CVE-2006-1942
CVSS5.1
发布时间 :2006-04-20 18:02:00
修订时间 :2011-03-07 00:00:00
NMCOP    

[原文]Mozilla Firefox 1.5.0.2 and possibly other versions before 1.5.0.4, Netscape 8.1, 8.0.4, and 7.2, and K-Meleon 0.9.13 allows user-assisted remote attackers to open local files via a web page with an IMG element containing a SRC attribute with a non-image file:// URL, then tricking the user into selecting View Image for the broken image, as demonstrated using a .wma file to launch Windows Media Player, or by referencing an "alternate web page."


[CNNVD]Mozilla Firefox/SeaMonkey/Thunderbird多个远程安全漏洞(CNNVD-200604-358)

        Mozilla Firefox/SeaMonkey/Thunderbird是Mozilla发布的WEB浏览器和邮件新闻组客户端产品。
        上述产品中存在多个安全漏洞,具体如下:
        1) 通过EvalInSandbox运行的JavaScript可以摆脱沙盒的限制,通过对在沙盒外创建并注入到沙盒中的对象调用valueOf()获得权限提升。恶意脚本可以使用这些权限入侵电脑或数据。
        2) 浏览器引擎中的内容破坏可能导致崩溃。
        3) 攻击者可以在发送的HTTP响应中包含有Transfer-Encoding首部,且在首部名和冒号(:)之间加入空格,导致欺骗其他域中的网页,发动钓鱼攻击,窃取敏感信息,如用户口令或cookies。
        4) 攻击者可以将图形的src属性设置为javascript: URL并在鼠标点击事件时加载目标站点,然后诱骗用户右击破坏的图形并从上下文菜单选择"浏览图形",这样就可以导致在攻击者选择的站点运行JavaScript,窃取登录cookies或保密信息。
        类似的,如果用户受骗对src属性设置为JavaScript: URL的帧右击并选择了"仅显示本帧"的话,就可以在帧站点环境中运行脚本。
        5) 在某些环境下持续的XUL属性被关联到了错误的URL。如果攻击者可以得到与URL关联的持续字符串而该字符串之后会在特权环境中eval或执行该属性的话,就会以浏览器的权限执行攻击者的代码。
        6) 攻击者可以使用嵌套的JavaScript: URL绕过MFSA 2005-34修复,执行特权代码。攻击者必须首先诱骗用户点击页面上缺失插件图标或信息栏上的"安装缺失插件..."按键,然后点击插件查找器对话框的"手动安装"按键。
        7) 特权用户界面代码可以调用对象原型的内容定义的设置器,导致可将高权限级别传递到内容定义的攻击代码。
        8) crypto.signText()中存在数组索引漏洞,如果传送了可选的证书授权名参数的话,就会溢出两位已分配的指针数组。
        9) 正常情况下基于Mozilla的客户端可以防止将Web内容链接到本地文件,但攻击者可以使用Windows文件名句法而不是将file:/// URL做为SRC=属性,就可以绕过这种限制。如果用户受骗右击了破损的链接并选择"浏览图形"的话,就会加载本地文件内容。
        10) Thunderbird在处理有无效base64字符的大VCard时存在双重释放漏洞。由于攻击者可以提供任意数量的特制VCard数据,因此这个漏洞可能导致执行任意指令。
        11) MFSA 2006-23中的漏洞并没有完全修复,攻击者可以用到已知位置文件的路径预添加文本输入控制,然后将输入控制的类型更改为文件上传控制而没有重置为预期的值。
        12) 在将Unicode字节顺序标记(BOM)转换为Unicode时在解析器看见web页面之前便将BOM从UTF-8页面剥离,导致解析器会看见并处理web输入过滤器所遗漏的脚本标签,因为这些标签类似于"scr[BOM]ipt"或Web站点的标注代码。
        13) Web内容可以访问Selection对象的nsISelectionPrivate接口并用于添加SelectionListener。当用户在页面上执行"查找"或"全选"操作时会调用监听程序。如果结合其他漏洞的话攻击者就可以在特权环境中执行任意代码。
        

- CVSS (基础分值)

CVSS分值: 5.1 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: HIGH [漏洞利用存在特定的访问条件]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:netscape:navigator:8.0.40Netscape Netscape 8.0.4
cpe:/a:k-meleon_project:k-meleon:0.9.13
cpe:/a:netscape:navigator:7.2Netscape Navigator 7.2
cpe:/a:netscape:navigator:8.1Netscape Netscape 8.1
cpe:/a:mozilla:firefox:1.5.0.2Mozilla Firefox 1.5.0.2

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1942
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-1942
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200604-358
(官方数据源) CNNVD

