lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20050726193426.GB7610@piware.de> Date: Tue Jul 26 22:00:25 2005 From: martin.pitt at canonical.com (Martin Pitt) Subject: [USN-155-1] Mozilla vulnerabilities =========================================================== Ubuntu Security Notice USN-155-1 July 26, 2005 mozilla vulnerabilities CAN-2005-1531, CAN-2005-1532, CAN-2005-1937, CAN-2005-2260, CAN-2005-2261, CAN-2005-2263, CAN-2005-2265, CAN-2005-2266, CAN-2005-2268, CAN-2005-2269, CAN-2005-2270 =========================================================== A security issue affects the following Ubuntu releases: Ubuntu 4.10 (Warty Warthog) Ubuntu 5.04 (Hoary Hedgehog) The following packages are affected: mozilla-browser mozilla-mailnews The problem can be corrected by upgrading the affected package to version 2:1.7.10-0ubuntu04.10 (for Ubuntu 4.10), or 2:1.7.10-0ubuntu05.04 (for Ubuntu 5.04). After a standard system upgrade you need to restart Mozilla to effect the necessary changes. Details follow: Secunia.com reported that one of the recent security patches in Firefox reintroduced the frame injection patch that was originally known as CAN-2004-0718. This allowed a malicious web site to spoof the contents of other web sites. (CAN-2005-1937) It was discovered that a malicious website could inject arbitrary scripts into a target site by loading it into a frame and navigating back to a previous Javascript URL that contained an eval() call. This could be used to steal cookies or other confidential data from the target site. (MFSA 2005-42) Michael Krax, Georgi Guninski, and L. David Baron found that the security checks that prevent script injection could be bypassed by wrapping a javascript: url in another pseudo-protocol like "view-source:" or "jar:". (CAN-2005-1531) A variant of the attack described in CAN-2005-1160 (see USN-124-1) was discovered. Additional checks were added to make sure Javascript eval and script objects are run with the privileges of the context that created them, not the potentially elevated privilege of the context calling them. (CAN-2005-1532) In several places the browser user interface did not correctly distinguish between true user events, such as mouse clicks or keystrokes, and synthetic events genenerated by web content. This could be exploited by malicious web sites to generate e. g. mouse clicks that install malicious plugins. Synthetic events are now prevented from reaching the browser UI entirely. (CAN-2005-2260) Scripts in XBL controls from web content continued to be run even when Javascript was disabled. This could be combined with most script-based exploits to attack people running vulnerable versions who thought disabling Javascript would protect them. (CAN-2005-2261) Matthew Mastracci discovered a flaw in the addons installation launcher. By forcing a page navigation immediately after calling the install method a callback function could end up running in the context of the new page selected by the attacker. This callback script could steal data from the new page such as cookies or passwords, or perform actions on the user's behalf such as make a purchase if the user is already logged into the target site. However, the default settings allow only http://addons.mozilla.org to bring up this install dialog. This could only be exploited if users have added untrustworthy sites to the installation whitelist, and if a malicious site can convince you to install from their site. (CAN-2005-2263) The function for version comparison in the addons installer did not properly verify the type of its argument. By passing specially crafted Javascript objects to it, a malicious web site could crash the browser and possibly even execute arbitrary code with the privilege of the user account Firefox runs in. (CAN-2005-2265) A child frame can call top.focus() even if the framing page comes from a different origin and has overridden the focus() routine. Andreas Sandblad discovered that the call is made in the context of the child frame. This could be exploited to steal cookies and passwords from the framed page, or take actions on behalf of a signed-in user. However, web sites with above properties are not very common. (CAN-2005-2266) Alerts and prompts created by scripts in web pages were presented with the generic title [Javascript Application] which sometimes made it difficult to know which site created them. A malicious page could exploit this by causing a prompt to appear in front of a trusted site in an attempt to extract information such as passwords from the user. In the fixed version these prompts contain the hostname of the page which created