diff options
author | simon <simon@FreeBSD.org> | 2005-02-26 22:25:31 +0800 |
---|---|---|
committer | simon <simon@FreeBSD.org> | 2005-02-26 22:25:31 +0800 |
commit | e0162cb5263b4399cf925183452b9e0c42186be1 (patch) | |
tree | 20a85e98ff76d17fefc51bd069f4c2aca66728da /security | |
parent | fc71b2886c7f172a27478eb6ee5444b23a8c8923 (diff) | |
download | freebsd-ports-gnome-e0162cb5263b4399cf925183452b9e0c42186be1.tar.gz freebsd-ports-gnome-e0162cb5263b4399cf925183452b9e0c42186be1.tar.zst freebsd-ports-gnome-e0162cb5263b4399cf925183452b9e0c42186be1.zip |
Document mozilla & firefox -- arbitrary code execution vulnerability.
Submitted by: Devon H. O'Dell <dodell@sitetronics.com> (original version)
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 87 |
1 files changed, 87 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 084fd5ea8db6..85e448fc042e 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -32,6 +32,93 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="cbfde1cd-87eb-11d9-aa18-0001020eed82"> + <topic>mozilla & firefox -- arbitrary code execution vulnerability</topic> + <affects> + <package> + <name>firefox</name> + <range><lt>1.0.1,1</lt></range> + </package> + <package> + <name>mozilla</name> + <range><lt>1.7.6,2</lt></range> + </package> + <package> + <name>linux-mozilla</name> + <name>linux-mozilla-devel</name> + <range><lt>1.7.6</lt></range> + </package> + <package> + <name>netscape7</name> + <range><ge>0</ge></range> + </package> + <package> + <!-- These ports are obsolete. --> + <name>de-linux-mozillafirebird</name> + <name>el-linux-mozillafirebird</name> + <name>ja-linux-mozillafirebird-gtk1</name> + <name>ja-mozillafirebird-gtk2</name> + <name>linux-mozillafirebird</name> + <name>ru-linux-mozillafirebird</name> + <name>zhCN-linux-mozillafirebird</name> + <name>zhTW-linux-mozillafirebird</name> + <range><ge>0</ge></range> + </package> + <package> + <!-- These package names are obsolete. --> + <name>de-linux-netscape</name> + <name>de-netscape7</name> + <name>fr-linux-netscape</name> + <name>fr-netscape7</name> + <name>ja-linux-netscape</name> + <name>ja-netscape7</name> + <name>linux-netscape</name> + <name>linux-phoenix</name> + <name>mozilla+ipv6</name> + <name>mozilla-embedded</name> + <name>mozilla-firebird</name> + <name>mozilla-gtk1</name> + <name>mozilla-gtk2</name> + <name>mozilla-gtk</name> + <name>mozilla-thunderbird</name> + <name>phoenix</name> + <name>pt_BR-netscape7</name> + <range><ge>0</ge></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>A Mozilla Foundation Security Advisory reports:</p> + <blockquote cite="http://www.mozilla.org/security/announce/mfsa2005-27.html"> + <p>Plugins (such as flash) can be used to load privileged + content into a frame. Once loaded various spoofs can be + applied to get the user to interact with the privileged + content. Michael Krax's "Fireflashing" example + demonstrates that an attacker can open about:config in a + frame, hide it with an opacity setting, and if the + attacker can get the victim to click at a particular spot + (design some kind of simple game) you could toggle boolean + preferences, some of which would make further attacks + easier.</p> + <p>The "firescrolling" example demonstrates arbitrary code + execution (in this case downloading a file) by convincing + the user to scroll twice.</p> + </blockquote> + <p><strong>Workaround:</strong> Disable JavaScript.</p> + </body> + </description> + <references> + <cvename>CAN-2005-0527</cvename> + <url>http://www.mikx.de/fireflashing/</url> + <url>http://www.mikx.de/firescrolling/</url> + <url>http://www.mozilla.org/security/announce/mfsa2005-27.html</url> + </references> + <dates> + <discovery>2005-02-24</discovery> + <entry>2005-02-26</entry> + </dates> + </vuln> + <vuln vid="32d4f0f1-85c3-11d9-b6dc-0007e900f747"> <topic>mkbold-mkitalic -- format string vulnerability</topic> <affects> |