- 其它链接及资源

http://www.gavinsharp.com/tmp/ImageVuln.html
(PATCH)  MISC  http://www.gavinsharp.com/tmp/ImageVuln.html
https://bugzilla.mozilla.org/show_bug.cgi?id=334341
(UNKNOWN)  CONFIRM  https://bugzilla.mozilla.org/show_bug.cgi?id=334341
http://xforce.iss.net/xforce/xfdb/25925
(UNKNOWN)  XF  firefox-viewimage-security-bypass(25925)
http://www.vupen.com/english/advisories/2008/0083
(VENDOR_ADVISORY)  VUPEN  ADV-2008-0083
http://www.vupen.com/english/advisories/2006/3748
(VENDOR_ADVISORY)  VUPEN  ADV-2006-3748
http://www.vupen.com/english/advisories/2006/2106
(VENDOR_ADVISORY)  VUPEN  ADV-2006-2106
http://www.securityfocus.com/bid/18228
(UNKNOWN)  BID  18228
http://www.securityfocus.com/archive/1/archive/1/446658/100/200/threaded
(UNKNOWN)  HP  SSRT061181
http://www.securityfocus.com/archive/1/archive/1/446658/100/200/threaded
(UNKNOWN)  HP  SSRT061181
http://www.securityfocus.com/archive/1/archive/1/435795/100/0/threaded
(UNKNOWN)  BUGTRAQ  20060602 rPSA-2006-0091-1 firefox thunderbird
http://www.securityfocus.com/archive/1/archive/1/433539/30/5070/threaded
(UNKNOWN)  BUGTRAQ  20060507 Re: Firefox 1.5.0.3 code execution exploit
http://www.securityfocus.com/archive/1/archive/1/433138/100/0/threaded
(UNKNOWN)  BUGTRAQ  20060505 Firefox 1.5.0.3 code execution exploit
http://www.securityfocus.com/archive/1/archive/1/431267/100/0/threaded
(UNKNOWN)  BUGTRAQ  20060418 Another flaw in Firefox 1.5.0.2: to open files from remote
http://www.osvdb.org/24713
(UNKNOWN)  OSVDB  24713
http://www.novell.com/linux/security/advisories/2006_35_mozilla.html
(UNKNOWN)  SUSE  SUSE-SA:2006:035
http://www.networksecurity.fi/advisories/netscape-view-image.html
(VENDOR_ADVISORY)  MISC  http://www.networksecurity.fi/advisories/netscape-view-image.html
http://www.mozilla.org/security/announce/2006/mfsa2006-39.html
(VENDOR_ADVISORY)  CONFIRM  http://www.mozilla.org/security/announce/2006/mfsa2006-39.html
http://www.debian.org/security/2006/dsa-1134
(UNKNOWN)  DEBIAN  DSA-1134
http://www.debian.org/security/2006/dsa-1120
(UNKNOWN)  DEBIAN  DSA-1120
http://www.debian.org/security/2006/dsa-1118
(UNKNOWN)  DEBIAN  DSA-1118
http://securitytracker.com/id?1016202
(UNKNOWN)  SECTRACK  1016202
http://secunia.com/advisories/22066
(VENDOR_ADVISORY)  SECUNIA  22066
http://secunia.com/advisories/21324
(VENDOR_ADVISORY)  SECUNIA  21324
http://secunia.com/advisories/21183
(VENDOR_ADVISORY)  SECUNIA  21183
http://secunia.com/advisories/21176
(VENDOR_ADVISORY)  SECUNIA  21176
http://secunia.com/advisories/20376
(VENDOR_ADVISORY)  SECUNIA  20376
http://secunia.com/advisories/20063
(VENDOR_ADVISORY)  SECUNIA  20063
http://secunia.com/advisories/19988
(VENDOR_ADVISORY)  SECUNIA  19988
http://secunia.com/advisories/19698
(VENDOR_ADVISORY)  SECUNIA  19698

- 漏洞信息

Mozilla Firefox/SeaMonkey/Thunderbird多个远程安全漏洞
中危 资料不足
2006-04-20 00:00:00 2009-06-20 00:00:00
远程  
        Mozilla Firefox/SeaMonkey/Thunderbird是Mozilla发布的WEB浏览器和邮件新闻组客户端产品。
        上述产品中存在多个安全漏洞,具体如下:
        1) 通过EvalInSandbox运行的JavaScript可以摆脱沙盒的限制,通过对在沙盒外创建并注入到沙盒中的对象调用valueOf()获得权限提升。恶意脚本可以使用这些权限入侵电脑或数据。
        2) 浏览器引擎中的内容破坏可能导致崩溃。
        3) 攻击者可以在发送的HTTP响应中包含有Transfer-Encoding首部,且在首部名和冒号(:)之间加入空格,导致欺骗其他域中的网页,发动钓鱼攻击,窃取敏感信息,如用户口令或cookies。
        4) 攻击者可以将图形的src属性设置为javascript: URL并在鼠标点击事件时加载目标站点,然后诱骗用户右击破坏的图形并从上下文菜单选择"浏览图形",这样就可以导致在攻击者选择的站点运行JavaScript,窃取登录cookies或保密信息。
        类似的,如果用户受骗对src属性设置为JavaScript: URL的帧右击并选择了"仅显示本帧"的话,就可以在帧站点环境中运行脚本。
        5) 在某些环境下持续的XUL属性被关联到了错误的URL。如果攻击者可以得到与URL关联的持续字符串而该字符串之后会在特权环境中eval或执行该属性的话,就会以浏览器的权限执行攻击者的代码。
        6) 攻击者可以使用嵌套的JavaScript: URL绕过MFSA 2005-34修复,执行特权代码。攻击者必须首先诱骗用户点击页面上缺失插件图标或信息栏上的"安装缺失插件..."按键,然后点击插件查找器对话框的"手动安装"按键。
        7) 特权用户界面代码可以调用对象原型的内容定义的设置器,导致可将高权限级别传递到内容定义的攻击代码。
        8) crypto.signText()中存在数组索引漏洞,如果传送了可选的证书授权名参数的话,就会溢出两位已分配的指针数组。
        9) 正常情况下基于Mozilla的客户端可以防止将Web内容链接到本地文件,但攻击者可以使用Windows文件名句法而不是将file:/// URL做为SRC=属性,就可以绕过这种限制。如果用户受骗右击了破损的链接并选择"浏览图形"的话,就会加载本地文件内容。
        10) Thunderbird在处理有无效base64字符的大VCard时存在双重释放漏洞。由于攻击者可以提供任意数量的特制VCard数据,因此这个漏洞可能导致执行任意指令。
        11) MFSA 2006-23中的漏洞并没有完全修复,攻击者可以用到已知位置文件的路径预添加文本输入控制,然后将输入控制的类型更改为文件上传控制而没有重置为预期的值。
        12) 在将Unicode字节顺序标记(BOM)转换为Unicode时在解析器看见web页面之前便将BOM从UTF-8页面剥离,导致解析器会看见并处理web输入过滤器所遗漏的脚本标签,因为这些标签类似于"scr[BOM]ipt"或Web站点的标注代码。
        13) Web内容可以访问Selection对象的nsISelectionPrivate接口并用于添加SelectionListener。当用户在页面上执行"查找"或"全选"操作时会调用监听程序。如果结合其他漏洞的话攻击者就可以在特权环境中执行任意代码。
        

