diff options
author | Joey Hess <joeyh@debian.org> | 2005-08-31 19:03:01 +0000 |
---|---|---|
committer | Joey Hess <joeyh@debian.org> | 2005-08-31 19:03:01 +0000 |
commit | b7fcd369a3b982c03336dbb08ea43dca1353ed87 (patch) | |
tree | 323bdc79e7072ec85073f8b35092a491fdc29143 /data/DTSA/advs | |
parent | 0c2266703283c6dfaaa4934d0b58ca67b03cb168 (diff) |
gave up on thunderbird build for now, reclaimed advisory 9 for bluez
git-svn-id: svn+ssh://svn.debian.org/svn/secure-testing@1751 e39458fd-73e7-0310-bf30-c45bca0a0e42
Diffstat (limited to 'data/DTSA/advs')
-rw-r--r-- | data/DTSA/advs/9-bluez-utils.adv | 14 | ||||
-rw-r--r-- | data/DTSA/advs/9-mozilla-thunderbird.adv | 59 |
2 files changed, 14 insertions, 59 deletions
diff --git a/data/DTSA/advs/9-bluez-utils.adv b/data/DTSA/advs/9-bluez-utils.adv new file mode 100644 index 0000000000..b91e1851e6 --- /dev/null +++ b/data/DTSA/advs/9-bluez-utils.adv @@ -0,0 +1,14 @@ +dtsa: DTSA-9-1 +source: bluez-utils +date: August 31st, 2005 +author: Joey Hess +vuln-type: bad device name escaping +problem-scope: remote +debian-specific: no +cve: CAN-2005-2547 +testing-fix: 2.19-0.1etch1 +sid-fix: 2.19-1 + +A bug in bluez-utils allows remote attackers to execute arbitrary commands +via shell metacharacters in the Bluetooth device name when invoking the PIN +helper. diff --git a/data/DTSA/advs/9-mozilla-thunderbird.adv b/data/DTSA/advs/9-mozilla-thunderbird.adv deleted file mode 100644 index 365f5a02aa..0000000000 --- a/data/DTSA/advs/9-mozilla-thunderbird.adv +++ /dev/null @@ -1,59 +0,0 @@ -dtsa: DTSA-9-1 -source: mozilla-thunderbird -date: August 28th, 2005 -author: Joey Hess -vuln-type: several vulnerabilities -problem-scope: remote -debian-specific: no -cve: CAN-2005-0989 CAN-2005-1159 CAN-2005-1160 CAN-2005-1532 CAN-2005-2261 CAN-2005-2265 CAN-2005-2266 CAN-2005-2269 CAN-2005-2270 -testing-fix: 1.0.2-3etch1 -sid-fix: 1.0.6-3 - -Several problems have been discovered in Mozilla Thunderbird, the standalone -mail client of the Mozilla suite. The Common Vulnerabilities and Exposures -project identifies the following problems: - -CAN-2005-0989 - - Remote attackers could read portions of heap memory into a Javascript string - via the lambda replace method. - -CAN-2005-1159 - - The Javascript interpreter could be tricked to continue execution at the - wrong memory address, which may allow attackers to cause a denial of service - (application crash) and possibly execute arbitrary code. - -CAN-2005-1160 - - Remote attackers could override certain properties or methods of DOM nodes - and gain privileges. - -CAN-2005-1532 - - Remote attackers could override certain properties or methods due to missing - proper limitation of Javascript eval and Script objects and gain privileges. - -CAN-2005-2261 - - XML scripts ran even when Javascript was disabled. - -CAN-2005-2265 - - Missing input sanitising of InstallVersion.compareTo() can cause the - application to crash. - -CAN-2005-2266 - - Remote attackers could steal sensitive information such as cookies and - passwords from web sites by accessing data in alien frames. - -CAN-2005-2269 - - Remote attackers could modify certain tag properties of DOM nodes that could - lead to the execution of arbitrary script or code. - -CAN-2005-2270 - - The Mozilla browser family does not properly clone base objects, which allows - remote attackers to execute arbitrary code. |