">
+ <topic>mozilla &amp; firefox -- arbitrary code execution vulnerability</topic>
+ <affects>
+ <package>
+ <name>firefox</name>
+ <range><lt>1.0.1,1</lt></range>
+ </package>
+ <package>
+ <name>mozilla</name>
+ <range><lt>1.7.6,2</lt></range>
+ </package>
+ <package>
+ <name>linux-mozilla</name>
+ <name>linux-mozilla-devel</name>
+ <range><lt>1.7.6</lt></range>
+ </package>
+ <package>
+ <name>netscape7</name>
+ <range><ge>0</ge></range>
+ </package>
+ <package>
+ <!-- These ports are obsolete. -->
+ <name>de-linux-mozillafirebird</name>
+ <name>el-linux-mozillafirebird</name>
+ <name>ja-linux-mozillafirebird-gtk1</name>
+ <name>ja-mozillafirebird-gtk2</name>
+ <name>linux-mozillafirebird</name>
+ <name>ru-linux-mozillafirebird</name>
+ <name>zhCN-linux-mozillafirebird</name>
+ <name>zhTW-linux-mozillafirebird</name>
+ <range><ge>0</ge></range>
+ </package>
+ <package>
+ <!-- These package names are obsolete. -->
+ <name>de-linux-netscape</name>
+ <name>de-netscape7</name>
+ <name>fr-linux-netscape</name>
+ <name>fr-netscape7</name>
+ <name>ja-linux-netscape</name>
+ <name>ja-netscape7</name>
+ <name>linux-netscape</name>
+ <name>linux-phoenix</name>
+ <name>mozilla+ipv6</name>
+ <name>mozilla-embedded</name>
+ <name>mozilla-firebird</name>
+ <name>mozilla-gtk1</name>
+ <name>mozilla-gtk2</name>
+ <name>mozilla-gtk</name>
+ <name>mozilla-thunderbird</name>
+ <name>phoenix</name>
+ <name>pt_BR-netscape7</name>
+ <range><ge>0</ge></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>A Mozilla Foundation Security Advisory reports:</p>
+ <blockquote cite="http://www.mozilla.org/security/announce/mfsa2005-27.html">
+ <p>Plugins (such as flash) can be used to load privileged
+ content into a frame. Once loaded various spoofs can be
+ applied to get the user to interact with the privileged
+ content. Michael Krax's "Fireflashing" example
+ demonstrates that an attacker can open about:config in a
+ frame, hide it with an opacity setting, and if the
+ attacker can get the victim to click at a particular spot
+ (design some kind of simple game) you could toggle boolean
+ preferences, some of which would make further attacks
+ easier.</p>
+ <p>The "firescrolling" example demonstrates arbitrary code
+ execution (in this case downloading a file) by convincing
+ the user to scroll twice.</p>
+ </blockquote>
+ <p><strong>Workaround:</strong> Disable JavaScript.</p>
+ </body>
+ </description>
+ <references>
+ <cvename>CAN-2005-0527</cvename>
+ <url>http://www.mikx.de/fireflashing/</url>
+ <url>http://www.mikx.de/firescrolling/</url>
+ <url>http://www.mozilla.org/security/announce/mfsa2005-27.html</url>
+ </references>
+ <dates>
+ <discovery>2005-02-24</discovery>
+ <entry>2005-02-26</entry>
+ </dates>
+ </vuln>
+
<vuln vid="32d4f0f1-85c3-11d9-b6dc-0007e900f747">
<topic>mkbold-mkitalic -- format string vulnerability</topic>
<affects>