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:
        http://www.mozilla.org/
        http://security.gentoo.org/glsa/glsa-200606-12.xml

- 漏洞信息 (F48488)

Debian Linux Security Advisory 1120-1 (PacketStormID:F48488)
2006-07-24 00:00:00
Debian  debian.org
advisory,vulnerability
linux,debian
CVE-2006-1942,CVE-2006-2775,CVE-2006-2776,CVE-2006-2777,CVE-2006-2778,CVE-2006-2779,CVE-2006-2780,CVE-2006-2781,CVE-2006-2782,CVE-2006-2783,CVE-2006-2784,CVE-2006-2785,CVE-2006-2786,CVE-2006-2787
[点击下载]

Debian Security Advisory 1118-1 - A massive slew of vulnerabilities have been patched in mozilla-firefox for Debian.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 1120-1                    security@debian.org
http://www.debian.org/security/                             Martin Schulze
July 23rd, 2006                         http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : mozilla-firefox
Vulnerability  : several
Problem type   : remote
Debian-specific: no
CVE IDs        : CVE-2006-1942 CVE-2006-2775 CVE-2006-2776 CVE-2006-2777
                 CVE-2006-2778 CVE-2006-2779 CVE-2006-2780 CVE-2006-2782
                 CVE-2006-2783 CVE-2006-2784 CVE-2006-2785 CVE-2006-2786
                 CVE-2006-2787
CERT advisories: VU#237257 VU#243153 VU#421529 VU#466673 VU#575969
BugTraq ID     : 18228

Several security related problems have been discovered in Mozilla.
The Common Vulnerabilities and Exposures project identifies the
following vulnerabilities:

CVE-2006-1942

    Eric Foley discovered that a user can be tricked to expose a local
    file to a remote attacker by displaying a local file as image in
    connection with other vulnerabilities.  [MFSA-2006-39]

CVE-2006-2775

    XUL attributes are associated with the wrong URL under certain
    circumstances, which might allow remote attackers to bypass
    restrictions.  [MFSA-2006-35]

CVE-2006-2776

    Paul Nickerson discovered that content-defined setters on an
    object prototype were getting called by privileged user interface
    code, and "moz_bug_r_a4" demonstrated that the higher privilege
    level could be passed along to the content-defined attack code.
    [MFSA-2006-37]

CVE-2006-2777

    A vulnerability allows remote attackers to execute arbitrary code
    and create notifications that are executed in a privileged
    context.  [MFSA-2006-43]

CVE-2006-2778

    Mikolaj Habryn a buffer overflow in the crypto.signText function
    that allows remote attackers to execute arbitrary code via certain
    optional Certificate Authority name arguments.  [MFSA-2006-38]

CVE-2006-2779

    Mozilla team members discovered several crashes during testing of
    the browser engine showing evidence of memory corruption which may
    also lead to the execution of arbitrary code.  This problem has
    only partially been corrected.  [MFSA-2006-32]

CVE-2006-2780

    An integer overflow allows remote attackers to cause a denial of
    service and may permit the execution of arbitrary code.
    [MFSA-2006-32]

CVE-2006-2782

    Chuck McAuley discovered that a text input box can be pre-filled
    with a filename and then turned into a file-upload control,
    allowing a malicious website to steal any local file whose name
    they can guess.  [MFSA-2006-41, MFSA-2006-23, CVE-2006-1729]

CVE-2006-2783

    Masatoshi Kimura discovered that the Unicode Byte-order-Mark (BOM)
    is stripped from UTF-8 pages during the conversion to Unicode
    before the parser sees the web page, which allows remote attackers
    to conduct cross-site scripting (XSS) attacks.  [MFSA-2006-42]

CVE-2006-2784

    Paul Nickerson discovered that the fix for CAN-2005-0752 can be
    bypassed using nested javascript: URLs, allowing the attacker to
    execute privileged code.  [MFSA-2005-34, MFSA-2006-36]

CVE-2006-2785

    Paul Nickerson demonstrated that if an attacker could convince a
    user to right-click on a broken image and choose "View Image" from
    the context menu then he could get JavaScript to
    run.  [MFSA-2006-34]

CVE-2006-2786

    Kazuho Oku discovered that Mozilla's lenient handling of HTTP
    header syntax may allow remote attackers to trick the browser to
    interpret certain responses as if they were responses from two
    different sites.  [MFSA-2006-33]

CVE-2006-2787

    The Mozilla researcher "moz_bug_r_a4" discovered that JavaScript
    run via EvalInSandbox can escape the sandbox and gain elevated
    privilege.  [MFSA-2006-31]

For the stable distribution (sarge) these problems have been fixed in
version 1.0.4-2sarge9.

For the unstable distribution (sid) these problems have been fixed in
version 1.5.dfsg+1.5.0.4-1.

We recommend that you upgrade your Mozilla Firefox packages.


Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given at the end of this advisory:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge9.dsc
      Size/MD5 checksum:     1001 21424c5ba440f16f6abea37711d66aa9
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge9.diff.gz
      Size/MD5 checksum:   398646 2eff76a21650ad05f52b5fdf73bd3f7e
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4.orig.tar.gz
      Size/MD5 checksum: 40212297 8e4ba81ad02c7986446d4e54e978409d

  Alpha architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge9_alpha.deb
      Size/MD5 checksum: 11173304 3a940907dc9761c8f509bb4c985db436
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge9_alpha.deb
      Size/MD5 checksum:   169032 05d7a00140abdf880b41c4fa28114068
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge9_alpha.deb
      Size/MD5 checksum:    60866 de85fa33566f2fbfcc86501ee62b2a1b

