summaryrefslogtreecommitdiffstats
path: root/data
diff options
context:
space:
mode:
authorJoey Hess <joeyh@debian.org>2005-09-01 17:01:09 +0000
committerJoey Hess <joeyh@debian.org>2005-09-01 17:01:09 +0000
commitf9998346da9058ec4bc8186f0f502d28e0a54025 (patch)
tree1b9e1f15e971c3d114bc7d00a2dfa405bbd0ef81 /data
parent9403a4eaf878162ae34868bd102d1820a2c40c85 (diff)
update firefox advisory since the DSA was updated
git-svn-id: svn+ssh://svn.debian.org/svn/secure-testing@1761 e39458fd-73e7-0310-bf30-c45bca0a0e42
Diffstat (limited to 'data')
-rw-r--r--data/DTSA/DTSA-8-2117
-rw-r--r--data/DTSA/advs/8-mozilla-firefox.adv17
-rw-r--r--data/DTSA/hints/joeyh2
-rw-r--r--data/DTSA/list4
4 files changed, 132 insertions, 8 deletions
diff --git a/data/DTSA/DTSA-8-2 b/data/DTSA/DTSA-8-2
new file mode 100644
index 0000000000..0bf4ac0574
--- /dev/null
+++ b/data/DTSA/DTSA-8-2
@@ -0,0 +1,117 @@
+------------------------------------------------------------------------------
+Debian Testing Security Advisory DTSA-8-2 http://secure-testing.debian.net
+secure-testing-team@lists.alioth.debian.org Joey Hess
+September 1st, 2005
+------------------------------------------------------------------------------
+
+Package : mozilla-firefox
+Vulnerability : several vulnerabilities (update)
+Problem-Scope : remote
+Debian-specific: No
+CVE ID : CAN-2004-0718 CAN-2005-1937 CAN-2005-2260 CAN-2005-2261 CAN-2005-2262 CAN-2005-2263 CAN-2005-2264 CAN-2005-2265 CAN-2005-2266 CAN-2005-2267 CAN-2005-2268 CAN-2005-2269 CAN-2005-2270
+
+We experienced that the update for Mozilla Firefox from DTSA-8-1
+unfortunately was a regression in several cases. Since the usual
+praxis of backporting apparently does not work, this update is
+basically version 1.0.6 with the version number rolled back, and hence
+still named 1.0.4-*. For completeness below is the original advisory
+text:
+
+Several problems were discovered in Mozilla Firefox:
+
+CAN-2004-0718 CAN-2005-1937
+
+A vulnerability has been discovered in Mozilla Firefox that allows remote
+attackers to inject arbitrary Javascript from one page into the frameset of
+another site.
+
+CAN-2005-2260
+
+The browser user interface does not properly distinguish between
+user-generated events and untrusted synthetic events, which makes it easier
+for remote attackers to perform dangerous actions that normally could only be
+performed manually by the user.
+
+CAN-2005-2261
+
+XML scripts ran even when Javascript disabled.
+
+CAN-2005-2262
+
+The user can be tricked to executing arbitrary JavaScript code by using a
+JavaScript URL as wallpaper.
+
+CAN-2005-2263
+
+It is possible for a remote attacker to execute a callback function in the
+context of another domain (i.e. frame).
+
+CAN-2005-2264
+
+By opening a malicious link in the sidebar it is possible for remote
+attackers to steal sensitive information.
+
+CAN-2005-2265
+
+Missing input sanitising of InstallVersion.compareTo() can cause the
+application to crash.
+
+CAN-2005-2266
+
+Remote attackers could steal sensitive information such as cookies and
+passwords from web sites by accessing data in alien frames.
+
+CAN-2005-2267
+
+By using standalone applications such as Flash and QuickTime to open a
+javascript: URL, it is possible for a remote attacker to steal sensitive
+information and possibly execute arbitrary code.
+
+CAN-2005-2268
+
+It is possible for a Javascript dialog box to spoof a dialog box from a
+trusted site and facilitates phishing attacks.
+
+CAN-2005-2269
+
+Remote attackers could modify certain tag properties of DOM nodes that could
+lead to the execution of arbitrary script or code.
+
+CAN-2005-2270
+
+The Mozilla browser family does not properly clone base objects, which allows
+remote attackers to execute arbitrary code.
+
+Note that this is the same set of security fixes put into stable in
+DSA-775 and DSA-779, and updated in DSA-779-2.
