aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorsimon <simon@FreeBSD.org>2006-09-15 18:18:04 +0800
committersimon <simon@FreeBSD.org>2006-09-15 18:18:04 +0800
commit7a27784394368a6b530ffc9f3cacd6bcfe88acf1 (patch)
treecb239914cb3811d8ad13bbaa5c617eafafc73ce1 /security
parentc057c4a7778b8d6d9a7ec40137e48b6d2d6be616 (diff)
downloadfreebsd-ports-gnome-7a27784394368a6b530ffc9f3cacd6bcfe88acf1.tar.gz
freebsd-ports-gnome-7a27784394368a6b530ffc9f3cacd6bcfe88acf1.tar.zst
freebsd-ports-gnome-7a27784394368a6b530ffc9f3cacd6bcfe88acf1.zip
Document mozilla -- multiple vulnerabilities.
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml80
1 files changed, 80 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 20ebf444c040..e2137b19ec5c 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -34,6 +34,86 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="e6296105-449b-11db-ba89-000c6ec775d9">
+ <topic>mozilla -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>firefox</name>
+ <range><lt>1.5.0.7,1</lt></range>
+ <range><gt>2.*,1</gt></range>
+ </package>
+ <package>
+ <name>linux-firefox</name>
+ <range><lt>1.5.0.7</lt></range>
+ </package>
+ <package>
+ <name>seamonkey</name>
+ <name>linux-seamonkey</name>
+ <range><lt>1.0.5</lt></range>
+ </package>
+ <package>
+ <name>thunderbird</name>
+ <name>linux-thunderbird</name>
+ <name>mozilla-thunderbird</name>
+ <range><lt>1.5.0.7</lt></range>
+ </package>
+ <package>
+ <name>linux-firefox-devel</name>
+ <name>linux-mozilla-devel</name>
+ <name>linux-mozilla</name>
+ <name>linux-seamonkey-devel</name>
+ <name>mozilla</name>
+ <range><gt>0</gt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The Mozilla Foundation reports of multiple security issues
+ in Firefox, Seamonkey, and Thunderbird. Several of these
+ issues can probably be used to run arbitrary code with the
+ privilege of the user running the program.</p>
+ <blockquote cite="http://www.mozilla.org/security/announce/">
+ <ul>
+ <li>MFSA 2006-64 Crashes with evidence of memory
+ corruption (rv:1.8.0.7)</li>
+ <li>MFSA 2006-63 JavaScript execution in mail via XBL</li>
+ <li>MFSA 2006-62 Popup-blocker cross-site scripting (XSS)</li>
+ <li>MFSA 2006-61 Frame spoofing using document.open()</li>
+ <li>MFSA 2006-60 RSA Signature Forgery</li>
+ <li>MFSA 2006-59 Concurrency-related vulnerability</li>
+ <li>MFSA 2006-58 Auto-Update compromise through DNS and
+ SSL spoofing</li>
+ <li>MFSA 2006-57 JavaScript Regular Expression Heap
+ Corruption</li>
+ </ul>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2006-4253</cvename>
+ <cvename>CVE-2006-4340</cvename>
+ <cvename>CVE-2006-4565</cvename>
+ <cvename>CVE-2006-4566</cvename>
+ <cvename>CVE-2006-4567</cvename>
+ <cvename>CVE-2006-4568</cvename>
+ <cvename>CVE-2006-4569</cvename>
+ <cvename>CVE-2006-4570</cvename>
+ <cvename>CVE-2006-4571</cvename>
+ <url>http://www.mozilla.org/security/announce/2006/mfsa2006-57.html</url>
+ <url>http://www.mozilla.org/security/announce/2006/mfsa2006-58.html</url>
+ <url>http://www.mozilla.org/security/announce/2006/mfsa2006-59.html</url>
+ <url>http://www.mozilla.org/security/announce/2006/mfsa2006-60.html</url>
+ <url>http://www.mozilla.org/security/announce/2006/mfsa2006-61.html</url>
+ <url>http://www.mozilla.org/security/announce/2006/mfsa2006-62.html</url>
+ <url>http://www.mozilla.org/security/announce/2006/mfsa2006-63.html</url>
+ <url>http://www.mozilla.org/security/announce/2006/mfsa2006-64.html</url>
+ </references>
+ <dates>
+ <discovery>2006-09-14</discovery>
+ <entry>2006-09-15</entry>
+ </dates>
+ </vuln>
+
<vuln vid="24f6b1eb-43d5-11db-81e1-000e0c2e438a">
<topic>win32-codecs -- multiple vulnerabilities</topic>
<affects>