mirror of
https://git.FreeBSD.org/ports.git
synced 2025-01-27 10:03:20 +00:00
Document mozilla & firefox -- arbitrary code execution vulnerability.
Submitted by: Devon H. O'Dell <dodell@sitetronics.com> (original version)
This commit is contained in:
parent
3d17564db2
commit
77260025a2
Notes:
svn2git
2021-03-31 03:12:20 +00:00
svn path=/head/; revision=129831
@ -32,6 +32,93 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||
|
||||
-->
|
||||
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
|
||||
<vuln vid="cbfde1cd-87eb-11d9-aa18-0001020eed82">
|
||||
<topic>mozilla & firefox -- arbitrary code execution vulnerability</topic>
|
||||
<affects>
|
||||
<package>
|
||||
<name>firefox</name>
|
||||
<range><lt>1.0.1,1</lt></range>
|
||||
</package>
|
||||
<package>
|
||||
<name>mozilla</name>
|
||||
<range><lt>1.7.6,2</lt></range>
|
||||
</package>
|
||||
<package>
|
||||
<name>linux-mozilla</name>
|
||||
<name>linux-mozilla-devel</name>
|
||||
<range><lt>1.7.6</lt></range>
|
||||
</package>
|
||||
<package>
|
||||
<name>netscape7</name>
|
||||
<range><ge>0</ge></range>
|
||||
</package>
|
||||
<package>
|
||||
<!-- These ports are obsolete. -->
|
||||
<name>de-linux-mozillafirebird</name>
|
||||
<name>el-linux-mozillafirebird</name>
|
||||
<name>ja-linux-mozillafirebird-gtk1</name>
|
||||
<name>ja-mozillafirebird-gtk2</name>
|
||||
<name>linux-mozillafirebird</name>
|
||||
<name>ru-linux-mozillafirebird</name>
|
||||
<name>zhCN-linux-mozillafirebird</name>
|
||||
<name>zhTW-linux-mozillafirebird</name>
|
||||
<range><ge>0</ge></range>
|
||||
</package>
|
||||
<package>
|
||||
<!-- These package names are obsolete. -->
|
||||
<name>de-linux-netscape</name>
|
||||
<name>de-netscape7</name>
|
||||
<name>fr-linux-netscape</name>
|
||||
<name>fr-netscape7</name>
|
||||
<name>ja-linux-netscape</name>
|
||||
<name>ja-netscape7</name>
|
||||
<name>linux-netscape</name>
|
||||
<name>linux-phoenix</name>
|
||||
<name>mozilla+ipv6</name>
|
||||
<name>mozilla-embedded</name>
|
||||
<name>mozilla-firebird</name>
|
||||
<name>mozilla-gtk1</name>
|
||||
<name>mozilla-gtk2</name>
|
||||
<name>mozilla-gtk</name>
|
||||
<name>mozilla-thunderbird</name>
|
||||
<name>phoenix</name>
|
||||
<name>pt_BR-netscape7</name>
|
||||
<range><ge>0</ge></range>
|
||||
</package>
|
||||
</affects>
|
||||
<description>
|
||||
<body xmlns="http://www.w3.org/1999/xhtml">
|
||||
<p>A Mozilla Foundation Security Advisory reports:</p>
|
||||
<blockquote cite="http://www.mozilla.org/security/announce/mfsa2005-27.html">
|
||||
<p>Plugins (such as flash) can be used to load privileged
|
||||
content into a frame. Once loaded various spoofs can be
|
||||
applied to get the user to interact with the privileged
|
||||
content. Michael Krax's "Fireflashing" example
|
||||
demonstrates that an attacker can open about:config in a
|
||||
frame, hide it with an opacity setting, and if the
|
||||
attacker can get the victim to click at a particular spot
|
||||
(design some kind of simple game) you could toggle boolean
|
||||
preferences, some of which would make further attacks
|
||||
easier.</p>
|
||||
<p>The "firescrolling" example demonstrates arbitrary code
|
||||
execution (in this case downloading a file) by convincing
|
||||
the user to scroll twice.</p>
|
||||
</blockquote>
|
||||
<p><strong>Workaround:</strong> Disable JavaScript.</p>
|
||||
</body>
|
||||
</description>
|
||||
<references>
|
||||
<cvename>CAN-2005-0527</cvename>
|
||||
<url>http://www.mikx.de/fireflashing/</url>
|
||||
<url>http://www.mikx.de/firescrolling/</url>
|
||||
<url>http://www.mozilla.org/security/announce/mfsa2005-27.html</url>
|
||||
</references>
|
||||
<dates>
|
||||
<discovery>2005-02-24</discovery>
|
||||
<entry>2005-02-26</entry>
|
||||
</dates>
|
||||
</vuln>
|
||||
|
||||
<vuln vid="32d4f0f1-85c3-11d9-b6dc-0007e900f747">
|
||||
<topic>mkbold-mkitalic -- format string vulnerability</topic>
|
||||
<affects>
|
||||
|
Loading…
Reference in New Issue
Block a user