it. (CAN-2005-2268) The XHTML DOM node handler did not take namespaces into account when verifying node types based on their names. For example, an XHTML document could contain an <IMG> tag with malicious contents, which would then be processed as the standard trusted HTML <img> tag. By tricking an user to view malicious web sites, this could be exploited to execute attacker-specified code with the full privileges of the user. (CAN-2005-2269) It was discovered that some objects were not created appropriately. This allowed malicious web content scripts to trace back the creation chain until they found a privileged object and execute code with higher privileges than allowed by the current site. (CAN-2005-2270) The update for Ubuntu 4.10 (Warty Warthog) also fixes several vulnerabilities which are not present in the Ubuntu 5.04 version. Some of them could be exploited to execute arbitrary code with full user privileges if the user visited a malicious web site. (MFSA-2005-01 to MFSA-2005-41; please see the following web site for details: http://www.mozilla.org/projects/security/known-vulnerabilities.html). We apologize for the huge delay of this update; we changed our update strategy for Mozilla products to make sure that such long delays will not happen again. Updated packages for Ubuntu 4.10 (Warty Warthog): Source archives: http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/mozilla_1.7.10-0ubuntu04.10.diff.gz Size/MD5: 787895 d1b93dab379d90229aff0b6444cd7958 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/mozilla_1.7.10-0ubuntu04.10.dsc Size/MD5: 1114 54a79bdf1055da5a4cef2cb2dafc96f5 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/mozilla_1.7.10.orig.tar.gz Size/MD5: 30583956 46d33c8977831c434759f1f8be8349b9 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/libnspr-dev_1.7.10-0ubuntu04.10_amd64.deb Size/MD5: 168072 5f73543a027ca48255fb49b7d5698ba6 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/libnspr4_1.7.10-0ubuntu04.10_amd64.deb Size/MD5: 139562 0cd70033ad7d3722795f88c6366eff27 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/libnss-dev_1.7.10-0ubuntu04.10_amd64.deb Size/MD5: 184958 76dc43e6c0b49378f52c6eaeb21a7c5c http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/libnss3_1.7.10-0ubuntu04.10_amd64.deb Size/MD5: 708258 6b961f2168030777d6cf8eb2d6332f1e http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/mozilla-browser_1.7.10-0ubuntu04.10_amd64.deb Size/MD5: 11419236 ea48391b5a5e050f23b1a0650a956783 http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-calendar_1.7.10-0ubuntu04.10_amd64.deb Size/MD5: 403268 ed929a52dbdbc5b06e79ec0fb81ff9fa http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-chatzilla_1.7.10-0ubuntu04.10_amd64.deb Size/MD5: 158326 86b385a15b6c85e4b915bacdced31314 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/mozilla-dev_1.7.10-0ubuntu04.10_amd64.deb Size/MD5: 3350360 e1f4ca50e4bd19d34eee93290fb82629 http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-dom-inspector_1.7.10-0ubuntu04.10_amd64.deb Size/MD5: 121136 eef79c168a357b87409c153c1f201e36 http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-js-debugger_1.7.10-0ubuntu04.10_amd64.deb Size/MD5: 204150 190f1f37a6a477cbba26f8f6f53dbc43 http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-mailnews_1.7.10-0ubuntu04.10_amd64.deb Size/MD5: 1937826 cf26eb285ceef89fcda0830758cc5bfd http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/mozilla-psm_1.7.10-0ubuntu04.10_amd64.deb Size/MD5: 204162 c83dc89bda3406a94923c07178adbda3 http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla_1.7.10-0ubuntu04.10_amd64.deb Size/MD5: 1036 b38a32c79d53150543aa65bd17344012 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/libnspr-dev_1.7.10-0ubuntu04.10_i386.deb Size/MD5: 168060 8c98d3b292d402cd22b11b420b54312b http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/libnspr4_1.7.10-0ubuntu04.10_i386.deb Size/MD5: 126116 bb9174988c7e3c7ba95d152e66a512c0 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/libnss-dev_1.7.10-0ubuntu04.10_i386.deb Size/MD5: 184946 a5e0cf933a97e2580f89ad2a8bd1800e http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/libnss3_1.7.10-0ubuntu04.10_i386.deb Size/MD5: 637908 68482be695882a1e245e72cd197395d9 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/mozilla-browser_1.7.10-0ubuntu04.10_i386.deb Size/MD5: 10602576 53124ed462188a86b8a75dc27faa7be3 http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-calendar_1.7.10-0ubuntu04.10_i386.deb Size/MD5: 403266 02b39a072c2c9d286fe1735ca7507a66 http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-chatzilla_1.7.10-0ubuntu04.10_i386.deb