Your message dated Wed, 23 Mar 2005 13:32:24 -0500 with message-id <[EMAIL PROTECTED]> and subject line Bug#294274: fixed in mozilla 2:1.7.6-1 has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -------------------------------------- Received: (at submit) by bugs.debian.org; 8 Feb 2005 21:06:40 +0000 >From [EMAIL PROTECTED] Tue Feb 08 13:06:38 2005 Return-path: <[EMAIL PROTECTED]> Received: from kitenet.net [64.62.161.42] (postfix) by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1CycZ8-0000hQ-00; Tue, 08 Feb 2005 13:06:34 -0800 Received: from dragon.kitenet.net (unknown [66.168.94.144]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client CN "Joey Hess", Issuer "Joey Hess" (verified OK)) by kitenet.net (Postfix) with ESMTP id B1E5E17F17 for <[EMAIL PROTECTED]>; Tue, 8 Feb 2005 21:06:13 +0000 (GMT) Received: by dragon.kitenet.net (Postfix, from userid 1000) id 904056E20E; Tue, 8 Feb 2005 16:08:03 -0500 (EST) Date: Tue, 8 Feb 2005 16:08:03 -0500 From: Joey Hess <[EMAIL PROTECTED]> To: Debian Bug Tracking System <[EMAIL PROTECTED]> Subject: IDN support allows domain name spoofing Message-ID: <[EMAIL PROTECTED]> Mime-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="zYM0uCDKw75PZbzx" Content-Disposition: inline X-Reportbug-Version: 3.7.1 User-Agent: Mutt/1.5.6+20040907i Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: --zYM0uCDKw75PZbzx Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Package: mozilla-browser Version: 2:1.7.5-1 Severity: normal Tags: security Epiphany and other browsers which support IDN are vulnerable to domain spoofing via homograph characters in domain names. Please see http://lists.netsys.com/pipermail/full-disclosure/2005-February/031459.html for details, and note that this is CAN-2005-0233. This bug is filed upstream: https://bugzilla.mozilla.org/show_bug.cgi?id=3D281381 Note: I have not marked this bug as releae critical, because it's not clear to me if spoofing attacks qualify. --=20 see shy jo --zYM0uCDKw75PZbzx Content-Type: application/pgp-signature; name="signature.asc" Content-Description: Digital signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.0 (GNU/Linux) iD8DBQFCCSozd8HHehbQuO8RAk7RAKCzl1gvBjoMAdIwOJYbFJCv/ajoYACdHAi9 ZRyMwPcMCttI8VKdnRPWPO0= =APHS -----END PGP SIGNATURE----- --zYM0uCDKw75PZbzx-- --------------------------------------- Received: (at 294274-close) by bugs.debian.org; 23 Mar 2005 18:55:09 +0000 >From [EMAIL PROTECTED] Wed Mar 23 10:55:08 2005 Return-path: <[EMAIL PROTECTED]> Received: from newraff.debian.org [208.185.25.31] (mail) by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1DEB0W-0004p1-00; Wed, 23 Mar 2005 10:55:08 -0800 Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian)) id 1DEAeW-00004v-00; Wed, 23 Mar 2005 13:32:24 -0500 From: Takuo KITAME <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] X-Katie: $Revision: 1.55 $ Subject: Bug#294274: fixed in mozilla 2:1.7.6-1 Message-Id: <[EMAIL PROTECTED]> Sender: Archive Administrator <[EMAIL PROTECTED]> Date: Wed, 23 Mar 2005 13:32:24 -0500 Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: X-CrossAssassin-Score: 9 Source: mozilla Source-Version: 2:1.7.6-1 We believe