|
| Current Newswire:
Advisories: March 26, 2005Mar 26, 2005, 23:00 (0 Talkback[s])Fedora Update Notification FEDORA-2005-248 2005-03-25 Product : Fedora Core 2 Description : Update Information: A buffer overflow bug was found in the way Mozilla processes GIF images. It is possible for an attacker to create a specially crafted GIF image, which when viewed by a victim will execute arbitrary code as the victim. The Common Vulnerabilities and Exposures project (cve.mitre.org/) has assigned the name CAN-2005-0399 to this issue. A bug was found in the way Mozilla responds to proxy auth requests. It is possible for a malicious webserver to steal credentials from a victims browser by issuing a 407 proxy authentication request. (CAN-2005-0147) A bug was found in the way Mozilla displays dialog windows. It is possible that a malicious web page which is being displayed in a background tab could present the user with a dialog window appearing to come from the active page. (CAN-2004-1380) A bug was found in the way Mozilla Mail handles cookies when loading content over HTTP regardless of the user's preference. It is possible that a particular user could be tracked through the use of malicious mail messages which load content over HTTP. (CAN-2005-0149) A flaw was found in the way Mozilla displays international domain names. It is possible for an attacker to display a valid URL, tricking the user into thinking they are viewing a legitimate webpage when they are not. (CAN-2005-0233) A bug was found in the way Mozilla handles pop-up windows. It is possible for a malicious website to control the content in an unrelated site's pop-up window. (CAN-2004-1156) A bug was found in the way Mozilla saves temporary files. Temporary files are saved with world readable permissions, which could allow a local malicious user to view potentially sensitive data. (CAN-2005-0142) A bug was found in the way Mozilla handles synthetic middle click events. It is possible for a malicious web page to steal the contents of a victims clipboard. (CAN-2005-0146) A bug was found in the way Mozilla processes XUL content. If a malicious web page can trick a user into dragging an object, it is possible to load malicious XUL content. (CAN-2005-0401) A bug was found in the way Mozilla loads links in a new tab which are middle clicked. A malicious web page could read local files or modify privileged chrom settings. (CAN-2005-0141) A bug was found in the way Mozilla displays the secure site icon. A malicious web page can use a view-source URL targetted at a secure page, while loading an insecure page, yet the secure site icon shows the previous secure state. (CAN-2005-0144) A bug was found in the way Mozilla displays the secure site icon. A malicious web page can display the secure site icon by loading a binary file from a secured site. (CAN-2005-0143) A bug was found in the way Mozilla displays the download dialog window. A malicious site can obfuscate the content displayed in the source field, tricking a user into thinking they are downloading content from a trusted source. (CAN-2005-0585) Users of Mozilla are advised to upgrade to this updated package which contains Mozilla version 1.7.6 to correct these issues.
This update can be downloaded from: http://download.fedora.redhat.com/pub/fedora/linux/core/updates/2/ 670cd6dfd4638a8b720c5524dfda0904
SRPMS/mozilla-1.7.6-1.2.2.src.rpm This update can also be installed with the Update Agent; you can launch the Update Agent with the 'up2date' command. Fedora Update Notification FEDORA-2005-251 2005-03-25 Product : Fedora Core 2 Description : Update Information: There were several security flaws found in the mozilla package, which devhelp depends on. Users of devhelp are advised to upgrade to this updated package which has been rebuilt against a later version of mozilla which is not vulnerable to these flaws.
This update can be downloaded from: http://download.fedora.redhat.com/pub/fedora/linux/core/updates/2/ a35fe8bea6559080c3a6f461527a0461
SRPMS/devhelp-0.9.1-0.2.5.src.rpm This update can also be installed with the Update Agent; you can launch the Update Agent with the 'up2date' command. Fedora Update Notification FEDORA-2005-253 2005-03-25 Product : Fedora Core 2 Description : Update Information: There were several security flaws found in the mozilla package, which epiphany depends on. Users of epiphany are advised to upgrade to this updated package which has been rebuilt against a later version of mozilla which is not vulnerable to these flaws.
This update can be downloaded from: http://download.fedora.redhat.com/pub/fedora/linux/core/updates/2/ 398444378e055d50d82da73619b3cafb
SRPMS/epiphany-1.2.10-0.2.1.src.rpm This update can also be installed with the Update Agent; you can launch the Update Agent with the 'up2date' command. 0 Talkback[s]
(click to add your comment)
|