summaryrefslogtreecommitdiff
path: root/security/vuxml
diff options
context:
space:
mode:
authorSimon L. B. Nielsen <simon@FreeBSD.org>2007-02-24 18:30:40 +0000
committerSimon L. B. Nielsen <simon@FreeBSD.org>2007-02-24 18:30:40 +0000
commit8f441b95bd0796543872eb33e8ad655c2487ea8e (patch)
tree84b03b96d217b50b7cfa96b2f81cb54c31fedffe /security/vuxml
parentAdd py-parsedatetime 0.8.3, python module for parsing 'human readable' (diff)
Document mozilla -- multiple vulnerabilities.
Note that Seamonkey 1.1 is marked vulnerable under the "better safe than sorry" principle, since it's not yet clear if Seamonkey 1.1 is vulnerable to this batch of vulnerabilities.
Notes
Notes: svn path=/head/; revision=185818
Diffstat (limited to 'security/vuxml')
-rw-r--r--security/vuxml/vuln.xml82
1 files changed, 82 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index d785c72d9d86..701995b841df 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -34,6 +34,88 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="12bd6ecf-c430-11db-95c5-000c6ec775d9">
+ <topic>mozilla -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>firefox</name>
+ <range><lt>1.5.0.10,1</lt></range>
+ <range><gt>2.*,1</gt><lt>2.0.0.2,1</lt></range>
+ </package>
+ <package>
+ <name>linux-firefox</name>
+ <range><lt>1.5.0.10</lt></range>
+ </package>
+ <package>
+ <name>seamonkey</name>
+ <name>linux-seamonkey</name>
+ <range><lt>1.0.8</lt></range>
+ <range><ge>1.1</ge></range>
+ </package>
+ <package>
+ <name>thunderbird</name>
+ <name>linux-thunderbird</name>
+ <name>mozilla-thunderbird</name>
+ <range><lt>1.5.0.10</lt></range>
+ </package>
+ <package>
+ <name>firefox-ja</name>
+ <name>linux-firefox-devel</name>
+ <name>linux-mozilla-devel</name>
+ <name>linux-mozilla</name>
+ <name>linux-seamonkey-devel</name>
+ <name>mozilla</name>
+ <range><gt>0</gt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The Mozilla Foundation reports of multiple security issues
+ in Firefox, Seamonkey, and Thunderbird. Several of these
+ issues can probably be used to run arbitrary code with the
+ privilege of the user running the program.</p>
+ <blockquote cite="http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox2.0.0.2">
+ <ul>
+ <li>MFSA 2007-07 Embedded nulls in location.hostname confuse same-domain checks</li>
+ <li>MFSA 2007-06 Mozilla Network Security Services (NSS) SSLv2 buffer overflow</li>
+ <li>MFSA 2007-05 XSS and local file access by opening blocked popups</li>
+ <li>MFSA 2007-04 Spoofing using custom cursor and CSS3 hotspot</li>
+ <li>MFSA 2007-03 Information disclosure through cache collisions</li>
+ <li>MFSA 2007-02 Improvements to help protect against Cross-Site Scripting attacks</li>
+ <li>MFSA 2007-01 Crashes with evidence of memory corruption (rv:1.8.0.10/1.8.1.2)</li>
+ </ul>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2006-6077</cvename>
+ <cvename>CVE-2007-0008</cvename>
+ <cvename>CVE-2007-0009</cvename>
+ <cvename>CVE-2007-0775</cvename>
+ <cvename>CVE-2007-0776</cvename>
+ <cvename>CVE-2007-0777</cvename>
+ <cvename>CVE-2007-0778</cvename>
+ <cvename>CVE-2007-0779</cvename>
+ <cvename>CVE-2007-0780</cvename>
+ <cvename>CVE-2007-0800</cvename>
+ <cvename>CVE-2007-0981</cvename>
+ <cvename>CVE-2007-0995</cvename>
+ <url>http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=482</url>
+ <url>http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=483</url>
+ <url>http://www.mozilla.org/security/announce/2007/mfsa2007-01.html</url>
+ <url>http://www.mozilla.org/security/announce/2007/mfsa2007-02.html</url>
+ <url>http://www.mozilla.org/security/announce/2007/mfsa2007-03.html</url>
+ <url>http://www.mozilla.org/security/announce/2007/mfsa2007-04.html</url>
+ <url>http://www.mozilla.org/security/announce/2007/mfsa2007-05.html</url>
+ <url>http://www.mozilla.org/security/announce/2007/mfsa2007-06.html</url>
+ <url>http://www.mozilla.org/security/announce/2007/mfsa2007-07.html</url>
+ </references>
+ <dates>
+ <discovery>2007-02-23</discovery>
+ <entry>2007-02-24</entry>
+ </dates>
+ </vuln>
+
<vuln vid="afdf500f-c1f6-11db-95c5-000c6ec775d9">
<topic>snort -- DCE/RPC preprocessor vulnerability</topic>
<affects>