ID

VAR-200611-0368


CVE

CVE-2006-6077


TITLE

Mozilla Firefox Password manager vulnerable to password disclosure

Trust: 0.8

sources: JVNDB: JVNDB-2006-000790

DESCRIPTION

The (1) Password Manager in Mozilla Firefox 2.0, and 1.5.0.8 and earlier; and the (2) Passcard Manager in Netscape 8.1.2 and possibly other versions, do not properly verify that an ACTION URL in a FORM element containing a password INPUT element matches the web site for which the user stored a password, which allows remote attackers to obtain passwords via a password INPUT element on a different web page located on the web site intended for this password. Mozilla According to, there have been reports of phishing cases where this password manager issue was exploited. Mozilla Firefox is reportedly prone to an information-disclosure weakness because it fails to properly notify users of the automatic population of form fields in disparate URLs deriving from the same domain. Exploiting this issue may allow attackers to obtain user credentials that have been saved in forms deriving from the same website where attack code resides. The most common manifestation of this condition would typically be in blogs or forums. This may allow attackers to access potentially sensitive information that would facilitate the success of phishing attacks. Initial reports and preliminary testing indicate that this issue affects only Firefox 2. UPDATE: Firefox 2.0.0.10 is still vulnerable to the issue. UPDATE (March 17, 2008): Unconfirmed reports indicate that this issue affects Firefox 2.0.0.12; we will update this BID as more information emerges. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200703-08 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: SeaMonkey: Multiple vulnerabilities Date: March 09, 2007 Bugs: #165555 ID: 200703-08 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been reported in SeaMonkey, some of which may allow user-assisted arbitrary remote code execution. Background ========== The SeaMonkey project is a community effort to deliver production-quality releases of code derived from the application formerly known as the 'Mozilla Application Suite'. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 www-client/seamonkey < 1.1.1 >= 1.1.1 2 www-client/seamonkey-bin < 1.1.1 >= 1.1.1 ------------------------------------------------------------------- 2 affected packages on all of their supported architectures. ------------------------------------------------------------------- Description =========== Tom Ferris reported a heap-based buffer overflow involving wide SVG stroke widths that affects SeaMonkey. Various researchers reported some errors in the JavaScript engine potentially leading to memory corruption. SeaMonkey also contains minor vulnerabilities involving cache collision and unsafe pop-up restrictions, filtering or CSS rendering under certain conditions. All those vulnerabilities are the same as in GLSA 200703-04 affecting Mozilla Firefox. Impact ====== An attacker could entice a user to view a specially crafted web page or to read a specially crafted email that will trigger one of the vulnerabilities, possibly leading to the execution of arbitrary code. It is also possible for an attacker to spoof the address bar, steal information through cache collision, bypass the local file protection mechanism with pop-ups, or perform cross-site scripting attacks, leading to the exposure of sensitive information, such as user credentials. Workaround ========== There is no known workaround at this time for all of these issues, but most of them can be avoided by disabling JavaScript. Note that the execution of JavaScript is disabled by default in the SeaMonkey email client, and enabling it is strongly discouraged. Resolution ========== Users upgrading to the following release of SeaMonkey should note that the corresponding Mozilla Firefox upgrade has been found to lose the saved passwords file in some cases. The saved passwords are encrypted and stored in the 'signons.txt' file of ~/.mozilla/ and we advise our users to save that file before performing the upgrade. All SeaMonkey users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=www-client/seamonkey-1.1.1" All SeaMonkey binary users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=www-client/seamonkey-bin-1.1.1" References ========== [ 1 ] CVE-2006-6077 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6077 [ 2 ] CVE-2007-0775 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0775 [ 3 ] CVE-2007-0776 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0776 [ 4 ] CVE-2007-0777 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0777 [ 5 ] CVE-2007-0778 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0778 [ 6 ] CVE-2007-0779 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0779 [ 7 ] CVE-2007-0780 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0780 [ 8 ] CVE-2007-0800 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0800 [ 9 ] CVE-2007-0801 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0801 [ 10 ] CVE-2007-0981 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0981 [ 11 ] CVE-2007-0995 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0995 [ 12 ] Mozilla Password Loss Bug https://bugzilla.mozilla.org/show_bug.cgi?id=360493#c366 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-200703-08.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at http://bugs.gentoo.org. License ======= Copyright 2007 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 . ---------------------------------------------------------------------- Secunia is proud to announce the availability of the Secunia Software Inspector. The Secunia Software Inspector is a free service that detects insecure versions of software that you may have installed in your system. When insecure versions are detected, the Secunia Software Inspector also provides thorough guidelines for updating the software to the latest secure version from the vendor. Try it out online: http://secunia.com/software_inspector/ ---------------------------------------------------------------------- TITLE: Netscape Multiple Vulnerabilities SECUNIA ADVISORY ID: SA24289 VERIFY ADVISORY: http://secunia.com/advisories/24289/ CRITICAL: Highly critical IMPACT: Security Bypass, Cross Site Scripting, Exposure of sensitive information, System access WHERE: >From remote SOFTWARE: Netscape 8.x http://secunia.com/product/5134/ DESCRIPTION: Multiple vulnerabilities have been reported in Netscape, which can be exploited by malicious people to bypass certain security restrictions, gain knowledge of sensitive information, conduct cross-site scripting attacks, or potentially compromise a user's system. See vulnerabilities #1, #2, #6, and #7 for more information: SA24205 The vulnerabilities have been reported in version 8.1.2. SOLUTION: Do not browse untrusted sites and disable Javascript. ORIGINAL ADVISORY: http://www.mozilla.org/security/announce/2007/mfsa2007-02.html http://www.mozilla.org/security/announce/2007/mfsa2007-03.html http://www.mozilla.org/security/announce/2007/mfsa2007-06.html http://www.mozilla.org/security/announce/2007/mfsa2007-07.html OTHER REFERENCES: SA24175: http://secunia.com/advisories/24175/ SA24205: http://secunia.com/advisories/24205/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6077 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0008 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0009 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0775 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0777 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0778 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0779 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0780 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0800 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0981 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0995 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0996 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1092 http://www.mozilla.org/security/announce/2007/mfsa2007-01.html http://www.mozilla.org/security/announce/2007/mfsa2007-02.html http://www.mozilla.org/security/announce/2007/mfsa2007-03.html http://www.mozilla.org/security/announce/2007/mfsa2007-04.html http://www.mozilla.org/security/announce/2007/mfsa2007-05.html http://www.mozilla.org/security/announce/2007/mfsa2007-06.html http://www.mozilla.org/security/announce/2007/mfsa2007-07.html http://www.mozilla.org/security/announce/2007/mfsa2007-08.html _______________________________________________________________________ Updated Packages: Mandriva Linux 2007.0: 779d995c3a792726d31c8949cbcbdb0f 2007.0/i586/deskbar-applet-2.16.0-3.4mdv2007.0.i586.rpm c982a6ed061d42aad0b6cc9019fb7d8e 2007.0/i586/devhelp-0.12-5.4mdv2007.0.i586.rpm 9f908e3aef38bc911688950c27c6ae0e 2007.0/i586/devhelp-plugins-0.12-5.4mdv2007.0.i586.rpm 88acffbb16c2b9e46af5cd85dacef441 2007.0/i586/epiphany-2.16.0-4.4mdv2007.0.i586.rpm fc5788820dc6e81e6fb9c5ddcb3d5a84 2007.0/i586/epiphany-devel-2.16.0-4.4mdv2007.0.i586.rpm 3e1096c6c731fd5c6bd3d91d3c3d5855 2007.0/i586/epiphany-extensions-2.16.0-3.4mdv2007.0.i586.rpm 48c2d19aafdf980094e218c24c32d302 2007.0/i586/galeon-2.0.1-8.4mdv2007.0.i586.rpm ad09aec53a7be271d93930f67a167067 2007.0/i586/gnome-python-extras-2.14.2-6.4mdv2007.0.i586.rpm ce09aae8a13da1d2994683db30f23ba6 2007.0/i586/gnome-python-gdl-2.14.2-6.4mdv2007.0.i586.rpm 8d2c71404a72ca7da85c3c6168b64653 2007.0/i586/gnome-python-gksu-2.14.2-6.4mdv2007.0.i586.rpm ec461c06d55d705d88856bcde85ce3e0 2007.0/i586/gnome-python-gtkhtml2-2.14.2-6.4mdv2007.0.i586.rpm 676fd9eb0b9bd70ca624fe36effd3829 2007.0/i586/gnome-python-gtkmozembed-2.14.2-6.4mdv2007.0.i586.rpm 4ec8be6938ec72ed4fd3047a3ce90c5f 2007.0/i586/gnome-python-gtkspell-2.14.2-6.4mdv2007.0.i586.rpm 8e046ecef73c723e91800d8909c70d8e 2007.0/i586/libdevhelp-1_0-0.12-5.4mdv2007.0.i586.rpm f64440840bc63dcfcfe30d544c1f9927 2007.0/i586/libdevhelp-1_0-devel-0.12-5.4mdv2007.0.i586.rpm 0de477b1bfc21ea84605bbf869773ac7 2007.0/i586/libmozilla-firefox1.5.0.10-1.5.0.10-1mdv2007.0.i586.rpm 1cac2d46475b2bb3e7b0d5f9338bcc8a 2007.0/i586/libmozilla-firefox1.5.0.10-devel-1.5.0.10-1mdv2007.0.i586.rpm a15b72381007bb5b7134e1fd0f15e816 2007.0/i586/libnspr4-1.5.0.10-1mdv2007.0.i586.rpm 3b1945bab290c52a069e40721f33c0f9 2007.0/i586/libnspr4-devel-1.5.0.10-1mdv2007.0.i586.rpm c468bd0ca67481408ab3368a13256bf3 2007.0/i586/libnspr4-static-devel-1.5.0.10-1mdv2007.0.i586.rpm 7a6029a9d000391f06272853cb19eb24 2007.0/i586/libnss3-1.5.0.10-1mdv2007.0.i586.rpm 431ec0bc112c599829563a10b113a4bc 2007.0/i586/libnss3-devel-1.5.0.10-1mdv2007.0.i586.rpm 31550304857a0077aa6e5785a4398a28 2007.0/i586/libtotem-plparser1-2.16.1-2.4mdv2007.0.i586.rpm 54e06b8f410a0e305836f8feb6d39896 2007.0/i586/libtotem-plparser1-devel-2.16.1-2.4mdv2007.0.i586.rpm 4aba2c01b46521f6799f2e7824b32a11 2007.0/i586/mozilla-firefox-1.5.0.10-1mdv2007.0.i586.rpm 5176f852d83cc4e52cf8670a4bb4e62b 2007.0/i586/mozilla-firefox-ar-1.5.0.10-1mdv2007.0.i586.rpm 29d69114b4ceae5e4b5b20a17fbff66f 2007.0/i586/mozilla-firefox-bg-1.5.0.10-1mdv2007.0.i586.rpm b5af23354127de177f118f689a3a08f9 2007.0/i586/mozilla-firefox-br-1.5.0.10-1mdv2007.0.i586.rpm 2aea7763c52275f9ff098c13a72710a5 2007.0/i586/mozilla-firefox-ca-1.5.0.10-1mdv2007.0.i586.rpm 2d16ba5dace98e04574909e18014ebee 2007.0/i586/mozilla-firefox-cs-1.5.0.10-1mdv2007.0.i586.rpm 68978bc64af267ae2e9a2834d87f31fa 2007.0/i586/mozilla-firefox-da-1.5.0.10-1mdv2007.0.i586.rpm fe1a4d17e001a7d949511a9f33b3c1e2 2007.0/i586/mozilla-firefox-de-1.5.0.10-1mdv2007.0.i586.rpm ca021d4e6d26e45d3ad136641a122a55 2007.0/i586/mozilla-firefox-el-1.5.0.10-1mdv2007.0.i586.rpm 5e965a88bf1539df3b879d0c93b6ed62 2007.0/i586/mozilla-firefox-es-1.5.0.10-1mdv2007.0.i586.rpm 019cb4ecf0a605e9eae901e85f1e01d8 2007.0/i586/mozilla-firefox-es_AR-1.5.0.10-1mdv2007.0.i586.rpm 7a6b3b8fba400fd5605c76f32664b307 2007.0/i586/mozilla-firefox-eu-1.5.0.10-1mdv2007.0.i586.rpm 28dcdeeeacc84c3ae9db1047254593f6 2007.0/i586/mozilla-firefox-fi-1.5.0.10-1mdv2007.0.i586.rpm c2cb1b4a96c3928347e571afa4c3e1e4 2007.0/i586/mozilla-firefox-fr-1.5.0.10-1mdv2007.0.i586.rpm 4076b5ef0f5b8f39e7021954b159152b 2007.0/i586/mozilla-firefox-fy-1.5.0.10-1mdv2007.0.i586.rpm 9a931e411eb1afa49f74c254f1fbfc2e 2007.0/i586/mozilla-firefox-ga-1.5.0.10-1mdv2007.0.i586.rpm ba925c55f95bbb33ac4d66f78f763003 2007.0/i586/mozilla-firefox-gu_IN-1.5.0.10-1mdv2007.0.i586.rpm 32dfcda703145db25e231ef1af7d2d9a 2007.0/i586/mozilla-firefox-he-1.5.0.10-1mdv2007.0.i586.rpm 55b02f6e8479ec0f8a451d4cb75270df 2007.0/i586/mozilla-firefox-hu-1.5.0.10-1mdv2007.0.i586.rpm f7015e40b9f7c2b16f21828c4ec47054 2007.0/i586/mozilla-firefox-it-1.5.0.10-1mdv2007.0.i586.rpm d70b264f2bcfdf858ad3f482b1f21c27 2007.0/i586/mozilla-firefox-ja-1.5.0.10-1mdv2007.0.i586.rpm 34c0037322a9a24d8cb9da18639c6527 2007.0/i586/mozilla-firefox-ko-1.5.0.10-1mdv2007.0.i586.rpm 3ce3659834d3405c8a1cc405df1091a5 2007.0/i586/mozilla-firefox-lt-1.5.0.10-1mdv2007.0.i586.rpm 218d07922e4ff1e188ee82f0d68641b2 2007.0/i586/mozilla-firefox-mk-1.5.0.10-1mdv2007.0.i586.rpm 0997b2dbc249d94d45da83941b29039d 2007.0/i586/mozilla-firefox-nb-1.5.0.10-1mdv2007.0.i586.rpm 5270b3907aefaf97947208e83fc3d9d1 2007.0/i586/mozilla-firefox-nl-1.5.0.10-1mdv2007.0.i586.rpm 69775f94444147d5585764ef22c7eb84 2007.0/i586/mozilla-firefox-pa_IN-1.5.0.10-1mdv2007.0.i586.rpm 6918ed80c9c926a9b2e3485dda7aa5c3 2007.0/i586/mozilla-firefox-pl-1.5.0.10-1mdv2007.0.i586.rpm 6ba6374f372e3dd48812f669bde2a7de 2007.0/i586/mozilla-firefox-pt-1.5.0.10-1mdv2007.0.i586.rpm 96aab65b672514129d7a79f684fa1da2 2007.0/i586/mozilla-firefox-pt_BR-1.5.0.10-1mdv2007.0.i586.rpm 86ccd2f89e9749eb62b221a34b773c88 2007.0/i586/mozilla-firefox-ro-1.5.0.10-1mdv2007.0.i586.rpm a53cdc5bde6ea90cb5c1fb388e228b1f 2007.0/i586/mozilla-firefox-ru-1.5.0.10-1mdv2007.0.i586.rpm d0a016e4fcf73aa0e0fdf998628e3bce 2007.0/i586/mozilla-firefox-sk-1.5.0.10-1mdv2007.0.i586.rpm 5345aed2734877327829c59ee50d7e38 2007.0/i586/mozilla-firefox-sl-1.5.0.10-1mdv2007.0.i586.rpm 1ff17fd1942f88478e5a705f3c5f4c4e 2007.0/i586/mozilla-firefox-sv-1.5.0.10-1mdv2007.0.i586.rpm 7513c40671d9c96ad1d5925180a0bc09 2007.0/i586/mozilla-firefox-tr-1.5.0.10-1mdv2007.0.i586.rpm c2b4273cb51eecef8ade093c0357d822 2007.0/i586/mozilla-firefox-uk-1.5.0.10-1mdv2007.0.i586.rpm 381e675ebe36f47bb13b1ed36858ac8c 2007.0/i586/mozilla-firefox-zh_CN-1.5.0.10-1mdv2007.0.i586.rpm 8aeae885a6691f5993bcc2e5986b16c2 2007.0/i586/mozilla-firefox-zh_TW-1.5.0.10-1mdv2007.0.i586.rpm d8161140936f5d797cf3b29c0556750b 2007.0/i586/totem-2.16.1-2.4mdv2007.0.i586.rpm 71e000297bc32418fddb84e6f1dffe5a 2007.0/i586/totem-common-2.16.1-2.4mdv2007.0.i586.rpm ab804ce48f72f588ea597672bda13861 2007.0/i586/totem-gstreamer-2.16.1-2.4mdv2007.0.i586.rpm 56b7545c1bafe8dfba734fbbffa9edc6 2007.0/i586/totem-mozilla-2.16.1-2.4mdv2007.0.i586.rpm 515317c8c72384e106ae463110f5cf2d 2007.0/i586/totem-mozilla-gstreamer-2.16.1-2.4mdv2007.0.i586.rpm ae38a420c078e6fc4ca6f7f238a8a6bf 2007.0/i586/yelp-2.16.0-2.4mdv2007.0.i586.rpm 1787a7a3a1e0f535a7ed497e02976015 2007.0/SRPMS/deskbar-applet-2.16.0-3.4mdv2007.0.src.rpm 64b600bb33a1f8b990bc9db8752ca6d9 2007.0/SRPMS/devhelp-0.12-5.4mdv2007.0.src.rpm d6c8549fb4ffa2e736f1529ebb1929d3 2007.0/SRPMS/epiphany-2.16.0-4.4mdv2007.0.src.rpm c31459f0043b5698408148a26ce3b693 2007.0/SRPMS/epiphany-extensions-2.16.0-3.4mdv2007.0.src.rpm ca5d93eb28c5d06c4c53921c9db564fd 2007.0/SRPMS/galeon-2.0.1-8.4mdv2007.0.src.rpm e4baae8156d74345a8d0510ac86c1b77 2007.0/SRPMS/gnome-python-extras-2.14.2-6.4mdv2007.0.src.rpm 9345f4c3918ae7138da070f7ec4b9d9d 2007.0/SRPMS/mozilla-firefox-1.5.0.10-1mdv2007.0.src.rpm a87a6d84c07ebbafa880d64cc494744f 2007.0/SRPMS/mozilla-firefox-l10n-1.5.0.10-1mdv2007.0.src.rpm 0c6aaa48d1ae50054cf5ea1f8645212d 2007.0/SRPMS/totem-2.16.1-2.4mdv2007.0.src.rpm 097cd08681ea7da92dbd8fd91e2b91ec 2007.0/SRPMS/yelp-2.16.0-2.4mdv2007.0.src.rpm Mandriva Linux 2007.0/X86_64: eee0c5fc5477148304371c57cf066a32 2007.0/x86_64/deskbar-applet-2.16.0-3.4mdv2007.0.x86_64.rpm 152656070294ba3f605200e9b37a1981 2007.0/x86_64/devhelp-0.12-5.4mdv2007.0.x86_64.rpm 4e1b01b0e854ecbe2b603de64112abd0 2007.0/x86_64/devhelp-plugins-0.12-5.4mdv2007.0.x86_64.rpm 808a8966d55c66147168e39ab081607f 2007.0/x86_64/epiphany-2.16.0-4.4mdv2007.0.x86_64.rpm c1db22485b83ef4eab9b672a4fbf6a3b 2007.0/x86_64/epiphany-devel-2.16.0-4.4mdv2007.0.x86_64.rpm 9ac89acfbcae3ade27cf2bfd2e90735e 2007.0/x86_64/epiphany-extensions-2.16.0-3.4mdv2007.0.x86_64.rpm 007ee6caf8e3035b9f3dd24e2430d041 2007.0/x86_64/galeon-2.0.1-8.4mdv2007.0.x86_64.rpm 81896c0a8a52471f2e8917e9ffdcd53b 2007.0/x86_64/gnome-python-extras-2.14.2-6.4mdv2007.0.x86_64.rpm e9ee10c16a5c19a69f21985e9d9aba54 2007.0/x86_64/gnome-python-gdl-2.14.2-6.4mdv2007.0.x86_64.rpm 5822e831db7fef86b769c843bae97174 2007.0/x86_64/gnome-python-gksu-2.14.2-6.4mdv2007.0.x86_64.rpm 3a9d1ec627df428c28cc4f5062153b7b 2007.0/x86_64/gnome-python-gtkhtml2-2.14.2-6.4mdv2007.0.x86_64.rpm 67bce4dd2d06d256312761e0c28f203e 2007.0/x86_64/gnome-python-gtkmozembed-2.14.2-6.4mdv2007.0.x86_64.rpm f1214b7fd0f9dab4946a1d1aa19e055c 2007.0/x86_64/gnome-python-gtkspell-2.14.2-6.4mdv2007.0.x86_64.rpm daf9342d18b4111534561416791e4616 2007.0/x86_64/lib64devhelp-1_0-0.12-5.4mdv2007.0.x86_64.rpm d20f5f7268c0dd0783973eb667b490bd 2007.0/x86_64/lib64devhelp-1_0-devel-0.12-5.4mdv2007.0.x86_64.rpm 2c7b657a6a8f8273551c0f89bc276ed8 2007.0/x86_64/lib64mozilla-firefox1.5.0.10-1.5.0.10-1mdv2007.0.x86_64.rpm 3c28eeb4ba66f99f9ec9c848c05f020f 2007.0/x86_64/lib64mozilla-firefox1.5.0.10-devel-1.5.0.10-1mdv2007.0.x86_64.rpm 552fd73a92ce8bd80b90ee017aa36fc2 2007.0/x86_64/lib64nspr4-1.5.0.10-1mdv2007.0.x86_64.rpm d6fbc739e19146f415c9109e6fa53362 2007.0/x86_64/lib64nspr4-devel-1.5.0.10-1mdv2007.0.x86_64.rpm 3db4cca9ebd9e65658d80ecad23aedb1 2007.0/x86_64/lib64nspr4-static-devel-1.5.0.10-1mdv2007.0.x86_64.rpm bda2ce6bbe99dda0efe5d8997e5bf80d 2007.0/x86_64/lib64nss3-1.5.0.10-1mdv2007.0.x86_64.rpm a6de5846868c98977af2fc3dca6a3f2e 2007.0/x86_64/lib64nss3-devel-1.5.0.10-1mdv2007.0.x86_64.rpm 9603a6a5aa838db41fe10219897f99c5 2007.0/x86_64/lib64totem-plparser1-2.16.1-2.4mdv2007.0.x86_64.rpm 75015fa82d6185e671f67761eab4ef23 2007.0/x86_64/lib64totem-plparser1-devel-2.16.1-2.4mdv2007.0.x86_64.rpm 0670189217b019283540e5afbee47bb5 2007.0/x86_64/mozilla-firefox-1.5.0.10-1mdv2007.0.x86_64.rpm e32462bf67f196a29176e0f18b36515b 2007.0/x86_64/mozilla-firefox-ar-1.5.0.10-1mdv2007.0.x86_64.rpm 988321cb7b63b66c60b4e2cc340987c2 2007.0/x86_64/mozilla-firefox-bg-1.5.0.10-1mdv2007.0.x86_64.rpm 8cc2acf622bf762cf6baf98eb8bce8e9 2007.0/x86_64/mozilla-firefox-br-1.5.0.10-1mdv2007.0.x86_64.rpm b68444807ccc3873c87a89b9d0b91444 2007.0/x86_64/mozilla-firefox-ca-1.5.0.10-1mdv2007.0.x86_64.rpm 9f91b3101a6a3d1dbb4bbbb8d6bec87a 2007.0/x86_64/mozilla-firefox-cs-1.5.0.10-1mdv2007.0.x86_64.rpm 7658891dc34fd716816a0bff3a32f3d6 2007.0/x86_64/mozilla-firefox-da-1.5.0.10-1mdv2007.0.x86_64.rpm 9c039ca94e7919fa2a04e289d266d570 2007.0/x86_64/mozilla-firefox-de-1.5.0.10-1mdv2007.0.x86_64.rpm e420af01966e3c3481076a9191e316e3 2007.0/x86_64/mozilla-firefox-el-1.5.0.10-1mdv2007.0.x86_64.rpm e5ab92fee1c3c7faa2371fcfb43db8f8 2007.0/x86_64/mozilla-firefox-es-1.5.0.10-1mdv2007.0.x86_64.rpm 132bc279c9f8d623320ce7b576602547 2007.0/x86_64/mozilla-firefox-es_AR-1.5.0.10-1mdv2007.0.x86_64.rpm 8a5b12ba839eb696384e1987b9271168 2007.0/x86_64/mozilla-firefox-eu-1.5.0.10-1mdv2007.0.x86_64.rpm b7e7d9a271da084f8c87db7ae081d513 2007.0/x86_64/mozilla-firefox-fi-1.5.0.10-1mdv2007.0.x86_64.rpm 50b10d3681353aa1628a743125f9976e 2007.0/x86_64/mozilla-firefox-fr-1.5.0.10-1mdv2007.0.x86_64.rpm 76a5ac312678049c05f5b5005a01221e 2007.0/x86_64/mozilla-firefox-fy-1.5.0.10-1mdv2007.0.x86_64.rpm ca3461bb675f2dce26b640cd739c6453 2007.0/x86_64/mozilla-firefox-ga-1.5.0.10-1mdv2007.0.x86_64.rpm 51d8cf1c5458ba72e56b549415a6fa59 2007.0/x86_64/mozilla-firefox-gu_IN-1.5.0.10-1mdv2007.0.x86_64.rpm fdfe1d2091dd03d70e4cf4f15aed51f4 2007.0/x86_64/mozilla-firefox-he-1.5.0.10-1mdv2007.0.x86_64.rpm 335260f39e210301b2df24f7f019a145 2007.0/x86_64/mozilla-firefox-hu-1.5.0.10-1mdv2007.0.x86_64.rpm 5bbebb6116ca5598bd05922e47b6b320 2007.0/x86_64/mozilla-firefox-it-1.5.0.10-1mdv2007.0.x86_64.rpm 9c9ec3d8f8feaaa989df1b051817034d 2007.0/x86_64/mozilla-firefox-ja-1.5.0.10-1mdv2007.0.x86_64.rpm 6c073feb67feb05e24c27fa8a5400e06 2007.0/x86_64/mozilla-firefox-ko-1.5.0.10-1mdv2007.0.x86_64.rpm ab7e5246daae8e2484eae546947a70f1 2007.0/x86_64/mozilla-firefox-lt-1.5.0.10-1mdv2007.0.x86_64.rpm 4399031513ccd6282b2236de2f9d8cc5 2007.0/x86_64/mozilla-firefox-mk-1.5.0.10-1mdv2007.0.x86_64.rpm 949ee75e7bfdd6e6a5bb217b8d68e8b2 2007.0/x86_64/mozilla-firefox-nb-1.5.0.10-1mdv2007.0.x86_64.rpm fbc3d3f03845f95ef728af313e6e6984 2007.0/x86_64/mozilla-firefox-nl-1.5.0.10-1mdv2007.0.x86_64.rpm b61a2a95d40216d01526633348c4df61 2007.0/x86_64/mozilla-firefox-pa_IN-1.5.0.10-1mdv2007.0.x86_64.rpm 4b279f979876c0cfb1169c1018e07718 2007.0/x86_64/mozilla-firefox-pl-1.5.0.10-1mdv2007.0.x86_64.rpm 61551680a507aff725cd8b69f399850c 2007.0/x86_64/mozilla-firefox-pt-1.5.0.10-1mdv2007.0.x86_64.rpm d2bfdc9c4e5b5208f01b56a4ea634da5 2007.0/x86_64/mozilla-firefox-pt_BR-1.5.0.10-1mdv2007.0.x86_64.rpm ebf39e9c8fac19f97a61cc6e5b9c6adb 2007.0/x86_64/mozilla-firefox-ro-1.5.0.10-1mdv2007.0.x86_64.rpm 5ca0c813a49d78b1c39d4762227670e6 2007.0/x86_64/mozilla-firefox-ru-1.5.0.10-1mdv2007.0.x86_64.rpm 0b895e1ff42bff78376dd5f80b9d5de3 2007.0/x86_64/mozilla-firefox-sk-1.5.0.10-1mdv2007.0.x86_64.rpm 6a875fcd76f8f9c9c7133b719e8bb653 2007.0/x86_64/mozilla-firefox-sl-1.5.0.10-1mdv2007.0.x86_64.rpm 6a9718c4e4dacdf3c784d6decc0af875 2007.0/x86_64/mozilla-firefox-sv-1.5.0.10-1mdv2007.0.x86_64.rpm 8bd2bfcca37c8300ab82629ab1fce83e 2007.0/x86_64/mozilla-firefox-tr-1.5.0.10-1mdv2007.0.x86_64.rpm f4e60f7388f7359cc240f1bddf511dd4 2007.0/x86_64/mozilla-firefox-uk-1.5.0.10-1mdv2007.0.x86_64.rpm c280f0ffbb88d5be62d4c192b6ba03d8 2007.0/x86_64/mozilla-firefox-zh_CN-1.5.0.10-1mdv2007.0.x86_64.rpm 2cda7cf4e89a2842b21f7146da0bf909 2007.0/x86_64/mozilla-firefox-zh_TW-1.5.0.10-1mdv2007.0.x86_64.rpm 1b0cccf2f5745cabced77bc850eec505 2007.0/x86_64/totem-2.16.1-2.4mdv2007.0.x86_64.rpm 085bc990c340c19206ad0871e7f85456 2007.0/x86_64/totem-common-2.16.1-2.4mdv2007.0.x86_64.rpm d9b7719742feb33ca005a965ecb0feab 2007.0/x86_64/totem-gstreamer-2.16.1-2.4mdv2007.0.x86_64.rpm f39d69611abe7660375045cd45ef4492 2007.0/x86_64/totem-mozilla-2.16.1-2.4mdv2007.0.x86_64.rpm 8237caade3d642351b44bc27a968f99f 2007.0/x86_64/totem-mozilla-gstreamer-2.16.1-2.4mdv2007.0.x86_64.rpm 5b8121bc299135fe98d554ed9a76e116 2007.0/x86_64/yelp-2.16.0-2.4mdv2007.0.x86_64.rpm 1787a7a3a1e0f535a7ed497e02976015 2007.0/SRPMS/deskbar-applet-2.16.0-3.4mdv2007.0.src.rpm 64b600bb33a1f8b990bc9db8752ca6d9 2007.0/SRPMS/devhelp-0.12-5.4mdv2007.0.src.rpm d6c8549fb4ffa2e736f1529ebb1929d3 2007.0/SRPMS/epiphany-2.16.0-4.4mdv2007.0.src.rpm c31459f0043b5698408148a26ce3b693 2007.0/SRPMS/epiphany-extensions-2.16.0-3.4mdv2007.0.src.rpm ca5d93eb28c5d06c4c53921c9db564fd 2007.0/SRPMS/galeon-2.0.1-8.4mdv2007.0.src.rpm e4baae8156d74345a8d0510ac86c1b77 2007.0/SRPMS/gnome-python-extras-2.14.2-6.4mdv2007.0.src.rpm 9345f4c3918ae7138da070f7ec4b9d9d 2007.0/SRPMS/mozilla-firefox-1.5.0.10-1mdv2007.0.src.rpm a87a6d84c07ebbafa880d64cc494744f 2007.0/SRPMS/mozilla-firefox-l10n-1.5.0.10-1mdv2007.0.src.rpm 0c6aaa48d1ae50054cf5ea1f8645212d 2007.0/SRPMS/totem-2.16.1-2.4mdv2007.0.src.rpm 097cd08681ea7da92dbd8fd91e2b91ec 2007.0/SRPMS/yelp-2.16.0-2.4mdv2007.0.src.rpm Corporate 3.0: cfcaea79a321bab95cf430c707670952 corporate/3.0/i586/libnspr4-1.5.0.10-0.1.C30mdk.i586.rpm 27b02c81e5fb1debdc1cce3afee68bc0 corporate/3.0/i586/libnspr4-devel-1.5.0.10-0.1.C30mdk.i586.rpm 181af0069e1a2bdeb27dae39377d5baa corporate/3.0/i586/libnspr4-static-devel-1.5.0.10-0.1.C30mdk.i586.rpm 97d0ff334fa36ac6e4c44b111f1d25e3 corporate/3.0/i586/libnss3-1.5.0.10-0.1.C30mdk.i586.rpm 7eaec8f6e6355ab077e2d74a4c0b6767 corporate/3.0/i586/libnss3-devel-1.5.0.10-0.1.C30mdk.i586.rpm cc2a0efc1fcbbdf29cd23a973bb8d393 corporate/3.0/i586/mozilla-firefox-1.5.0.10-0.1.C30mdk.i586.rpm 50ddb4e9115d13222683b9be04830d41 corporate/3.0/i586/mozilla-firefox-ar-1.5.0.10-0.2.C30mdk.i586.rpm 506e4c5e3d65187a9ac923054bd78788 corporate/3.0/i586/mozilla-firefox-bg-1.5.0.10-0.2.C30mdk.i586.rpm 6b5449983de06be56122a4b98faab190 corporate/3.0/i586/mozilla-firefox-br-1.5.0.10-0.2.C30mdk.i586.rpm f20759ddb13bc97e360a57e6cfaa5286 corporate/3.0/i586/mozilla-firefox-ca-1.5.0.10-0.2.C30mdk.i586.rpm 672b16864c6854af9459eed8e5e4c311 corporate/3.0/i586/mozilla-firefox-cs-1.5.0.10-0.2.C30mdk.i586.rpm 062f0bc1f9d376ed672db747b0464989 corporate/3.0/i586/mozilla-firefox-da-1.5.0.10-0.2.C30mdk.i586.rpm 88f49ec84ac1a8cd4bbc7db4dc3b74e3 corporate/3.0/i586/mozilla-firefox-de-1.5.0.10-0.2.C30mdk.i586.rpm 1d308bb9b88ddb380dd4743eb1966067 corporate/3.0/i586/mozilla-firefox-devel-1.5.0.10-0.1.C30mdk.i586.rpm 713d7970bfa857af5543580f84856265 corporate/3.0/i586/mozilla-firefox-el-1.5.0.10-0.2.C30mdk.i586.rpm 11e4e55704cec087ca740aa58bf3c3fe corporate/3.0/i586/mozilla-firefox-es-1.5.0.10-0.2.C30mdk.i586.rpm 8a822498c67f4655a8b371139afdb80e corporate/3.0/i586/mozilla-firefox-es_AR-1.5.0.10-0.2.C30mdk.i586.rpm ade80f46e4bca7bddd59542b1b168e61 corporate/3.0/i586/mozilla-firefox-eu-1.5.0.10-0.2.C30mdk.i586.rpm 88666fc4e9155c1bafa95bd138462179 corporate/3.0/i586/mozilla-firefox-fi-1.5.0.10-0.2.C30mdk.i586.rpm f747b8ae67b465446c6e2546868521b8 corporate/3.0/i586/mozilla-firefox-fr-1.5.0.10-0.2.C30mdk.i586.rpm ca31b22778c40e7a207b54da5a66e582 corporate/3.0/i586/mozilla-firefox-fy-1.5.0.10-0.2.C30mdk.i586.rpm b6e8fbf350d1ecbfe7f7708f980968fd corporate/3.0/i586/mozilla-firefox-ga-1.5.0.10-0.2.C30mdk.i586.rpm 1f0875e6b78d47aa1accee3f44e5bc85 corporate/3.0/i586/mozilla-firefox-gu_IN-1.5.0.10-0.2.C30mdk.i586.rpm 0fc7c2efaf9c5e11c70543cebd6549d0 corporate/3.0/i586/mozilla-firefox-he-1.5.0.10-0.2.C30mdk.i586.rpm 09f757fb6106984a7c0c31486a69e317 corporate/3.0/i586/mozilla-firefox-hu-1.5.0.10-0.2.C30mdk.i586.rpm 14d1ec188e10e9334fd276c59d3a6edd corporate/3.0/i586/mozilla-firefox-it-1.5.0.10-0.2.C30mdk.i586.rpm 3f6ae9132041147d003e6da01aee4732 corporate/3.0/i586/mozilla-firefox-ja-1.5.0.10-0.2.C30mdk.i586.rpm 0fe5b44d6fe3ed16907c4e2261639c7b corporate/3.0/i586/mozilla-firefox-ko-1.5.0.10-0.2.C30mdk.i586.rpm c0b6c484ff5c96a3c00f8837e86fac6e corporate/3.0/i586/mozilla-firefox-lt-1.5.0.10-0.2.C30mdk.i586.rpm c8603b7d03ecc79a1e45199db42e785c corporate/3.0/i586/mozilla-firefox-mk-1.5.0.10-0.2.C30mdk.i586.rpm 5bb530b75c205e411e41b38ef4907fc3 corporate/3.0/i586/mozilla-firefox-nb-1.5.0.10-0.2.C30mdk.i586.rpm 87ce1abd9939c32650602bdeb58f5321 corporate/3.0/i586/mozilla-firefox-nl-1.5.0.10-0.2.C30mdk.i586.rpm 861ef003893203a3eb9fc51ce09ca600 corporate/3.0/i586/mozilla-firefox-pa_IN-1.5.0.10-0.2.C30mdk.i586.rpm d635a470e14a1cedb14a7e2285437e5d corporate/3.0/i586/mozilla-firefox-pl-1.5.0.10-0.2.C30mdk.i586.rpm 24c6f31559bd65870b3462f12f5c5286 corporate/3.0/i586/mozilla-firefox-pt-1.5.0.10-0.2.C30mdk.i586.rpm 96210fbd0e63da1f53629030c97976a4 corporate/3.0/i586/mozilla-firefox-pt_BR-1.5.0.10-0.2.C30mdk.i586.rpm d530dddbccfdd9301f667665dfcb0972 corporate/3.0/i586/mozilla-firefox-ro-1.5.0.10-0.2.C30mdk.i586.rpm 1f874132aaae86875790dbea3af9ff2d