CVE-2006-1741 |
|
发布时间 :2006-04-14 06:02:00 | ||
修订时间 :2017-10-10 21:30:49 | ||||
NMCOP |
[原文]Mozilla Firefox 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to inject arbitrary Javascript into other sites by (1) "using a modal alert to suspend an event handler while a new page is being loaded", (2) using eval(), and using certain variants involving (3) "new Script;" and (4) using window.__proto__ to extend eval, aka "cross-site JavaScript injection".
[CNNVD]Mozilla Suite/Firefox/SeaMonkey/Thunderbird多个远程安全漏洞(CNNVD-200604-248)
Mozilla Suite/Firefox/SeaMonkey/Thunderbird都是Mozilla发布的WEB浏览器和邮件新闻组客户端产品。
上述产品中存在多个安全漏洞,具体如下:
1) 攻击者可能通过DHTML相关的攻击导致拒绝服务或执行任意代码。
2) Mozilla/Firefox和Thunderbird没有正确地处理CSS "letter-spacing"单元。攻击者可以通过指定很大的数值在内存分配期间溢出整数,导致堆溢出。成功利用这个漏洞的攻击者可以执行任意代码。
3) 远程攻击者可以向文件框中注入目标文件名然后将该文本框转换为文件上传控件,或更改事件处理器相关的"y"类型,导致读取任意文件。
4) 攻击者可以利用crypto.generateCRMFRequest方式以用户权限运行任意代码,可能安装恶意软件。
5) 如果用户在"打印预览"下浏览页面的话,则攻击者可以使用XBL控件中的脚本获得chrome权限。
6) 攻击者可以通过能够生成负数数组索引的无效且不易察觉的表格相关标签序列执行任意代码。
7) 攻击者可以利用setTimeout()和新的Firefox 1.5数组方式ForEach绕过js_ValueToFunctionObject()中的安全检查,获得权限提升。
8) XUL内容窗口与Firefox 1.5中新的faster history机制交互可能导致这些窗口变得半透明。攻击者可以利用这个漏洞诱骗用户与无法看到的窗口UI交互,导致执行任意代码。
9) 如果没有参数便调用了.valueOf.call()和.valueOf.apply()的话,上述函数会返回Object类原型而不是调用者的全局窗口对象。如果调用了另一个窗口的可获得属性的话,这就允许攻击者绕过同源保护,向另一个窗口注入脚本。
10) nsHTMLContentSink.cpp在解析特制序列的HTML标签时存在内存破坏漏洞,允许攻击者从栈控制函数指针引用,最终导致执行任意代码。
11) 攻击者可以利用window.controllers数组绕过同源保护,向另一个站点注入脚本。这可能允许恶意页面窃取cookies或口令之类的信息。如果用户已经登录的话,还可以代表该用户执行操作。
12) 特权的嵌入XBL绑定的编译范围没有得到正确的保护,攻击者可以通过调用valueOf.call()和alueOf.apply(),或向DOM的document.body原型链中注入XBL方式访问XBL绑定,然后编译并运行攻击者所提供的JavaScript。
13) 攻击者可以利用Object.watch()方式访问内部函数对象(clone parent),然后以完全权限运行任意JavaScript代码。
14) 攻击者可以利用与XBL绑定方式相关的求值创建可由错误权限编译的JavaScript函数,这样攻击者就可以以完全的用户权限运行代码。
15) 通过在可视图形上放置到可执行程序的透明图形链接,恶意站点可以诱骗用户右击并选择"图形另存为...",保存可执行程序而不是所预期的图形。之后如果攻击者双击了所保存的"图形"的话,就会执行攻击者所提供的恶意程序。
如果要利用这个漏洞,攻击者必须在扩展名前放置很多空格,以便将扩展名挤出标准文件保存对话框之外,这样在下载的时候默认的Windows行为会隐藏起扩展名。例如,类似于"bikini.jpg .exe"的扩展名看起来会像是合法的图形文件。此外,攻击者还可以将常见的图形图形嵌入到可执行程序以便进一步迷惑用户。
16) 远程攻击者可以利用有很大正则表达式的JavaScript、InstallTrigger.install方式、通过更改-moz-grid和-moz-grid-group显示样式,或某些能够导致越界数组写入和缓冲区溢出的级联样式表(CSS)导致拒绝服务,或执行任意代码。
17) 攻击者可以通过首先在弹出窗口中加载目标安全站点然后将站点位置更改至不同位置的方式欺骗浏览器的安全站点标识符。如果用户打开了"输入安全站点"模式警告对话框的话,就可以在显示对话框的时候更改窗口位置,而原始站点的安全浏览标识符保持不变。
18) 如果启用了"禁止在邮件消息中加载远程图形"的话,HTML渲染引擎就无法正确的阻断在线HTML附件中的外部图形,这允许在用户读取邮件并访问外部图形时泄漏敏感信息,如应用程序版本或IP地址。
- CVSS (基础分值)
CVSS分值: | 4.3 | [中等(MEDIUM)] |
机密性影响: | NONE | [对系统的机密性无影响] |
完整性影响: | PARTIAL | [可能会导致系统文件被修改] |
可用性影响: | NONE | [对系统可用性无影响] |
攻击复杂度: | MEDIUM | [漏洞利用存在一定的访问条件] |
攻击向量: | NETWORK | [攻击者不需要获取内网访问权或本地访问权] |
身份认证: | NONE | [漏洞利用无需身份认证] |
- CWE (弱点类目)
CWE-79 | [在Web页面生成时对输入的转义处理不恰当(跨站脚本)] |
- CPE (受影响的平台与产品)
cpe:/a:mozilla:firefox:1.0 | Mozilla Firefox 1.0 |
cpe:/a:mozilla:firefox:1.0.1 | Mozilla Firefox 1.0.1 |
cpe:/a:mozilla:firefox:1.0.2 | Mozilla Firefox 1.0.2 |
cpe:/a:mozilla:firefox:1.0.3 | Mozilla Firefox 1.0.3 |
cpe:/a:mozilla:firefox:1.0.4 | Mozilla Firefox 1.0.4 |
cpe:/a:mozilla:firefox:1.0.5 | Mozilla Firefox 1.0.5 |
