diff options
| author | Jacques Vidrine <nectar@FreeBSD.org> | 2005-01-13 18:03:57 +0000 |
|---|---|---|
| committer | Jacques Vidrine <nectar@FreeBSD.org> | 2005-01-13 18:03:57 +0000 |
| commit | 9d91c8188ee62e3fd0e59e0d5ca65da31edc30c4 (patch) | |
| tree | 55352fcf5604ec4fa380b499e9286893181ee427 | |
| parent | - Document a vulnerability in mpg123. (diff) | |
Document Mozilla NNTP handler vulnerability.
| -rw-r--r-- | security/vuxml/vuln.xml | 58 |
1 files changed, 58 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 52717ae1ceac..f4668d79a090 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -32,6 +32,64 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="3fbf9db2-658b-11d9-abad-000a95bc6fae"> + <topic>mozilla -- heap overflow in NNTP handler</topic> + <affects> + <package> + <name>de-netscape7</name> + <name>fr-netscape7</name> + <name>ja-netscape7</name> + <name>netscape7</name> + <name>pt_BR-netscape7</name> + <range><gt>0</gt></range> + </package> + <package> + <name>mozilla-gtk1</name> + <name>linux-mozilla</name> + <name>linux-mozilla-devel</name> + <range><lt>1.7.5</lt></range> + </package> + <package> + <name>mozilla</name> + <range><lt>1.7.5,2</lt></range> + </package> + <package> + <!-- These package names are obsolete. --> + <name>de-linux-netscape</name> + <name>fr-linux-netscape</name> + <name>ja-linux-netscape</name> + <name>linux-netscape</name> + <name>mozilla+ipv6</name> + <name>mozilla-embedded</name> + <name>mozilla-gtk2</name> + <name>mozilla-gtk</name> + <range><ge>0</ge></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Maurycy Prodeus reports a critical vulnerability in + Mozilla-based browsers:</p> + <blockquote cite="http://isec.pl/vulnerabilities/isec-0020-mozilla.txt"> + <p>Mozilla browser supports NNTP urls. Remote side is able to + trigger news:// connection to any server. I found a flaw in + NNTP handling code which may cause heap overflow and allow + remote attacker to execute arbitrary code on client + machine.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CAN-2004-1316</cvename> + <url>http://isec.pl/vulnerabilities/isec-0020-mozilla.txt</url> + <mlist msgid="Pine.LNX.4.44.0412292228440.19239-200000@isec.pl">http://marc.theaimsgroup.com/?l=bugtraq&m=110436284718949</mlist> + </references> + <dates> + <discovery>2004-12-29</discovery> + <entry>2005-01-13</entry> + </dates> + </vuln> + <vuln vid="3cc84400-6576-11d9-a9e7-0001020eed82"> <topic>mpg123 -- buffer overflow vulnerability</topic> <affects> |
