Debian Project

Debian testing security team - Advisory

DTSA-7-1

Date Reported:
August 28th, 2005
Affected Package:
mozilla
Vulnerability:
frame injection spoofing
Problem-Scope:
remote
Debian-specific:
No
CVE:
CVE-2004-0718 CVE-2005-1937

More information:
A vulnerability has been discovered in Mozilla that allows remote attackers 
to inject arbitrary Javascript from one page into the frameset of another 
site. Thunderbird is not affected by this and Galeon will be automatically 
fixed as it uses Mozilla components. Mozilla Firefox is vulnerable and will 
be covered by a separate advisory. 
 
Note that this is the same security fix put into stable in DSA-777. 

For the testing distribution (etch) this is fixed in version 2:1.7.8-1sarge1
For the unstable distribution (sid) this is fixed in version 2:1.7.10-1

This upgrade is recommended if you use mozilla.

If you have the secure testing lines in your sources.list, you can update by running this command as root:
apt-get update && apt-get install mozilla

The Debian testing security team does not track security issues for then stable (sarge) and oldstable (woody) distributions. If stable is vulnerable, the Debian security team will make an announcement once a fix is ready.

To use the Debian testing security archive, add the following lines to your /etc/apt/sources.list:

deb http://secure-testing.debian.net/debian-secure-testing etch/security-updates main contrib non-free
deb-src http://secure-testing.debian.net/debian-secure-testing etch/security-updates main contrib non-free

The archive signing key can be downloaded from
http://testing-security.debian.net/ziyi-2005-7.asc

For further information about the Debian testing security team, please refer to http://testing-security.debian.net/

Valid HTML 4.01! Valid CSS!