corporate/3.0/i586/mozilla-firefox-ru-1.5.0.10-0.2.C30mdk.i586.rpm 9170adc72bea22d8db7d23318bf6863b corporate/3.0/i586/mozilla-firefox-sk-1.5.0.10-0.2.C30mdk.i586.rpm 2bc0a475e6aa3f467601ddd95c02f6f2 corporate/3.0/i586/mozilla-firefox-sl-1.5.0.10-0.2.C30mdk.i586.rpm 7ecd1e07336b4f8248fc8d365b4c6269 corporate/3.0/i586/mozilla-firefox-sv-1.5.0.10-0.2.C30mdk.i586.rpm 97de54ac3735b36402bb12738d6b1fcf corporate/3.0/i586/mozilla-firefox-tr-1.5.0.10-0.2.C30mdk.i586.rpm 5f9a9bebccf626f6a182ac6d688415df corporate/3.0/i586/mozilla-firefox-uk-1.5.0.10-0.2.C30mdk.i586.rpm cb2d199d199168d9d1de8a0f539d8d75 corporate/3.0/i586/mozilla-firefox-zh_CN-1.5.0.10-0.2.C30mdk.i586.rpm 8707d3e4e0f268ea771275da9b9cc7ba corporate/3.0/i586/mozilla-firefox-zh_TW-1.5.0.10-0.2.C30mdk.i586.rpm 7b031bc2acf4a863c6747993583cd023 corporate/3.0/SRPMS/mozilla-firefox-1.5.0.10-0.1.C30mdk.src.rpm 3192632f0ec2905e81b16c4d5a2cd620 corporate/3.0/SRPMS/mozilla-firefox-l10n-1.5.0.10-0.2.C30mdk.src.rpm Corporate 3.0/X86_64: 318a7755ce85aeed20758abbcbf5d567 corporate/3.0/x86_64/lib64nspr4-1.5.0.10-0.1.C30mdk.x86_64.rpm f32af599c51a5a5f08b18e0e3d863950 corporate/3.0/x86_64/lib64nspr4-devel-1.5.0.10-0.1.C30mdk.x86_64.rpm dde0f78ddc412c33ce51171d5ad3295d corporate/3.0/x86_64/lib64nspr4-static-devel-1.5.0.10-0.1.C30mdk.x86_64.rpm 2a2c8866f8e61d888294e0f73951e82d corporate/3.0/x86_64/lib64nss3-1.5.0.10-0.1.C30mdk.x86_64.rpm b5194dd8030fd917ac47ba09e8bae633 corporate/3.0/x86_64/lib64nss3-devel-1.5.0.10-0.1.C30mdk.x86_64.rpm d70bfdbf3a8c753b3dfea27fdfc6dca9 corporate/3.0/x86_64/mozilla-firefox-1.5.0.10-0.1.C30mdk.x86_64.rpm 4368a936e1c370169f36be9dfbb4685b corporate/3.0/x86_64/mozilla-firefox-ar-1.5.0.10-0.2.C30mdk.x86_64.rpm c448e8ec33bf54b90821609ee3a20847 corporate/3.0/x86_64/mozilla-firefox-bg-1.5.0.10-0.2.C30mdk.x86_64.rpm a7a616f2bde2787d86f200370428b828 corporate/3.0/x86_64/mozilla-firefox-br-1.5.0.10-0.2.C30mdk.x86_64.rpm b255cf5f89cda0877542a7a1098e1980 corporate/3.0/x86_64/mozilla-firefox-ca-1.5.0.10-0.2.C30mdk.x86_64.rpm 08b7d822fee3247eed3b4db85a3f24ea corporate/3.0/x86_64/mozilla-firefox-cs-1.5.0.10-0.2.C30mdk.x86_64.rpm f21586fdbfedae0e42ef105fc089ecd8 corporate/3.0/x86_64/mozilla-firefox-da-1.5.0.10-0.2.C30mdk.x86_64.rpm 0e09804224c840aa3fc64573b24039d5 corporate/3.0/x86_64/mozilla-firefox-de-1.5.0.10-0.2.C30mdk.x86_64.rpm e854fd98a712f9f26e58a92a5026d93c corporate/3.0/x86_64/mozilla-firefox-devel-1.5.0.10-0.1.C30mdk.x86_64.rpm 5cc60f9222ce0bf7dda593de9337b17b corporate/3.0/x86_64/mozilla-firefox-el-1.5.0.10-0.2.C30mdk.x86_64.rpm a354af569ce428841a69225f9ce5642c corporate/3.0/x86_64/mozilla-firefox-es-1.5.0.10-0.2.C30mdk.x86_64.rpm cb4b7dd8438daa3ceda643da1c67ea26 corporate/3.0/x86_64/mozilla-firefox-es_AR-1.5.0.10-0.2.C30mdk.x86_64.rpm 2c67e834b78baeef99d1c5a73698ef27 corporate/3.0/x86_64/mozilla-firefox-eu-1.5.0.10-0.2.C30mdk.x86_64.rpm 5ad9414023711e25c2e79ec804878376 corporate/3.0/x86_64/mozilla-firefox-fi-1.5.0.10-0.2.C30mdk.x86_64.rpm d7e40bdddde30e6bbd9dd5bd4160d964 corporate/3.0/x86_64/mozilla-firefox-fr-1.5.0.10-0.2.C30mdk.x86_64.rpm 151e9b8b18ee88dbe8f64c399cd0c2ef corporate/3.0/x86_64/mozilla-firefox-fy-1.5.0.10-0.2.C30mdk.x86_64.rpm 294a9748cca76530c4494e17acbc1180 corporate/3.0/x86_64/mozilla-firefox-ga-1.5.0.10-0.2.C30mdk.x86_64.rpm 6e73133315a67a39455bc78ecb154ef7 corporate/3.0/x86_64/mozilla-firefox-gu_IN-1.5.0.10-0.2.C30mdk.x86_64.rpm 7aafec45f646dcd04fef9b5dd814a9e1 corporate/3.0/x86_64/mozilla-firefox-he-1.5.0.10-0.2.C30mdk.x86_64.rpm c8fd1f26507eb301a8b74b8b5e2e9761 corporate/3.0/x86_64/mozilla-firefox-hu-1.5.0.10-0.2.C30mdk.x86_64.rpm ed3818c0b11bcd671f1ccf7abc20eb57 corporate/3.0/x86_64/mozilla-firefox-it-1.5.0.10-0.2.C30mdk.x86_64.rpm c07b0f52638f1cb186e005451aeff4a4 corporate/3.0/x86_64/mozilla-firefox-ja-1.5.0.10-0.2.C30mdk.x86_64.rpm 75b06b764c019d69e4fca4f2c138c431 corporate/3.0/x86_64/mozilla-firefox-ko-1.5.0.10-0.2.C30mdk.x86_64.rpm 6b5b33bcec277615c7f50e08e862aa00 corporate/3.0/x86_64/mozilla-firefox-lt-1.5.0.10-0.2.C30mdk.x86_64.rpm f81bae11998644c884e738aa4d79fc0f corporate/3.0/x86_64/mozilla-firefox-mk-1.5.0.10-0.2.C30mdk.x86_64.rpm e24ca9675c4a21dee3f935605a8e801c corporate/3.0/x86_64/mozilla-firefox-nb-1.5.0.10-0.2.C30mdk.x86_64.rpm 904c363046d3a881b7880a9168d8edac corporate/3.0/x86_64/mozilla-firefox-nl-1.5.0.10-0.2.C30mdk.x86_64.rpm 8599628ac4bc66a8807ccbca2265d3fa corporate/3.0/x86_64/mozilla-firefox-pa_IN-1.5.0.10-0.2.C30mdk.x86_64.rpm a334a562db518fd16222d46c35bf81ba corporate/3.0/x86_64/mozilla-firefox-pl-1.5.0.10-0.2.C30mdk.x86_64.rpm 9766eb6fdef5eb9c6d7ed3040d3c7c58 corporate/3.0/x86_64/mozilla-firefox-pt-1.5.0.10-0.2.C30mdk.x86_64.rpm 9c6c6679f39014efd18a3faad2ad7f37 corporate/3.0/x86_64/mozilla-firefox-pt_BR-1.5.0.10-0.2.C30mdk.x86_64.rpm e74e98c2f4746a2963e9f3a35e65bd68 corporate/3.0/x86_64/mozilla-firefox-ro-1.5.0.10-0.2.C30mdk.x86_64.rpm dcf5e7454fbe1987afd1dd5dc77a97cc corporate/3.0/x86_64/mozilla-firefox-ru-1.5.0.10-0.2.C30mdk.x86_64.rpm f155f9d53a7f2c8d85acfc788033f171 corporate/3.0/x86_64/mozilla-firefox-sk-1.5.0.10-0.2.C30mdk.x86_64.rpm cdaaca2f3f8c50290a9da3b4ca2fe51f corporate/3.0/x86_64/mozilla-firefox-sl-1.5.0.10-0.2.C30mdk.x86_64.rpm 35f49bc6ba8f9f85db21c76a7ef0731c corporate/3.0/x86_64/mozilla-firefox-sv-1.5.0.10-0.2.C30mdk.x86_64.rpm 0968dfb43370849632b66d94841150a4 corporate/3.0/x86_64/mozilla-firefox-tr-1.5.0.10-0.2.C30mdk.x86_64.rpm 955ae93096900735cd1497722c323926 corporate/3.0/x86_64/mozilla-firefox-uk-1.5.0.10-0.2.C30mdk.x86_64.rpm 508e690da730041c9f88cc0c730fa6a0 corporate/3.0/x86_64/mozilla-firefox-zh_CN-1.5.0.10-0.2.C30mdk.x86_64.rpm 24ffb6e707a5eca5ed386b0c18e042f1 corporate/3.0/x86_64/mozilla-firefox-zh_TW-1.5.0.10-0.2.C30mdk.x86_64.rpm 7b031bc2acf4a863c6747993583cd023 corporate/3.0/SRPMS/mozilla-firefox-1.5.0.10-0.1.C30mdk.src.rpm 3192632f0ec2905e81b16c4d5a2cd620 corporate/3.0/SRPMS/mozilla-firefox-l10n-1.5.0.10-0.2.C30mdk.src.rpm Corporate 4.0: c9d88ef17632a8483c9de470dde537de corporate/4.0/i586/libnspr4-1.5.0.10-0.1.20060mlcs4.i586.rpm 8852d5f5812df55c3c88049fc6b57df9 corporate/4.0/i586/libnspr4-devel-1.5.0.10-0.1.20060mlcs4.i586.rpm 1cad73a946a1860f8291ee4a3e237c8b corporate/4.0/i586/libnspr4-static-devel-1.5.0.10-0.1.20060mlcs4.i586.rpm bf79d51895333f11f77cfee57611a507 corporate/4.0/i586/libnss3-1.5.0.10-0.1.20060mlcs4.i586.rpm fb1b1a8c40f0b36b536616e766bb433e corporate/4.0/i586/libnss3-devel-1.5.0.10-0.1.20060mlcs4.i586.rpm 12bda4363fb6c216ae4857edee15fa48 corporate/4.0/i586/mozilla-firefox-1.5.0.10-0.1.20060mlcs4.i586.rpm 51c2aacbd8207e99d6f4b9a2e2925591 corporate/4.0/i586/mozilla-firefox-ar-1.5.0.10-0.2.20060mlcs4.i586.rpm a8e0d2106a4675582324ce5e6d074515 corporate/4.0/i586/mozilla-firefox-bg-1.5.0.10-0.2.20060mlcs4.i586.rpm 49b0eab3903353f1efc68177d94c9acb corporate/4.0/i586/mozilla-firefox-br-1.5.0.10-0.2.20060mlcs4.i586.rpm 96ef09b85aa912c1b29ba50cf04174b1 corporate/4.0/i586/mozilla-firefox-ca-1.5.0.10-0.2.20060mlcs4.i586.rpm 7c18b64e02e7135000b66d8b93abfa9c corporate/4.0/i586/mozilla-firefox-cs-1.5.0.10-0.2.20060mlcs4.i586.rpm dddb928bd90a08e88b31b2da02d301e9 corporate/4.0/i586/mozilla-firefox-da-1.5.0.10-0.2.20060mlcs4.i586.rpm f05df61764e973c51a2854f85fb4092a corporate/4.0/i586/mozilla-firefox-de-1.5.0.10-0.2.20060mlcs4.i586.rpm 60904fbe437e62846f989e480334f981 corporate/4.0/i586/mozilla-firefox-devel-1.5.0.10-0.1.20060mlcs4.i586.rpm 238bf940d1bcbb6fda8931b71f667f72 corporate/4.0/i586/mozilla-firefox-el-1.5.0.10-0.2.20060mlcs4.i586.rpm 447735f0d29fd5e0de6300f6fd045de9 corporate/4.0/i586/mozilla-firefox-es-1.5.0.10-0.2.20060mlcs4.i586.rpm 931eabcf091f4559345608f5392806bf corporate/4.0/i586/mozilla-firefox-es_AR-1.5.0.10-0.2.20060mlcs4.i586.rpm 9fd3a7993810b1b123c3ba91a3a1490f corporate/4.0/i586/mozilla-firefox-eu-1.5.0.10-0.2.20060mlcs4.i586.rpm fd9d51556e2ba94e0ffaf43705f5cab6 corporate/4.0/i586/mozilla-firefox-fi-1.5.0.10-0.2.20060mlcs4.i586.rpm 52adede8af8524b638cd83314aec6266 corporate/4.0/i586/mozilla-firefox-fr-1.5.0.10-0.2.20060mlcs4.i586.rpm 282ae19f5142375fc6e3ad10e967dff9 corporate/4.0/i586/mozilla-firefox-fy-1.5.0.10-0.2.20060mlcs4.i586.rpm 656828e7f2ae5d63cad48aaab33256a4 corporate/4.0/i586/mozilla-firefox-ga-1.5.0.10-0.2.20060mlcs4.i586.rpm fa58146cd153717c41c9451557e999f6 corporate/4.0/i586/mozilla-firefox-gu_IN-1.5.0.10-0.2.20060mlcs4.i586.rpm 17b33ea5ece6d8eaa9517fb3189ec55a corporate/4.0/i586/mozilla-firefox-he-1.5.0.10-0.2.20060mlcs4.i586.rpm 30053a74588d22644b41275b5ce778e1 corporate/4.0/i586/mozilla-firefox-hu-1.5.0.10-0.2.20060mlcs4.i586.rpm 885a9938fcf4959f7f6bdd61bd2ba650 corporate/4.0/i586/mozilla-firefox-it-1.5.0.10-0.2.20060mlcs4.i586.rpm 77e1ac081838a5ac3e8af94cd7a6f498 corporate/4.0/i586/mozilla-firefox-ja-1.5.0.10-0.2.20060mlcs4.i586.rpm e2c5b9a2d2bd30987c17936e23c5e8d8 corporate/4.0/i586/mozilla-firefox-ko-1.5.0.10-0.2.20060mlcs4.i586.rpm 4800b533de6d0f1e546f6dae9a5fb21a corporate/4.0/i586/mozilla-firefox-lt-1.5.0.10-0.2.20060mlcs4.i586.rpm 0931d7d5523c46ac7c973975ca8dad73 corporate/4.0/i586/mozilla-firefox-mk-1.5.0.10-0.2.20060mlcs4.i586.rpm 394080d296f7a239844de8a8b9b7c0c4 corporate/4.0/i586/mozilla-firefox-nb-1.5.0.10-0.2.20060mlcs4.i586.rpm 10d1780b83a3f5d30e1b8b4361ffdfdd corporate/4.0/i586/mozilla-firefox-nl-1.5.0.10-0.2.20060mlcs4.i586.rpm 8b572aedf2e0e16e12723edfcdfae0db corporate/4.0/i586/mozilla-firefox-pa_IN-1.5.0.10-0.2.20060mlcs4.i586.rpm 83b936f9a1c305b79cb0c341f924487c corporate/4.0/i586/mozilla-firefox-pl-1.5.0.10-0.2.20060mlcs4.i586.rpm 19dda1ba52136f6f9142b6258fd997aa corporate/4.0/i586/mozilla-firefox-pt-1.5.0.10-0.2.20060mlcs4.i586.rpm 8a5a3934236c75d1005c10d398f57cbc corporate/4.0/i586/mozilla-firefox-pt_BR-1.5.0.10-0.2.20060mlcs4.i586.rpm 5c0e7463955e0112393e2112b969fbe9 corporate/4.0/i586/mozilla-firefox-ro-1.5.0.10-0.2.20060mlcs4.i586.rpm bc7fd0ab0a70f299b65c04ad8e4fa690 corporate/4.0/i586/mozilla-firefox-ru-1.5.0.10-0.2.20060mlcs4.i586.rpm 234e0d15ab182ab8d19f56b3977d0a44 corporate/4.0/i586/mozilla-firefox-sk-1.5.0.10-0.2.20060mlcs4.i586.rpm e127bce5679ad77353c7322f27dd3b88 corporate/4.0/i586/mozilla-firefox-sl-1.5.0.10-0.2.20060mlcs4.i586.rpm f55d9b802b42c0f96f57303e8592824b corporate/4.0/i586/mozilla-firefox-sv-1.5.0.10-0.2.20060mlcs4.i586.rpm b1a9c031df80ae88b4a356b9af301ed1 corporate/4.0/i586/mozilla-firefox-tr-1.5.0.10-0.2.20060mlcs4.i586.rpm 37b979cd7cce011dfe8aeab993fbb7c1 corporate/4.0/i586/mozilla-firefox-uk-1.5.0.10-0.2.20060mlcs4.i586.rpm baf550b8086fc279abba47078710224e corporate/4.0/i586/mozilla-firefox-zh_CN-1.5.0.10-0.2.20060mlcs4.i586.rpm 7d16f4f417c1863370687e78293bcb9f corporate/4.0/i586/mozilla-firefox-zh_TW-1.5.0.10-0.2.20060mlcs4.i586.rpm 7fccd7db700eb245940aab0124ec4c05 corporate/4.0/SRPMS/mozilla-firefox-1.5.0.10-0.1.20060mlcs4.src.rpm 43ef53c286c5fb8b3f277c0fc0a20df8 corporate/4.0/SRPMS/mozilla-firefox-l10n-1.5.0.10-0.2.20060mlcs4.src.rpm Corporate 4.0/X86_64: 6d13ee022d7fa9c3b5132e0ba82bf3ea corporate/4.0/x86_64/lib64nspr4-1.5.0.10-0.1.20060mlcs4.x86_64.rpm 0490445228499883494da3049cf36b7e corporate/4.0/x86_64/lib64nspr4-devel-1.5.0.10-0.1.20060mlcs4.x86_64.rpm c0e7738ec03a83d2c39a7053c975b1bf corporate/4.0/x86_64/lib64nspr4-static-devel-1.5.0.10-0.1.20060mlcs4.x86_64.rpm 4d9d303f922461f7d4f328bea614db8e corporate/4.0/x86_64/lib64nss3-1.5.0.10-0.1.20060mlcs4.x86_64.rpm 9c3775e48214afc0cd035a06c40d526d corporate/4.0/x86_64/lib64nss3-devel-1.5.0.10-0.1.20060mlcs4.x86_64.rpm f4dc844b4b15c6165ed98a00383cfc24 corporate/4.0/x86_64/mozilla-firefox-1.5.0.10-0.1.20060mlcs4.x86_64.rpm 3b6d11aebb0fd5c1e0f44f2c1600005f corporate/4.0/x86_64/mozilla-firefox-ar-1.5.0.10-0.2.20060mlcs4.x86_64.rpm a3f17246002dee38637799e1c23b5d32 corporate/4.0/x86_64/mozilla-firefox-bg-1.5.0.10-0.2.20060mlcs4.x86_64.rpm 8ecc63eb0d8f791f6cec078df25f55ef corporate/4.0/x86_64/mozilla-firefox-br-1.5.0.10-0.2.20060mlcs4.x86_64.rpm a54acae77a36998a6536050e86948585 corporate/4.0/x86_64/mozilla-firefox-ca-1.5.0.10-0.2.20060mlcs4.x86_64.rpm e30b8dabbffc4e4e179c78d627278a79 corporate/4.0/x86_64/mozilla-firefox-cs-1.5.0.10-0.2.20060mlcs4.x86_64.rpm 6ef3998ac9620fb78acf70f51392496e corporate/4.0/x86_64/mozilla-firefox-da-1.5.0.10-0.2.20060mlcs4.x86_64.rpm 6dac6eb4933dcb84df7fd37c194309e5 corporate/4.0/x86_64/mozilla-firefox-de-1.5.0.10-0.2.20060mlcs4.x86_64.rpm ddba48d3aff4bafb269ee84371e5c384 corporate/4.0/x86_64/mozilla-firefox-devel-1.5.0.10-0.1.20060mlcs4.x86_64.rpm 98b4220ef27043107b322a5cdd421be3 corporate/4.0/x86_64/mozilla-firefox-el-1.5.0.10-0.2.20060mlcs4.x86_64.rpm 106e4bf9040efb15d8fadb61aa5a7c2f corporate/4.0/x86_64/mozilla-firefox-es-1.5.0.10-0.2.20060mlcs4.x86_64.rpm ce661feb49b45a68920c4637c7c13c5c corporate/4.0/x86_64/mozilla-firefox-es_AR-1.5.0.10-0.2.20060mlcs4.x86_64.rpm 132ec96029ffb15384aed5ba812583a1 corporate/4.0/x86_64/mozilla-firefox-eu-1.5.0.10-0.2.20060mlcs4.x86_64.rpm b16cf456819902a14cf94a96ac93181e corporate/4.0/x86_64/mozilla-firefox-fi-1.5.0.10-0.2.20060mlcs4.x86_64.rpm 8e4915d6bb122cd84ce0759b4eca96e4 corporate/4.0/x86_64/mozilla-firefox-fr-1.5.0.10-0.2.20060mlcs4.x86_64.rpm 16ac6ac2049bace795a518d3862ada83 corporate/4.0/x86_64/mozilla-firefox-fy-1.5.0.10-0.2.20060mlcs4.x86_64.rpm 8c0de62ea2b10f6c3c94b08c8e208bd7 corporate/4.0/x86_64/mozilla-firefox-ga-1.5.0.10-0.2.20060mlcs4.x86_64.rpm c183da11469c352f269025c5fc57e012 corporate/4.0/x86_64/mozilla-firefox-gu_IN-1.5.0.10-0.2.20060mlcs4.x86_64.rpm d2816239b3ce0a131eb6f235927bfa4d corporate/4.0/x86_64/mozilla-firefox-he-1.5.0.10-0.2.20060mlcs4.x86_64.rpm 9a8d7e5714f9953adb8c40b528ffdba7 corporate/4.0/x86_64/mozilla-firefox-hu-1.5.0.10-0.2.20060mlcs4.x86_64.rpm db7471b38b44a3aeec57a2f70c256f4e corporate/4.0/x86_64/mozilla-firefox-it-1.5.0.10-0.2.20060mlcs4.x86_64.rpm