[Secure-testing-commits] r1751 - in data/DTSA: . advs
Joey Hess
joeyh at costa.debian.org
Wed Aug 31 19:03:01 UTC 2005
Author: joeyh
Date: 2005-08-31 19:03:01 +0000 (Wed, 31 Aug 2005)
New Revision: 1751
Added:
data/DTSA/advs/9-bluez-utils.adv
Removed:
data/DTSA/advs/9-mozilla-thunderbird.adv
Modified:
data/DTSA/DTSA-9-1
data/DTSA/list
Log:
gave up on thunderbird build for now, reclaimed advisory 9 for bluez
Modified: data/DTSA/DTSA-9-1
===================================================================
--- data/DTSA/DTSA-9-1 2005-08-31 16:53:15 UTC (rev 1750)
+++ data/DTSA/DTSA-9-1 2005-08-31 19:03:01 UTC (rev 1751)
@@ -1,72 +1,31 @@
------------------------------------------------------------------------------
Debian Testing Security Advisory DTSA-9-1 http://secure-testing.debian.net
secure-testing-team at lists.alioth.debian.org Joey Hess
-August 28th, 2005
+August 31st, 2005
------------------------------------------------------------------------------
-Package : mozilla-thunderbird
-Vulnerability : several vulnerabilities
+Package : bluez-utils
+Vulnerability : bad device name escaping
Problem-Scope : remote
Debian-specific: No
-CVE ID : CAN-2005-0989 CAN-2005-1159 CAN-2005-1160 CAN-2005-1532 CAN-2005-2261 CAN-2005-2265 CAN-2005-2266 CAN-2005-2269 CAN-2005-2270
+CVE ID : CAN-2005-2547
-Several problems have been discovered in Mozilla Thunderbird, the standalone
-mail client of the Mozilla suite. The Common Vulnerabilities and Exposures
-project identifies the following problems:
+A bug in bluez-utils allows remote attackers to execute arbitrary commands
+via shell metacharacters in the Bluetooth device name when invoking the PIN
+helper.
-CAN-2005-0989
-
-Remote attackers could read portions of heap memory into a Javascript string
-via the lambda replace method.
-
-CAN-2005-1159
-
-The Javascript interpreter could be tricked to continue execution at the
-wrong memory address, which may allow attackers to cause a denial of service
-(application crash) and possibly execute arbitrary code.
-
-CAN-2005-1160
-
-Remote attackers could override certain properties or methods of DOM nodes
-and gain privileges.
-
-CAN-2005-1532
-
-Remote attackers could override certain properties or methods due to missing
-proper limitation of Javascript eval and Script objects and gain privileges.
-
-CAN-2005-2261
-
-XML scripts ran even when Javascript was disabled.
-
-CAN-2005-2265
-
-Missing input sanitising of InstallVersion.compareTo() can cause the
-application to crash.
-
-CAN-2005-2266
-
-Remote attackers could steal sensitive information such as cookies and
-passwords from web sites by accessing data in alien frames.
-
-CAN-2005-2269
-
-Remote attackers could modify certain tag properties of DOM nodes that could
-lead to the execution of arbitrary script or code.
-
-CAN-2005-2270
-
-The Mozilla browser family does not properly clone base objects, which allows
-remote attackers to execute arbitrary code.
-
For the testing distribution (etch) this is fixed in version
-1.0.2-3etch1
+2.19-0.1etch1
For the unstable distribution (sid) this is fixed in version
-1.0.6-3
+2.19-1
-This upgrade is recommended if you use mozilla-thunderbird.
+This upgrade is recommended if you use bluez-utils.
+The Debian testing security team does not track security issues for then
+stable (sarge) and oldstable (woody) distributions. If stable is vulnerable,
+the Debian security team will make an announcement once a fix is ready.
