Date: Fri, 30 Jul 2004 17:42:58 +0200 From: Oliver Eikemeier <eikemeier@fillmore-labs.com> To: Trevor@FreeBSD.ORG, "Johnson <trevor"@FreeBSD.org, FreeBSD GNOME Users <gnome@FreeBSD.org> Subject: Mozilla / Firefox user interface spoofing vulnerability Message-ID: <221A1C06-E23F-11D8-B327-00039312D914@fillmore-labs.com>
next in thread | raw e-mail | index | archive | help
AFAICT, the following packages are affected: trevor@FreeBSD.org - linux-mozilla-1.5 - linux-mozilla-devel-1.6a gnome@FreeBSD.org - firefox-0.9.1_1 - mozilla-1.7.1,2 - mozilla-1.8.a2,2 - mozilla-gtk1-1.7.1_1 portaudit reference: <http://www.freebsd.org/ports/portaudit/730db824-e216-11d8-9b0a-000347a4fa7d. html> You might want to correct the VuXML entry when it is incorrect. Please refer to: <http://www.freebsd.org/doc/en_US.ISO8859-1/books/porters- handbook/security-notify.html> firefox-0.9.1_1 seems to be vulnerable to certificate spoofing too, I'm not sure whether other versions are affected: <http://www.freebsd.org/ports/portaudit/abe47a5a-e23c-11d8-9b0a-000347a4fa7d. html> Cheers -Oliver
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?221A1C06-E23F-11D8-B327-00039312D914>