a1edf7dddc4c57664e9b7c41c29481b4 corporate/4.0/x86_64/mozilla-firefox-ja-1.5.0.10-0.2.20060mlcs4.x86_64.rpm e7d4cca273590d658643af1a0e0a3c3f corporate/4.0/x86_64/mozilla-firefox-ko-1.5.0.10-0.2.20060mlcs4.x86_64.rpm 95e875e933161481817058192705cc55 corporate/4.0/x86_64/mozilla-firefox-lt-1.5.0.10-0.2.20060mlcs4.x86_64.rpm 1b43c856786159cf3f7a59837050401a corporate/4.0/x86_64/mozilla-firefox-mk-1.5.0.10-0.2.20060mlcs4.x86_64.rpm b3e0ea6366409cb297cb4173c5330b40 corporate/4.0/x86_64/mozilla-firefox-nb-1.5.0.10-0.2.20060mlcs4.x86_64.rpm 8a9fbc3f37b7de37336fbcfff054a356 corporate/4.0/x86_64/mozilla-firefox-nl-1.5.0.10-0.2.20060mlcs4.x86_64.rpm 534545b2ec917b51bbf27291c6fa9a3b corporate/4.0/x86_64/mozilla-firefox-pa_IN-1.5.0.10-0.2.20060mlcs4.x86_64.rpm 42e92780667437b6ee60f5820cb97a2b corporate/4.0/x86_64/mozilla-firefox-pl-1.5.0.10-0.2.20060mlcs4.x86_64.rpm 9bd0c9123f63d84e8c3a12f13c19ae9f corporate/4.0/x86_64/mozilla-firefox-pt-1.5.0.10-0.2.20060mlcs4.x86_64.rpm 337773e93570734e94305acf0440f62a corporate/4.0/x86_64/mozilla-firefox-pt_BR-1.5.0.10-0.2.20060mlcs4.x86_64.rpm 703f8acdaad9b0f654c331eb022cbf77 corporate/4.0/x86_64/mozilla-firefox-ro-1.5.0.10-0.2.20060mlcs4.x86_64.rpm 01c25d3eb9f8a06dd6098293c88c2dca corporate/4.0/x86_64/mozilla-firefox-ru-1.5.0.10-0.2.20060mlcs4.x86_64.rpm c1fb6de0b01b4c4907847004b6b2e05a corporate/4.0/x86_64/mozilla-firefox-sk-1.5.0.10-0.2.20060mlcs4.x86_64.rpm db9d491deef9842c9f5e1493dbd996bb corporate/4.0/x86_64/mozilla-firefox-sl-1.5.0.10-0.2.20060mlcs4.x86_64.rpm 2ae15ace7f8137eb7d383a6be838144f corporate/4.0/x86_64/mozilla-firefox-sv-1.5.0.10-0.2.20060mlcs4.x86_64.rpm 6d73f353ff4de75188015f9db657ec86 corporate/4.0/x86_64/mozilla-firefox-tr-1.5.0.10-0.2.20060mlcs4.x86_64.rpm 800864eb5c3d392955c0ccca16469685 corporate/4.0/x86_64/mozilla-firefox-uk-1.5.0.10-0.2.20060mlcs4.x86_64.rpm d2dfe49edd705f89ebcefc1344d610aa corporate/4.0/x86_64/mozilla-firefox-zh_CN-1.5.0.10-0.2.20060mlcs4.x86_64.rpm 9995161554c1d34a4649f7c8ae6519d8 corporate/4.0/x86_64/mozilla-firefox-zh_TW-1.5.0.10-0.2.20060mlcs4.x86_64.rpm 7fccd7db700eb245940aab0124ec4c05 corporate/4.0/SRPMS/mozilla-firefox-1.5.0.10-0.1.20060mlcs4.src.rpm 43ef53c286c5fb8b3f277c0fc0a20df8 corporate/4.0/SRPMS/mozilla-firefox-l10n-1.5.0.10-0.2.20060mlcs4.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFF5dR+mqjQ0CJFipgRApkQAKCwNIjEhnWrFUJBCVdP+JPYSoXbKQCggnPX ezKR2KERlky8e8I363Sfs3c= =fJ94 -----END PGP SIGNATURE----- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - -------------------------------------------------------------------------- Debian Security Advisory DSA 1336-1 security@debian.org http://www.debian.org/security/ Moritz Muehlenhoff July 22nd, 2007 http://www.debian.org/security/faq - -------------------------------------------------------------------------- Package : mozilla-firefox Vulnerability : several Problem-Type : remote Debian-specific: no CVE ID : CVE-2007-1282 CVE-2007-0994 CVE-2007-0995 CVE-2007-0996 CVE-2007-0981 CVE-2007-0008 CVE-2007-0009 CVE-2007-0775 CVE-2007-0778 CVE-2007-0045 CVE-2006-6077 Several remote vulnerabilities have been discovered in Mozilla Firefox. This will be the last security update of Mozilla-based products for the oldstable (sarge) distribution of Debian. We recommend to upgrade to stable (etch) as soon as possible. The Common Vulnerabilities and Exposures project identifies the following vulnerabilities: CVE-2007-1282 It was discovered that an integer overflow in text/enhanced message parsing allows the execution of arbitrary code. CVE-2007-0994 It was discovered that a regression in the Javascript engine allows the execution of Javascript with elevated privileges. CVE-2007-0995 It was discovered that incorrect parsing of invalid HTML characters allows the bypass of content filters. CVE-2007-0996 It was discovered that insecure child frame handling allows cross-site scripting. CVE-2007-0981 It was discovered that Firefox handles URI withs a null byte in the hostname insecurely. CVE-2007-0008 It was discovered that a buffer overflow in the NSS code allows the execution of arbitrary code. CVE-2007-0009 It was discovered that a buffer overflow in the NSS code allows the execution of arbitrary code. CVE-2007-0775 It was discovered that multiple programming errors in the layout engine allow the execution of arbitrary code. CVE-2007-0778 It was discovered that the page cache calculates hashes in an insecure manner. CVE-2006-6077 It was discovered that the password manager allows the disclosure of passwords. For the oldstable distribution (sarge) these problems have been fixed in version 1.0.4-2sarge17. You should upgrade to etch as soon as possible. The stable distribution (etch) isn't affected. These vulnerabilities have been fixed prior to the release of Debian etch. The unstable distribution (sid) no longer contains mozilla-firefox. Iceweasel is already fixed. Upgrade Instructions - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 3.1 alias sarge - -------------------------------- Source archives: http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge17.dsc Size/MD5 checksum: 1641 36715bb647cb3b7cd117edee90a34bfd http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge17.diff.gz Size/MD5 checksum: 553311 4ba992e60e5c6b156054c5105b1134ae http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4.orig.tar.gz Size/MD5 checksum: 40212297 8e4ba81ad02c7986446d4e54e978409d Alpha architecture: http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge17_alpha.deb Size/MD5 checksum: 11221890 5d8d1de73d162edf8ddbaa40844bb454 http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge17_alpha.deb Size/MD5 checksum: 172696 42d5c31ec7a2e3163846c347f04773df http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge17_alpha.deb Size/MD5 checksum: 63574 238529b9d4ae396dc01d786d4fb843b4 AMD64 architecture: http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge17_amd64.deb Size/MD5 checksum: 9429140 8394fcd85a7218db784160702efc5249 http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge17_amd64.deb Size/MD5 checksum: 166496 795a8ec3e1aa1b0a718ad6f4439670ef http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge17_amd64.deb Size/MD5 checksum: 62022 ef315cc90c3780ff151cd2271e913859 ARM architecture: http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge17_arm.deb Size/MD5 checksum: 8244544 71eaf9cb5418a77410ff12c7f36eb32b http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge17_arm.deb Size/MD5 checksum: 157966 5e2e22d04a33ccbc0e6b19b4c4d43492 http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge17_arm.deb Size/MD5 checksum: 57358 6f34a7a02114e48cadc6860b86f75130 HP Precision architecture: http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge17_hppa.deb Size/MD5 checksum: 10301620 3700a0b7dcb0ab061b3521e2a3f232f9 http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge17_hppa.deb Size/MD5 checksum: 169432 387b8fa52d406dfdd26c3adc3ccac615 http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge17_hppa.deb Size/MD5 checksum: 62500 80addaf2d87b6952fdc9104c5fc9dfde Intel IA-32 architecture: http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge17_i386.deb Size/MD5 checksum: 8919924 8fc67257357687c8611b3e4e5389aee4 http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge17_i386.deb Size/MD5 checksum: 161684 6c989c4276e34c6031b6185418a8ddb1 http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge17_i386.deb Size/MD5 checksum: 58896 7e48aa697c8c17f7d22de860a17e7dfd Intel IA-64 architecture: http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge17_ia64.deb Size/MD5 checksum: 11664142 aa008699700ba3c8b45d3a8961e99192 http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge17_ia64.deb Size/MD5 checksum: 172030 e79af50f04490de310cda7f6ce652d44 http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge17_ia64.deb Size/MD5 checksum: 66718 8cabdbf0919ac447c5d492ef6227d9af Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge17_m68k.deb Size/MD5 checksum: 8196148 e3544446b371fd7ed4b79e53f69b556a http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge17_m68k.deb Size/MD5 checksum: 160556 0164d4c0f675a020643ccedf94a55eb8 http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge17_m68k.deb Size/MD5 checksum: 58168 b429907e69e8daa7d51e45552659da27 Big endian MIPS architecture: http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge17_mips.deb Size/MD5 checksum: 9954006 0eb0513fc950e7cd8abcae9666b24a7b http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge17_mips.deb Size/MD5 checksum: 159496 ca0585a663a5470d3a62ae0786864beb http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge17_mips.deb Size/MD5 checksum: 59170 22ea96156de56d046a7afd73d4857419 Little endian MIPS architecture: http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge17_mipsel.deb Size/MD5 checksum: 9831728 dda6865c7290fce658847f0909617c73 http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge17_mipsel.deb Size/MD5 checksum: 159060 e7a7c4db0f5df82f84ceef6827df2bea http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge17_mipsel.deb Size/MD5 checksum: 58984 b0b02ac1c62041db8d377a7ff40c013c PowerPC architecture: http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge15_powerpc.deb Size/MD5 checksum: 8587718 8d219ce9e684b86babfe31db9d7d9658 http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge15_powerpc.deb Size/MD5 checksum: 159762 41f3707945d5edae6ee1ac90bdef5cab http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge15_powerpc.deb Size/MD5 checksum: 60936 1a79408acd12828a3710393e05d99914 IBM S/390 architecture: http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge17_s390.deb Size/MD5 checksum: 9667078 5838d957637b4d4c2c19afea0dd68db5 http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge17_s390.deb Size/MD5 checksum: 167092 4dd6de7299014d5e0c13da8e480a7f3c http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge17_s390.deb Size/MD5 checksum: 61472 64d10c667ed4c6c12947c49f5cca8ff6 Sun Sparc architecture: http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge17_sparc.deb Size/MD5 checksum: 8680322 241cddabdf91eb14b0a6529ffc84a51d http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge17_sparc.deb Size/MD5 checksum: 160304 7887081b85d3ead3994a997608bbe22a http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge17_sparc.deb Size/MD5 checksum: 57718 4a4eeeb0815cb03d51f74965403911ad These files will probably be moved into the oldstable distribution on its next update. - --------------------------------------------------------------------------------- For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFGo5b7Xm3vHE4uyloRAsdgAKDTo6NxeylHh30syJpFeyF5/Yr/XwCdH188 NdI5zd36oN5mVqIDUsqYC3o= =/qY/ -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . =========================================================== Ubuntu Security Notice USN-428-1 February 26, 2007 firefox vulnerabilities CVE-2006-6077, CVE-2007-0008, CVE-2007-0009, CVE-2007-0775, CVE-2007-0776, CVE-2007-0777, CVE-2007-0778, CVE-2007-0779, CVE-2007-0780, CVE-2007-0800, CVE-2007-0981, CVE-2007-0995, CVE-2007-0996, CVE-2007-1092 =========================================================== A security issue affects the following Ubuntu releases: Ubuntu 5.10 Ubuntu 6.10 This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 5.10: firefox 1.5.dfsg+1.5.0.10-0ubuntu0.5.10.1 Ubuntu 6.06 LTS: firefox 1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1 libnspr4 1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1 libnss3 1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1 Ubuntu 6.10: firefox 2.0.0.2+0dfsg-0ubuntu0.6.10 libnspr4 2.0.0.2+0dfsg-0ubuntu0.6.10 libnss3 2.0.0.2+0dfsg-0ubuntu0.6.10 After a standard system upgrade you need to restart Firefox to effect the necessary changes. Details follow: Several flaws have been found that could be used to perform Cross-site scripting attacks. A malicious web site could exploit these to modify the contents or steal confidential data (such as passwords) from other opened web pages. (CVE-2006-6077, CVE-2007-0780, CVE-2007-0800, CVE-2007-0981, CVE-2007-0995, CVE-2007-0996) The SSLv2 protocol support in the NSS library did not sufficiently check the validity of public keys presented with a SSL certificate. A malicious SSL web site using SSLv2 could potentially exploit this to execute arbitrary code with the user's privileges. (CVE-2007-0008) The SSLv2 protocol support in the NSS library did not sufficiently verify the validity of client master keys presented in an SSL client certificate. (CVE-2007-0775, CVE-2007-0776, CVE-2007-0777, CVE-2007-1092) Two web pages could collide in the disk cache with the result that depending on order loaded the end of the longer document could be appended to the shorter when the shorter one was reloaded from the cache. It is possible a determined hacker could construct a targeted attack to steal some sensitive data from a particular web page. The potential victim would have to be already logged into the targeted service (or be fooled into doing so) and then visit the malicious site. (CVE-2007-0778) David Eckel reported that browser UI elements--such as the host name and security indicators--could be spoofed by using custom cursor images and a specially crafted style sheet. (CVE-2007-0779) Updated packages for Ubuntu 5.