  AMD64 architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge9_amd64.deb
      Size/MD5 checksum:  9401816 963bc07e9bad81b56674d2e87fcc2074
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge9_amd64.deb
      Size/MD5 checksum:   163774 782e55322d790e206be62b7c973cf4ee
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge9_amd64.deb
      Size/MD5 checksum:    59390 62063c4dc7dfb9dd977b2a019bd37946

  ARM architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge9_arm.deb
      Size/MD5 checksum:  8223298 0a3854d01bb66b8251a6fd0f6f6acf1d
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge9_arm.deb
      Size/MD5 checksum:   155248 04b4755e60835717a7b5ed0025f00f0c
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge9_arm.deb
      Size/MD5 checksum:    54702 93f66e628ad9327de4ed14acdfec4395

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge9_i386.deb
      Size/MD5 checksum:  8899786 395567e782da4a1d6e0ef10367ba57cc
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge9_i386.deb
      Size/MD5 checksum:   159032 5225bca73b84ed3e8a1c4e06bdd6cd69
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge9_i386.deb
      Size/MD5 checksum:    56250 f8baa460416bd34c28e347b371c2ac72

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge9_ia64.deb
      Size/MD5 checksum: 11632562 3fc46e9c4a4575594c610c7ff85146ce
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge9_ia64.deb
      Size/MD5 checksum:   169362 aad3f6f89760080eca86f9988c690532
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge9_ia64.deb
      Size/MD5 checksum:    64062 0973673b6e56cc6d26db14a0170c4a1a

  HP Precision architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge9_hppa.deb
      Size/MD5 checksum: 10275134 dbdcf7d07ead3c046ec5a604922bd853
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge9_hppa.deb
      Size/MD5 checksum:   166732 ff51c0f78f3bb6ee011c85e850e67230
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge9_hppa.deb
      Size/MD5 checksum:    59840 856193bc316aecbcce4f88aae4404240

  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge9_m68k.deb
      Size/MD5 checksum:  8175302 d60841a0292077f4635ca9b68c45cd8a
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge9_m68k.deb
      Size/MD5 checksum:   157932 5559512572a0493c336f46e67dc6163d
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge9_m68k.deb
      Size/MD5 checksum:    55524 f04387c9e24e76965342227983327a03

  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge9_mips.deb
      Size/MD5 checksum:  9932150 56eefc3ec8a8832645ec1316929f4411
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge9_mips.deb
      Size/MD5 checksum:   156774 696dca1ed57d6c13fd80bcd6fc4364cd
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge9_mips.deb
      Size/MD5 checksum:    56506 af7303ff23599cf25224df22f5b92e05

  Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge9_mipsel.deb
      Size/MD5 checksum:  9810314 3673c61e049c42c7ea21ed58e06b2acc
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge9_mipsel.deb
      Size/MD5 checksum:   156350 9d3f411c8372b54775ab5ba90c10d0da
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge9_mipsel.deb
      Size/MD5 checksum:    56336 ccc11bdf50a4b0809fe7ed2dbdf44006

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge9_powerpc.deb
      Size/MD5 checksum:  8571660 cf198d98db5695e5c423c567ebfdba38
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge9_powerpc.deb
      Size/MD5 checksum:   157448 d96866bfc3e74f73d6cf4a3f71aa50cb
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge9_powerpc.deb
      Size/MD5 checksum:    58628 e3a6722463006bb379c9548318784af8

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge9_s390.deb
      Size/MD5 checksum:  9641400 c935ca331cf22eab9f311fc65c69e227
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge9_s390.deb
      Size/MD5 checksum:   164392 342aeb1f6362565bac9cd8f9a34e6711
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge9_s390.deb
      Size/MD5 checksum:    58816 3199d08b5c64c05d4c9f3600fd1a9927

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge9_sparc.deb
      Size/MD5 checksum:  8662210 a25db0f4ce57b47898d633b2512cd0b4
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge9_sparc.deb
      Size/MD5 checksum:   157632 5d0f66746bcbb48269e1e4e0efa71067
    http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge9_sparc.deb
      Size/MD5 checksum:    55062 99d09b78f6efa23c02d1e9076185f105


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (GNU/Linux)

iD4DBQFEwxuaW5ql+IAeqTIRAph6AJigs7vAqUX4Kff4L09LciD7GjfGAJ9oSjEi
YKqqcIwtb4nh4LCbn5fKcw==
=zfrY
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
    

- 漏洞信息 (F48485)

Debian Linux Security Advisory 1118-1 (PacketStormID:F48485)
2006-07-24 00:00:00
Debian  debian.org
advisory,vulnerability
linux,debian
CVE-2006-1942,CVE-2006-2775,CVE-2006-2776,CVE-2006-2777,CVE-2006-2778,CVE-2006-2779,CVE-2006-2780,CVE-2006-2781,CVE-2006-2782,CVE-2006-2783,CVE-2006-2784,CVE-2006-2785,CVE-2006-2786,CVE-2006-2787
[点击下载]

Debian Security Advisory 1118-1 - A massive slew of vulnerabilities have been patched in Mozilla for Debian.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 1118-1                    security@debian.org
http://www.debian.org/security/                             Martin Schulze
July 22nd, 2006                         http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : mozilla
Vulnerability  : several
Problem type   : remote
Debian-specific: no
CVE IDs        : CVE-2006-1942 CVE-2006-2775 CVE-2006-2776 CVE-2006-2777
                 CVE-2006-2778 CVE-2006-2779 CVE-2006-2780 CVE-2006-2781
                 CVE-2006-2782 CVE-2006-2783 CVE-2006-2784 CVE-2006-2785
                 CVE-2006-2786 CVE-2006-2787
CERT advisories: VU#237257 VU#243153 VU#421529 VU#466673 VU#575969
BugTraq ID     : 18228

Several security related problems have been discovered in Mozilla.
The Common Vulnerabilities and Exposures project identifies the
following vulnerabilities:

CVE-2006-1942

    Eric Foley discovered that a user can be tricked to expose a local
    file to a remote attacker by displaying a local file as image in
    connection with other vulnerabilities.  [MFSA-2006-39]

CVE-2006-2775

    XUL attributes are associated with the wrong URL under certain
    circumstances, which might allow remote attackers to bypass
    restrictions.  [MFSA-2006-35]

CVE-2006-2776

    Paul Nickerson discovered that content-defined setters on an
    object prototype were getting called by privileged user interface
    code, and "moz_bug_r_a4" demonstrated that the higher privilege
    level could be passed along to the content-defined attack code.
    [MFSA-2006-37]

CVE-2006-2777

    A vulnerability allows remote attackers to execute arbitrary code
    and create notifications that are executed in a privileged
    context.  [MFSA-2006-43]

CVE-2006-2778

    Mikolaj Habryn a buffer overflow in the crypto.signText function
    that allows remote attackers to execute arbitrary code via certain
    optional Certificate Authority name arguments.  [MFSA-2006-38]

CVE-2006-2779

    Mozilla team members discovered several crashes during testing of
    the browser engine showing evidence of memory corruption which may
    also lead to the execution of arbitrary code.  This problem has
    only partially been corrected.  [MFSA-2006-32]

CVE-2006-2780

    An integer overflow allows remote attackers to cause a denial of
    service and may permit the execution of arbitrary code.
    [MFSA-2006-32]

CVE-2006-2781

    Masatoshi Kimura discovered a double-free vulnerability that
    allows remote attackers to cause a denial of service and possibly
    execute arbitrary code via a VCard.  [MFSA-2006-40]

CVE-2006-2782

    Chuck McAuley discovered that a text input box can be pre-filled
    with a filename and then turned into a file-upload control,
    allowing a malicious website to steal any local file whose name
    they can guess.  [MFSA-2006-41, MFSA-2006-23, CVE-2006-1729]

CVE-2006-2783

    Masatoshi Kimura discovered that the Unicode Byte-order-Mark (BOM)
    is stripped from UTF-8 pages during the conversion to Unicode
    before the parser sees the web page, which allows remote attackers
    to conduct cross-site scripting (XSS) attacks.  [MFSA-2006-42]

CVE-2006-2784

    Paul Nickerson discovered that the fix for CAN-2005-0752 can be
    bypassed using nested javascript: URLs, allowing the attacker to
    execute privileged code.  [MFSA-2005-34, MFSA-2006-36]

CVE-2006-2785

    Paul Nickerson demonstrated that if an attacker could convince a
    user to right-click on a broken image and choose "View Image" from
    the context menu then he could get JavaScript to
    run.  [MFSA-2006-34]

CVE-2006-2786

    Kazuho Oku discovered that Mozilla's lenient handling of HTTP
    header syntax may allow remote attackers to trick the browser to
    interpret certain responses as if they were responses from two
    different sites.  [MFSA-2006-33]

CVE-2006-2787

    The Mozilla researcher "moz_bug_r_a4" discovered that JavaScript
    run via EvalInSandbox can escape the sandbox and gain elevated
    privilege.  [MFSA-2006-31]

For the stable distribution (sarge) these problems have been fixed in
version 1.7.8-1sarge7.1

For the unstable distribution (sid) these problems have been fixed in
version 1.7.13-0.3.

We recommend that you upgrade your Mozilla packages.


Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given at the end of this advisory:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.1.dsc
      Size/MD5 checksum:     1127 473562c669e27793809fd76034b5e9de
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.1.diff.gz
      Size/MD5 checksum:   498361 6d4f73fb299451760cbf05974d36753a
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8.orig.tar.gz
      Size/MD5 checksum: 30589520 13c0f0331617748426679e8f2e9f537a

  Alpha architecture:

    http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.1_alpha.deb
      Size/MD5 checksum:   168076 9478bc76f4c4dac2cfa1adc51c599e71
    http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.1_alpha.deb
      Size/MD5 checksum:   147050 34ab8e06aeb3d46f150b0099a29b8c2b
    http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.1_alpha.deb
      Size/MD5 checksum:   184960 ec9526c058ec2a9629fa16a2c7b0f286
    http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.1_alpha.deb
      Size/MD5 checksum:   856618 515d873622c67d0cf1b155f85187935c
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.1_alpha.deb
      Size/MD5 checksum:     1040 a12e4c5754cf581aa6aab5dd4a1388ec
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.1_alpha.deb
      Size/MD5 checksum: 11481282 52de66676dea443b4426cb0e24703a57
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.1_alpha.deb
      Size/MD5 checksum:   403306 efe2822cd3109126a096e4c19bb61f6e
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.1_alpha.deb
      Size/MD5 checksum:   158336 490cc71ffff457bd6f600ef3d7ab9b4b
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.1_alpha.deb
      Size/MD5 checksum:  3358246 5bf68f7988b64ef4175768d92829dccc
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.1_alpha.deb
      Size/MD5 checksum:   122294 6c36e2cec285b6ec28b3115aaa8cfdb1
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.1_alpha.deb
      Size/MD5 checksum:   204170 d02d474bf40b4a0adc41e58cbb0f71aa
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.1_alpha.deb
      Size/MD5 checksum:  1937112 be8a8005f99506a3e9188672c3f70e57
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.1_alpha.deb
      Size/MD5 checksum:   212298 96d4c738772a42501805fd1cfb2a6336

