Linux Security
    Linux Security
    Linux Security

    Debian: Mozilla fix frame injection spoofing vulnerability DSA-775-1

    Date 15 Aug 2005
    Posted By LinuxSecurity Advisories
    Updated package.
    - --------------------------------------------------------------------------
    Debian Security Advisory DSA 775-1                     This email address is being protected from spambots. You need JavaScript enabled to view it.                             Martin Schulze
    August 15th, 2005             
    - --------------------------------------------------------------------------
    Package        : mozilla
    Vulnerability  : frame injection spoofing
    Problem-Type   : remote
    Debian-specific: no
    CVE ID         : CAN-2004-0718 CAN-2005-1937
    BugTraq ID     : 14242
    A vulnerability has been discovered in Mozilla and Mozilla Firefox
    that allows remote attackers to inject arbitrary Javascript from one
    page into the frameset of another site.  Thunderbird is not affected
    by this and Galeon will be automatically fixed as it uses Mozilla
    The old stable distribution (woody) does not contain Mozilla Firefox
    For the stable distribution (sarge) this problem has been fixed in
    version 1.0.4-2sarge1.
    For the unstable distribution (sid) this problem has been fixed in
    version 1.0.6-1.
    We recommend that you upgrade your mozilla-firefox package.
    Upgrade Instructions
    - --------------------
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    Debian GNU/Linux 3.1 alias sarge
    - --------------------------------
      Source archives:
          Size/MD5 checksum:     1001 248d8f9e82f3cade699588f729b26aba
          Size/MD5 checksum:   227342 b5bff4a3262a6bd69dfb66b654dd1baf
          Size/MD5 checksum: 40212297 8e4ba81ad02c7986446d4e54e978409d
      Alpha architecture:
          Size/MD5 checksum: 11156416 70c32a6e9517462f18bb828a454b3212
          Size/MD5 checksum:   164986 e3b758071d4be7c98bfd8a0540791de6
          Size/MD5 checksum:    56802 a45946418ff52e979d402455eb910a48
      AMD64 architecture:
          Size/MD5 checksum:  9392060 636d020aff9b205714b45b739110425b
          Size/MD5 checksum:   159748 49544cb67eafedfa22248d7d8fdd8663
          Size/MD5 checksum:    55276 8f948a91991238f70f75e3775c2d0801
      ARM architecture:
          Size/MD5 checksum:  8209620 89ecd8c94f4fbbb90300c345dd6c3563
          Size/MD5 checksum:   151096 f8fb6c08b9258a1ff01b98ec0a45c2c4
          Size/MD5 checksum:    50648 7cf42eb18d94903784c6bccdc5b325e3
      Intel IA-32 architecture:
          Size/MD5 checksum:  8880930 c52905c0b136e7539670c41018b9c9b3
          Size/MD5 checksum:   154894 b2a599514fda8a36228ca74cc6e642eb
          Size/MD5 checksum:    52186 665e3b76f6303cf62cfaa8673a5c67a3
      Intel IA-64 architecture:
          Size/MD5 checksum: 11608384 7a4b9639a9cdaf21243ed7a3be74e598
          Size/MD5 checksum:   165308 11a3066857ca62dec1d60dbe8ac14851
          Size/MD5 checksum:    59988 a7465c43cf91cf81fbaa342f027d10c0
      HP Precision architecture:
          Size/MD5 checksum: 10258426 d5ffabecc48a1a6bfa7d3a8d26980732
          Size/MD5 checksum:   162692 58a4a0a39bafd202a2919a5543a7ab55
          Size/MD5 checksum:    55782 d475a913358c0621373cfaa6759f3858
      Motorola 680x0 architecture:
          Size/MD5 checksum:  8159568 14665ff28f3988e53f27b2a69ac6969e
          Size/MD5 checksum:   153808 0fa57632ae398ffac16a51a7a38ef4aa
          Size/MD5 checksum:    51458 8b05ef20891031341e127772cf467009
      Big endian MIPS architecture:
          Size/MD5 checksum:  9913666 0be44208606d670654eceaf1f0467395
          Size/MD5 checksum:   152774 7cb360f46abc025799c9a8ae4b2f195d
          Size/MD5 checksum:    52480 921b88b8540a0bb7cfabb68490055d00
      Little endian MIPS architecture:
          Size/MD5 checksum:  9794034 f6bc5806b30ba861b45abbd945338f32
          Size/MD5 checksum:   152272 bf7d062c8aaa7177233069d67849b311
          Size/MD5 checksum:    52272 d268d7c64ed36ac6c08d0786f0717abf
      PowerPC architecture:
          Size/MD5 checksum:  8553770 4867ba093d827168e933ffda4e6919fa
          Size/MD5 checksum:   153316 cdcc5efb2ab59de06336ad19c19d4f0f
          Size/MD5 checksum:    54574 96ce5e54ce3d3431430319ed18d185f6
      IBM S/390 architecture:
          Size/MD5 checksum:  9631110 6e4bfb79847ae61b7e273cc2bb5498a0
          Size/MD5 checksum:   160320 60b84a49f19bc3a4b22aa945ccf3e2bf
          Size/MD5 checksum:    54716 e7b8bc318ee6bb50e02c5d53246d7d05
      Sun Sparc architecture:
          Size/MD5 checksum:  8643914 594b8fb1f240d890bdda7d0a3ad3fc71
          Size/MD5 checksum:   153508 167227e2dccc4264cdc4ba8c20986df8
          Size/MD5 checksum:    51014 6a3225585fb9f8a8632e09ba6403b8d9
      These files will probably be moved into the stable distribution on
      its next update.
    - ---------------------------------------------------------------------------------
    For apt-get: deb stable/updates main
    For dpkg-ftp: dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.


    LinuxSecurity Poll

    No results found.

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.