that the bug you reported is fixed in the latest version of mozilla, which is due to be installed in the Debian FTP archive: libnspr-dev_1.7.6-1_i386.deb to pool/main/m/mozilla/libnspr-dev_1.7.6-1_i386.deb libnspr4_1.7.6-1_i386.deb to pool/main/m/mozilla/libnspr4_1.7.6-1_i386.deb libnss-dev_1.7.6-1_i386.deb to pool/main/m/mozilla/libnss-dev_1.7.6-1_i386.deb libnss3_1.7.6-1_i386.deb to pool/main/m/mozilla/libnss3_1.7.6-1_i386.deb mozilla-browser_1.7.6-1_i386.deb to pool/main/m/mozilla/mozilla-browser_1.7.6-1_i386.deb mozilla-calendar_1.7.6-1_i386.deb to pool/main/m/mozilla/mozilla-calendar_1.7.6-1_i386.deb mozilla-chatzilla_1.7.6-1_i386.deb to pool/main/m/mozilla/mozilla-chatzilla_1.7.6-1_i386.deb mozilla-dev_1.7.6-1_i386.deb to pool/main/m/mozilla/mozilla-dev_1.7.6-1_i386.deb mozilla-dom-inspector_1.7.6-1_i386.deb to pool/main/m/mozilla/mozilla-dom-inspector_1.7.6-1_i386.deb mozilla-js-debugger_1.7.6-1_i386.deb to pool/main/m/mozilla/mozilla-js-debugger_1.7.6-1_i386.deb mozilla-mailnews_1.7.6-1_i386.deb to pool/main/m/mozilla/mozilla-mailnews_1.7.6-1_i386.deb mozilla-psm_1.7.6-1_i386.deb to pool/main/m/mozilla/mozilla-psm_1.7.6-1_i386.deb mozilla_1.7.6-1.diff.gz to pool/main/m/mozilla/mozilla_1.7.6-1.diff.gz mozilla_1.7.6-1.dsc to pool/main/m/mozilla/mozilla_1.7.6-1.dsc mozilla_1.7.6-1_i386.deb to pool/main/m/mozilla/mozilla_1.7.6-1_i386.deb mozilla_1.7.6.orig.tar.gz to pool/main/m/mozilla/mozilla_1.7.6.orig.tar.gz A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Takuo KITAME <[EMAIL PROTECTED]> (supplier of updated mozilla package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Thu, 24 Mar 2005 01:34:42 +0900 Source: mozilla Binary: mozilla mozilla-calendar mozilla-dom-inspector libnspr4 mozilla-js-debugger mozilla-browser libnss3 libnspr-dev mozilla-chatzilla mozilla-psm mozilla-mailnews libnss-dev mozilla-dev Architecture: source i386 Version: 2:1.7.6-1 Distribution: unstable Urgency: low Maintainer: Takuo KITAME <[EMAIL PROTECTED]> Changed-By: Takuo KITAME <[EMAIL PROTECTED]> Description: libnspr-dev - Netscape Portable Runtime library - development files libnspr4 - Netscape Portable Runtime Library libnss-dev - Network Security Service Libraries - development libnss3 - Network Security Service Libraries - runtime mozilla - The Mozilla Internet application suite - meta package mozilla-browser - The Mozilla Internet application suite - core and browser mozilla-calendar - Todo organizer,calendar and reminder,integrated with Mozilla suit mozilla-chatzilla - Mozilla Web Browser - irc client mozilla-dev - The Mozilla Internet application suite - development files mozilla-dom-inspector - A tool for inspecting the DOM of pages in Mozilla. mozilla-js-debugger - JavaScript debugger for use with Mozilla mozilla-mailnews - The Mozilla Internet application suite - mail and news support mozilla-psm - The Mozilla Internet application suite - Personal Security Manage Closes: 215394 265928 270783 277504 279200 285611 290451 290863 293663 294274 297216 297618 297619 297620 300090 300978 Changes: mozilla (2:1.7.6-1) unstable; urgency=low . * New upstream release * fix some security issues. - CAN-2005-0233: IDN support