Computer Security
[EN] securityvulns.ru no-pyccku


Mozilla Firefox / Thunderbird URL processing code execution
updated since 25.07.2007
Published:01.08.2007
Source:
SecurityVulns ID:7978
Type:client
Threat Level:
7/10
Description:It's possible to inject shell characters into mailto:, news:, nntp: IRLs if Thunderbird is used as URL handler.
Affected:MOZILLA : Thunderbird 1.5
 MOZILLA : Firefox 2.0
 MOZILLA : Thunderbird 2.0
 ICEAPE : iceape 1.0
 XULRUNNER : xulrunner 1.8
 ICEAPE : iceape 1.1
CVE:CVE-2007-3845 (Mozilla Firefox before 2.0.0.6, Thunderbird before 1.5.0.13 and 2.x before 2.0.0.6, and SeaMonkey before 1.1.4 allow remote attackers to execute arbitrary commands via certain vectors associated with launching "a file handling program based on the file extension at the end of the URI," a variant of CVE-2007-4041. NOTE: the vendor states that "it is still possible to launch a filetype handler based on extension rather than the registered protocol handler.")
 CVE-2007-3844 (Mozilla Firefox 2.0.0.5, Thunderbird 2.0.0.5 and before 1.5.0.13, and SeaMonkey 1.1.3 allows remote attackers to conduct cross-site scripting (XSS) attacks with chrome privileges via an addon that inserts a (1) javascript: or (2) data: link into an about:blank document loaded by chrome via (a) the window.open function or (b) a content.location assignment, aka "Cross Context Scripting." NOTE: this issue is caused by a CVE-2007-3089 regression.)
Original documentdocumentMOZILLA, Mozilla Foundation Security Advisory 2007-27 (01.08.2007)
 documentMOZILLA, Mozilla Foundation Security Advisory 2007-26 (01.08.2007)
 documentThor Larholm, Re: [Full-disclosure] Mozilla protocol abuse (26.07.2007)
 documentThor Larholm, Mozilla protocol abuse (26.07.2007)
 documentBilly Rios, Remote Command Exec (FireFox 2.0.0.5 et al) (25.07.2007)
 documentBilly Rios, [Full-disclosure] More URI Handling Vulnerabilites (FireFox Remote Command Execution) (25.07.2007)
Files:Mozilla protocol abuse report and the XPI exploits

Daily web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
updated since 01.08.2007
Published:01.08.2007
Source:
SecurityVulns ID:7995
Type:remote
Threat Level:
5/10
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
Affected:MAMBO : Mambo 4.6
 WORDPRESS : WordPress 2.2
 WIKIWEBWEAVER : WikiWebWeaver 1.1
 WEBDIRECTOR : WebDirector 2.2
 OPENRAT : OpenRat 0.8
Original documentdocumentr0t, WebDirector XSS vuln. (01.08.2007)
 documentmikispag_(at)_gmail.com, PHP-Nuke (ALL versions) Multiple XSS and HTML injection (01.08.2007)
 documenttomaz.bratusa_(at)_teamintell.com, Mambo 4.6.2 CMS - Session fixation Issue in backend Administration interface (01.08.2007)
 documentyollubunlar_(at)_yollubunlar.org, WikiWebWeaver 1.1 beta Upload Shell Vulnerability (01.08.2007)
 documentmybeni websecurity, [Full-disclosure] *****SPAM***** New Wordpress 2.2.1 Vulnerabilities and the First Weblog XSS Worm (01.08.2007)

Mozilla Firefox DoS
Published:01.08.2007
Source:
SecurityVulns ID:7996
Type:client
Threat Level:
3/10
Description:It's possible to create large number of unclosable pop-up windows.
Affected:MOZILLA : Firefox 2.0
Original documentdocumentcarl hardwick, [Full-disclosure] Firefox 2.0.0.6 Java Pop-Up DoS flaw (01.08.2007)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod