aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorsimon <simon@FreeBSD.org>2005-05-12 17:59:32 +0800
committersimon <simon@FreeBSD.org>2005-05-12 17:59:32 +0800
commitfddffee3881515a2aa71f60f5c3a768037b85f65 (patch)
tree793a30efaff68d09cd7d89b72e14d8a5ef6cb330 /security
parent8a0e81510f71e9c514ff9dff39254439c1523487 (diff)
downloadfreebsd-ports-gnome-fddffee3881515a2aa71f60f5c3a768037b85f65.tar.gz
freebsd-ports-gnome-fddffee3881515a2aa71f60f5c3a768037b85f65.tar.zst
freebsd-ports-gnome-fddffee3881515a2aa71f60f5c3a768037b85f65.zip
Document two new vulnerabilities in mozilla/firefox.
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml183
1 files changed, 183 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 88562cb2f6e5..1059612fe2fe 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -32,6 +32,189 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="a6427195-c2c7-11d9-89f7-02061b08fc24">
+ <topic>mozilla -- privilege escalation via non-DOM property
+ overrides</topic>
+ <affects>
+ <package>
+ <name>firefox</name>
+ <range><lt>1.0.4,1</lt></range>
+ </package>
+ <package>
+ <name>linux-firefox</name>
+ <range><lt>1.0.4</lt></range>
+ </package>
+ <package>
+ <name>mozilla</name>
+ <range><lt>1.7.8,2</lt></range>
+ <range><ge>1.8.*,2</ge></range>
+ </package>
+ <package>
+ <name>linux-mozilla</name>
+ <name>linux-mozilla-devel</name>
+ <range><lt>1.7.8</lt></range>
+ <range><ge>1.8.*</ge></range>
+ </package>
+ <package>
+ <name>netscape7</name>
+ <range><ge>0</ge></range>
+ </package>
+ <package>
+ <!-- These ports are obsolete. -->
+ <name>de-linux-mozillafirebird</name>
+ <name>el-linux-mozillafirebird</name>
+ <name>ja-linux-mozillafirebird-gtk1</name>
+ <name>ja-mozillafirebird-gtk2</name>
+ <name>linux-mozillafirebird</name>
+ <name>ru-linux-mozillafirebird</name>
+ <name>zhCN-linux-mozillafirebird</name>
+ <name>zhTW-linux-mozillafirebird</name>
+ <range><ge>0</ge></range>
+ </package>
+ <package>
+ <!-- These package names are obsolete. -->
+ <name>de-linux-netscape</name>
+ <name>de-netscape7</name>
+ <name>fr-linux-netscape</name>
+ <name>fr-netscape7</name>
+ <name>ja-linux-netscape</name>
+ <name>ja-netscape7</name>
+ <name>linux-netscape</name>
+ <name>linux-phoenix</name>
+ <name>mozilla+ipv6</name>
+ <name>mozilla-embedded</name>
+ <name>mozilla-firebird</name>
+ <name>mozilla-gtk1</name>
+ <name>mozilla-gtk2</name>
+ <name>mozilla-gtk</name>
+ <name>mozilla-thunderbird</name>
+ <name>phoenix</name>
+ <name>pt_BR-netscape7</name>
+ <range><ge>0</ge></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>A Mozilla Foundation Security Advisory reports:</p>
+ <blockquote cite="http://www.mozilla.org/security/announce/mfsa2005-44.html">
+ <p>Additional checks were added to make sure Javascript eval
+ and Script objects are run with the privileges of the
+ context that created them, not the potentially elevated
+ privilege of the context calling them in order to protect
+ against an additional variant of <a
+ href="http://www.mozilla.org/security/announce/mfsa2005-41.html">MFSA
+ 2005-41</a>.</p>
+ </blockquote>
+ <p>The Mozilla Foundation Security Advisory MFSA 2005-41
+ reports:</p>
+ <blockquote cite="http://www.mozilla.org/security/announce/mfsa2005-41.html">
+ <p>moz_bug_r_a4 reported several exploits giving an attacker
