mozilla -- insecure temporary directory vulnerability
Description:
A Mozilla Foundation Security Advisory reports:
A predictable name is used for the plugin temporary
directory. A malicious local user could symlink this to
the victim's home directory and wait for the victim to run
Firefox. When Firefox shuts down the victim's directory
would be erased.
References:
Affects:
- firefox <1.0.1,1
- mozilla <1.7.6,2
- linux-mozilla <1.7.6
- linux-mozilla-devel <1.7.6
- netscape7 >=0
- de-linux-mozillafirebird >=0
- el-linux-mozillafirebird >=0
- ja-linux-mozillafirebird-gtk1 >=0
- ja-mozillafirebird-gtk2 >=0
- linux-mozillafirebird >=0
- ru-linux-mozillafirebird >=0
- zhCN-linux-mozillafirebird >=0
- zhTW-linux-mozillafirebird >=0
- de-linux-netscape >=0
- de-netscape7 >=0
- fr-linux-netscape >=0
- fr-netscape7 >=0
- ja-linux-netscape >=0
- ja-netscape7 >=0
- linux-netscape >=0
- linux-phoenix >=0
- mozilla+ipv6 >=0
- mozilla-embedded >=0
- mozilla-firebird >=0
- mozilla-gtk1 >=0
- mozilla-gtk2 >=0
- mozilla-gtk >=0
- mozilla-thunderbird >=0
- phoenix >=0
- pt_BR-netscape7 >=0
portaudit: mozilla -- insecure temporary directory vulnerability
Disclaimer: The data contained on this page is derived from the VuXML document,
please refer to the the original document for copyright information. The author of
portaudit makes no claim of authorship or ownership of any of the information contained herein.
If you have found a vulnerability in a FreeBSD port not listed in the
database, please contact the
FreeBSD Security Officer. Refer to
"FreeBSD Security
Information" for more information.
Oliver Eikemeier <eik@FreeBSD.org>