cpe:/a:mozilla:firefox:1.0.6 | Mozilla Firefox 1.0.6 |
cpe:/a:mozilla:firefox:1.0.7 | Mozilla Firefox 1.0.7 |
cpe:/a:mozilla:firefox:1.5 | Mozilla Firefox 1.5 |
cpe:/a:mozilla:firefox:1.5:beta1 | Mozilla Firefox 1.5 Beta 1 |
cpe:/a:mozilla:firefox:1.5:beta2 | Mozilla Firefox 1.5 Beta 2 |
cpe:/a:mozilla:mozilla_suite:1.7.6 | Mozilla Mozilla Suite 1.7.6 |
cpe:/a:mozilla:mozilla_suite:1.7.7 | Mozilla Mozilla Suite 1.7.7 |
cpe:/a:mozilla:mozilla_suite:1.7.8 | Mozilla Mozilla Suite 1.7.8 |
cpe:/a:mozilla:mozilla_suite:1.7.10 | Mozilla Mozilla Suite 1.7.10 |
cpe:/a:mozilla:mozilla_suite:1.7.11 | Mozilla Mozilla Suite 1.7.11 |
cpe:/a:mozilla:mozilla_suite:1.7.12 | Mozilla Mozilla Suite 1.7.12 |
cpe:/a:mozilla:seamonkey:1.0::alpha | |
cpe:/a:mozilla:seamonkey:1.0:beta | Mozilla SeaMonkey 1.0 beta |
cpe:/a:mozilla:thunderbird:1.0 | Mozilla Thunderbird 1.0 |
cpe:/a:mozilla:thunderbird:1.0.1 | Mozilla Thunderbird 1.0.1 |
cpe:/a:mozilla:thunderbird:1.0.2 | Mozilla Thunderbird 1.0.2 |
cpe:/a:mozilla:thunderbird:1.0.3 | Mozilla Thunderbird 1.0.3 |
cpe:/a:mozilla:thunderbird:1.0.4 | Mozilla Thunderbird 1.0.4 |
cpe:/a:mozilla:thunderbird:1.0.5 | Mozilla Thunderbird 1.0.5 |
cpe:/a:mozilla:thunderbird:1.0.5:beta | Mozilla Thunderbird 1.0.5 Beta |
cpe:/a:mozilla:thunderbird:1.0.6 | Mozilla Thunderbird 1.0.6 |
cpe:/a:mozilla:thunderbird:1.0.7 | Mozilla Thunderbird 1.0.7 |
cpe:/a:mozilla:thunderbird:1.5 | Mozilla Thunderbird 1.5 |
cpe:/a:mozilla:thunderbird:1.5:beta2 | Mozilla Thunderbird 1.5 Beta 2 |
cpe:/a:mozilla:thunderbird:1.5.0.1 | Mozilla Thunderbird 1.5.0.1 |
- OVAL (用于检测的技术细节)
oval:org.mitre.oval:def:9167 | Mozilla Firefox 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to inje... |
oval:org.mitre.oval:def:1855 | Mozilla Cross-site JavaScript Injection Using Event Handlers |
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。 |
- 官方数据库链接
- 其它链接及资源
- 漏洞信息
Mozilla Suite/Firefox/SeaMonkey/Thunderbird多个远程安全漏洞 | |
中危 | 跨站脚本 |
2006-04-14 00:00:00 | 2009-02-05 00:00:00 |
远程 | |
Mozilla Suite/Firefox/SeaMonkey/Thunderbird都是Mozilla发布的WEB浏览器和邮件新闻组客户端产品。
上述产品中存在多个安全漏洞,具体如下: 1) 攻击者可能通过DHTML相关的攻击导致拒绝服务或执行任意代码。 2) Mozilla/Firefox和Thunderbird没有正确地处理CSS "letter-spacing"单元。攻击者可以通过指定很大的数值在内存分配期间溢出整数,导致堆溢出。成功利用这个漏洞的攻击者可以执行任意代码。 3) 远程攻击者可以向文件框中注入目标文件名然后将该文本框转换为文件上传控件,或更改事件处理器相关的"y"类型,导致读取任意文件。 4) 攻击者可以利用crypto.generateCRMFRequest方式以用户权限运行任意代码,可能安装恶意软件。 5) 如果用户在"打印预览"下浏览页面的话,则攻击者可以使用XBL控件中的脚本获得chrome权限。 6) 攻击者可以通过能够生成负数数组索引的无效且不易察觉的表格相关标签序列执行任意代码。 7) 攻击者可以利用setTimeout()和新的Firefox 1.5数组方式ForEach绕过js_ValueToFunctionObject()中的安全检查,获得权限提升。 8) XUL内容窗口与Firefox 1.5中新的faster history机制交互可能导致这些窗口变得半透明。攻击者可以利用这个漏洞诱骗用户与无法看到的窗口UI交互,导致执行任意代码。 9) 如果没有参数便调用了.valueOf.call()和.valueOf.apply()的话,上述函数会返回Object类原型而不是调用者的全局窗口对象。如果调用了另一个窗口的可获得属性的话,这就允许攻击者绕过同源保护,向另一个窗口注入脚本。 10) nsHTMLContentSink.cpp在解析特制序列的HTML标签时存在内存破坏漏洞,允许攻击者从栈控制函数指针引用,最终导致执行任意代码。 11) 攻击者可以利用window.controllers数组绕过同源保护,向另一个站点注入脚本。这可能允许恶意页面窃取cookies或口令之类的信息。如果用户已经登录的话,还可以代表该用户执行操作。 