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.10-0ubuntu0.5.10.1.diff.gz Size/MD5: 176831 76744cf2123e13143408e37deb2311c0 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.10-0ubuntu0.5.10.1.dsc Size/MD5: 1063 eac4c86acb16ad4cf85604e5cc9f441c http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.10.orig.tar.gz Size/MD5: 44679183 d55d439c238064ddcedb8fabb6089ff2 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/mozilla-firefox-dev_1.5.dfsg+1.5.0.10-0ubuntu0.5.10.1_all.deb Size/MD5: 50314 d17e00b536378e1710c918f2b834e513 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/mozilla-firefox_1.5.dfsg+1.5.0.10-0ubuntu0.5.10.1_all.deb Size/MD5: 51208 abdc905b5e3c31c05a427defdc9035bc amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.10-0ubuntu0.5.10.1_amd64.deb Size/MD5: 3167242 01f67e394a7b569df52fd02513712811 http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.10-0ubuntu0.5.10.1_amd64.deb Size/MD5: 217230 bc5d29d293abc4665c052c0fc76aef79 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.10-0ubuntu0.5.10.1_amd64.deb Size/MD5: 83544 d7978eba50c0e82d4e3606240e38e3fa http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.10-0ubuntu0.5.10.1_amd64.deb Size/MD5: 10311286 4ea4f615c24ecceae90e7b432ddb5e4a i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.10-0ubuntu0.5.10.1_i386.deb Size/MD5: 3167298 571b158ab384827e881ab52d05c7afcb http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.10-0ubuntu0.5.10.1_i386.deb Size/MD5: 210744 0092218d208b41e1a72b1303a77b3238 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.10-0ubuntu0.5.10.1_i386.deb Size/MD5: 75946 21eda2226572b3c3143f8e4ab8145ba6 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.10-0ubuntu0.5.10.1_i386.deb Size/MD5: 8712048 66138335623748c529c3050084ceadaa powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.10-0ubuntu0.5.10.1_powerpc.deb Size/MD5: 3167330 7cdba77a564720cf82ea475eace3aef5 http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.10-0ubuntu0.5.10.1_powerpc.deb Size/MD5: 214166 630d44a2240aa9d8790de3db3e9b05ff http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.10-0ubuntu0.5.10.1_powerpc.deb Size/MD5: 79138 f4b3d39d326f77acde26161d1d66c84b http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.10-0ubuntu0.5.10.1_powerpc.deb Size/MD5: 9899346 9066e6747aa0337985a1f29f4e64cffd sparc architecture (Sun SPARC/UltraSPARC) http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.10-0ubuntu0.5.10.1_sparc.deb Size/MD5: 3167284 e6726b6ed59b5c083796ae93c6eedc64 http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.10-0ubuntu0.5.10.1_sparc.deb Size/MD5: 211730 b1f127d2df48b09c7b404f09754c71be http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.10-0ubuntu0.5.10.1_sparc.deb Size/MD5: 77516 8b430af0eadfa18b180f2637fafa7a5e http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.10-0ubuntu0.5.10.1_sparc.deb Size/MD5: 9227232 727146f6c93a565f8aabda0a1bbfc80b Updated packages for Ubuntu 6.06 LTS: Source archives: http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1.diff.gz Size/MD5: 177547 396588ea856af87e8137682342648d1d http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1.dsc Size/MD5: 1120 1625dcf8053738851d0a2978b6f0e315 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.10.orig.tar.gz Size/MD5: 44679183 d55d439c238064ddcedb8fabb6089ff2 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/mozilla-firefox-dev_1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_all.deb Size/MD5: 50410 66f8a212fb4dbf22b9c8abbb21650d2c http://security.ubuntu.com/ubuntu/pool/main/f/firefox/mozilla-firefox_1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_all.deb Size/MD5: 51296 8dc3631d49303156f74ba2e0ad72c744 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_amd64.deb Size/MD5: 47439362 0e8e0cc7f0385fc74a953610f7f41c11 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_amd64.deb Size/MD5: 2804532 a9c1cd1a790a715b6ad58785cb0eea01 http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_amd64.deb Size/MD5: 217360 f217f66f7563f80f309e065a44a08cfb http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_amd64.deb Size/MD5: 83620 0b3738208c8069b8a5449a59ae604293 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_amd64.deb Size/MD5: 9553646 c66621583e808b88663b200ad3238f7a http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_amd64.deb Size/MD5: 220158 e4f1cc5b0c2edc41cf1e4c6aa3051a33 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_amd64.deb Size/MD5: 163484 e1c0ab1f05132b717751783ccc0c22c1 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_amd64.deb Size/MD5: 245468 10d43347432618aaa140c081c20ed10f http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_amd64.deb Size/MD5: 710556 53cb8cc7e3a7d346630184980df34ff5 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_i386.deb Size/MD5: 44003676 a53682ff42f56d8dd494c96d2e3817d5 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_i386.deb Size/MD5: 2804534 281bc91e92c6224df7c77b4ce2840e1b http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_i386.deb Size/MD5: 210766 0d2d6ecfaa6ad0b629fc78159a8ba0f3 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_i386.deb Size/MD5: 75992 fc370791f6533f01409d3b369505766a http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_i386.deb Size/MD5: 8044874 cbda163790d814d785831358cb53cabc http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_i386.deb Size/MD5: 220160 2067d9432ff164e7344bd8142bb026ff http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_i386.deb Size/MD5: 148072 274cd0206aafa1a5ad02dbe279a37216 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_i386.deb Size/MD5: 245474 ed709e80de120a795d79df237b6dd421 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_i386.deb Size/MD5: 616162 766f3224ad0924ae1d47c6970a2bfd16 powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_powerpc.deb Size/MD5: 48831230 a594a826614ab062cb8e12a5e67a7115 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_powerpc.deb Size/MD5: 2804524 01b3f645267c4b3b166a6dcdebe099cf http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_powerpc.deb Size/MD5: 214208 d5563084e7a175423a1a27d98270c5a7 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_powerpc.deb Size/MD5: 79110 fa20295177cf290ee980127c3ed1ff33 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_powerpc.deb Size/MD5: 9215262 f641d7657a284bd049c75d5119512013 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_powerpc.deb Size/MD5: 220160 b684d9f82943b8698b9f369737cd318a http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_powerpc.deb Size/MD5: 160684 0919604b7e446d0a7923968ee1d0357b http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_powerpc.deb Size/MD5: 245472 d9e5620a0672e46e89a90123430e78ae http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_powerpc.deb Size/MD5: 655490 5c4225025b12a75900899859c6b616d1 sparc architecture (Sun SPARC/UltraSPARC) http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_sparc.deb Size/MD5: 45406824 2ade39640c714000138eec2c5b8691f9 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_sparc.deb Size/MD5: 2804570 0f0d35704d9f00e41c3ccce5535cb9ce http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_sparc.deb Size/MD5: 211712 f88704bb8c6671debcfae882f408c607 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_sparc.deb Size/MD5: 77564 d5b89bc054fb2c6cf0089b04c727d0a7 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_sparc.deb Size/MD5: 8571602 6eb03eae7ffb19c3afc766a016d2e723 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_sparc.deb Size/MD5: 220156 a92bbd2e0e9a936355abeaae9376264c http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_sparc.deb Size/MD5: 150554 85be23282c348b3de7bf3786aa56a5a6 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_sparc.deb Size/MD5: 245474 dd03340bae55531e40a887ad5204c774 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_sparc.deb Size/MD5: 599816 04b5ea1db1aa17f292481d913eddecb5 Updated packages for Ubuntu 6.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_2.0.0.2+0dfsg-0ubuntu0.6.10.diff.gz Size/MD5: 322293 4d8894d022833e46c25d5e6ce269ee5b http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_2.0.0.2+0dfsg-0ubuntu0.6.10.dsc Size/MD5: 1218 c6708c7c771a995e0ec709cc022ce61a http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_2.0.0.2+0dfsg.orig.tar.gz Size/MD5: 46466665 f6dad051f9995ebba310e8cd6497ae9f Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_2.0.0.2+0dfsg-0ubuntu0.6.10_all.deb Size/MD5: 236878 52d4d42a0881949da47a5f7946d2edec http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/mozilla-firefox-dev_2.0.0.2+0dfsg-0ubuntu0.6.10_all.deb Size/MD5: 55668 a379aaf8d4f67465c0e71aaa852a3b8a http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/mozilla-firefox-dom-inspector_2.0.0.2+0dfsg-0ubuntu0.6.10_all.deb Size/MD5: 55762 aea5774743b8e3bc90c8349099e9c423 http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/mozilla-firefox-gnome-support_2.0.0.2+0dfsg-0ubuntu0.6.10_all.deb Size/MD5: 55776 85b1c150c432f3fc2038a5ff3a5804ed http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/mozilla-firefox_2.0.0.2+0dfsg-0ubuntu0.6.10_all.deb Size/MD5: 56574 91e46691914551281676003e3b6589bb amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_2.0.0.2+0dfsg-0ubuntu0.6.10_amd64.deb Size/MD5: 50341952 381fc5626f047660d2bdd680824db54d http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_2.0.0.2+0dfsg-0ubuntu0.6.10_amd64.deb Size/MD5: 3120906 263ed42e4bdbcc4ba3010744cb900160 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_2.0.0.2+0dfsg-0ubuntu0.6.10_amd64.deb Size/MD5: 90062 198b64dcde3d7e1eb9bed2aeb32ce808 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_2.0.0.2+0dfsg-0ubuntu0.6.10_amd64.deb Size/MD5: 10399974 e3adef875d5fefa75c56fdf614183bdc http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox2.0.0.2+0dfsg-0ubuntu0.6.10_amd64.deb Size/MD5: 225444 9a1465fcc7386edba0fb81d00079066e http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox2.0.0.2+0dfsg-0ubuntu0.6.10_amd64.deb Size/MD5: 168168 1ccb3b97ed970c07bbdf6fb769f2e4b5 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox2.0.0.2+0dfsg-0ubuntu0.6.10_amd64.deb Size/MD5: 250820 df7c647e48cb8941a0421d5f1a5c4661 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox2.0.0.2+0dfsg-0ubuntu0.6.10_amd64.deb Size/MD5: 862110 87c01e4266d1c06d1097e5f8a58806d2 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_2.0.0.2+0dfsg-0ubuntu0.6.10_i386.deb Size/MD5: 49498816 4c61ffe25628585a91e1d90180997343 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_2.0.0.2+0dfsg-0ubuntu0.6.10_i386.deb Size/MD5: 3111488 1ec3b0bbe8564828421f381ed8b0d5fb http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_2.0.0.2+0dfsg-0ubuntu0.6.10_i386.deb Size/MD5: 83792 91c2b8d2410921fd6e19c742e9552550 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_2.0.0.2+0dfsg-0ubuntu0.6.10_i386.deb Size/MD5: 9225462 4c0d2cb608ee830bdc38b7f8d89f9a33 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox2.0.0.2+0dfsg-0ubuntu0.6.10_i386.deb Size/MD5: 225434 5293ae8d41c018d4a956555c189fd7f6 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox2.0.0.2+0dfsg-0ubuntu0.6.10_i386.deb Size/MD5: 157774 cc2c474e306b1d80db79cdba936c2ee6 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox2.0.0.2+0dfsg-0ubuntu0.6.10_i386.deb Size/MD5: 250794 42e6e643fb73ae668e569ec3d5052ea9 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox2.0.0.2+0dfsg-0ubuntu0.6.10_i386.deb Size/MD5: 785948 fefc874278ea69ba2a8b518d6826e158 powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_2.0.0.2+0dfsg-0ubuntu0.6.10_powerpc.deb Size/MD5: 52033226 d7ddf5236086638446d6ea4775c833ee http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_2.0.0.2+0dfsg-0ubuntu0.6.10_powerpc.deb Size/MD5: 3117424 0a5038c00b1997b6c7b72f16e1ca85e7 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_2.0.0.2+0dfsg-0ubuntu0.6.10_powerpc.deb Size/MD5: 85668 25e4f56d5311cc9e3a0ecaf28d6189ff http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_2.0.0.2+0dfsg-0ubuntu0.6.10_powerpc.deb Size/MD5: 10067834 1758c9d69c571c0d7bf9ec20b74e2a33 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox2.0.0.2+0dfsg-0ubuntu0.6.10_powerpc.deb Size/MD5: 225432 241089d26f31cb5e0816debe7b09a55d http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox2.0.0.2+0dfsg-0ubuntu0.6.10_powerpc.deb Size/MD5: 166830 dd932812a920701677df9b3bf9970023 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox2.0.0.2+0dfsg-0ubuntu0.6.10_powerpc.deb Size/MD5: 250798 65cddc61ad6f809004d342dcdf07c2cc http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox2.0.0.2+0dfsg-0ubuntu0.6.10_powerpc.deb Size/MD5: 860802 217ffcce7a3a99cabd9b4cff500281a8 sparc architecture (Sun SPARC/UltraSPARC) http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_2.0.0.2+0dfsg-0ubuntu0.6.10_sparc.deb Size/MD5: 49550142 e432529be2a2c6b7b327ede81d2cc1c3 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_2.0.0.2+0dfsg-0ubuntu0.6.10_sparc.deb Size/MD5: 3108058 4a2bc97252c385fe323b56b7fb03c64f http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_2.0.0.2+0dfsg-0ubuntu0.6.10_sparc.deb Size/MD5: 83484 8d24e2420d7d2188a620674aa566956d http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_2.0.0.2+0dfsg-0ubuntu0.6.10_sparc.deb Size/MD5: 9493984 e311cd75fa46ed1a47958f6883ea65aa http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox2.0.0.2+0dfsg-0ubuntu0.6.10_sparc.deb Size/MD5: 225444 fdcd4bf5450574bcbe7d3aca89dbc403 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox2.0.0.2+0dfsg-0ubuntu0.6.10_sparc.deb Size/MD5: 155678 a99e5fc7bef8c29e0e89c48288144fc6 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox2.0.0.2+0dfsg-0ubuntu0.6.10_sparc.deb Size/MD5: 250800 dd3473d37b593e55c82f5dce245bebe0 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox2.0.0.2+0dfsg-0ubuntu0.6.10_sparc.deb Size/MD5: 766616 ba23d67757ddc39888e92f6af56ec67d

