aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorsimon <simon@FreeBSD.org>2005-09-11 04:55:35 +0800
committersimon <simon@FreeBSD.org>2005-09-11 04:55:35 +0800
commit970ee48d76471a1ef183650153f3561b759825b5 (patch)
tree3b5a42d58f7cbe76e402ad3208ff1fa70f9b8fb2 /security
parentb403cb8c24a980e23ea8758523e515b33e7eb635 (diff)
downloadfreebsd-ports-gnome-970ee48d76471a1ef183650153f3561b759825b5.tar.gz
freebsd-ports-gnome-970ee48d76471a1ef183650153f3561b759825b5.tar.zst
freebsd-ports-gnome-970ee48d76471a1ef183650153f3561b759825b5.zip
Document firefox & mozilla -- buffer overflow vulnerability.
Prodded by: pav
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml97
1 files changed, 97 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index eb2c1eb0f785..b92c3475712e 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -32,6 +32,103 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="8665ebb9-2237-11da-978e-0001020eed82">
+ <topic>firefox &amp; mozilla -- buffer overflow
+ vulnerability</topic>
+ <affects>
+ <package>
+ <name>firefox</name>
+ <range><lt>1.0.6_5,1</lt></range>
+ </package>
+ <package>
+ <name>linux-firefox</name>
+ <range><gt>0</gt></range>
+ </package>
+ <package>
+ <name>mozilla</name>
+ <range><lt>1.7.11_1,2</lt></range>
+ <range><ge>1.8.*,2</ge><lt>1.8.b1_5,2</lt></range>
+ </package>
+ <package>
+ <name>linux-mozilla</name>
+ <name>linux-mozilla-devel</name>
+ <range><gt>0</gt></range>
+ </package>
+ <package>
+ <name>netscape7</name>
+ <range><ge>0</ge></range>
+ </package>
+ <package>
+ <!-- These ports are obsolete. -->
+ <name>de-linux-mozillafirebird</name>
+ <name>el-linux-mozillafirebird</name>
+ <name>ja-linux-mozillafirebird-gtk1</name>
+ <name>ja-mozillafirebird-gtk2</name>
+ <name>linux-mozillafirebird</name>
+ <name>ru-linux-mozillafirebird</name>
+ <name>zhCN-linux-mozillafirebird</name>
+ <name>zhTW-linux-mozillafirebird</name>
+ <range><ge>0</ge></range>
+ </package>
+ <package>
+ <!-- These package names are obsolete. -->
+ <name>de-linux-netscape</name>
+ <name>de-netscape7</name>
+ <name>fr-linux-netscape</name>
+ <name>fr-netscape7</name>
+ <name>ja-linux-netscape</name>
+ <name>ja-netscape7</name>
+ <name>linux-netscape</name>
+ <name>linux-phoenix</name>
+ <name>mozilla+ipv6</name>
+ <name>mozilla-embedded</name>
+ <name>mozilla-firebird</name>
+ <name>mozilla-gtk1</name>
+ <name>mozilla-gtk2</name>
+ <name>mozilla-gtk</name>
+ <name>mozilla-thunderbird</name>
+ <name>phoenix</name>
+ <name>pt_BR-netscape7</name>
+ <range><ge>0</ge></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Tom Ferris reports:</p>
+ <blockquote cite="http://marc.theaimsgroup.com/?l=full-disclosure&amp;m=112624614008387">
+ <p>A buffer overflow vulnerability exists within Firefox
+ version 1.0.6 and all other prior versions which allows
+ for an attacker to remotely execute arbitrary code on an
+ affected host.</p>
+ <p>The problem seems to be when a hostname which has all
+ dashes causes the NormalizeIDN call in
+ nsStandardURL::BuildNormalizedSpec to return true, but is
+ sets encHost to an empty string. Meaning, Firefox appends
+ 0 to approxLen and then appends the long string of dashes
+ to the buffer instead.</p>
+ </blockquote>
+ <p><strong>Note:</strong> It is possible to disable IDN
+ support as a workaround to protect against this buffer
+ overflow. How to do this is described on the <em><a
+ href="http://www.mozilla.org/security/idn.html">What Firefox
+ and Mozilla users should know about the IDN buffer overflow
+ security issue</a></em> web page.</p>
+ </body>
+ </description>
+ <references>
+ <bid>14784</bid>
+ <certvu>573857</certvu>
+ <cvename>CAN-2005-2871</cvename>
+ <url>http://marc.theaimsgroup.com/?l=full-disclosure&amp;m=112624614008387</url>
+ <url>http://www.mozilla.org/security/idn.html</url>
+ <url>https://bugzilla.mozilla.org/show_bug.cgi?id=307259</url>
+ </references>
+ <dates>
+ <discovery>2005-09-08</discovery>
+ <entry>2005-09-10</entry>
+ </dates>
+ </vuln>
+
<vuln vid="673aec6f-1cae-11da-bc01-000e0c2e438a">
<topic>htdig -- cross site scripting vulnerability</topic>
<affects>