12) 特权的嵌入XBL绑定的编译范围没有得到正确的保护,攻击者可以通过调用valueOf.call()和alueOf.apply(),或向DOM的document.body原型链中注入XBL方式访问XBL绑定,然后编译并运行攻击者所提供的JavaScript。 13) 攻击者可以利用Object.watch()方式访问内部函数对象(clone parent),然后以完全权限运行任意JavaScript代码。 14) 攻击者可以利用与XBL绑定方式相关的求值创建可由错误权限编译的JavaScript函数,这样攻击者就可以以完全的用户权限运行代码。 15) 通过在可视图形上放置到可执行程序的透明图形链接,恶意站点可以诱骗用户右击并选择"图形另存为...",保存可执行程序而不是所预期的图形。之后如果攻击者双击了所保存的"图形"的话,就会执行攻击者所提供的恶意程序。 如果要利用这个漏洞,攻击者必须在扩展名前放置很多空格,以便将扩展名挤出标准文件保存对话框之外,这样在下载的时候默认的Windows行为会隐藏起扩展名。例如,类似于"bikini.jpg .exe"的扩展名看起来会像是合法的图形文件。此外,攻击者还可以将常见的图形图形嵌入到可执行程序以便进一步迷惑用户。 16) 远程攻击者可以利用有很大正则表达式的JavaScript、InstallTrigger.install方式、通过更改-moz-grid和-moz-grid-group显示样式,或某些能够导致越界数组写入和缓冲区溢出的级联样式表(CSS)导致拒绝服务,或执行任意代码。 17) 攻击者可以通过首先在弹出窗口中加载目标安全站点然后将站点位置更改至不同位置的方式欺骗浏览器的安全站点标识符。如果用户打开了"输入安全站点"模式警告对话框的话,就可以在显示对话框的时候更改窗口位置,而原始站点的安全浏览标识符保持不变。 18) 如果启用了"禁止在邮件消息中加载远程图形"的话,HTML渲染引擎就无法正确的阻断在线HTML附件中的外部图形,这允许在用户读取邮件并访问外部图形时泄漏敏感信息,如应用程序版本或IP地址。 |
- 公告与补丁
目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:
Sun Solaris 10.0 Sun 119115-21 http://sunsolve.sun.com/ Sun Solaris 8 Sun 120671-03 http://sunsolve.sun.com/patches/ HP HP-UX B.11.23 HP Firefox v2.0.0.4 http://www.hp.com/products1/unix/java/firefox/downloads/license_firefo x_2-0-0-4.html HP thunderbird_1.5.0.9_ia.depot.gz For HP-UX B.11.23 and B.11.31 (IA) http://www.hp.com/products1/unix/java/firefox/downloads/license_thunde rbird_1-5-0-8.html HP thunderbird_1.5.0.9_pa.depot.gz For HP-UX B.11.11, B.11.23, and B.11.31 (PA) http://www.hp.com/products1/unix/java/firefox/downloads/license_thunde rbird_1-5-0-8.html HP HP-UX B.11.11 HP Firefox v2.0.0.4 http://www.hp.com/products1/unix/java/firefox/downloads/license_firefo x_2-0-0-4.html HP thunderbird_1.5.0.9_pa.depot.gz For HP-UX B.11.11, B.11.23, and B.11.31 (PA) http://www.hp.com/products1/unix/java/firefox/downloads/license_thunde rbird_1-5-0-8.html Mozilla Thunderbird 0.8 Fedora Legacy thunderbird-1.0.8-1.1.fc3.4.legacy.i386.rpm Fedora Core 3: http://download.fedoralegacy.org/fedora/3/updates/i386/thunderbird-1.0 .8-1.1.fc3.4.legacy.i386.rpm Fedora Legacy thunderbird-1.0.8-1.1.fc3.4.legacy.x86_64.rpm Fedora Core 3: http://download.fedoralegacy.org/fedora/3/updates/x86_64/thunderbird-1 .0.8-1.1.fc3.4.legacy.x86_64.rpm Mozilla Firefox 1.0.4 Debian mozilla-firefox-dom-inspector_1.0.4-2sarge6_alpha.deb Debian GNU/Linux 3.1 alias sarge http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla -firefox-dom-inspector_1.0.4-2sarge6_alpha.deb Debian mozilla-firefox-dom-inspector_1.0.4-2sarge6_amd64.deb Debian GNU/Linux 3.1 alias sarge http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla -firefox-dom-inspector_1.0.4-2sarge6_amd64.deb Debian mozilla-firefox-dom-inspector_1.0.4-2sarge6_arm.deb Debian GNU/Linux 3.1 alias sarge http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla -firefox-dom-inspector_1.0.4-2sarge6_arm.deb Debian mozilla-firefox-dom-inspector_1.0.4-2sarge6_hppa.deb Debian GNU/Linux 3.1 alias sarge http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla -firefox-dom-inspector_1.0.4-2sarge6_hppa.deb Debian mozilla-firefox-dom-inspector_1.0.4-2sarge6_i386.deb