Trust: 2.52

sources: NVD: CVE-2006-6077 // JVNDB: JVNDB-2006-000790 // BID: 21240 // VULHUB: VHN-22185 // PACKETSTORM: 55035 // PACKETSTORM: 54701 // PACKETSTORM: 54814 // PACKETSTORM: 57941 // PACKETSTORM: 54812 // PACKETSTORM: 54837

AFFECTED PRODUCTS

vendor:netscapemodel:navigatorscope:eqversion:8.1.2

Trust: 1.6

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.1

Trust: 1.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.4

Trust: 1.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.6

Trust: 1.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.3

Trust: 1.3

vendor:mozillamodel:firefoxscope:eqversion:1.5

Trust: 1.3

vendor:mozillamodel:firefoxscope:eqversion:2.0

Trust: 1.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.5

Trust: 1.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.2

Trust: 1.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.7

Trust: 1.3

vendor:mozillamodel:firefoxscope:lteversion:1.5.0.8

Trust: 1.0

vendor:mozillamodel:firefoxscope:lteversion:1.5.0.9

Trust: 0.8

vendor:mozillamodel:firefoxscope:lteversion:2.0.0.1

Trust: 0.8

vendor:mozillamodel:seamonkeyscope:lteversion:1.0.7

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:2.0

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:2.1

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:4.0

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:4.0 (x86-64)

Trust: 0.8

vendor:turbo linuxmodel:turbolinuxscope:eqversion:10_f

Trust: 0.8

vendor:turbo linuxmodel:turbolinux desktopscope:eqversion:10

Trust: 0.8

vendor:turbo linuxmodel:turbolinux multimediascope: - version: -

Trust: 0.8

vendor:turbo linuxmodel:turbolinux personalscope: - version: -

Trust: 0.8

vendor:turbo linuxmodel:turbolinux serverscope:eqversion:10

Trust: 0.8

vendor:turbo linuxmodel:turbolinux serverscope:eqversion:10 (x64)

Trust: 0.8

vendor:turbo linuxmodel:homescope: - version: -

Trust: 0.8

vendor:netscapemodel:netscapescope:eqversion:8.1.2 ( other may also be affected. )

Trust: 0.8

vendor:hewlett packardmodel:hp-uxscope:eqversion:11.11

Trust: 0.8

vendor:hewlett packardmodel:hp-uxscope:eqversion:11.23

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:2.1 (as)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:2.1 (es)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:2.1 (ws)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:3 (as)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:3 (es)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:3 (ws)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4 (as)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4 (es)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4 (ws)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:5 (server)

Trust: 0.8

vendor:red hatmodel:enterprise linux desktopscope:eqversion:3.0

Trust: 0.8

vendor:red hatmodel:enterprise linux desktopscope:eqversion:4.0

Trust: 0.8

vendor:red hatmodel:enterprise linux desktopscope:eqversion:5.0 (client)

Trust: 0.8

vendor:red hatmodel:linux advanced workstationscope:eqversion:2.1

Trust: 0.8

vendor:red hatmodel:rhel desktop workstationscope:eqversion:5 (client)

Trust: 0.8

vendor:red hatmodel:rhel optional productivity applicationsscope:eqversion:5 (server)

Trust: 0.8

vendor:mozillamodel:seamonkeyscope:eqversion:1.0.5

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2007.0

Trust: 0.3

vendor:debianmodel:linux ppcscope:eqversion:3.1

Trust: 0.3

vendor:hpmodel:hp-ux b.11.23scope: - version: -

Trust: 0.3

vendor:redhatmodel:enterprise linux wsscope:eqversion:2.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.9

