summaryrefslogtreecommitdiffstats
path: root/data/DTSA/advs
diff options
context:
space:
mode:
authorJoey Hess <joeyh@debian.org>2005-08-28 19:52:53 +0000
committerJoey Hess <joeyh@debian.org>2005-08-28 19:52:53 +0000
commit0be31d2bc96436a62e7438070502634324138400 (patch)
tree0b21035b8f3b8cdce26c9e3e14d7eb1c62b6f7c8 /data/DTSA/advs
parent9cdf9d3fdc602fb05b8951fb97963ce8f005e2d1 (diff)
and firefox..
git-svn-id: svn+ssh://svn.debian.org/svn/secure-testing@1704 e39458fd-73e7-0310-bf30-c45bca0a0e42
Diffstat (limited to 'data/DTSA/advs')
-rw-r--r--data/DTSA/advs/8-mozilla-firefox.adv78
1 files changed, 78 insertions, 0 deletions
diff --git a/data/DTSA/advs/8-mozilla-firefox.adv b/data/DTSA/advs/8-mozilla-firefox.adv
new file mode 100644
index 0000000000..5fef0a6e4e
--- /dev/null
+++ b/data/DTSA/advs/8-mozilla-firefox.adv
@@ -0,0 +1,78 @@
+dtsa: DTSA-8-1
+source: mozilla-firefox
+date: August 28th, 2005
+author: Joey Hess
+vuln-type: several vulnerabilities
+problem-scope: remote
+debian-specific: no
+cve: CAN-2004-0718 CAN-2005-1937 CAN-2005-2260 CAN-2005-2261 CAN-2005-2262 CAN-2005-2263 CAN-2005-2264 CAN-2005-2265 CAN-2005-2266 CAN-2005-2267 CAN-2005-2268 CAN-2005-2269 CAN-2005-2270
+testing-fix: 1.0.4-2sarge2
+sid-fix: 1.0.6-3
+
+Several problems were discovered in Mozilla Firefox:
+
+CAN-2004-0718 CAN-2005-1937
+
+ A vulnerability has been discovered in Mozilla Firefox that allows remote
+ attackers to inject arbitrary Javascript from one page into the frameset of
+ another site.
+
+CAN-2005-2260
+
+ The browser user interface does not properly distinguish between
+ user-generated events and untrusted synthetic events, which makes it easier
+ for remote attackers to perform dangerous actions that normally could only be
+ performed manually by the user.
+
+CAN-2005-2261
+
+ XML scripts ran even when Javascript disabled.
+
+CAN-2005-2262
+
+ The user can be tricked to executing arbitrary JavaScript code by using a
+ JavaScript URL as wallpaper.
+
+CAN-2005-2263
+
+ It is possible for a remote attacker to execute a callback function in the
+ context of another domain (i.e. frame).
+
+CAN-2005-2264
+
+ By opening a malicious link in the sidebar it is possible for remote
+ attackers to steal sensitive information.
+
+CAN-2005-2265
+
+ Missing input sanitising of InstallVersion.compareTo() can cause the
+ application to crash.
+
+CAN-2005-2266
+
+ Remote attackers could steal sensitive information such as cookies and
+ passwords from web sites by accessing data in alien frames.
+
+CAN-2005-2267
+
+ By using standalone applications such as Flash and QuickTime to open a
+ javascript: URL, it is possible for a remote attacker to steal sensitive
+ information and possibly execute arbitrary code.
+
+CAN-2005-2268
+
+ It is possible for a Javascript dialog box to spoof a dialog box from a
+ trusted site and facilitates phishing attacks.
+
+CAN-2005-2269
+
+ Remote attackers could modify certain tag properties of DOM nodes that could
+ lead to the execution of arbitrary script or code.
+
+CAN-2005-2270
+
+ The Mozilla browser family does not properly clone base objects, which allows
+ remote attackers to execute arbitrary code.
+
+Note that this is the same set of security fixes put into stable in
+DSA-775 and DSA-779.

© 2014-2024 Faster IT GmbH | imprint | privacy policy