  AMD64 architecture:

    http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.1_amd64.deb
      Size/MD5 checksum:   168070 841b4f6d14d55a8e37ea9fe2d4b8508b
    http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.1_amd64.deb
      Size/MD5 checksum:   146154 b17bbe57b0a30c4698f5c883984d552e
    http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.1_amd64.deb
      Size/MD5 checksum:   184950 342427477e9db97c2d663a3b7620c1ea
    http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.1_amd64.deb
      Size/MD5 checksum:   714978 bbf6e26c728df94a6bdb8e19b22dae5b
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.1_amd64.deb
      Size/MD5 checksum:     1036 4f0379f9ae6b0edf6eb5fbf4977f9d6e
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.1_amd64.deb
      Size/MD5 checksum: 10946160 f7e344cd5bbcc6f1d06b314be572ffd2
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.1_amd64.deb
      Size/MD5 checksum:   403294 675c774981cadd3d695cc7fa498d2046
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.1_amd64.deb
      Size/MD5 checksum:   158330 387195d0b8a6fd9acf4b1a2c8d0d70d8
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.1_amd64.deb
      Size/MD5 checksum:  3352180 f896a49299904f8082ccc96ff85ac40e
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.1_amd64.deb
      Size/MD5 checksum:   121192 df4ef46b4940ecd65ae9cdc140cca1bf
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.1_amd64.deb
      Size/MD5 checksum:   204170 cdd080115be04ac72473181ce622caf1
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.1_amd64.deb
      Size/MD5 checksum:  1936006 002755bffa9cbb1a943a4a81d04f362b
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.1_amd64.deb
      Size/MD5 checksum:   204400 61fe98f12d92139d157dd672ca6513c8

  ARM architecture:

    http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.1_arm.deb
      Size/MD5 checksum:   168074 1de16d4b8435fe420a7883dc7d51c910
    http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.1_arm.deb
      Size/MD5 checksum:   124492 d138a37a746f6fa32bd574f34fdaaefe
    http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.1_arm.deb
      Size/MD5 checksum:   184960 30851d8827b6061465d370ba42d4ccff
    http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.1_arm.deb
      Size/MD5 checksum:   632198 79ce23ade76fcc6cb789053d801c904f
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.1_arm.deb
      Size/MD5 checksum:     1036 e0a0373f1cdf7ecf8f176bbbc4e23d18
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.1_arm.deb
      Size/MD5 checksum:  9212808 1dbb7f756a25a96e9057ef8f96d05805
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.1_arm.deb
      Size/MD5 checksum:   403314 07dad23f621d6e3be785ba0fb5a29763
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.1_arm.deb
      Size/MD5 checksum:   158366 176eede20a70a9ac2a61282b7bc45b01
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.1_arm.deb
      Size/MD5 checksum:  3341712 0904389fef700da0f4664d4bceb28717
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.1_arm.deb
      Size/MD5 checksum:   112672 8797efa5f068220b587eaac7818cccdc
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.1_arm.deb
      Size/MD5 checksum:   204178 75382868b592a542b00e6b6441591a3b
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.1_arm.deb
      Size/MD5 checksum:  1604452 34e908e017cf40549741c227acc78b50
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.1_arm.deb
      Size/MD5 checksum:   168866 ed9894b18f51f745750ad28fa47aba1f

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.1_i386.deb
      Size/MD5 checksum:   170346 5956d005059fd107818f8035fa9ffbf2
    http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.1_i386.deb
      Size/MD5 checksum:   136984 5a5c0d8e7e0614ee02c182983e8d8656
    http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.1_i386.deb
      Size/MD5 checksum:   187138 74f8739619d8ae81b1fe30d0668b8a58
    http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.1_i386.deb
      Size/MD5 checksum:   661744 74ebef87c001e89d4a2e8d45c9910e13
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.1_i386.deb
      Size/MD5 checksum:     1032 8f01d06ab6028c5b908dd5594e1d1c14
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.1_i386.deb
      Size/MD5 checksum: 10336772 e281b8fb2b04eb6f788654557efb8f94
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.1_i386.deb
      Size/MD5 checksum:   403504 5db7402ffdb5b6523fa43d1c89944907
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.1_i386.deb
      Size/MD5 checksum:   158352 a8a7f9c96a21287704a76ff3e5455335
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.1_i386.deb
      Size/MD5 checksum:  3594164 db6a4633ec5db81ce6e0bd1d9bf95193
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.1_i386.deb
      Size/MD5 checksum:   116702 fade783b8720425b0f05004c6d9632ef
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.1_i386.deb
      Size/MD5 checksum:   204170 e173db0beb2598ea64ac80262b8043e4
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.1_i386.deb
      Size/MD5 checksum:  1816096 10fd0769547b8342fcf833182c66f7cd
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.1_i386.deb
      Size/MD5 checksum:   192634 9f757a02bfa0e741b4d131191ac3bed1

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.1_ia64.deb
      Size/MD5 checksum:   168076 7caf0acd02827f3259cc523d24882267
    http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.1_ia64.deb
      Size/MD5 checksum:   174472 c8fbf63229bf8f13e1e51419a917da78
    http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.1_ia64.deb
      Size/MD5 checksum:   184950 8305ace7fb5c15b17da7cbd94ac114be
    http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.1_ia64.deb
      Size/MD5 checksum:   966902 6f09c27be295615d6724ec4e82c8682c
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.1_ia64.deb
      Size/MD5 checksum:     1036 8d0589021091a859a4fe1a8784cf2b84
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.1_ia64.deb
      Size/MD5 checksum: 12948914 25e2e3b61f3212b5e69fb8db376dea1c
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.1_ia64.deb
      Size/MD5 checksum:   403298 00cd58b07f32fb9b33cdf3f9138ff48d
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.1_ia64.deb
      Size/MD5 checksum:   158334 c03b2a84ab5db4574bce186a934bb61c
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.1_ia64.deb
      Size/MD5 checksum:  3377948 0ae22412a7c6766cc74b84578f029da0
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.1_ia64.deb
      Size/MD5 checksum:   125598 a853f9be2fef52df2b7537a56a4762ca
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.1_ia64.deb
      Size/MD5 checksum:   204160 d6c4e9801cb584fa974ec2843d4e7dde
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.1_ia64.deb
      Size/MD5 checksum:  2302302 8d6e65e606882e9a9f29eae5ecdc0505
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.1_ia64.deb
      Size/MD5 checksum:   242684 1c59d2b14cf73625549222c27feec305