Debian GNU/Linux 3.1 alias sarge http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla -firefox-dom-inspector_1.0.4-2sarge6_i386.deb Debian mozilla-firefox-dom-inspector_1.0.4-2sarge6_ia64.deb Debian GNU/Linux 3.1 alias sarge http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla -firefox-dom-inspector_1.0.4-2sarge6_ia64.deb Debian mozilla-firefox-dom-inspector_1.0.4-2sarge6_m68k.deb Debian GNU/Linux 3.1 alias sarge http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla -firefox-dom-inspector_1.0.4-2sarge6_m68k.deb Debian mozilla-firefox-dom-inspector_1.0.4-2sarge6_mips.deb Debian GNU/Linux 3.1 alias sarge http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla -firefox-dom-inspector_1.0.4-2sarge6_mips.deb Debian mozilla-firefox-dom-inspector_1.0.4-2sarge6_mipsel.deb Debian GNU/Linux 3.1 alias sarge http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla -firefox-dom-inspector_1.0.4-2sarge6_mipsel.deb Debian mozilla-firefox-dom-inspector_1.0.4-2sarge6_powerpc.deb Debian GNU/Linux 3.1 alias sarge http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla -firefox-dom-inspector_1.0.4-2sarge6_powerpc.deb Debian mozilla-firefox-dom-inspector_1.0.4-2sarge6_s390.deb Debian GNU/Linux 3.1 alias sarge http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla -firefox-dom-inspector_1.0.4-2sarge6_s390.deb Debian mozilla-firefox-dom-inspector_1.0.4-2sarge6_sparc.deb Debian GNU/Linux 3.1 alias sarge http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla -firefox-dom-inspector_1.0.4-2sarge6_sparc.deb Debian mozilla-firefox-gnome-support_1.0.4-2sarge6_alpha.deb Debian GNU/Linux 3.1 alias sarge http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla -firefox-gnome-support_1. |
- 漏洞信息 (F46093)
Ubuntu Security Notice 276-1 (PacketStormID:F46093) |
2006-05-06 00:00:00 |
Ubuntu security.ubuntu.com |
advisory,vulnerability |
linux,ubuntu |
CVE-2006-0292,CVE-2006-0296,CVE-2006-0748,CVE-2006-0749,CVE-2006-0884,CVE-2006-1045,CVE-2006-1727,CVE-2006-1728,CVE-2006-1730,CVE-2006-1731,CVE-2006-1732,CVE-2006-1733,CVE-2006-1734,CVE-2006-1735,CVE-2006-1737,CVE-2006-1738,CVE-2006-1739,CVE-2006-1741 |
[点击下载] |
Ubuntu Security Notice 276-1 - A large number of mozilla-thunderbird related vulnerabilities have been patched for Ubuntu. |
=========================================================== Ubuntu Security Notice USN-276-1 May 03, 2006 mozilla-thunderbird vulnerabilities CVE-2006-0292, CVE-2006-0296, CVE-2006-0748, CVE-2006-0749, CVE-2006-0884, CVE-2006-1045, CVE-2006-1727, CVE-2006-1728, CVE-2006-1730, CVE-2006-1731, CVE-2006-1732, CVE-2006-1733, CVE-2006-1734, CVE-2006-1735, CVE-2006-1737, CVE-2006-1738, CVE-2006-1739, CVE-2006-1741, CVE-2006-1742, CVE-2006-1790 =========================================================== A security issue affects the following Ubuntu releases: Ubuntu 5.04 (Hoary Hedgehog) Ubuntu 5.10 (Breezy Badger) The following packages are affected: mozilla-thunderbird The problem can be corrected by upgrading the affected