+
+For the testing distribution (etch) this is fixed in version
+1.0.4-2sarge3
+
+For the unstable distribution (sid) this is fixed in version
+1.0.6-3
+
+This upgrade is recommended if you use mozilla-firefox.
+
+The Debian testing security team does not track security issues for then
+stable (sarge) and oldstable (woody) distributions. If stable is vulnerable,
+the Debian security team will make an announcement once a fix is ready.
+
+Upgrade Instructions
+--------------------
+
+To use the Debian testing security archive, add the following lines to
+your /etc/apt/sources.list:
+
+deb http://secure-testing.debian.net/debian-security-updates etch-proposed-updates/security-updates main contrib non-free
+deb-src http://secure-testing.debian.net/debian-security-updates etch-proposed-updates/security-updates main contrib non-free
+
+The archive signing key can be downloaded from
+http://secure-testing.debian.net/ziyi-2005-7.asc
+
+To install the update, run this command as root:
+
+apt-get update && apt-get install mozilla-firefox
+
+For further information about the Debian testing security team, please refer
+to http://secure-testing.debian.net/
diff --git a/data/DTSA/advs/8-mozilla-firefox.adv b/data/DTSA/advs/8-mozilla-firefox.adv
index 5fef0a6e4e..97f2c8043d 100644
--- a/data/DTSA/advs/8-mozilla-firefox.adv
+++ b/data/DTSA/advs/8-mozilla-firefox.adv
@@ -1,14 +1,21 @@
-dtsa: DTSA-8-1
+dtsa: DTSA-8-2
source: mozilla-firefox
-date: August 28th, 2005
+date: September 1st, 2005
author: Joey Hess
-vuln-type: several vulnerabilities
+vuln-type: several vulnerabilities (update)
problem-scope: remote
debian-specific: no
cve: CAN-2004-0718 CAN-2005-1937 CAN-2005-2260 CAN-2005-2261 CAN-2005-2262 CAN-2005-2263 CAN-2005-2264 CAN-2005-2265 CAN-2005-2266 CAN-2005-2267 CAN-2005-2268 CAN-2005-2269 CAN-2005-2270
-testing-fix: 1.0.4-2sarge2
+testing-fix: 1.0.4-2sarge3
sid-fix: 1.0.6-3
+We experienced that the update for Mozilla Firefox from DTSA-8-1
+unfortunately was a regression in several cases. Since the usual
+praxis of backporting apparently does not work, this update is
+basically version 1.0.6 with the version number rolled back, and hence
+still named 1.0.4-*. For completeness below is the original advisory
+text:
+
Several problems were discovered in Mozilla Firefox:
CAN-2004-0718 CAN-2005-1937
@@ -75,4 +82,4 @@ CAN-2005-2270
remote attackers to execute arbitrary code.
Note that this is the same set of security fixes put into stable in
-DSA-775 and DSA-779.
+DSA-775 and DSA-779, and updated in DSA-779-2.
diff --git a/data/DTSA/hints/joeyh b/data/DTSA/hints/joeyh
index 6997f28abf..a77d4d0573 100644
--- a/data/DTSA/hints/joeyh
+++ b/data/DTSA/hints/joeyh
@@ -1,6 +1,6 @@
sync maildrop/1.5.3-1.1etch1
sync pcre3/6.3-0.1etch1
-sync mozilla-firefox/1.0.4-2sarge2
+sync mozilla-firefox/1.0.4-2sarge3
sync mozilla/2:1.7.8-1sarge1
sync centericq/4.20.0-8etch1
sync clamav/0.86.2-4etch1
diff --git a/data/DTSA/list b/data/DTSA/list
index 5ece88760a..ebc40aa8bd 100644
--- a/data/DTSA/list
+++ b/data/DTSA/list
@@ -6,8 +6,8 @@
[31 Aug 2005] DTSA-9-1 bluez-utils - bad device name escaping
- bluez-utils 2.19-0.1etch1
TODO: unreleased
-[28 Aug 2005] DTSA-8-1 mozilla-firefox - several vulnerabilities
- - mozilla-firefox 1.0.4-2sarge2 (high)
+[28 Aug 2005] DTSA-8-2 mozilla-firefox - several vulnerabilities
+ - mozilla-firefox 1.0.4-2sarge3 (high)
[28 Aug 2005] DTSA-7-1 mozilla - frame injection spoofing
- mozilla 2:1.7.8-1sarge1 (high)
[28 Aug 2005] DTSA-6-1 cgiwrap - multiple vulnerabilities

© 2014-2024 Faster IT GmbH | imprint | privacy policy