  HP Precision architecture:

    http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.1_hppa.deb
      Size/MD5 checksum:   168076 5626cf0a12a7d9993ab65840ac71b2e4
    http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.1_hppa.deb
      Size/MD5 checksum:   157080 ae8769ba33d1f7b1c55db5af74322108
    http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.1_hppa.deb
      Size/MD5 checksum:   184966 653cf87074a4392f1103f333b8f385a4
    http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.1_hppa.deb
      Size/MD5 checksum:   754910 5c54ed3f028d4fca725c43f17aac7472
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.1_hppa.deb
      Size/MD5 checksum:     1038 b21e02e210697770a13094757afdb343
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.1_hppa.deb
      Size/MD5 checksum: 12164938 0710346051d9d6217a938faf1a6c3a5e
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.1_hppa.deb
      Size/MD5 checksum:   403280 dec179a4a47c40e21b74e1015655a47a
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.1_hppa.deb
      Size/MD5 checksum:   158346 0fbead0b5adfaf58475f3308ad5c7825
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.1_hppa.deb
      Size/MD5 checksum:  3358624 8c0cbf705f20e694222dc2a2e558bf25
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.1_hppa.deb
      Size/MD5 checksum:   123514 7d29aa30c3c525bfb3674200d0853f60
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.1_hppa.deb
      Size/MD5 checksum:   204152 5f27c072d2b0cf7a88362b0ca86aa91f
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.1_hppa.deb
      Size/MD5 checksum:  2135198 ca8cf38363e6fa41e3c58e0f6813bcec
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.1_hppa.deb
      Size/MD5 checksum:   216176 dbf6f4e0538358e675fafb2215215ddb

  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.1_m68k.deb
      Size/MD5 checksum:   168090 2f9923cada81ee2792194134d5c8766c
    http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.1_m68k.deb
      Size/MD5 checksum:   126174 a2d29b886d583dfeaecaf9140a98cbb1
    http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.1_m68k.deb
      Size/MD5 checksum:   184976 07788d7940bceb772ee38b639fa06c90
    http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.1_m68k.deb
      Size/MD5 checksum:   600262 57d23c1825ce20d9fdc7ed3c935e4822
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.1_m68k.deb
      Size/MD5 checksum:     1044 6865b570c621d2715d90d55e72c18686
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.1_m68k.deb
      Size/MD5 checksum:  9707812 039664d92d6585080245e56b31a495bc
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.1_m68k.deb
      Size/MD5 checksum:   403372 80f8ea392f13f4a8615281ad17b45345
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.1_m68k.deb
      Size/MD5 checksum:   158396 e11aa75979022c10ff540e9cca7da37e
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.1_m68k.deb
      Size/MD5 checksum:  3336888 253879215a28c9c1611e1eab36739c69
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.1_m68k.deb
      Size/MD5 checksum:   114490 e32e9948e3e8df554e2314c7e7851c86
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.1_m68k.deb
      Size/MD5 checksum:   204220 56d85ed9b0439792035300fe5c3745e9
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.1_m68k.deb
      Size/MD5 checksum:  1683110 5392bc875f07ce277f17a08558223d76
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.1_m68k.deb
      Size/MD5 checksum:   174758 bd3bb602538e94bb672b67c80056aa51

  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.1_mips.deb
      Size/MD5 checksum:   168078 b716653d10d25308e460c0d15ce8c249
    http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.1_mips.deb
      Size/MD5 checksum:   141006 e192f8087b16f7e17257aa63394def8f
    http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.1_mips.deb
      Size/MD5 checksum:   184962 d2d6aaad54ee894ed00c678a856cd292
    http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.1_mips.deb
      Size/MD5 checksum:   725986 e57f99d19cc017d3273eaa632cef1359
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.1_mips.deb
      Size/MD5 checksum:     1040 2574a4694290c9c0b66900214389d13a
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.1_mips.deb
      Size/MD5 checksum: 10729826 577b9c004ce4078826f9085cfef3f1b7
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.1_mips.deb
      Size/MD5 checksum:   403284 e32ea6716c0102cbd6e7c2c738239555
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.1_mips.deb
      Size/MD5 checksum:   158342 ac17f1b907adddaae579376411860fe6
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.1_mips.deb
      Size/MD5 checksum:  3358078 c03e05906c6da5b7f06c8adfb9bf1bb5
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.1_mips.deb
      Size/MD5 checksum:   117626 027b87aceadf873cadd52f5b5a6cdad2
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.1_mips.deb
      Size/MD5 checksum:   204166 04db7ee6b1bcc0a7e286bd7aed2a46af
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.1_mips.deb
      Size/MD5 checksum:  1795496 43c24c3da475b571baee65e6f97b3b72
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.1_mips.deb
      Size/MD5 checksum:   189876 4515f5447d4d74104bac1b98a21741a9

  Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.1_mipsel.deb
      Size/MD5 checksum:   168080 6b20701ae2005724d525421407997b34
    http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.1_mipsel.deb
      Size/MD5 checksum:   140964 20d773802c88e422796b2b0d8657f269
    http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.1_mipsel.deb
      Size/MD5 checksum:   184956 e696e6afa300237c1fe8bf9d24c25341
    http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.1_mipsel.deb
      Size/MD5 checksum:   715454 ba7d908f470f0fe10912263bd88ffe27
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.1_mipsel.deb
      Size/MD5 checksum:     1042 e660b635921248505a19c5bc4ad57698
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.1_mipsel.deb
      Size/MD5 checksum: 10606956 9c45e8272bec9b1e40d18a577283d270
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.1_mipsel.deb
      Size/MD5 checksum:   403302 fc7449f1c1aca3e3beb41743d5ddce15
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.1_mipsel.deb
      Size/MD5 checksum:   158342 b357c21424e98e72a150cdc7ef285f36
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.1_mipsel.deb
      Size/MD5 checksum:  3358814 9384ee1ae88d0ce5bfb9cf7419cf1fc4
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.1_mipsel.deb
      Size/MD5 checksum:   117192 6cee62bb29d207039072c1f66b15693d
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.1_mipsel.deb
      Size/MD5 checksum:   204166 02d9a75229f18b8222cbde0809763968
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.1_mipsel.deb
      Size/MD5 checksum:  1777564 812da33649005f3e9c602b92e5198d0f
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.1_mipsel.deb
      Size/MD5 checksum:   187450 50a81db8d3f8fb747b9641ebab1e44c2

