[Secure-testing-commits] r1704 - in data/DTSA: . advs
Joey Hess
joeyh at costa.debian.org
Sun Aug 28 19:52:53 UTC 2005
Author: joeyh
Date: 2005-08-28 19:52:53 +0000 (Sun, 28 Aug 2005)
New Revision: 1704
Added:
data/DTSA/DTSA-8-1
data/DTSA/advs/8-mozilla-firefox.adv
Modified:
data/DTSA/list
Log:
and firefox..
Added: data/DTSA/DTSA-8-1
===================================================================
--- data/DTSA/DTSA-8-1 2005-08-28 19:44:10 UTC (rev 1703)
+++ data/DTSA/DTSA-8-1 2005-08-28 19:52:53 UTC (rev 1704)
@@ -0,0 +1,106 @@
+------------------------------------------------------------------------------
+Debian Testing Security Advisory DTSA-8-1 http://secure-testing.debian.net
+secure-testing-team at lists.alioth.debian.org Joey Hess
+August 28th, 2005
+------------------------------------------------------------------------------
+
+Package : mozilla-firefox
+Vulnerability : several vulnerabilities
+Problem-Scope : remote
+Debian-specific: No
+CVE ID : CAN-2004-0718 CAN-2005-1937 CAN-2005-2260 CAN-2005-2261 CAN-2005-2262 CAN-2005-2263 CAN-2005-2264 CAN-2005-2265 CAN-2005-2266 CAN-2005-2267 CAN-2005-2268 CAN-2005-2269 CAN-2005-2270
+
+Several problems were discovered in Mozilla Firefox:
+
+CAN-2004-0718 CAN-2005-1937
+
+A vulnerability has been discovered in Mozilla Firefox that allows remote
+attackers to inject arbitrary Javascript from one page into the frameset of
+another site.
+
+CAN-2005-2260
+
+The browser user interface does not properly distinguish between
+user-generated events and untrusted synthetic events, which makes it easier
+for remote attackers to perform dangerous actions that normally could only be
+performed manually by the user.
+
+CAN-2005-2261
+
+XML scripts ran even when Javascript disabled.
+
+CAN-2005-2262
+
+The user can be tricked to executing arbitrary JavaScript code by using a
+JavaScript URL as wallpaper.
+
+CAN-2005-2263
+
+It is possible for a remote attacker to execute a callback function in the
+context of another domain (i.e. frame).
+
+CAN-2005-2264
+
+By opening a malicious link in the sidebar it is possible for remote
+attackers to steal sensitive information.
+
+CAN-2005-2265
+
+Missing input sanitising of InstallVersion.compareTo() can cause the
+application to crash.
+
+CAN-2005-2266
+
+Remote attackers could steal sensitive information such as cookies and
+passwords from web sites by accessing data in alien frames.
+
+CAN-2005-2267
+
+By using standalone applications such as Flash and QuickTime to open a
+javascript: URL, it is possible for a remote attacker to steal sensitive
+information and possibly execute arbitrary code.
+
+CAN-2005-2268
+
+It is possible for a Javascript dialog box to spoof a dialog box from a
+trusted site and facilitates phishing attacks.
+
+CAN-2005-2269
+
+Remote attackers could modify certain tag properties of DOM nodes that could
+lead to the execution of arbitrary script or code.
+
+CAN-2005-2270
+
+The Mozilla browser family does not properly clone base objects, which allows
+remote attackers to execute arbitrary code.
+
+For the testing distribution (etch) this is fixed in version
+1.0.4-2sarge2
+
+For the unstable distribution (sid) this is fixed in version
+1.0.6-3
+
+This upgrade is recommended if you use mozilla-firefox.
+
+Note that this is the same set of security fixes put into stable in
+DSA-775 and DSA-779.
