Vulnerabilità: CVE-2007-0776

Heap buffer overflow nella funzione _cairo_pen_init in Mozilla Firefox 2.x prima 2.0.0.2, Thunderbird prima 1.5.0.10, e SeaMonkey prima 1.0.8 permette attaccanti remoti di eseguire codice arbitrario tramite una grande attributo ictus larghezza nell’elemento clipPath in un file in formato SVG.


http://www.securityfocus.com/bid/22694
http://www.securityfocus.com/archive/1/461336/100/0/threaded
http://www.securityfocus.com/archive/1/461809/100/0/threaded
http://www.kb.cert.org/vuls/id/551436
http://www.mozilla.org/security/announce/2007/mfsa2007-01.html
https://issues.rpath.com/browse/RPL-1081
http://fedoranews.org/cms/node/2713
http://fedoranews.org/cms/node/2728
http://fedoranews.org/cms/node/2747
http://fedoranews.org/cms/node/2749
http://security.gentoo.org/glsa/glsa-200703-04.xml
http://www.gentoo.org/security/en/glsa/glsa-200703-08.xml
http://security.gentoo.org/glsa/glsa-200703-18.xml
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742
http://www.mandriva.com/security/advisories?name=MDKSA-2007:052
https://bugzilla.mozilla.org/show_bug.cgi?id=360645
http://www.osvdb.org/32113
http://www.securitytracker.com/id?1017698
http://secunia.com/advisories/24205
http://secunia.com/advisories/24238
http://secunia.com/advisories/24252
http://secunia.com/advisories/24293
http://secunia.com/advisories/24320
http://secunia.com/advisories/24328
http://secunia.com/advisories/24333
http://secunia.com/advisories/24384
http://secunia.com/advisories/24389
http://secunia.com/advisories/24393
http://secunia.com/advisories/24406
http://secunia.com/advisories/24410
http://secunia.com/advisories/24437
http://secunia.com/advisories/24455
http://secunia.com/advisories/24456
http://secunia.com/advisories/24457
http://secunia.com/advisories/24522
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.374851
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.363947
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.338131
http://lists.suse.com/archive/suse-security-announce/2007-Mar/0001.html
http://www.novell.com/linux/security/advisories/2007_22_mozilla.html
http://www.ubuntu.com/usn/usn-428-1
http://www.ubuntu.com/usn/usn-431-1
http://www.vupen.com/english/advisories/2007/0718
http://www.vupen.com/english/advisories/2007/0719
http://www.vupen.com/english/advisories/2008/0083
https://exchange.xforce.ibmcloud.com/vulnerabilities/32698
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0776


E' possibile lasciare un commento come utenti registrati al sito, accedendo tramite social, account wordpress oppure come utenti anonimi. Nel caso in cui si desideri lasciare un commento come utenti anonimi si verrà avvisati via email di un'eventuale risposta solo se si inserisce l'indirizzo email (facoltativo). L'inserimento di qualsiasi dato nei campi dei commenti è totalmente facoltativo. Chiunque decida di inserire un qualsiasi dato accetta il trattamento di questi ultimi per i fini inerenti al servizio ovvero la risposta al commento e le comunicazioni strettamente necessarie.


Rispondi