+
Upgrade Instructions
--------------------
@@ -81,7 +40,7 @@
To install the update, run this command as root:
-apt-get update && apt-get install mozilla-thunderbird
+apt-get update && apt-get install bluez-utils
For further information about the Debian testing security team, please refer
to http://secure-testing.debian.net/
Copied: data/DTSA/advs/9-bluez-utils.adv (from rev 1745, data/DTSA/advs/9-mozilla-thunderbird.adv)
===================================================================
--- data/DTSA/advs/9-mozilla-thunderbird.adv 2005-08-31 11:04:13 UTC (rev 1745)
+++ data/DTSA/advs/9-bluez-utils.adv 2005-08-31 19:03:01 UTC (rev 1751)
@@ -0,0 +1,14 @@
+dtsa: DTSA-9-1
+source: bluez-utils
+date: August 31st, 2005
+author: Joey Hess
+vuln-type: bad device name escaping
+problem-scope: remote
+debian-specific: no
+cve: CAN-2005-2547
+testing-fix: 2.19-0.1etch1
+sid-fix: 2.19-1
+
+A bug in bluez-utils allows remote attackers to execute arbitrary commands
+via shell metacharacters in the Bluetooth device name when invoking the PIN
+helper.
Deleted: data/DTSA/advs/9-mozilla-thunderbird.adv
===================================================================
--- data/DTSA/advs/9-mozilla-thunderbird.adv 2005-08-31 16:53:15 UTC (rev 1750)
+++ data/DTSA/advs/9-mozilla-thunderbird.adv 2005-08-31 19:03:01 UTC (rev 1751)
@@ -1,59 +0,0 @@
-dtsa: DTSA-9-1
-source: mozilla-thunderbird
-date: August 28th, 2005
-author: Joey Hess
-vuln-type: several vulnerabilities
-problem-scope: remote
-debian-specific: no
-cve: CAN-2005-0989 CAN-2005-1159 CAN-2005-1160 CAN-2005-1532 CAN-2005-2261 CAN-2005-2265 CAN-2005-2266 CAN-2005-2269 CAN-2005-2270
-testing-fix: 1.0.2-3etch1
-sid-fix: 1.0.6-3
-
-Several problems have been discovered in Mozilla Thunderbird, the standalone
-mail client of the Mozilla suite. The Common Vulnerabilities and Exposures
-project identifies the following problems:
-
-CAN-2005-0989
-
- Remote attackers could read portions of heap memory into a Javascript string
- via the lambda replace method.
-
-CAN-2005-1159
-
- The Javascript interpreter could be tricked to continue execution at the
- wrong memory address, which may allow attackers to cause a denial of service
- (application crash) and possibly execute arbitrary code.
-
-CAN-2005-1160
-
- Remote attackers could override certain properties or methods of DOM nodes
- and gain privileges.
-
-CAN-2005-1532
-
- Remote attackers could override certain properties or methods due to missing
- proper limitation of Javascript eval and Script objects and gain privileges.
-
-CAN-2005-2261
-
- XML scripts ran even when Javascript was disabled.
-
-CAN-2005-2265
-
- Missing input sanitising of InstallVersion.compareTo() can cause the
- application to crash.
-
-CAN-2005-2266
-
- Remote attackers could steal sensitive information such as cookies and
- passwords from web sites by accessing data in alien frames.
-
-CAN-2005-2269
-
- Remote attackers could modify certain tag properties of DOM nodes that could
- lead to the execution of arbitrary script or code.
-
-CAN-2005-2270
-
- The Mozilla browser family does not properly clone base objects, which allows
- remote attackers to execute arbitrary code.
Modified: data/DTSA/list
===================================================================
--- data/DTSA/list 2005-08-31 16:53:15 UTC (rev 1750)
+++ data/DTSA/list 2005-08-31 19:03:01 UTC (rev 1751)
@@ -1,13 +1,11 @@
[29 Aug 2005] DTSA-11-1 maildrop - local privilege escalation
{CAN-2005-2655}
- maildrop 1.5.3-1.1etch1 (high)
-[01 Jan 1969] DTSA-10-1 pcre3 - buffer overflow
+[31 Aug 2005] DTSA-10-1 pcre3 - buffer overflow
- pcre3 6.3-0.1etch1 (high)
-[28 Aug 2005] DTSA-9-1 mozilla-thunderbird - several vulnerabilities
- - mozilla-thunderbird 1.0.2-3etch1 (high)
- NOTE: joeyh working on it
- NOTE: stalled by build failure
- TODO: complete, or recycle this advisory number
+[31 Aug 2005] DTSA-9-1 bluez-utils - bad device name escaping
+ - bluez-utils 2.19-0.1etch1
+ TODO: unreleased
[28 Aug 2005] DTSA-8-1 mozilla-firefox - several vulnerabilities
- mozilla-firefox 1.0.4-2sarge2 (high)
[28 Aug 2005] DTSA-7-1 mozilla - frame injection spoofing
More information about the Secure-testing-commits
mailing list