package to version 1.0.8-0ubuntu05.04 (for Ubuntu 5.04) or 1.0.8-0ubuntu05.10.1 (for Ubuntu 5.10). After a standard system upgrade you need to restart Thunderbird to effect the necessary changes. Details follow: Igor Bukanov discovered that the JavaScript engine did not properly declare some temporary variables. Under some rare circumstances, a malicious mail with embedded JavaScript could exploit this to execute arbitrary code with the privileges of the user. (CVE-2006-0292, CVE-2006-1742) The function XULDocument.persist() did not sufficiently validate the names of attributes. An attacker could exploit this to inject arbitrary XML code into the file 'localstore.rdf', which is read and evaluated at startup. This could include JavaScript commands that would be run with the user's privileges. (CVE-2006-0296) Due to a flaw in the HTML tag parser a specific sequence of HTML tags caused memory corruption. A malicious HTML email could exploit this to crash the browser or even execute arbitrary code with the user's privileges. (CVE-2006-0748) An invalid ordering of table-related tags caused Thunderbird to use a negative array index. A malicious HTML email could exploit this to execute arbitrary code with the privileges of the user. (CVE-2006-0749) Georgi Guninski discovered that forwarding mail in-line while using the default HTML "rich mail" editor executed JavaScript embedded in the email message. Forwarding mail in-line is not the default setting but it is easily accessed through the "Forward As" menu item. (CVE-2006-0884) As a privacy measure to prevent senders (primarily spammers) from tracking when email is read Thunderbird does not load remote content referenced from an HTML mail message until a user tells it to do so. This normally includes the content of frames and CSS files. It was discovered that it was possible to bypass this restriction by indirectly including remote content through an intermediate inline CSS script or frame. (CVE-2006-1045) Georgi Guninski discovered that embedded XBL scripts could escalate their (normally reduced) privileges to get full privileges of the user if the email is viewed with "Print Preview". (CVE-2006-1727) The crypto.generateCRMFRequest() function had a flaw which could be exploited to run arbitrary code with the user's privileges. (CVE-2006-1728) An integer overflow was detected in the handling of the CSS property "letter-spacing". A malicious HTML email could exploit this to run arbitrary code with the user's privileges. (CVE-2006-1730) The methods valueOf.call() and .valueOf.apply() returned an object whose privileges were not properly confined to those of the caller, which made them vulnerable to cross-site scripting attacks. A malicious email with embedded JavaScript code could exploit this to modify the contents or steal confidential data (such as passwords) from other opened web pages. (CVE-2006-1731) The window.controllers array variable (CVE-2006-1732) and event handlers (CVE-2006-1741) were vulnerable to a