Size/MD5: 158320 8879f23c27a1787c49e3695c9a4fcfe5 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/mozilla-dev_1.7.10-0ubuntu04.10_i386.deb Size/MD5: 3343192 6b9057c17c18b2c1a73154500c70cc42 http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-dom-inspector_1.7.10-0ubuntu04.10_i386.deb Size/MD5: 115810 2b31e6c96b80615c2f916969f855a79f http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-js-debugger_1.7.10-0ubuntu04.10_i386.deb Size/MD5: 204140 c60f89e46ca9827c8bdc62990325738b http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-mailnews_1.7.10-0ubuntu04.10_i386.deb Size/MD5: 1780920 93f92d8d66349f7bd8e59f5e4fc76ef6 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/mozilla-psm_1.7.10-0ubuntu04.10_i386.deb Size/MD5: 188206 41231266c644d9760779988908efbc5c http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla_1.7.10-0ubuntu04.10_i386.deb Size/MD5: 1030 f12e02b92ae890afeac4d8d41a85f276 powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/libnspr-dev_1.7.10-0ubuntu04.10_powerpc.deb Size/MD5: 168072 ba80600f62884978df2b2f04c322f06c http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/libnspr4_1.7.10-0ubuntu04.10_powerpc.deb Size/MD5: 124770 b17ebc91a1b791816f313746f52a6402 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/libnss-dev_1.7.10-0ubuntu04.10_powerpc.deb Size/MD5: 184950 3e7c8c7cc16c9615b9255ce3fcc73b7c http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/libnss3_1.7.10-0ubuntu04.10_powerpc.deb Size/MD5: 712682 dc25643199535a3c8e4e48f766fa8e99 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/mozilla-browser_1.7.10-0ubuntu04.10_powerpc.deb Size/MD5: 10164662 5d494ec9f05ac4f910642f41264b8c60 http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-calendar_1.7.10-0ubuntu04.10_powerpc.deb Size/MD5: 403276 65484c2dc4f038d104746f5fa2fc7489 http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-chatzilla_1.7.10-0ubuntu04.10_powerpc.deb Size/MD5: 158332 05369072e2805e665dcb2eb0ed311ec4 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/mozilla-dev_1.7.10-0ubuntu04.10_powerpc.deb Size/MD5: 3338534 623c77253ad680985c7c00fee1ea28e3 http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-dom-inspector_1.7.10-0ubuntu04.10_powerpc.deb Size/MD5: 114542 f4f3f3baa8b6b0e7c0129ccca3ffd7da http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-js-debugger_1.7.10-0ubuntu04.10_powerpc.deb Size/MD5: 204158 ddd745af7c8ec2ac86cb1a23e0b20a5c http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-mailnews_1.7.10-0ubuntu04.10_powerpc.deb Size/MD5: 1642582 b6406c9fcf0720da67ebe2161884b8fb http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/mozilla-psm_1.7.10-0ubuntu04.10_powerpc.deb Size/MD5: 175472 80bc4b4730e0cfc1c1d15ad41debf97e http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla_1.7.10-0ubuntu04.10_powerpc.deb Size/MD5: 1036 4a8d43ad6703ee277fd33f558fc0ba10 Updated packages for Ubuntu 5.04 (Hoary Hedgehog): Source archives: http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/mozilla_1.7.10-0ubuntu05.04.diff.gz Size/MD5: 310547 9114a0520dfd1ec3f1e8840cc7b209d4 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/mozilla_1.7.10-0ubuntu05.04.dsc Size/MD5: 1136 9c2b49a4c6127860bd5873c902df7103 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/mozilla_1.7.10.orig.tar.gz Size/MD5: 30583956 46d33c8977831c434759f1f8be8349b9 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/libnspr-dev_1.7.10-0ubuntu05.04_amd64.deb Size/MD5: 168066 01ffef9884ce28174557a52f83733ef5 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/libnspr4_1.7.10-0ubuntu05.04_amd64.deb Size/MD5: 140028 c8f9228d7793a031ab73f1f4e690dd3b http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/libnss-dev_1.7.10-0ubuntu05.04_amd64.deb Size/MD5: 184940 0e591f14f97cfce7af277aa7315009d7 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/libnss3_1.7.10-0ubuntu05.04_amd64.deb Size/MD5: 708860 a599ff95ab1687f2769c54bca8a0c920 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/mozilla-browser_1.7.10-0ubuntu05.04_amd64.deb Size/MD5: 10604772 ec3f043c5605adaaa40c53cbee400711 http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-calendar_1.7.10-0ubuntu05.04_amd64.deb Size/MD5: 403258 d1a734b01463eff486bf73b71c72b95e http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-chatzilla_1.7.10-0ubuntu05.04_amd64.deb Size/MD5: 158322 b6adcb39d0eb40d51bc747bbf2dacb65 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/mozilla-dev_1.7.10-0ubuntu05.04_amd64.deb Size/MD5: 3350388 3a4978438779c894f1b2e531127a976a http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-dom-inspector_1.7.10-0ubuntu05.04_amd64.deb Size/MD5: 121180 