lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20040310162813.17407.qmail@updates.mandrakesoft.com>
From: security at linux-mandrake.com (Mandrake Linux Security Team)
Subject: MDKSA-2004:021 - Updated mozilla packages fix multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

                 Mandrakelinux Security Update Advisory
 _______________________________________________________________________

 Package name:           mozilla
 Advisory ID:            MDKSA-2004:021
 Date:                   March 10th, 2004

 Affected versions:	 9.2
 ______________________________________________________________________

 Problem Description:

 A number of vulnerabilities were discovered in Mozilla 1.4:
 
 A malicious website could gain access to a user's authentication
 credentials to a proxy server.
 
 Script.prototype.freeze/thaw could allow an attacker to run
 arbitrary code on your computer.
 
 A vulnerability was also discovered in the NSS security suite which
 ships with Mozilla.  The S/MIME implementation would allow remote
 attackers to cause a Denial of Service and possibly execute arbitrary
 code via an S/MIME email message containing certain unexpected ASN.1
 constructs, which was demonstrated using the NISCC test suite.  NSS
 version 3.9 corrects these problems and has been included in this
 package (which shipped with NSS 3.8).
 
 Finally, Corsaire discovered that a number of HTTP user agents
 contained a flaw in how they handle cookies.  This flaw could
 allow an attacker to avoid the path restrictions specified by a
 cookie's originator.  According to their advisory:
 
 "The cookie specifications detail a path argument that can be used to
 restrict the areas of a host that will be exposed to a cookie.  By
 using standard traversal techniques this functionality can be
 subverted, potentially exposing the cookie to scrutiny and use in
 further attacks."
 
 As well, a bug with Mozilla and Finnish keyboards has been corrected.
 
 The updated packages are patched to correct these vulnerabilities.
 _______________________________________________________________________

 References:

  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0594
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0564
  http://www.kb.cert.org/vuls/id/428230
  http://bugzilla.mozilla.org/show_bug.cgi?id=220122
  http://bugzilla.mozilla.org/show_bug.cgi?id=221526
  http://bugzilla.mozilla.org/show_bug.cgi?id=213012
  http://www.uniras.gov.uk/vuls/2003/006489/smime.htm
 ______________________________________________________________________

 Updated Packages:
  
 Mandrakelinux 9.2:
 c38912bc7ec63477a99d54ca9d0da6a2  9.2/RPMS/libnspr4-1.4-13.2.92mdk.i586.rpm
 0389815c9e7dbe3e10fc0c26375bb3b1  9.2/RPMS/libnspr4-devel-1.4-13.2.92mdk.i586.rpm
 7646ec4e16c2c9358dcc98ebabf0a3b9  9.2/RPMS/libnss3-1.4-13.2.92mdk.i586.rpm
 63a527da7c61047ba425606e94ecd3be  9.2/RPMS/libnss3-devel-1.4-13.2.92mdk.i586.rpm
 e8bbe96aeb65cfab46ffe2aa354d902f  9.2/RPMS/mozilla-1.4-13.2.92mdk.i586.rpm
 dfa83fa168d574770a8799c581e18335  9.2/RPMS/mozilla-devel-1.4-13.2.92mdk.i586.rpm
 bb2b9c485b566b219749366c62500721  9.2/RPMS/mozilla-dom-inspector-1.4-13.2.92mdk.i586.rpm
 ad11d0c4800bd95452d00a8ebaf5d98b  9.2/RPMS/mozilla-enigmail-1.4-13.2.92mdk.i586.rpm
 5fc51520069a0eba9f5a53dc93ba4eab  9.2/RPMS/mozilla-enigmime-1.4-13.2.92mdk.i586.rpm
 54bc668f3881fc320ee5d7c5a47cf691  9.2/RPMS/mozilla-irc-1.4-13.2.92mdk.i586.rpm
 adee5ba7d06873222b272fd5cb4002a6  9.2/RPMS/mozilla-js-debugger-1.4-13.2.92mdk.i586.rpm
 8ae4e6c230046102f6fb3718ea89a44c  9.2/RPMS/mozilla-mail-1.4-13.2.92mdk.i586.rpm
 1e1d178eb6e1b712ed4172fbcb9645a8  9.2/RPMS/mozilla-spellchecker-1.4-13.2.92mdk.i586.rpm
 18dcce51283517af9f1d280e4cc671b2  9.2/SRPMS/mozilla-1.4-13.2.92mdk.src.rpm

