[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[LCFC] webwml://security/2005/dsa-810.wml

Le mardi 13 septembre 2005 à 15:04 +0200, bernard Gisbert a écrit :
> Bonjour,
> juste une coquille pour moi :
> -<p>Plusieurs problèmes ont été découverts dans Mozilla, le naviguateur
> +<p>Plusieurs problèmes ont été découverts dans Mozilla, le navigateur

Merci, c'est corrigé.

> Une question cependant : pourquoi utiliser « i.e. »  au lieu de «
> c.-à-d. » ?

- je trouve ça plus court, facile à taper et lisible
- « i.e. » est plus utilisé dans le cvs (35 fois) que les variantes sur
càd (9 fois)
- « c'est-à-dire » est très utilisé (97 fois), mais trop long  mon goût
vu l'usage dans ce cas.

Merci pour ta relecture et sync avec la version 1.3 de la VO par la même

Simon Paillard <simon.paillard@resel.enst-bretagne.fr>
<define-tag description>several vulnerabilities</define-tag>
<define-tag moreinfo>
<p>Several problems have been discovered in Mozilla, the web browser of
the Mozilla suite.  Since the usual praxis of backporting apparently
does not work for this package, this update is basically version
1.7.10 with the version number rolled back, and hence still named
1.7.8.  The Common Vulnerabilities and Exposures project identifies
the following problems:</p>


<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0718";>CAN-2004-0718</a>, <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1937";>CAN-2005-1937</a>

    <p>A vulnerability has been discovered in Mozilla that allows remote
    attackers to inject arbitrary Javascript from one page into the
    frameset of another site.</p></li>

<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2260";>CAN-2005-2260</a>

    <p>The browser user interface does not properly distinguish between
    user-generated events and untrusted synthetic events, which makes
    it easier for remote attackers to perform dangerous actions that
    normally could only be performed manually by the user.</p></li>

<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2261";>CAN-2005-2261</a>

    <p>XML scripts ran even when Javascript disabled.</p></li>

<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2263";>CAN-2005-2263</a>

    <p>It is possible for a remote attacker to execute a callback
    function in the context of another domain (i.e. frame).</p></li>

<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2265";>CAN-2005-2265</a>

    <p>Missing input sanitising of InstallVersion.compareTo() can cause
    the application to crash.</p></li>

<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2266";>CAN-2005-2266</a>

    <p>Remote attackers could steal sensitive information such as cookies
    and passwords from web sites by accessing data in alien frames.</p></li>

<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2268";>CAN-2005-2268</a>

    <p>It is possible for a Javascript dialog box to spoof a dialog box
    from a trusted site and facilitates phishing attacks.</p></li>

<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2269";>CAN-2005-2269</a>

    <p>Remote attackers could modify certain tag properties of DOM nodes
    that could lead to the execution of arbitrary script or code.</p></li>

<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2270";>CAN-2005-2270</a>

    <p>The Mozilla browser family does not properly clone base objects,
    which allows remote attackers to execute arbitrary code.</p></li>


<p>For the stable distribution (sarge) these problems have been fixed in
version 1.7.8-1sarge2.</p>

<p>For the unstable distribution (sid) these problems have been fixed in
version 1.7.10-1.</p>

<p>We recommend that you upgrade your Mozilla packages.</p>

# do not modify the following line
#include "$(ENGLISHDIR)/security/2005/dsa-810.data"
# $Id: dsa-810.wml,v 1.3 2005/09/14 05:30:20 kaare Exp $

Attachment: signature.asc
Description: This is a digitally signed message part

Reply to: