summaryrefslogtreecommitdiff
path: root/security/vuxml/vuln.xml
diff options
context:
space:
mode:
authorSimon L. B. Nielsen <simon@FreeBSD.org>2005-07-30 09:13:14 +0000
committerSimon L. B. Nielsen <simon@FreeBSD.org>2005-07-30 09:13:14 +0000
commit1c4842c911e2a6692e2b61a7b0e48cd0c7ff8261 (patch)
tree0250002b0ab658811f9ee43950c4d06e2cf97a93 /security/vuxml/vuln.xml
parentUpgrade to version 1.9.5. (diff)
Document opera -- image dragging vulnerability and opera -- download
dialog spoofing vulnerability.
Notes
Notes: svn path=/head/; revision=140447
Diffstat (limited to 'security/vuxml/vuln.xml')
-rw-r--r--security/vuxml/vuln.xml78
1 files changed, 78 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 7d1614508805..811513ce00b3 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -32,6 +32,84 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="934b1de4-00d7-11da-bc08-0001020eed82">
+ <topic>opera -- image dragging vulnerability</topic>
+ <affects>
+ <package>
+ <name>linux-opera</name>
+ <name>opera-devel</name>
+ <name>opera</name>
+ <range><lt>8.02</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>A Secunia Advisory reports:</p>
+ <blockquote cite="http://secunia.com/advisories/15756/">
+ <p>Secunia Research has discovered a vulnerability in Opera,
+ which can be exploited by malicious people to conduct
+ cross-site scripting attacks and retrieve a user's
+ files.</p>
+ <p>The vulnerability is caused due to Opera allowing a user
+ to drag e.g. an image, which is actually a "javascript:"
+ URI, resulting in cross-site scripting if dropped over
+ another site. This may also be used to populate a file
+ upload form, resulting in uploading of arbitrary files to
+ a malicious web site.</p>
+ <p>Successful exploitation requires that the user is tricked
+ into dragging and dropping e.g. an image or a link.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>http://secunia.com/advisories/15756/</url>
+ <url>http://www.opera.com/freebsd/changelogs/802/</url>
+ </references>
+ <dates>
+ <discovery>2005-07-28</discovery>
+ <entry>2005-07-30</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="a2aa24fd-00d4-11da-bc08-0001020eed82">
+ <topic>opera -- download dialog spoofing vulnerability</topic>
+ <affects>
+ <package>
+ <name>linux-opera</name>
+ <name>opera-devel</name>
+ <name>opera</name>
+ <range><lt>8.02</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>A Secunia Advisory reports:</p>
+ <blockquote cite="http://secunia.com/advisories/15870/">
+ <p>Secunia Research has discovered a vulnerability in Opera,
+ which can be exploited by malicious people to trick users
+ into executing malicious files.</p>
+ <p>The vulnerability is caused due to an error in the
+ handling of extended ASCII codes in the download
+ dialog. This can be exploited to spoof the file extension
+ in the file download dialog via a specially crafted
+ "Content-Disposition" HTTP header.</p>
+ <p>Successful exploitation may result in users being tricked
+ into executing a malicious file via the download dialog,
+ but requires that the "Arial Unicode MS" font
+ (ARIALUNI.TTF) has been installed on the system.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>http://secunia.com/advisories/15870/</url>
+ <url>http://www.opera.com/freebsd/changelogs/802/</url>
+ </references>
+ <dates>
+ <discovery>2005-07-28</discovery>
+ <entry>2005-07-30</entry>
+ </dates>
+ </vuln>
+
<vuln vid="5d51d245-00ca-11da-bc08-0001020eed82">
<topic>ethereal -- multiple vulnerabilities</topic>
<affects>