 Mandrakelinux 9.2/AMD64:
 5452e154db36916d4e0710001a8c1bf4  amd64/9.2/RPMS/lib64nspr4-1.4-13.2.92mdk.amd64.rpm
 0dd5edee872e319e43b055348b439eb3  amd64/9.2/RPMS/lib64nspr4-devel-1.4-13.2.92mdk.amd64.rpm
 18d23cac7a7eb9a45c40e484a42665fb  amd64/9.2/RPMS/lib64nss3-1.4-13.2.92mdk.amd64.rpm
 96e5b7a0bffa68a8a26f0fc0c33179bb  amd64/9.2/RPMS/lib64nss3-devel-1.4-13.2.92mdk.amd64.rpm
 8f86da0aafcf57ce795935354bfe1284  amd64/9.2/RPMS/mozilla-1.4-13.2.92mdk.amd64.rpm
 4294cda22a8639804d64961b5232217b  amd64/9.2/RPMS/mozilla-devel-1.4-13.2.92mdk.amd64.rpm
 fe1d7bbfcff75ed48276b125e5e07150  amd64/9.2/RPMS/mozilla-dom-inspector-1.4-13.2.92mdk.amd64.rpm
 0389b9624511d9bfa8f9873c64e78819  amd64/9.2/RPMS/mozilla-enigmail-1.4-13.2.92mdk.amd64.rpm
 f65b2fdf67002011cf138a7fc2a15048  amd64/9.2/RPMS/mozilla-enigmime-1.4-13.2.92mdk.amd64.rpm
 3908bf0f64951a31d0b0d13fbed460f1  amd64/9.2/RPMS/mozilla-irc-1.4-13.2.92mdk.amd64.rpm
 e75e31efbc498cc11851c75c44233e93  amd64/9.2/RPMS/mozilla-js-debugger-1.4-13.2.92mdk.amd64.rpm
 dee877e87556e579d54668a1e3a0bbf2  amd64/9.2/RPMS/mozilla-mail-1.4-13.2.92mdk.amd64.rpm
 09155dea70b8b6cf7afdd13a27dede18  amd64/9.2/RPMS/mozilla-spellchecker-1.4-13.2.92mdk.amd64.rpm
 18dcce51283517af9f1d280e4cc671b2  amd64/9.2/SRPMS/mozilla-1.4-13.2.92mdk.src.rpm
 _______________________________________________________________________

 Bug IDs fixed (see http://bugs.mandrakelinux.com for more information):

  376 - mozilla and finnish keyboard give pipe
 _______________________________________________________________________

 To upgrade automatically use MandrakeUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 A list of FTP mirrors can be obtained from:

  http://www.mandrakesecure.net/en/ftp.php

 All packages are signed by Mandrakesoft for security.  You can obtain
 the GPG public key of the Mandrakelinux Security Team by executing:

  gpg --recv-keys --keyserver www.mandrakesecure.net 0x22458A98

 Please be aware that sometimes it takes the mirrors a few hours to
 update.

 You can view other update advisories for Mandrakelinux at:

  http://www.mandrakesecure.net/en/advisories/

 Mandrakesoft has several security-related mailing list services that
 anyone can subscribe to.  Information on these lists can be obtained by
 visiting:

  http://www.mandrakesecure.net/en/mlist.php

 If you want to report vulnerabilities, please contact

  security_linux-mandrake.com

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Linux Mandrake Security Team
  <security linux-mandrake.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)

iD8DBQFAT0IdmqjQ0CJFipgRAiHpAJ4jvYpnAFf5x3VM8hkqcetxlBgBnACgxtj9
SaERIMikLF67jQm9MDX1ZDA=
=bKxo
-----END PGP SIGNATURE-----


Powered by blists - more mailing lists