summaryrefslogtreecommitdiffstats
path: root/data/DTSA/advs
diff options
context:
space:
mode:
authorJoey Hess <joeyh@debian.org>2005-08-31 19:03:01 +0000
committerJoey Hess <joeyh@debian.org>2005-08-31 19:03:01 +0000
commitb7fcd369a3b982c03336dbb08ea43dca1353ed87 (patch)
tree323bdc79e7072ec85073f8b35092a491fdc29143 /data/DTSA/advs
parent0c2266703283c6dfaaa4934d0b58ca67b03cb168 (diff)
gave up on thunderbird build for now, reclaimed advisory 9 for bluez
git-svn-id: svn+ssh://svn.debian.org/svn/secure-testing@1751 e39458fd-73e7-0310-bf30-c45bca0a0e42
Diffstat (limited to 'data/DTSA/advs')
-rw-r--r--data/DTSA/advs/9-bluez-utils.adv14
-rw-r--r--data/DTSA/advs/9-mozilla-thunderbird.adv59
2 files changed, 14 insertions, 59 deletions
diff --git a/data/DTSA/advs/9-bluez-utils.adv b/data/DTSA/advs/9-bluez-utils.adv
new file mode 100644
index 0000000000..b91e1851e6
--- /dev/null
+++ b/data/DTSA/advs/9-bluez-utils.adv
@@ -0,0 +1,14 @@
+dtsa: DTSA-9-1
+source: bluez-utils
+date: August 31st, 2005
+author: Joey Hess
+vuln-type: bad device name escaping
+problem-scope: remote
+debian-specific: no
+cve: CAN-2005-2547
+testing-fix: 2.19-0.1etch1
+sid-fix: 2.19-1
+
+A bug in bluez-utils allows remote attackers to execute arbitrary commands
+via shell metacharacters in the Bluetooth device name when invoking the PIN
+helper.
diff --git a/data/DTSA/advs/9-mozilla-thunderbird.adv b/data/DTSA/advs/9-mozilla-thunderbird.adv
deleted file mode 100644
index 365f5a02aa..0000000000
--- a/data/DTSA/advs/9-mozilla-thunderbird.adv
+++ /dev/null
@@ -1,59 +0,0 @@
-dtsa: DTSA-9-1
-source: mozilla-thunderbird
-date: August 28th, 2005
-author: Joey Hess
-vuln-type: several vulnerabilities
-problem-scope: remote
-debian-specific: no
-cve: CAN-2005-0989 CAN-2005-1159 CAN-2005-1160 CAN-2005-1532 CAN-2005-2261 CAN-2005-2265 CAN-2005-2266 CAN-2005-2269 CAN-2005-2270
-testing-fix: 1.0.2-3etch1
-sid-fix: 1.0.6-3
-
-Several problems have been discovered in Mozilla Thunderbird, the standalone
-mail client of the Mozilla suite. The Common Vulnerabilities and Exposures
-project identifies the following problems:
-
-CAN-2005-0989
-
- Remote attackers could read portions of heap memory into a Javascript string
- via the lambda replace method.
-
-CAN-2005-1159
-
- The Javascript interpreter could be tricked to continue execution at the
- wrong memory address, which may allow attackers to cause a denial of service
- (application crash) and possibly execute arbitrary code.
-
-CAN-2005-1160
-
- Remote attackers could override certain properties or methods of DOM nodes
- and gain privileges.
-
-CAN-2005-1532
-
- Remote attackers could override certain properties or methods due to missing
- proper limitation of Javascript eval and Script objects and gain privileges.
-
-CAN-2005-2261
-
- XML scripts ran even when Javascript was disabled.
-
-CAN-2005-2265
-
- Missing input sanitising of InstallVersion.compareTo() can cause the
- application to crash.
-
-CAN-2005-2266
-
- Remote attackers could steal sensitive information such as cookies and
- passwords from web sites by accessing data in alien frames.
-
-CAN-2005-2269
-
- Remote attackers could modify certain tag properties of DOM nodes that could
- lead to the execution of arbitrary script or code.
-
-CAN-2005-2270
-
- The Mozilla browser family does not properly clone base objects, which allows
- remote attackers to execute arbitrary code.

© 2014-2024 Faster IT GmbH | imprint | privacy policy