fe31f51e8c1ddce8d00c55a0ffaa0609 http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-js-debugger_1.7.10-0ubuntu05.04_amd64.deb Size/MD5: 204144 6f30f8a5aab9a79d67010d3d6f30ba2d http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-mailnews_1.7.10-0ubuntu05.04_amd64.deb Size/MD5: 1935902 e9237f23592a8210eb455372ce860fc7 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/mozilla-psm_1.7.10-0ubuntu05.04_amd64.deb Size/MD5: 204122 93173df651b43c76a9b9377f098df9a5 http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla_1.7.10-0ubuntu05.04_amd64.deb Size/MD5: 1032 126b185c4886fc68a69dec48d0683ee7 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/libnspr-dev_1.7.10-0ubuntu05.04_i386.deb Size/MD5: 168064 5a0e70ac2d5e8c98ed086794e142c7b2 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/libnspr4_1.7.10-0ubuntu05.04_i386.deb Size/MD5: 126702 8415469bef6048d35e37fedd5f3962c6 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/libnss-dev_1.7.10-0ubuntu05.04_i386.deb Size/MD5: 184954 f9e1e504981b3d82bc4e997b63a87dc6 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/libnss3_1.7.10-0ubuntu05.04_i386.deb Size/MD5: 638694 74c6379cf3bb2ad963d969d31c501537 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/mozilla-browser_1.7.10-0ubuntu05.04_i386.deb Size/MD5: 9617280 8b3ab23e5c32f8afd5122d52d8951949 http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-calendar_1.7.10-0ubuntu05.04_i386.deb Size/MD5: 403268 61436ebff7bac70672a2fa5ba184fb68 http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-chatzilla_1.7.10-0ubuntu05.04_i386.deb Size/MD5: 158324 2d9bdc79894dedd525ec7b51078207a8 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/mozilla-dev_1.7.10-0ubuntu05.04_i386.deb Size/MD5: 3342872 0fa8ce7b49a5bf9099e876c45d7e294e http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-dom-inspector_1.7.10-0ubuntu05.04_i386.deb Size/MD5: 115828 901524c4341f6e9c187c325823af9995 http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-js-debugger_1.7.10-0ubuntu05.04_i386.deb Size/MD5: 204148 a8d9a4a49d53984d8a0b028333cbe0d1 http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-mailnews_1.7.10-0ubuntu05.04_i386.deb Size/MD5: 1780858 267c6c6389de344bf71332ea0248ac00 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/mozilla-psm_1.7.10-0ubuntu05.04_i386.deb Size/MD5: 188192 cbdc25cfb559cf8080f8430251fa5334 http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla_1.7.10-0ubuntu05.04_i386.deb Size/MD5: 1040 0059e2b4cae42fcce02d9a6e999973fa powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/libnspr-dev_1.7.10-0ubuntu05.04_powerpc.deb Size/MD5: 168072 ce35aab4bac03e2e597205fa0c07ef7f http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/libnspr4_1.7.10-0ubuntu05.04_powerpc.deb Size/MD5: 125410 b9f7aca9a2c1b4a5849f99bf019f545c http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/libnss-dev_1.7.10-0ubuntu05.04_powerpc.deb Size/MD5: 184944 cb2727093d228450f2eda33edde7fbc8 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/libnss3_1.7.10-0ubuntu05.04_powerpc.deb Size/MD5: 713078 220b0e60522361ae8f004d39412948c1 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/mozilla-browser_1.7.10-0ubuntu05.04_powerpc.deb Size/MD5: 9168634 ef5834e1946c772b82dd6556bbbb3b41 http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-calendar_1.7.10-0ubuntu05.04_powerpc.deb Size/MD5: 403272 1d25b0888c9e5f26cddcaf098262ffb2 http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-chatzilla_1.7.10-0ubuntu05.04_powerpc.deb Size/MD5: 158330 0ef7507f9bf5afe90a169aaa6857f041 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/mozilla-dev_1.7.10-0ubuntu05.04_powerpc.deb Size/MD5: 3338630 3b1dbdbd8c43564ff5f93dd06ee22670 http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-dom-inspector_1.7.10-0ubuntu05.04_powerpc.deb Size/MD5: 114568 a67a49248469e7f890cd3a91e6248f9a http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-js-debugger_1.7.10-0ubuntu05.04_powerpc.deb Size/MD5: 204156 6cc870984199c8f9edea55d89333f784 http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-mailnews_1.7.10-0ubuntu05.04_powerpc.deb Size/MD5: 1642886 0569609ed88d459aaad2e83877dea6c1 http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/mozilla-psm_1.7.10-0ubuntu05.04_powerpc.deb Size/MD5: 175486 d494cff4442b868bc3ec0942c2881e29 http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla_1.7.10-0ubuntu05.04_powerpc.deb Size/MD5: 1034 f4c3ac4e8b6e1623dd3b98ca804d5146 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 189 bytes Desc: Digital signature Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20050726/8723dea1/attachment-0001.bin
Powered by blists - more mailing lists