Trust: 0.3

vendor:mozillamodel:caminoscope:eqversion:0.7.0

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:5.10

Trust: 0.3

vendor:mozillamodel:caminoscope:eqversion:1.5

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:1.0.2

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:5.10

Trust: 0.3

vendor:turbolinuxmodel:serverscope:eqversion:10.0x86

Trust: 0.3

vendor:rpathmodel:linuxscope:eqversion:1

Trust: 0.3

vendor:mandrakesoftmodel:corporate server x86 64scope:eqversion:4.0

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:1.0

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:5.10

Trust: 0.3

vendor:susemodel:linuxscope:eqversion:10.1x86

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.8

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:5.10

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:6.10

Trust: 0.3

vendor:turbolinuxmodel:personalscope: - version: -

Trust: 0.3

vendor:redhatmodel:enterprise linux esscope:eqversion:4

Trust: 0.3

vendor:redhatmodel:enterprise linux esscope:eqversion:3

Trust: 0.3

vendor:s u s emodel:novell linux desktopscope:eqversion:9

Trust: 0.3

vendor:s u s emodel:unitedlinuxscope:eqversion:1.0

Trust: 0.3

vendor:debianmodel:linux m68kscope:eqversion:3.1

Trust: 0.3

vendor:redhatmodel:advanced workstation for the itanium processorscope:eqversion:2.1

Trust: 0.3

vendor:turbolinuxmodel:fujiscope: - version: -

Trust: 0.3

vendor:mozillamodel:caminoscope:eqversion:1.0.1

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:3.1

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop clientscope:eqversion:5

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:3.1

Trust: 0.3

vendor:redhatmodel:enterprise linux ws ia64scope:eqversion:2.1

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:11.0

Trust: 0.3

vendor:debianmodel:linux hppascope:eqversion:3.1

Trust: 0.3

vendor:avayamodel:messaging storage server mm3.0scope: - version: -

Trust: 0.3

vendor:avayamodel:messaging storage serverscope: - version: -

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.6

Trust: 0.3

vendor:mozillamodel:firefox betascope:eqversion:1.52

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:neversion:1.0.8

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:2.0

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:6.10

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:6.10

Trust: 0.3

vendor:mozillamodel:caminoscope:eqversion:1.0.2

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:6.10

Trust: 0.3

vendor:redhatmodel:enterprise linux esscope:eqversion:2.1

Trust: 0.3

vendor:mozillamodel:caminoscope:eqversion:1.0

Trust: 0.3

vendor:mozillamodel:caminoscope:eqversion:0.8

Trust: 0.3

vendor:debianmodel:linuxscope:eqversion:3.1

Trust: 0.3

vendor:redhatmodel:desktopscope:eqversion:4.0

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:1.0.6

Trust: 0.3

vendor:turbolinuxmodel:homescope: - version: -

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:1.0.7

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2007.0

Trust: 0.3

vendor:susemodel:linux enterprise serverscope:eqversion:8

Trust: 0.3

vendor:s u s emodel:suse linux retail solutionscope:eqversion:8.0

Trust: 0.3

vendor:mandrakesoftmodel:corporate server x86 64scope:eqversion:3.0

Trust: 0.3

vendor:redhatmodel:enterprise linux optional productivity application serverscope:eqversion:5

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.5.0.8

Trust: 0.3

vendor:mandrakesoftmodel:corporate serverscope:eqversion:4.0

Trust: 0.3

vendor:mozillamodel:firefox betascope:eqversion:2.01

Trust: 0.3

vendor:redhatmodel:advanced workstation for the itanium processor ia64scope:eqversion:2.1

Trust: 0.3

vendor:susemodel:linuxscope:eqversion:10.0x86

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.0.10

Trust: 0.3

vendor:redhatmodel:fedora core5scope: - version: -

Trust: 0.3

vendor:mozillamodel:caminoscope:eqversion:0.8.4

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:1.0.3

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:mozillamodel:firefoxscope:neversion:2.0.0.2

Trust: 0.3

vendor:mozillamodel:firefox rc3scope:eqversion:2.0

Trust: 0.3

vendor:mozillamodel:firefox betascope:eqversion:1.51

Trust: 0.3

vendor:debianmodel:linux alphascope:eqversion:3.1

Trust: 0.3

vendor:mozillamodel:firefox rc2scope:eqversion:2.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.1

Trust: 0.3

vendor:turbolinuxmodel:desktopscope:eqversion:10.0

Trust: 0.3

vendor:turbolinuxmodel:serverscope:eqversion:10.0

Trust: 0.3

vendor:redhatmodel:enterprise linux serverscope:eqversion:5

Trust: 0.3

vendor:turbolinuxmodel:f...scope:eqversion:10

Trust: 0.3

vendor:redhatmodel:enterprise linux as ia64scope:eqversion:2.1

Trust: 0.3

vendor:susemodel:linuxscope:eqversion:9.3x86

Trust: 0.3

vendor:s u s emodel:novell linux posscope:eqversion:9

Trust: 0.3

vendor:mozillamodel:caminoscope:eqversion:0.8.3

Trust: 0.3

vendor:mozillamodel:firefoxscope:neversion:1.5.0.10

Trust: 0.3

vendor:s u s emodel:open-enterprise-serverscope:eqversion:0

Trust: 0.3

vendor:redhatmodel:enterprise linux asscope:eqversion:3

Trust: 0.3

vendor:redhatmodel:fedora core6scope: - version: -

Trust: 0.3

vendor:redhatmodel:enterprise linux asscope:eqversion:4

Trust: 0.3

vendor:hpmodel:hp-ux b.11.11scope: - version: -

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.0.4

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:3.1

Trust: 0.3

vendor:sgimodel:propack sp6scope:eqversion:3.0

Trust: 0.3

vendor:s u s emodel:suse linux school server for i386scope: - version: -

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:10.2

Trust: 0.3

vendor:redhatmodel:enterprise linux wsscope:eqversion:4

Trust: 0.3

vendor:redhatmodel:enterprise linux wsscope:eqversion:3

Trust: 0.3

vendor:mozillamodel:seamonkey devscope:eqversion:1.0

Trust: 0.3

vendor:redhatmodel:desktopscope:eqversion:3.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.0.12

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop workstation clientscope:eqversion:5

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:3.1

Trust: 0.3

vendor:mozillamodel:caminoscope:eqversion:1.0.3

Trust: 0.3

vendor:debianmodel:linux mipselscope:eqversion:3.1

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:3.1

Trust: 0.3

vendor:mandrakesoftmodel:corporate serverscope:eqversion:3.0

Trust: 0.3

vendor:s u s emodel:suse linux openexchange serverscope:eqversion:4.0

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:1.0

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:1.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.8

Trust: 0.3

vendor:turbolinuxmodel:serverscope:eqversion:10.0.0x64

Trust: 0.3

vendor:susemodel:linux enterprise serverscope:eqversion:9

Trust: 0.3

vendor:netscapemodel:browserscope:eqversion:8.1.2

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:3.1

Trust: 0.3

vendor:redhatmodel:enterprise linux es ia64scope:eqversion:2.1

Trust: 0.3

vendor:mozillamodel:caminoscope:neversion:1.5.1

Trust: 0.3

vendor:redhatmodel:enterprise linux asscope:eqversion:2.1

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:3.1

Trust: 0.3

vendor:turbolinuxmodel:multimediascope: - version: -

Trust: 0.3

sources: BID: 21240 // JVNDB: JVNDB-2006-000790 // CNNVD: CNNVD-200611-402 // NVD: CVE-2006-6077

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2006-6077
value: MEDIUM

Trust: 1.0

NVD: CVE-2006-6077
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200611-402
value: MEDIUM

Trust: 0.6

VULHUB: VHN-22185
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2006-6077
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-22185
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-22185 // JVNDB: JVNDB-2006-000790 // CNNVD: CNNVD-200611-402 // NVD: CVE-2006-6077

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2006-6077

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 57941 // CNNVD: CNNVD-200611-402

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-200611-402

CONFIGURATIONS

sources: JVNDB: JVNDB-2006-000790

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-22185

PATCH

title:HPSBUX02153url:http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c00771742

Trust: 0.8

title:HPSBUX02153url:http://h50221.www5.hp.com/upassist/itrc_japan/assist2/secbltn/HP-UX/HPSBUX02153.html

Trust: 0.8

title:seamonkey (V2.x)url:http://www.miraclelinux.com/support/update/list.php?errata_id=984

Trust: 0.8

title:firefox (V4.0)url:http://www.miraclelinux.com/support/update/list.php?errata_id=946

Trust: 0.8

title:mfsa2007-02url:http://www.mozilla.org/security/announce/2007/mfsa2007-02.html

Trust: 0.8

title:mfsa2007-02url:http://www.mozilla-japan.org/security/announce/2007/mfsa2007-02.html

Trust: 0.8

title:Top Pageurl:http://browser.netscape.com/

Trust: 0.8

title:RHSA-2007:0077url:https://rhn.redhat.com/errata/RHSA-2007-0077.html

Trust: 0.8

title:RHSA-2007:0078url:https://rhn.redhat.com/errata/RHSA-2007-0078.html

Trust: 0.8

title:RHSA-2007:0079url:https://rhn.redhat.com/errata/RHSA-2007-0079.html

Trust: 0.8

title:RHSA-2007:0097url:https://rhn.redhat.com/errata/RHSA-2007-0097.html

Trust: 0.8

title:RHSA-2007:0108 url:https://rhn.redhat.com/errata/RHSA-2007-0108.html

Trust: 0.8

title:TLSA-2007-13url:http://www.turbolinux.com/security/2007/TLSA-2007-13.txt

Trust: 0.8

title:RHSA-2007:0079url:http://www.jp.redhat.com/support/errata/RHSA/RHSA-2007-0079J.html

Trust: 0.8

title:RHSA-2007:0097url:http://www.jp.redhat.com/support/errata/RHSA/RHSA-2007-0097J.html

Trust: 0.8

title:RHSA-2007:0108 url:http://www.jp.redhat.com/support/errata/RHSA/RHSA-2007-0108J.html

Trust: 0.8

title:RHSA-2007:0077url:http://www.jp.redhat.com/support/errata/RHSA/RHSA-2007-0077J.html

Trust: 0.8

title:RHSA-2007:0078url:http://www.jp.redhat.com/support/errata/RHSA/RHSA-2007-0078J.html

Trust: 0.8

title:TLSA-2007-13url:http://www.turbolinux.co.jp/security/2007/TLSA-2007-13j.txt

Trust: 0.8

sources: JVNDB: JVNDB-2006-000790

EXTERNAL IDS

db:NVDid:CVE-2006-6077

Trust: 3.3

db:BIDid:21240

Trust: 2.8

db:SECUNIAid:23046

Trust: 2.5

db:SECTRACKid:1017271

Trust: 2.5

db:SECUNIAid:23108

Trust: 1.9

db:SECUNIAid:24238

Trust: 1.9

db:SECUNIAid:24205

Trust: 1.9

db:SECUNIAid:24395

Trust: 1.7

db:SECUNIAid:24437

Trust: 1.7

db:SECUNIAid:24457

Trust: 1.7

db:SECUNIAid:24650

Trust: 1.7

db:SECUNIAid:25588

Trust: 1.7

db:SECUNIAid:24393

Trust: 1.7

db:BIDid:22694

Trust: 1.7

db:VUPENid:ADV-2006-4662

Trust: 1.7

db:VUPENid:ADV-2007-0718

Trust: 1.7

db:XFid:30470

Trust: 1.4

db:SECUNIAid:24328

Trust: 1.1

db:SECUNIAid:24320

Trust: 1.1

db:SECUNIAid:24342

Trust: 1.1

db:SECUNIAid:24293

Trust: 1.1

db:SECUNIAid:24290

Trust: 1.1

db:SECUNIAid:24343

Trust: 1.1

db:SECUNIAid:24384

Trust: 1.1

db:SECUNIAid:24333

Trust: 1.1

db:SECUNIAid:24287

Trust: 1.1

db:JVNDBid:JVNDB-2006-000790

Trust: 0.8

db:CNNVDid:CNNVD-200611-402

Trust: 0.7

db:UBUNTUid:USN-428-1

Trust: 0.6

db:REDHATid:RHSA-2007:0078

Trust: 0.6

db:REDHATid:RHSA-2007:0079

Trust: 0.6

db:REDHATid:RHSA-2007:0097

Trust: 0.6

db:REDHATid:RHSA-2007:0108

Trust: 0.6

db:MANDRIVAid:MDKSA-2007:050

Trust: 0.6

db:BUGTRAQid:20061123 PASSWORD FLAW ALSO IN FIREFOX 1.5.08. WAS: BIG FLAW IN FIREFOX 2: PASSWORD MANAGER BUG EXPOSES PASSWORDS

Trust: 0.6

db:BUGTRAQid:20061221 RE: CRITICAL FLAW IN FIREFOX 2.0.0.1 ALLOWS TO STEAL THE USER PASSWORDS WITH A VIDEOCLIP

Trust: 0.6

db:BUGTRAQid:20061220 CRITICAL FLAW IN FIREFOX 2.0.0.1 ALLOWS TO STEAL THE USER PASSWORDS WITH A VIDEOCLIP

Trust: 0.6

db:BUGTRAQid:20061222 RE[2]: CRITICAL FLAW IN FIREFOX 2.0.0.1 ALLOWS TO STEAL THE USER PASSWORDS WITH A VIDEOCLIP

Trust: 0.6

db:BUGTRAQid:20061122 BIG FLAW IN FIREFOX 2: PASSWORD MANAGER BUG EXPOSES PASSWORDS

Trust: 0.6

db:BUGTRAQid:20070303 RPSA-2007-0040-3 FIREFOX THUNDERBIRD

Trust: 0.6

db:BUGTRAQid:20070226 RPSA-2007-0040-1 FIREFOX

Trust: 0.6

db:BUGTRAQid:20061123 RE: PASSWORD FLAW ALSO IN FIREFOX 1.5.08. WAS: BIG FLAW IN FIREFOX 2: PASSWORD MANAGER BUG EXPOSES PASSWORDS

Trust: 0.6

db:BUGTRAQid:20061123 RE: BIG FLAW IN FIREFOX 2: PASSWORD MANAGER BUG EXPOSES PASSWORDS

Trust: 0.6

db:SUSEid:SUSE-SA:2007:022

Trust: 0.6

db:GENTOOid:GLSA-200703-04

Trust: 0.6

db:GENTOOid:GLSA-200703-08

Trust: 0.6

db:SLACKWAREid:SSA:2007-066-05

Trust: 0.6

db:DEBIANid:DSA-1336

Trust: 0.6

db:PACKETSTORMid:55035

Trust: 0.2

db:PACKETSTORMid:54812

Trust: 0.2

db:PACKETSTORMid:54814

Trust: 0.2

db:PACKETSTORMid:54837

Trust: 0.2

db:PACKETSTORMid:54914

Trust: 0.1

db:VULHUBid:VHN-22185

Trust: 0.1

db:SECUNIAid:24289

Trust: 0.1

db:PACKETSTORMid:54701

Trust: 0.1

db:PACKETSTORMid:57941

Trust: 0.1

sources: VULHUB: VHN-22185 // BID: 21240 // JVNDB: JVNDB-2006-000790 // PACKETSTORM: 55035 // PACKETSTORM: 54701 // PACKETSTORM: 54814 // PACKETSTORM: 57941 // PACKETSTORM: 54812 // PACKETSTORM: 54837 // CNNVD: CNNVD-200611-402 // NVD: CVE-2006-6077

