Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 30 Jul 2004 17:42:58 +0200
From:      Oliver Eikemeier <eikemeier@fillmore-labs.com>
To:        Trevor@FreeBSD.ORG, "Johnson <trevor"@FreeBSD.org, FreeBSD GNOME Users <gnome@FreeBSD.org>
Subject:   Mozilla / Firefox user interface spoofing vulnerability
Message-ID:  <221A1C06-E23F-11D8-B327-00039312D914@fillmore-labs.com>

next in thread | raw e-mail | index | archive | help
AFAICT, the following packages are affected:


trevor@FreeBSD.org
- linux-mozilla-1.5
- linux-mozilla-devel-1.6a

gnome@FreeBSD.org
- firefox-0.9.1_1
- mozilla-1.7.1,2
- mozilla-1.8.a2,2
- mozilla-gtk1-1.7.1_1

portaudit reference:
   
<http://www.freebsd.org/ports/portaudit/730db824-e216-11d8-9b0a-000347a4fa7d.
html>

You might want to correct the VuXML entry when it is incorrect. Please 
refer to:
   <http://www.freebsd.org/doc/en_US.ISO8859-1/books/porters-
handbook/security-notify.html>

firefox-0.9.1_1 seems to be vulnerable to certificate spoofing too, I'm 
not sure whether other versions are affected:
   
<http://www.freebsd.org/ports/portaudit/abe47a5a-e23c-11d8-9b0a-000347a4fa7d.
html>

Cheers
-Oliver



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?221A1C06-E23F-11D8-B327-00039312D914>