aboutsummaryrefslogtreecommitdiffstats
path: root/security/vuxml
diff options
context:
space:
mode:
authorsimon <simon@FreeBSD.org>2007-02-25 02:30:40 +0800
committersimon <simon@FreeBSD.org>2007-02-25 02:30:40 +0800
commitefd76609499e497b390a90c7ad553bd63b7b468f (patch)
tree0261260f127fac27bda32eb1aae2be449a8a1e43 /security/vuxml
parenta4bab6517fed040c9154c855dd1536a518d4bc29 (diff)
downloadfreebsd-ports-gnome-efd76609499e497b390a90c7ad553bd63b7b468f.tar.gz
freebsd-ports-gnome-efd76609499e497b390a90c7ad553bd63b7b468f.tar.zst
freebsd-ports-gnome-efd76609499e497b390a90c7ad553bd63b7b468f.zip
Document mozilla -- multiple vulnerabilities.
Note that Seamonkey 1.1 is marked vulnerable under the "better safe than sorry" principle, since it's not yet clear if Seamonkey 1.1 is vulnerable to this batch of vulnerabilities.
Diffstat (limited to 'security/vuxml')
-rw-r--r--security/vuxml/vuln.xml82
1 files changed, 82 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index d785c72d9d86..701995b841df 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -34,6 +34,88 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="12bd6ecf-c430-11db-95c5-000c6ec775d9">
+ <topic>mozilla -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>firefox</name>
+ <range><lt>1.5.0.10,1</lt></range>
+ <range><gt>2.*,1</gt><lt>2.0.0.2,1</lt></range>
+ </package>
+ <package>
+ <name>linux-firefox</name>
+ <range><lt>1.5.0.10</lt></range>
+ </package>
+ <package>
+ <name>seamonkey</name>
+ <name>linux-seamonkey</name>
+ <range><lt>1.0.8</lt></range>
+ <range><ge>1.1</ge></range>
+ </package>
+ <package>
+ <name>thunderbird</name>
+ <name>linux-thunderbird</name>
+ <name>mozilla-thunderbird</name>
+ <range><lt>1.5.0.10</lt></range>
+ </package>
+ <package>
+ <name>firefox-ja</name>
+ <name>linux-firefox-devel</name>
+ <name>linux-mozilla-devel</name>
+ <name>linux-mozilla</name>
+ <name>linux-seamonkey-devel</name>
+ <name>mozilla</name>
+ <range><gt>0</gt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The Mozilla Foundation reports of multiple security issues
+ in Firefox, Seamonkey, and Thunderbird. Several of these
+ issues can probably be used to run arbitrary code with the
+ privilege of the user running the program.</p>
+ <blockquote cite="http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox2.0.0.2">
+ <ul>
+ <li>MFSA 2007-07 Embedded nulls in location.hostname confuse same-domain checks</li>
+ <li>MFSA 2007-06 Mozilla Network Security Services (NSS) SSLv2 buffer overflow</li>
+ <li>MFSA 2007-05 XSS and local file access by opening blocked popups</li>
+ <li>MFSA 2007-04 Spoofing using custom cursor and CSS3 hotspot</li>
+ <li>MFSA 2007-03 Information disclosure through cache collisions</li>
+ <li>MFSA 2007-02 Improvements to help protect against Cross-Site Scripting attacks</li>
+ <li>MFSA 2007-01 Crashes with evidence of memory corruption (rv:1.8.0.10/1.8.1.2)</li>
+ </ul>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2006-6077</cvename>
+ <cvename>CVE-2007-0008</cvename>
+ <cvename>CVE-2007-0009</cvename>
+ <cvename>CVE-2007-0775</cvename>
+ <cvename>CVE-2007-0776</cvename>
+ <cvename>CVE-2007-0777</cvename>
+ <cvename>CVE-2007-0778</cvename>
+ <cvename>CVE-2007-0779</cvename>
+ <cvename>CVE-2007-0780</cvename>
+ <cvename>CVE-2007-0800</cvename>
+ <cvename>CVE-2007-0981</cvename>
+ <cvename>CVE-2007-0995</cvename>
+ <url>http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=482</url>
+ <url>http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=483</url>
+ <url>http://www.mozilla.org/security/announce/2007/mfsa2007-01.html</url>
+ <url>http://www.mozilla.org/security/announce/2007/mfsa2007-02.html</url>
+ <url>http://www.mozilla.org/security/announce/2007/mfsa2007-03.html</url>
+ <url>http://www.mozilla.org/security/announce/2007/mfsa2007-04.html</url>
+ <url>http://www.mozilla.org/security/announce/2007/mfsa2007-05.html</url>
+ <url>http://www.mozilla.org/security/announce/2007/mfsa2007-06.html</url>
+ <url>http://www.mozilla.org/security/announce/2007/mfsa2007-07.html</url>
+ </references>
+ <dates>
+ <discovery>2007-02-23</discovery>
+ <entry>2007-02-24</entry>
+ </dates>
+ </vuln>
+
<vuln vid="afdf500f-c1f6-11db-95c5-000c6ec775d9">
<topic>snort -- DCE/RPC preprocessor vulnerability</topic>
<affects>