summaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorsimon <simon@FreeBSD.org>2005-09-21 22:31:09 +0000
committersimon <simon@FreeBSD.org>2005-09-21 22:31:09 +0000
commit07fdf827c8770cc86dc67369cdc92bb011be667a (patch)
treedfc42640a1bf6e74fb2e2b831404ab3484509028 /security
parentd859500604fc5e453f4aa996e3ff8582a61797d9 (diff)
downloadFreeBSD-ports-07fdf827c8770cc86dc67369cdc92bb011be667a.zip
FreeBSD-ports-07fdf827c8770cc86dc67369cdc92bb011be667a.tar.gz
Document mozilla & firefox -- command line URL shell command injection.
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml87
1 files changed, 87 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 1773db1..58eff9b 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -32,6 +32,93 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="2e28cefb-2aee-11da-a263-0001020eed82">
+ <topic>mozilla &amp; firefox -- command line URL shell command injection</topic>
+ <affects>
+ <package>
+ <name>firefox</name>
+ <range><lt>1.0.7,1</lt></range>
+ </package>
+ <package>
+ <name>linux-firefox</name>
+ <range><gt>1.0.7</gt></range>
+ </package>
+ <package>
+ <name>mozilla</name>
+ <range><lt>1.7.12,2</lt></range>
+ <range><ge>1.8.*,2</ge></range>
+ </package>
+ <package>
+ <name>linux-mozilla</name>
+ <name>linux-mozilla-devel</name>
+ <range><gt>0</gt></range>
+ </package>
+ <package>
+ <name>netscape7</name>
+ <range><ge>0</ge></range>
+ </package>
+ <package>
+ <!-- These ports are obsolete. -->
+ <name>de-linux-mozillafirebird</name>
+ <name>el-linux-mozillafirebird</name>
+ <name>ja-linux-mozillafirebird-gtk1</name>
+ <name>ja-mozillafirebird-gtk2</name>
+ <name>linux-mozillafirebird</name>
+ <name>ru-linux-mozillafirebird</name>
+ <name>zhCN-linux-mozillafirebird</name>
+ <name>zhTW-linux-mozillafirebird</name>
+ <range><ge>0</ge></range>
+ </package>
+ <package>
+ <!-- These package names are obsolete. -->
+ <name>de-linux-netscape</name>
+ <name>de-netscape7</name>
+ <name>fr-linux-netscape</name>
+ <name>fr-netscape7</name>
+ <name>ja-linux-netscape</name>
+ <name>ja-netscape7</name>
+ <name>linux-netscape</name>
+ <name>linux-phoenix</name>
+ <name>mozilla+ipv6</name>
+ <name>mozilla-embedded</name>
+ <name>mozilla-firebird</name>
+ <name>mozilla-gtk1</name>
+ <name>mozilla-gtk2</name>
+ <name>mozilla-gtk</name>
+ <name>mozilla-thunderbird</name>
+ <name>phoenix</name>
+ <name>pt_BR-netscape7</name>
+ <range><ge>0</ge></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>A Secunia Advisory reports:</p>
+ <blockquote cite="http://secunia.com/advisories/16869/">
+ <p>Peter Zelezny has discovered a vulnerability in Firefox,
+ which can be exploited by malicious people to compromise a
+ user's system.</p>
+ <p>The vulnerability is caused due to the shell script used
+ to launch Firefox parsing shell commands that are enclosed
+ within backticks in the URL provided via the command
+ line. This can e.g. be exploited to execute arbitrary
+ shell commands by tricking a user into following a
+ malicious link in an external application which uses
+ Firefox as the default browser.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CAN-2005-2968</cvename>
+ <url>https://bugzilla.mozilla.org/show_bug.cgi?id=307185</url>
+ <url>http://secunia.com/advisories/16869/</url>
+ </references>
+ <dates>
+ <discovery>2005-09-06</discovery>
+ <entry>2005-09-22</entry>
+ </dates>
+ </vuln>
+
<vuln vid="e936d612-253f-11da-bc01-000e0c2e438a">
<topic>apache -- Certificate Revocation List (CRL) off-by-one vulnerability</topic>
<affects>
OpenPOWER on IntegriCloud