similar attack. The privileged built-in XBL bindings were not fully protected from web content and could be accessed by calling valueOf.call() and valueOf.apply() on a method of that binding. A malicious email could exploit this to run arbitrary JavaScript code with the user's privileges. (CVE-2006-1733) It was possible to use the Object.watch() method to access an internal function object (the "clone parent"). A malicious email containing JavaScript code could exploit this to execute arbitrary code with the user's privileges. (CVE-2006-1734) By calling the XBL.method.eval() method in a special way it was possible to create JavaScript functions that would get compiled with the wrong privileges. A malicious email could exploit this to execute arbitrary JavaScript code with the user's privileges. (CVE-2006-1735) Several crashes have been fixed which could be triggered by specially crafted HTML content and involve memory corruption. These could potentially be exploited to execute arbitrary code with the user's privileges. (CVE-2006-1737, CVE-2006-1738, CVE-2006-1739, CVE-2006-1790) The "enigmail" plugin has been updated to work with the new Thunderbird and Mozilla versions. Updated packages for Ubuntu 5.04: Source archives: http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.8-0ubuntu05.04.diff.gz Size/MD5: 76623 e2c82d7f468caa965e5621ad18b77a69 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.8-0ubuntu05.04.dsc Size/MD5: 942 4931c6ed9945f46bad16162d90837282 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.8.orig.tar.gz Size/MD5: 32849510 ae345f1b722d8f3a977af4fd358d27b0 http://security.ubuntu.com/ubuntu/pool/main/e/enigmail/enigmail_0.92.1-0ubuntu05.04.1.diff.gz Size/MD5: 16967 0d21f085cb14cc87f8dd2d3e1f066c00 http://security.ubuntu.com/ubuntu/pool/main/e/enigmail/enigmail_0.92.1-0ubuntu05.04.1.dsc Size/MD5: 900 e90119b58ffbc055a79dbf8c27974890 http://security.ubuntu.com/ubuntu/pool/main/e/enigmail/enigmail_0.92.1.orig.tar.gz Size/MD5: 2041938 5225bb1b406e9242c38cf9ac6c3d6dd0 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.8-0ubuntu05.04_amd64.deb Size/MD5: 3346316 4838ce489a4512185c2e8619c36803af http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.8-0ubuntu05.04_amd64.deb Size/MD5: 144566 5e8664ddac5eb2d360dfe7cf5693b5ca http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.8-0ubuntu05.04_amd64.deb Size/MD5: 27052 8ee5b7fa38567d6b56b94263c6b214ae http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.8-0ubuntu05.04_amd64.deb Size/MD5: 82044 33b3f22708c85cfe4afc45d6309b7a39 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.8-0ubuntu05.04_amd64.deb Size/MD5: 11955310 6816901f94b36fe12c17a5e77a91cdd1 http://security.ubuntu.com/ubuntu/pool/universe/e/enigmail/mozilla-enigmail_0.92.1-0ubuntu05.04.1_amd64.deb Size/MD5: 327162 ae60497d3d11bc53d6844a7e6b54b2fc http://security.ubuntu.com/ubuntu/pool/main/e/enigmail/mozilla-thunderbird-enigmail_0.92.1-0ubuntu05.04.1_amd64.deb Size/MD5: 333180 7d3b0e50d3d274f341502cb447983794 