allows domainname spooing (closes: #294274) - CAN-2005-0592: Heap-based bufer over flow (closes: #297619) - CAN-2004-1156: secunia window injection vulnerability (closes: #293663) - MFSA-2005-18: Mozilla Firefox and Mozilla Browser Out Of Memory Heap Corruption Design Error - CAN-2005-0593: SSL "secure site" indicator spoofing (closes: #297618) - CAN-2005-0588: does not restrict xsl:include and xsl:import tags in XSLT stylesheets to the current domain. - CAN-2005-0587: allows remote malicious web sites to overwrite arbitrary files by tricking the user into downloading a .LNK (link) file twice, which overwrites the file that was referenced in the first .LNK file. - CAN-2005-0586: allows remote malicious web sites to spoof the extensions of files to download via the Content-Disposition header - CAN-2005-0585: truncates long sub-domains or paths for display, which may allow remote malicious web sites to spoof legitimate sites and facilitate phishing attacks. - CAN-2005-0584: when displaying the HTTP Authentication dialog, do not change the focus to the tab that generated the prompt, which could facilitate spoofing and phishing attacks. (closes: #297620) * change binary name to mozilla-suite rom mozilla-VERSION (closes: #285611,#277504,#215394) * applied over the spot patch (closes: #290863) * added debian/po/it.po (closes: #279200) * added debian/po/nl.po (closes: #270783) * update debian/po/fi.po (closes: #265928) * remove run-mozilla.sh (closes: #297216, #300090) * update xprint dependency (closes: #300978) * use readlink(1) instead of perl's. (closes: #290451) Files: 03f9b7cf7250d2bfa894fd264306b6ab 1111 web optional mozilla_1.7.6-1.dsc 800f8d3877193a5d786d9ce4e3d1e400 30587697 web optional mozilla_1.7.6.orig.tar.gz 15b76e937aa59308670c5afbaba7fd1f 303435 web optional mozilla_1.7.6-1.diff.gz 70e9de0a98277fb0899227bebba665ab 1028 web optional mozilla_1.7.6-1_i386.deb 97f99f437701e242220fa9de5a7c3bdf 10280282 web optional mozilla-browser_1.7.6-1_i386.deb 8fc77a77186e461c480b8455c9272281 3343978 devel optional mozilla-dev_1.7.6-1_i386.deb 0d6d79f4b70dd7d3cd58ad69829c4d91 1811052 mail optional mozilla-mailnews_1.7.6-1_i386.deb 7881b2b481782364b1cb8a30cc454cf5 158318 net optional mozilla-chatzilla_1.7.6-1_i386.deb 68e7c2c1c5ae79b1ae7bd0efbb75467e 192294 web optional mozilla-psm_1.7.6-1_i386.deb 6b746476168989818eddd61e2d926acb 116194 web optional mozilla-dom-inspector_1.7.6-1_i386.deb f1925702d98df3ae51f28abe8f72c9b8 204124 devel optional mozilla-js-debugger_1.7.6-1_i386.deb 5684fcb1e872312398fa3572157d8ffd 403270 misc optional mozilla-calendar_1.7.6-1_i386.deb db7397110795bc26f3ff049ad5cb0b26 129784 libs optional libnspr4_1.7.6-1_i386.deb 4df0474571e6206ffeb96f1847857598 168060 libdevel optional libnspr-dev_1.7.6-1_i386.deb 76106353331539e79d10e133498699d4 653648 libs optional libnss3_1.7.6-1_i386.deb 3093fc70ca1754bf1506cc7c000b5106 184920 libdevel optional libnss-dev_1.7.6-1_i386.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.0 (GNU/Linux) iD8DBQFCQbO+U+WZW1FVMwoRAnxyAJ92vH1aYBcYDcyKE3UaKjHUGTT7fACfaXuH hsFMT2ZhkOqrng0p3NOEBu0= =zlfK -----END PGP SIGNATURE----- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]