REFERENCES

url:http://www.securityfocus.com/bid/21240

Trust: 2.5

url:http://securitytracker.com/id?1017271

Trust: 2.5

url:http://www.mozilla.org/security/announce/2007/mfsa2007-02.html

Trust: 2.2

url:https://bugzilla.mozilla.org/show_bug.cgi?id=360493

Trust: 2.0

url:http://www.info-svc.com/news/11-21-2006/

Trust: 2.0

url:http://security.gentoo.org/glsa/glsa-200703-04.xml

Trust: 1.8

url:http://www.securityfocus.com/bid/22694

Trust: 1.7

url:https://issues.rpath.com/browse/rpl-1081

Trust: 1.7

url:https://issues.rpath.com/browse/rpl-1103

Trust: 1.7

url:http://www.debian.org/security/2007/dsa-1336

Trust: 1.7

url:http://www.gentoo.org/security/en/glsa/glsa-200703-08.xml

Trust: 1.7

url:http://www.mandriva.com/security/advisories?name=mdksa-2007:050

Trust: 1.7

url:http://www.info-svc.com/news/11-21-2006/rcsr1/

Trust: 1.7

url:http://rhn.redhat.com/errata/rhsa-2007-0077.html

Trust: 1.7

url:http://www.redhat.com/support/errata/rhsa-2007-0078.html

Trust: 1.7

url:http://www.redhat.com/support/errata/rhsa-2007-0079.html

Trust: 1.7

url:http://www.redhat.com/support/errata/rhsa-2007-0097.html

Trust: 1.7

url:http://www.redhat.com/support/errata/rhsa-2007-0108.html

Trust: 1.7

url:http://secunia.com/advisories/23046

Trust: 1.7

url:http://secunia.com/advisories/24395

Trust: 1.7

url:http://secunia.com/advisories/24437

Trust: 1.7

url:http://secunia.com/advisories/24457

Trust: 1.7

url:http://secunia.com/advisories/24650

Trust: 1.7

url:http://secunia.com/advisories/25588

Trust: 1.7

url:http://www.novell.com/linux/security/advisories/2007_22_mozilla.html

Trust: 1.7

url:http://www.ubuntu.com/usn/usn-428-1

Trust: 1.7

url:http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.338131

Trust: 1.6

url:http://www.frsirt.com/english/advisories/2006/4662

Trust: 1.4

url:http://xforce.iss.net/xforce/xfdb/30470

Trust: 1.4

url:http://www.securityfocus.com/archive/1/452382/100/0/threaded

Trust: 1.1

url:http://www.securityfocus.com/archive/1/452431/100/0/threaded

Trust: 1.1

url:http://www.securityfocus.com/archive/1/452440/100/0/threaded

Trust: 1.1

url:http://www.securityfocus.com/archive/1/452463/100/0/threaded

Trust: 1.1

url:http://www.securityfocus.com/archive/1/454982/100/0/threaded

Trust: 1.1

url:http://www.securityfocus.com/archive/1/455073/100/0/threaded

Trust: 1.1

url:http://www.securityfocus.com/archive/1/455148/100/0/threaded

Trust: 1.1

url:http://www.securityfocus.com/archive/1/461336/100/0/threaded

Trust: 1.1

url:http://www.securityfocus.com/archive/1/461809/100/0/threaded

Trust: 1.1

url:http://fedoranews.org/cms/node/2713

Trust: 1.1

url:http://fedoranews.org/cms/node/2728

Trust: 1.1

url:http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c00771742

Trust: 1.1

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a10031

Trust: 1.1

url:http://secunia.com/advisories/23108

Trust: 1.1

url:http://secunia.com/advisories/24205

Trust: 1.1

url:http://secunia.com/advisories/24238

Trust: 1.1

url:http://secunia.com/advisories/24287

Trust: 1.1

url:http://secunia.com/advisories/24290

Trust: 1.1

url:http://secunia.com/advisories/24293

Trust: 1.1

url:http://secunia.com/advisories/24320

Trust: 1.1

url:http://secunia.com/advisories/24328

Trust: 1.1

url:http://secunia.com/advisories/24333

Trust: 1.1

url:http://secunia.com/advisories/24342

Trust: 1.1

url:http://secunia.com/advisories/24343

Trust: 1.1

url:http://secunia.com/advisories/24384

Trust: 1.1

url:http://secunia.com/advisories/24393

Trust: 1.1

url:ftp://patches.sgi.com/support/free/security/advisories/20070202-01-p.asc

Trust: 1.1

url:ftp://patches.sgi.com/support/free/security/advisories/20070301-01-p.asc

Trust: 1.1

url:http://lists.suse.com/archive/suse-security-announce/2007-mar/0001.html

Trust: 1.1

url:http://www.vupen.com/english/advisories/2006/4662

Trust: 1.1

url:http://www.vupen.com/english/advisories/2007/0718

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/30470

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-6077

Trust: 1.1

url:http://secunia.com/advisories/24205/

Trust: 0.9

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2006-6077

Trust: 0.8

url:http://secunia.com/advisories/24238/

Trust: 0.8

url:http://secunia.com/advisories/23046/

Trust: 0.8

url:http://secunia.com/advisories/23108/

Trust: 0.8

url:http://www.securityfocus.com/archive/1/archive/1/452463/100/0/threaded

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/452440/100/0/threaded

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/452431/100/0/threaded

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/452382/100/0/threaded

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/461809/100/0/threaded

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/461336/100/0/threaded

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/455148/100/0/threaded

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/455073/100/0/threaded

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/454982/100/0/threaded

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2007/0718

Trust: 0.6

url:http://secunia.com

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2007-0775

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2007-0981

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2007-0778

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2006-6077

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2007-0995

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2007-0800

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2007-0779

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2007-0780

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2007-0777

Trust: 0.4

url:http://www.caminobrowser.org/releases/1.5.1/

Trust: 0.3

url:http://www.securitypronews.com/news/securitynews/spn-45-20061121firefoxopentonewxssflaw.html

Trust: 0.3

url:http://news.netcraft.com/archives/2006/10/27/myspace_accounts_compromised_by_phishers.html

Trust: 0.3

url:/archive/1/452382

Trust: 0.3

url:/archive/1/454982

Trust: 0.3

url:/archive/1/452463

Trust: 0.3

url:http://support.avaya.com/elmodocs2/security/asa-2007-114.htm

Trust: 0.3

url:http://www2.itrc.hp.com/service/cki/docdisplay.do?admit=-1335382922+1188588104897+28353475&docid=c00771742

Trust: 0.3

url:http://rhn.redhat.com/errata/rhsa-2007-0078.html

Trust: 0.3

url:http://rhn.redhat.com/errata/rhsa-2007-0079.html

Trust: 0.3

url:http://rhn.redhat.com/errata/rhsa-2007-0097.html

Trust: 0.3

url:http://rhn.redhat.com/errata/rhsa-2007-0108.html

Trust: 0.3

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-0780

Trust: 0.3

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-0777

Trust: 0.3

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-0775

Trust: 0.3

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-0995

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2007-0776

Trust: 0.3

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-0778

Trust: 0.3

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-0779

Trust: 0.3

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-0800

Trust: 0.3

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-0981

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2007-0008

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2007-0009

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2007-0996

Trust: 0.3

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-0776

Trust: 0.2

url:https://bugzilla.mozilla.org/show_bug.cgi?id=360493#c366

Trust: 0.2

url:http://bugs.gentoo.org.

Trust: 0.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-0801

Trust: 0.2

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.2

url:http://security.gentoo.org/

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2007-0801

Trust: 0.2

url:http://www.mozilla.org/security/announce/2007/mfsa2007-03.html

Trust: 0.2

url:http://www.mozilla.org/security/announce/2007/mfsa2007-06.html

Trust: 0.2

url:http://www.mozilla.org/security/announce/2007/mfsa2007-07.html

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2007-1092

Trust: 0.2

url:http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2007&amp;m=slackware-security.338131

Trust: 0.1

url:http://security.gentoo.org/glsa/glsa-200703-08.xml

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/software_inspector/

Trust: 0.1

url:http://secunia.com/advisories/24289/

Trust: 0.1

url:http://secunia.com/advisories/24175/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/product/5134/

Trust: 0.1

url:http://www.mozilla.org/security/announce/2007/mfsa2007-01.html

Trust: 0.1

url:http://www.mozilla.org/security/announce/2007/mfsa2007-04.html

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-1092

Trust: 0.1

url:http://www.mozilla.org/security/announce/2007/mfsa2007-05.html

Trust: 0.1

url:http://www.mandriva.com/security/

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-0009

Trust: 0.1

url:http://www.mandriva.com/security/advisories

Trust: 0.1

url:http://www.mozilla.org/security/announce/2007/mfsa2007-08.html

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-0008

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-0996

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge17_arm.deb

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-1282

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge17_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge17_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge17_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge17_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge15_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge17_mipsel.deb

Trust: 0.1

url:http://secunia.com/

Trust: 0.1

url:http://www.debian.org/security/faq

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge17_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge17_m68k.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge17_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge17_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge17_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge17_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge17_m68k.deb

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-0994

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge17_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge17_mips.deb

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-0045

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge17_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4.orig.tar.gz

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge17_s390.deb

Trust: 0.1

url:http://lists.grok.org.uk/full-disclosure-charter.html

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge17_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge17_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge17_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge15_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge17_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge17.diff.gz

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge17_m68k.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge17_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge17_i386.deb

Trust: 0.1

url:http://packages.debian.org/<pkg>

Trust: 0.1

url:http://security.debian.org/

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge17_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge17_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge17_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge17_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge17_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge17_s390.deb

Trust: 0.1

url:http://www.debian.org/security/

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge17.dsc

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge17_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge15_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge17_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge17_hppa.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox2.0.0.2+0dfsg-0ubuntu0.6.10_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox2.0.0.2+0dfsg-0ubuntu0.6.10_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.10-0ubuntu0.5.10.1_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.10-0ubuntu0.5.10.1_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.10-0ubuntu0.5.10.1_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.10-0ubuntu0.5.10.1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox2.0.0.2+0dfsg-0ubuntu0.6.10_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.10-0ubuntu0.5.10.1.diff.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.10-0ubuntu0.5.10.1_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_2.0.0.2+0dfsg-0ubuntu0.6.10_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox2.0.0.2+0dfsg-0ubuntu0.6.10_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.10-0ubuntu0.5.10.1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox2.0.0.2+0dfsg-0ubuntu0.6.10_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_2.0.0.2+0dfsg-0ubuntu0.6.10_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_2.0.0.2+0dfsg-0ubuntu0.6.10.dsc

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/mozilla-firefox_2.0.0.2+0dfsg-0ubuntu0.6.10_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/mozilla-firefox_1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_2.0.0.2+0dfsg.orig.tar.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.10-0ubuntu0.5.10.1_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox2.0.0.2+0dfsg-0ubuntu0.6.10_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.10-0ubuntu0.5.10.1_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox2.0.0.2+0dfsg-0ubuntu0.6.10_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.10-0ubuntu0.5.10.1_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/mozilla-firefox-dev_1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox2.0.0.2+0dfsg-0ubuntu0.6.10_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox2.0.0.2+0dfsg-0ubuntu0.6.10_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/mozilla-firefox-dev_2.0.0.2+0dfsg-0ubuntu0.6.10_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.10-0ubuntu0.5.10.1_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.10.orig.tar.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.10-0ubuntu0.5.10.1.dsc

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_2.0.0.2+0dfsg-0ubuntu0.6.10_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_2.0.0.2+0dfsg-0ubuntu0.6.10.diff.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_2.0.0.2+0dfsg-0ubuntu0.6.10_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1.dsc

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_2.0.0.2+0dfsg-0ubuntu0.6.10_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_2.0.0.2+0dfsg-0ubuntu0.6.10_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_2.0.0.2+0dfsg-0ubuntu0.6.10_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.10-0ubuntu0.5.10.1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_2.0.0.2+0dfsg-0ubuntu0.6.10_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox2.0.0.2+0dfsg-0ubuntu0.6.10_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_2.0.0.2+0dfsg-0ubuntu0.6.10_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_2.0.0.2+0dfsg-0ubuntu0.6.10_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_2.0.0.2+0dfsg-0ubuntu0.6.10_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_2.0.0.2+0dfsg-0ubuntu0.6.10_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_2.0.0.2+0dfsg-0ubuntu0.6.10_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_2.0.0.2+0dfsg-0ubuntu0.6.10_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/mozilla-firefox-dev_1.5.dfsg+1.5.0.10-0ubuntu0.5.10.1_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.10-0ubuntu0.5.10.1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_2.0.0.2+0dfsg-0ubuntu0.6.10_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1.diff.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/mozilla-firefox-dom-inspector_2.0.0.2+0dfsg-0ubuntu0.6.10_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox2.0.0.2+0dfsg-0ubuntu0.6.10_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.10-0ubuntu0.5.10.1_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox2.0.0.2+0dfsg-0ubuntu0.6.10_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox2.0.0.2+0dfsg-0ubuntu0.6.10_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/mozilla-firefox_1.5.dfsg+1.5.0.10-0ubuntu0.5.10.1_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/mozilla-firefox-gnome-support_2.0.0.2+0dfsg-0ubuntu0.6.10_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_2.0.0.2+0dfsg-0ubuntu0.6.10_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.10-0ubuntu0.5.10.1_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.10-0ubuntu0.5.10.1_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_2.0.0.2+0dfsg-0ubuntu0.6.10_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox2.0.0.2+0dfsg-0ubuntu0.6.10_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox2.0.0.2+0dfsg-0ubuntu0.6.10_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.10-0ubuntu0.5.10.1_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox2.0.0.2+0dfsg-0ubuntu0.6.10_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox1.5.dfsg+1.5.0.10-0ubuntu0.6.06.1_i386.deb

Trust: 0.1

sources: VULHUB: VHN-22185 // BID: 21240 // JVNDB: JVNDB-2006-000790 // PACKETSTORM: 55035 // PACKETSTORM: 54701 // PACKETSTORM: 54814 // PACKETSTORM: 57941 // PACKETSTORM: 54812 // PACKETSTORM: 54837 // CNNVD: CNNVD-200611-402 // NVD: CVE-2006-6077

CREDITS

Robert Chapin discovered this weakness.

Trust: 0.9

sources: BID: 21240 // CNNVD: CNNVD-200611-402

SOURCES

db:VULHUBid:VHN-22185
db:BIDid:21240
db:JVNDBid:JVNDB-2006-000790
db:PACKETSTORMid:55035
db:PACKETSTORMid:54701
db:PACKETSTORMid:54814
db:PACKETSTORMid:57941
db:PACKETSTORMid:54812
db:PACKETSTORMid:54837
db:CNNVDid:CNNVD-200611-402
db:NVDid:CVE-2006-6077

LAST UPDATE DATE

2025-01-14T20:33:10.145000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-22185date:2018-10-17T00:00:00
db:BIDid:21240date:2008-03-17T18:00:00
db:JVNDBid:JVNDB-2006-000790date:2007-08-01T00:00:00
db:CNNVDid:CNNVD-200611-402date:2006-11-27T00:00:00
db:NVDid:CVE-2006-6077date:2024-11-21T00:21:42.563

SOURCES RELEASE DATE

db:VULHUBid:VHN-22185date:2006-11-24T00:00:00
db:BIDid:21240date:2006-11-21T00:00:00
db:JVNDBid:JVNDB-2006-000790date:2007-04-01T00:00:00
db:PACKETSTORMid:55035date:2007-03-14T00:19:53
db:PACKETSTORMid:54701date:2007-02-27T16:54:22
db:PACKETSTORMid:54814date:2007-03-06T04:36:13
db:PACKETSTORMid:57941date:2007-07-23T04:37:49
db:PACKETSTORMid:54812date:2007-03-06T04:30:15
db:PACKETSTORMid:54837date:2007-03-06T06:26:26
db:CNNVDid:CNNVD-200611-402date:2006-11-24T00:00:00
db:NVDid:CVE-2006-6077date:2006-11-24T17:07:00