No. I could always post, I just have to login evertime I make or reply to a post. I just setup Firefox to remember the Ridemonkey password. Hopefully this will solve my authentication issues.
From: US-CERT Technical Alerts [mailto:technical-alerts@us-cert.gov]
Sent: Friday, September 17, 2004 4:11 PM
To: technical-alerts@us-cert.gov
Subject: US-CERT Technical Cyber Security Alert TA04-261A -- Multiple vulnerabilities in Mozilla products
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Technical Cyber Security Alert TA04-261A
Multiple vulnerabilities in Mozilla products
Original release date: September 17, 2004
Last revised: --
Source: US-CERT
Systems Affected
Mozilla software, including the following:
* Mozilla web browser, email and newsgroup client
* Firefox web browser
* Thunderbird email client
Overview
Several vulnerabilities exist in the Mozilla web browser and derived
products, the most serious of which could allow a remote attacker to
execute arbitrary code on an affected system.
I. Description
Several vulnerabilities have been reported in the Mozilla web browser
and derived products. More detailed information is available in the
individual vulnerability notes:
VU#414240 - Mozilla Mail vulnerable to buffer overflow via
writeGroup() function in nsVCardObj.cpp
Mozilla Mail contains a stack overflow vulnerability in the display
routines for VCards. By sending an email message with a crafted VCard,
a remote attacker may be able to execute arbitrary code on the
victim's machine with the privileges of the current user. This can be
exploited in the preview mode as well.
VU#847200 - Mozilla contains integer overflows in bitmap image decoder
A vulnerability in the way Mozilla and its derived programs handle
certain bitmap images could allow a remote attacker to execute
arbitrary code on a vulnerable system.
VU#808216 - Mozilla contains heap overflow in UTF8 conversion of
hostname portion of URLs
A vulnerability in the way Mozilla and its derived programs handle
certain malformed URLs could allow a remote attacker to execute
arbitrary code on a vulnerable system.
VU#125776 - Multiple buffer overflows in Mozilla POP3 protocol handler
There are multiple buffer overflow vulnerabilities in the Mozilla POP3
protocol handler that could allow a malicious POP3 server to execute
arbitrary code on the affected system.
VU#327560 - Mozilla "send page" feature contains a buffer overflow
vulnerability
There is a buffer overflow vulnerability in the Mozilla "send page"
feature that could allow a remote attacker to execute arbitrary code.
VU#651928 - Mozilla allows arbitrary code execution via link dragging
A vulnerability affecting Mozilla web browsers may allow violation of
cross-domain scripting policies and possibly execute code originating
from a remote source.
II. Impact
These vulnerabilities could allow a remote attacker to execute
arbitrary code with the privileges of the user running the affected
application.
VU#847200 could also allow a remote attacker to crash an affected
application.
III. Solution
Upgrade to a patched version
Mozilla has released versions of the affected software that contain
patches for these issues:
* Mozilla 1.7.3
* Firefox Preview Release
* Thunderbird 0.8
Users are strongly encouraged to upgrade to one of these versions.
Mozilla has assigned credit for reporting of these issue to the
following:
* VU#414240: Georgi Guninski
* VU#847200: Gael Delalleau
* VU#808216: Gael Delalleau and Mats Palmgren
* VU#125776: Gael Delalleau
* VU#327560: Georgi Guninski
* VU#651928: Jesse Ruderman
_________________________________________________________________
Feedback can be directed to the US-CERT Technical Staff.
_________________________________________________________________
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.