+ the ability to install malicious code or steal data,
+ requiring only that the user do commonplace actions like
+ click on a link or open the context menu.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>http://www.mozilla.org/security/announce/mfsa2005-44.html</url>
+ </references>
+ <dates>
+ <discovery>2005-05-11</discovery>
+ <entry>2005-05-12</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="a81746a1-c2c7-11d9-89f7-02061b08fc24">
+ <topic>mozilla -- "Wrapped" javascript: urls bypass security
+ checks</topic>
+ <affects>
+ <package>
+ <name>firefox</name>
+ <range><lt>1.0.4,1</lt></range>
+ </package>
+ <package>
+ <name>linux-firefox</name>
+ <range><lt>1.0.4</lt></range>
+ </package>
+ <package>
+ <name>mozilla</name>
+ <range><lt>1.7.8,2</lt></range>
+ <range><ge>1.8.*,2</ge></range>
+ </package>
+ <package>
+ <name>linux-mozilla</name>
+ <name>linux-mozilla-devel</name>
+ <range><lt>1.7.8</lt></range>
+ <range><ge>1.8.*</ge></range>
+ </package>
+ <package>
+ <name>netscape7</name>
+ <range><ge>0</ge></range>
+ </package>
+ <package>
+ <!-- These ports are obsolete. -->
+ <name>de-linux-mozillafirebird</name>
+ <name>el-linux-mozillafirebird</name>
+ <name>ja-linux-mozillafirebird-gtk1</name>
+ <name>ja-mozillafirebird-gtk2</name>
+ <name>linux-mozillafirebird</name>
+ <name>ru-linux-mozillafirebird</name>
+ <name>zhCN-linux-mozillafirebird</name>
+ <name>zhTW-linux-mozillafirebird</name>
+ <range><ge>0</ge></range>
+ </package>
+ <package>
+ <!-- These package names are obsolete. -->
+ <name>de-linux-netscape</name>
+ <name>de-netscape7</name>
+ <name>fr-linux-netscape</name>
+ <name>fr-netscape7</name>
+ <name>ja-linux-netscape</name>
+ <name>ja-netscape7</name>
+ <name>linux-netscape</name>
+ <name>linux-phoenix</name>
+ <name>mozilla+ipv6</name>
+ <name>mozilla-embedded</name>
+ <name>mozilla-firebird</name>
+ <name>mozilla-gtk1</name>
+ <name>mozilla-gtk2</name>
+ <name>mozilla-gtk</name>
+ <name>mozilla-thunderbird</name>
+ <name>phoenix</name>
+ <name>pt_BR-netscape7</name>
+ <range><ge>0</ge></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>A Mozilla Foundation Security Advisory reports:</p>
+ <blockquote cite="http://www.mozilla.org/security/announce/mfsa2005-43.html">
+ <p>Some security checks intended to prevent script injection
+ were incorrect and could be bypassed by wrapping a
+ javascript: url in the view-source:
+ pseudo-protocol. Michael Krax demonstrated that a variant
+ of his <a
+ href="http://www.mozilla.org/security/announce/mfsa2005-37.html">favicon</a>
+ exploit could still execute arbitrary code, and the same
+ technique could also be used to perform cross-site
+ scripting.</p>
+ <p>Georgi Guninski demonstrated the same flaw wrapping
+ javascript: urls with the jar: pseudo-protocol.</p>
+ <p>L. David Baron discovered a nested variant that defeated
+ checks in the script security manager.</p>
+ <p><strong>Workaround:</strong> Disable Javascript</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>http://www.mozilla.org/security/announce/mfsa2005-43.html</url>
+ </references>
+ <dates>
+ <discovery>2005-05-11</discovery>
+ <entry>2005-05-12</entry>
+ </dates>
+ </vuln>
+
<vuln vid="eca6195a-c233-11d9-804c-02061b08fc24">
<topic>mozilla -- code execution via javascript: IconURL
vulnerability</topic>