Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng/.git;a=commitdiff;h=5098e097c99ab0a7be5679d2a53aa9db9411697d
commit 5098e097c99ab0a7be5679d2a53aa9db9411697d Author: VMiklos <[EMAIL PROTECTED]> Date: Thu Aug 2 16:48:39 2007 +0200 FSA235-firefox diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml index 05f7134..e1c9b3f 100644 --- a/frugalware/xml/security.xml +++ b/frugalware/xml/security.xml @@ -27,6 +27,37 @@ <fsas> <fsa> + <id>235</id> + <date>2007-08-02</date> + <author>vmiklos</author> + <package>firefox</package> + <vulnerable>2.0.0.4-1terminus1</vulnerable> + <unaffected>2.0.0.6-1terminus1</unaffected> + <bts>http://bugs.frugalware.org/task/2252 + http://bugs.frugalware.org/task/2253 + http://bugs.frugalware.org/task/2303</bts> + <cve>http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3656 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3670 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3734 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3735 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3736 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3737 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3738 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3089 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3844</cve> + <desc>1) Michal Zalewski has discovered a vulnerability in Mozilla Firefox, which can be exploited by malicious people to disclose sensitive information and conduct spoofing attacks. + The vulnerability is caused due to an error in the handling of the "wyciwyg://" URI handler. This can be exploited to access or spoof contents from a previously cached web site e.g. via HTTP 302 redirects when a user visits a malicious web page. + 2) The problem is that Firefox registers the "firefoxurl://" URI handler and allows invoking firefox with arbitrary command line arguments. Using e.g. the "-chrome" parameter it is possible to execute arbitrary Javascript in chrome context. This can be exploited to execute arbitrary commands e.g. when a user visits a malicious web site using other browsers. + 3) Various errors in the browser engine can be exploited to cause memory corruption and potentially to execute arbitrary code. + 4) Various errors in the Javascript engine can be exploited to cause memory corruption and potentially to execute arbitrary code. + 5) An error in the "addEventListener" and "setTimeout" methods can be exploited to inject script into another site's context, circumventing the browser's same-origin policy. + 6) An error in the cross-domain handling can be exploited to inject arbitrary HTML and script code in a sub-frame of another web site. + 7) An unspecified error in the handling of elements outside of documents allows an attacker to call an event handler and execute arbitrary code with chrome privileges. + 8) An unspecified error in the handling of "XPCNativeWrapper" can lead to execution of user-supplied code. + 9) The vulnerability is caused due to an error within the handling of "about:blank" pages loaded by chrome in an addon. This can be exploited to execute script code under chrome privileges by e.g. clicking on a link opened in an "about:blank" window created and populated in a certain ways by an addon. + Successful exploitation requires that certain addons are installed.</desc> + </fsa> + <fsa> <id>234</id> <date>2007-07-31</date> <author>vmiklos</author> _______________________________________________ Frugalware-git mailing list [email protected] http://frugalware.org/mailman/listinfo/frugalware-git