+
+Upgrade Instructions
+--------------------
+
+To use the Debian testing security archive, add the following lines to
+your /etc/apt/sources.list:
+
+deb http://secure-testing.debian.net/debian-security-updates etch-proposed-updates/security-updates main contrib non-free
+deb-src http://secure-testing.debian.net/debian-security-updates etch-proposed-updates/security-updates main contrib non-free
+
+The archive signing key can be downloaded from
+http://secure-testing.debian.net/ziyi-2005-7.asc
+
+To install the update, run this command as root:
+
+apt-get update && apt-get install mozilla-firefox
+
+For further information about the Debian testing security team, please refer
+to http://secure-testing.debian.net/
Added: data/DTSA/advs/8-mozilla-firefox.adv
===================================================================
--- data/DTSA/advs/8-mozilla-firefox.adv 2005-08-28 19:44:10 UTC (rev 1703)
+++ data/DTSA/advs/8-mozilla-firefox.adv 2005-08-28 19:52:53 UTC (rev 1704)
@@ -0,0 +1,78 @@
+dtsa: DTSA-8-1
+source: mozilla-firefox
+date: August 28th, 2005
+author: Joey Hess
+vuln-type: several vulnerabilities
+problem-scope: remote
+debian-specific: no
+cve: CAN-2004-0718 CAN-2005-1937 CAN-2005-2260 CAN-2005-2261 CAN-2005-2262 CAN-2005-2263 CAN-2005-2264 CAN-2005-2265 CAN-2005-2266 CAN-2005-2267 CAN-2005-2268 CAN-2005-2269 CAN-2005-2270
+testing-fix: 1.0.4-2sarge2
+sid-fix: 1.0.6-3
+
+Several problems were discovered in Mozilla Firefox:
+
+CAN-2004-0718 CAN-2005-1937
+
+ A vulnerability has been discovered in Mozilla Firefox that allows remote
+ attackers to inject arbitrary Javascript from one page into the frameset of
+ another site.
+
+CAN-2005-2260
+
+ The browser user interface does not properly distinguish between
+ user-generated events and untrusted synthetic events, which makes it easier
+ for remote attackers to perform dangerous actions that normally could only be
+ performed manually by the user.
+
+CAN-2005-2261
+
+ XML scripts ran even when Javascript disabled.
+
+CAN-2005-2262
+
+ The user can be tricked to executing arbitrary JavaScript code by using a
+ JavaScript URL as wallpaper.
+
+CAN-2005-2263
+
+ It is possible for a remote attacker to execute a callback function in the
+ context of another domain (i.e. frame).
+
+CAN-2005-2264
+
+ By opening a malicious link in the sidebar it is possible for remote
+ attackers to steal sensitive information.
+
+CAN-2005-2265
+
+ Missing input sanitising of InstallVersion.compareTo() can cause the
+ application to crash.
+
+CAN-2005-2266
+
+ Remote attackers could steal sensitive information such as cookies and
+ passwords from web sites by accessing data in alien frames.
+
+CAN-2005-2267
+
+ By using standalone applications such as Flash and QuickTime to open a
+ javascript: URL, it is possible for a remote attacker to steal sensitive
+ information and possibly execute arbitrary code.
+
+CAN-2005-2268
+
+ It is possible for a Javascript dialog box to spoof a dialog box from a
+ trusted site and facilitates phishing attacks.
+
+CAN-2005-2269
+
+ Remote attackers could modify certain tag properties of DOM nodes that could
+ lead to the execution of arbitrary script or code.
+
+CAN-2005-2270
+
+ The Mozilla browser family does not properly clone base objects, which allows
+ remote attackers to execute arbitrary code.
+
+Note that this is the same set of security fixes put into stable in
+DSA-775 and DSA-779.
Modified: data/DTSA/list
===================================================================
--- data/DTSA/list 2005-08-28 19:44:10 UTC (rev 1703)
+++ data/DTSA/list 2005-08-28 19:52:53 UTC (rev 1704)
@@ -1,4 +1,7 @@
-[29 Aug 2005] DTSA-7-1 mozilla - frame injection spoofing
+[28 Aug 2005] DTSA-8-1 mozilla-firefox - several vulnerabilities
+ - mozilla-firefox 1.0.4-2sarge2
+ NOTE: joeyh working on it
+[28 Aug 2005] DTSA-7-1 mozilla - frame injection spoofing
- mozilla 2:1.7.8-1sarge1
NOTE: joeyh working on it
[28 Aug 2005] DTSA-6-1 cgiwrap - multiple vulnerabilities
More information about the Secure-testing-commits
mailing list