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.1_powerpc.deb
      Size/MD5 checksum:   168076 3ec22b357709447796939d749ee01918
    http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.1_powerpc.deb
      Size/MD5 checksum:   131506 b23d3cb1d96dd102ea8e1a317611d9cf
    http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.1_powerpc.deb
      Size/MD5 checksum:   184962 47e118b6e43ab5dd68edaaebb61a14a5
    http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.1_powerpc.deb
      Size/MD5 checksum:   719212 2eb46acfdb0984316af95544d2a26586
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.1_powerpc.deb
      Size/MD5 checksum:     1040 da38d40720821ab284ff921f8d14ac7b
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.1_powerpc.deb
      Size/MD5 checksum:  9706108 c273d7531e0510262497b2b665025009
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.1_powerpc.deb
      Size/MD5 checksum:   403278 909516b0d9bfbc46f3c0dd438bb02c29
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.1_powerpc.deb
      Size/MD5 checksum:   158338 2de3e64ff4391b9db98838fac617dbf6
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.1_powerpc.deb
      Size/MD5 checksum:  3340554 4253026847bdceca40ba1f7f8a77150a
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.1_powerpc.deb
      Size/MD5 checksum:   114590 cf73e13daee899efb5d6cefb3e85c461
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.1_powerpc.deb
      Size/MD5 checksum:   204148 3de97db7ab79ee5b688b62dc1132859c
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.1_powerpc.deb
      Size/MD5 checksum:  1643042 52b9f55a9507da86f34ebda24e25ec12
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.1_powerpc.deb
      Size/MD5 checksum:   175652 d7538c95e4ea1efaf76737a24b5e0388

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.1_s390.deb
      Size/MD5 checksum:   168070 97ce8fcc52d581aa9608dbc327abbe8b
    http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.1_s390.deb
      Size/MD5 checksum:   156822 008799a0d79ca556d878a20b96028354
    http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.1_s390.deb
      Size/MD5 checksum:   184962 a3241679a42c7f8fe899e34ae7516981
    http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.1_s390.deb
      Size/MD5 checksum:   799202 fbbf02a9624d975a1eaafdfaf025f885
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.1_s390.deb
      Size/MD5 checksum:     1042 12f767e93775437d702d9ea31bed575c
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.1_s390.deb
      Size/MD5 checksum: 11330344 442b98dd32a88fd33efa22d5d13bdd3e
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.1_s390.deb
      Size/MD5 checksum:   403320 aa21f60bfc070223d8a6f5c78c4b0faf
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.1_s390.deb
      Size/MD5 checksum:   158350 b0981f49d6b5639a4712e2a115599d6b
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.1_s390.deb
      Size/MD5 checksum:  3353136 4576af9688c6fc5b4e7fe64deb11aead
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.1_s390.deb
      Size/MD5 checksum:   121352 1c1672d0d0f3752a0195ee1ff33d8ec4
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.1_s390.deb
      Size/MD5 checksum:   204158 a0a82c9fa992b839aaf60f9484fd9bc8
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.1_s390.deb
      Size/MD5 checksum:  1944746 432f3f0fb2e1a429a51ddda422cc21cc
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.1_s390.deb
      Size/MD5 checksum:   213482 f8bc5f9fa1e79b26ba22bb891e5b9b46

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.1_sparc.deb
      Size/MD5 checksum:   168082 98bec9b3ad75652b9fa7f0c425a2deb2
    http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.1_sparc.deb
      Size/MD5 checksum:   128722 9947038f2936e62834bfdd1b2672d497
    http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.1_sparc.deb
      Size/MD5 checksum:   184962 4ffe137e0baebd3335718ac6936ca52b
    http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.1_sparc.deb
      Size/MD5 checksum:   673000 696296101aefad3cdc6e41c39320f85a
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.1_sparc.deb
      Size/MD5 checksum:     1038 e1e482e36d09311de2fb0416e068e070
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.1_sparc.deb
      Size/MD5 checksum:  9376650 7b791062063db30e3a2f25436f410c01
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.1_sparc.deb
      Size/MD5 checksum:   403280 15a8a8616423b988387abcf2a3089b93
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.1_sparc.deb
      Size/MD5 checksum:   158336 2481b4d5956c4219f33a5c29d3125ed3
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.1_sparc.deb
      Size/MD5 checksum:  3341556 4765e3947b3045730fb35f128ec8b30c
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.1_sparc.deb
      Size/MD5 checksum:   112532 8b9d8d6fb0469b333837653684508c68
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.1_sparc.deb
      Size/MD5 checksum:   204158 a46509b3f314a48cf5d0365dd999688a
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.1_sparc.deb
      Size/MD5 checksum:  1583728 57ca973e877b3a718e5534537c94e468
    http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.1_sparc.deb
      Size/MD5 checksum:   168012 2a402caa207ced1ede92416141a37ab9


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (GNU/Linux)

iD8DBQFEwibVW5ql+IAeqTIRAgCjAKCTna7EXWnfCae8ORnFtPat+ZZZjQCgqMIj
JsY39Lz2s/UBFnxveD7ud+8=
=ySjN
-----END PGP SIGNATURE-----

    

- 漏洞信息

24713
Mozilla Firefox IMG Element Crafted file:// URL Arbitrary Local File Access
Vendor Verified

- 漏洞描述

- 时间线

2006-05-05 Unknow
2006-05-05 Unknow

- 解决方案

Products

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站