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.8-0ubuntu05.04_i386.deb Size/MD5: 3339820 40cfb23ff33a24a1e002e5ae6e319a55 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.8-0ubuntu05.04_i386.deb Size/MD5: 139624 5a3929b65c1e9384ca953f6f28f86991 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.8-0ubuntu05.04_i386.deb Size/MD5: 27040 ee1123d1e2bb0b46a7212679de65ccd6 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.8-0ubuntu05.04_i386.deb Size/MD5: 79778 84622dd3db2690375b0e073448841e91 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.8-0ubuntu05.04_i386.deb Size/MD5: 10906934 55712d19a5b6cb3806b13fc465ad60b4 http://security.ubuntu.com/ubuntu/pool/universe/e/enigmail/mozilla-enigmail_0.92.1-0ubuntu05.04.1_i386.deb Size/MD5: 310964 0f4d71ae7dc7b613cde1e1759fa29dbb http://security.ubuntu.com/ubuntu/pool/main/e/enigmail/mozilla-thunderbird-enigmail_0.92.1-0ubuntu05.04.1_i386.deb Size/MD5: 318594 78b3bcfa57d384908226868b1ad426ce powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.8-0ubuntu05.04_powerpc.deb Size/MD5: 3335256 c56ffb4e645d66c08e7102b12fe18c83 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.8-0ubuntu05.04_powerpc.deb Size/MD5: 138410 107186f5ec6c4048a4bc8ebd510abfa5 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.8-0ubuntu05.04_powerpc.deb Size/MD5: 27044 7587ace6fd17ffb10799c5b7546e8262 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.8-0ubuntu05.04_powerpc.deb Size/MD5: 73992 5c50490392e962e7d5e21fa1d1ef6c4d http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.8-0ubuntu05.04_powerpc.deb Size/MD5: 10449994 1787f118606df90c056107248d39e98f http://security.ubuntu.com/ubuntu/pool/universe/e/enigmail/mozilla-enigmail_0.92.1-0ubuntu05.04.1_powerpc.deb Size/MD5: 313234 83451690ecff28aa21b302659ab67e3a http://security.ubuntu.com/ubuntu/pool/main/e/enigmail/mozilla-thunderbird-enigmail_0.92.1-0ubuntu05.04.1_powerpc.deb Size/MD5: 320344 bd8cacb157b0391f95e47b7f55049ad9 Updated packages for Ubuntu 5.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.8-0ubuntu05.10.1.diff.gz Size/MD5: 78589 a81e704914bb097722eef1eb1951bbd0 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.8-0ubuntu05.10.1.dsc Size/MD5: 918 c30bd87fbee4cd0f0c3ab1e1a549f210 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.8.orig.tar.gz Size/MD5: 32849510 ae345f1b722d8f3a977af4fd358d27b0 http://security.ubuntu.com/ubuntu/pool/main/e/enigmail/enigmail_0.92.1-0ubuntu05.10.1.diff.gz Size/MD5: 16998 45dd732ea8a6e94cc72329cb5fd8abfd http://security.ubuntu.com/ubuntu/pool/main/e/enigmail/enigmail_0.92.1-0ubuntu05.10.1.dsc Size/MD5: 866 88c6273adbf2f0bf648aae9d919529dd http://security.ubuntu.com/ubuntu/pool/main/e/enigmail/enigmail_0.92.1.orig.tar.gz Size/MD5: 2041938 5225bb1b406e9242c38cf9ac6c3d6dd0 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.8-0ubuntu05.10.1_amd64.deb Size/MD5: 3293534 a5466ae79562b66ab65516bd786cc4c1 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.8-0ubuntu05.10.1_amd64.deb Size/MD5: 146062 85510c5277f233cf543bb24629cf2791 