Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=6d3ab302dff1a57cc94db8d11a51115420eb009e

commit 6d3ab302dff1a57cc94db8d11a51115420eb009e
Author: Miklos Vajna <[EMAIL PROTECTED]>
Date:   Fri Mar 7 14:43:27 2008 +0100

FSA373-firefox

diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml
index 9ebf741..3aba6f4 100644
--- a/frugalware/xml/security.xml
+++ b/frugalware/xml/security.xml
@@ -27,6 +27,35 @@

<fsas>
<fsa>
+               <id>373</id>
+               <date>2008-03-07</date>
+               <author>vmiklos</author>
+               <package>firefox</package>
+               <vulnerable>2.0.0.11-1sayshell1</vulnerable>
+               <unaffected>2.0.0.12-1sayshell1</unaffected>
+               <bts>http://bugs.frugalware.org/task/2776</bts>
+               <cve>http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0412
+                       
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0413
+                       
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0414
+                       
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0415
+                       
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0419
+                       
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0420
+                       
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0591
+                       
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0593</cve>
+               <desc>Some vulnerabilities and weaknesses have been reported 
Mozilla Firefox, which can be exploited by malicious people to disclose 
sensitive information, bypass certain security restrictions, conduct spoofing 
attacks, or to compromise a user's system.
+                       1) Various errors in the browser engine can be 
exploited to cause a memory corruption.
+                       2) Various errors in the Javascript engine can be 
exploited to cause a memory corruption.
+                       Successful exploitation of these vulnerabilities may 
allow execution of arbitrary code.
+                       3) A security issue is caused due to a design error 
within the focus handling and can potentially be exploited to trick a user into 
uploading arbitrary files.
+                       4) An error in the Javascript engine can be exploited 
to run Javascript code with "chrome" privileges.
+                       5) An error in the Javascript engine can be exploited 
to bypass the same-origin policy via the "XMLDocument.load()" function.
+                       6) An error exists in the handling of images when a 
user leaves a page, which uses "designMode" frames. This can be exploited to 
disclose the user's navigation history, forward navigation information, and to 
cause a memory corruption.
+                       Successful exploitation of this vulnerability may allow 
execution of arbitrary code.
+                       7) A design error related to timer-enabled dialogs can 
be exploited to trick a user into unintentionally confirming a security dialog.
+                       8) The problem is that Firefox follows "302" redirects 
for stylesheets and allows reading the target URL via "element.sheet.href". 
This can potentially be exploited to disclose sensitive URL parameters.
+                       9) An error within the processing of color palettes 
within bitmaps can be exploited to disclose the contents of memory areas.</desc>
+       </fsa>
+       <fsa>
<id>372</id>
<date>2008-03-04</date>
<author>vmiklos</author>
_______________________________________________
Frugalware-git mailing list
[email protected]
http://frugalware.org/mailman/listinfo/frugalware-git

Reply via email to