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.8-0ubuntu05.10.1_amd64.deb Size/MD5: 27556 1ed57f5b19fffaa589f2c63cc38b8d34 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.8-0ubuntu05.10.1_amd64.deb Size/MD5: 85568 4ef141fb9d6cfe98cc3596c4fd0be89b http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.8-0ubuntu05.10.1_amd64.deb Size/MD5: 11976142 a69cb1d98a768049462499b178f5a99f http://security.ubuntu.com/ubuntu/pool/universe/e/enigmail/mozilla-enigmail_0.92.1-0ubuntu05.10.1_amd64.deb Size/MD5: 328698 a8b8a3c072d452f9574c956de3a8805e http://security.ubuntu.com/ubuntu/pool/main/e/enigmail/mozilla-thunderbird-enigmail_0.92.1-0ubuntu05.10.1_amd64.deb Size/MD5: 334412 5338fb2503077e60e317a7555640aef7 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.8-0ubuntu05.10.1_i386.deb Size/MD5: 3287228 96f7b87993b15341908028905fc93679 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.8-0ubuntu05.10.1_i386.deb Size/MD5: 139624 b268fad24d8c35ed9a05c9c97e01bb5e http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.8-0ubuntu05.10.1_i386.deb Size/MD5: 27552 a38be0266866af883b525a50d8672ac3 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.8-0ubuntu05.10.1_i386.deb Size/MD5: 76942 1e2b0b0163b12d52af2881720978ca7d http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.8-0ubuntu05.10.1_i386.deb Size/MD5: 10374514 32e541a406bed650de919d15f089a3aa http://security.ubuntu.com/ubuntu/pool/universe/e/enigmail/mozilla-enigmail_0.92.1-0ubuntu05.10.1_i386.deb Size/MD5: 311056 4d8ecdff00ada64fde35baa64c6362a5 http://security.ubuntu.com/ubuntu/pool/main/e/enigmail/mozilla-thunderbird-enigmail_0.92.1-0ubuntu05.10.1_i386.deb Size/MD5: 318578 4fb5630d72f0442a33554ca364b6cede powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.8-0ubuntu05.10.1_powerpc.deb Size/MD5: 3285046 59891dba5f7f0a8045a777ebee2bbe13 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.8-0ubuntu05.10.1_powerpc.deb Size/MD5: 139692 6d78f1414d2e2375682b3763cc0da542 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.8-0ubuntu05.10.1_powerpc.deb Size/MD5: 27552 28194ffd23b895a46ebca73dcb1b85d3 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.8-0ubuntu05.10.1_powerpc.deb Size/MD5: 76654 e352b77b08e50b4a72228e6390de00b5 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.8-0ubuntu05.10.1_powerpc.deb Size/MD5: 10487686 644313dc6de638d7b6620f090a5cabed http://security.ubuntu.com/ubuntu/pool/universe/e/enigmail/mozilla-enigmail_0.92.1-0ubuntu05.10.1_powerpc.deb Size/MD5: 314132 a1ae03a1b92a71dfd85f31fa2f548335 http://security.ubuntu.com/ubuntu/pool/main/e/enigmail/mozilla-thunderbird-enigmail_0.92.1-0ubuntu05.10.1_powerpc.deb Size/MD5: 321364 bf03d8fd532a39f09ff0e4205518cd2c
- 漏洞信息
24658 | |
Mozilla Multiple Products Modal Alert Suspended Handler XSS | |
Remote / Network Access | Input Manipulation |
Loss of Integrity | |
Vendor Verified |
- 漏洞描述
Unknown or Incomplete |
- 时间线
2006-04-13 | Unknow |
Unknow | Unknow |
- 解决方案
Unknown or Incomplete |
- 相关参考
漏洞作者
Unknown or Incomplete |