Your message dated Wed, 4 Aug 2004 02:05:42 -0500
with message-id <[EMAIL PROTECTED]>
and subject line [CAN-2004-0721] frame injection vulnerability
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 27 Jul 2004 21:48:12 +0000
>From [EMAIL PROTECTED] Tue Jul 27 14:48:12 2004
Return-path: <[EMAIL PROTECTED]>
Received: from mail.o2w.nl [213.227.141.209] (postfix)
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1BpZnw-0003EQ-00; Tue, 27 Jul 2004 14:48:12 -0700
Received: from zensunni.xinara.org (unknown [217.22.72.48])
        (using TLSv1 with cipher RC4-SHA (128/128 bits))
        (Client did not present a certificate)
        by mail.o2w.nl (Postfix) with ESMTP id 6E096358B5
        for <[EMAIL PROTECTED]>; Tue, 27 Jul 2004 23:48:07 +0200 (CEST)
Received: from ray by zensunni.xinara.org with local (Exim 4.34)
        id 1BpZno-00082Y-RC; Tue, 27 Jul 2004 23:48:04 +0200
Date: Tue, 27 Jul 2004 23:48:04 +0200
From: "J.H.M. Dassen (Ray)" <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: [CAN-2004-0721] frame injection vulnerability
Message-ID: <[EMAIL PROTECTED]>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
X-Reportbug-Version: 2.63
Organization: Ray at home
X-System: Debian GNU/Linux 3.1, kernel 2.4.27-rc3
User-Agent: Mutt/1.5.6+20040722i
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
        autolearn=no version=2.60-bugs.debian.org_2004_03_25
X-Spam-Level: 

Package: konqueror
Version: 4:3.2.2-1
Severity: grave
Tags: security upstream sid

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0721 :

+-----------------------------------------------------------------------------+
| Name        | CAN-2004-0721 (under review)                                  |
|-------------+---------------------------------------------------------------|
|             | Konqueror 3.1.3, 3.2.2, and possibly other versions does not  |
|             | properly prevent a frame in one domain from injecting content |
| Description | into a frame that belongs to another domain,m which           |
|             | facilitates web site spoofing and other attacks, aka the      |
|             | frame injection vulnerability.                                |
|-------------+---------------------------------------------------------------|
|             |   * MISC:http://secunia.com/advisories/11978                  |
| References  |   * MISC:http://secunia.com/                                  |
|             |     multiple_browsers_frame_injection_vulnerability_test/     |
|-------------+---------------------------------------------------------------|
| Phase       | Assigned (20040722)                                           |
|-------------+---------------------------------------------------------------|

-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (800, 'unstable'), (750, 'experimental'), (500, 'testing')
Architecture: i386 (i686)
Kernel: Linux 2.4.27-rc3
Locale: LANG=C, LC_CTYPE=en_US.ISO8859-1
-- 
Obsig: developing a new sig

---------------------------------------
Received: (at 261740-done) by bugs.debian.org; 4 Aug 2004 07:05:46 +0000
>From [EMAIL PROTECTED] Wed Aug 04 00:05:46 2004
Return-path: <[EMAIL PROTECTED]>
Received: from pico.surpasshosting.com [66.194.152.191] 
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1BsFqM-0005fL-00; Wed, 04 Aug 2004 00:05:46 -0700
Received: from cdm-208-180-235-136.cnro.cox-internet.com ([208.180.235.136] 
helo=calc-amd64)
        by pico.surpasshosting.com with esmtp (TLSv1:RC4-SHA:128)
        (Exim 4.34)
        id 1BsFqL-0001VS-MB
        for [EMAIL PROTECTED]; Wed, 04 Aug 2004 03:05:45 -0400
Received: from ccheney by calc-amd64 with local (Exim 4.34)
        id 1BsFqI-0005H9-KW
        for [EMAIL PROTECTED]; Wed, 04 Aug 2004 02:05:42 -0500
Date: Wed, 4 Aug 2004 02:05:42 -0500
From: Chris Cheney <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: [CAN-2004-0721] frame injection vulnerability
Message-ID: <[EMAIL PROTECTED]>
Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
        protocol="application/pgp-signature"; boundary="3VRmKSg17yJg2MZg"
Content-Disposition: inline
User-Agent: Mutt/1.5.6+20040722i
Sender: Christopher L Cheney <[EMAIL PROTECTED]>
X-AntiAbuse: This header was added to track abuse, please include it with any 
abuse report
X-AntiAbuse: Primary Hostname - pico.surpasshosting.com
X-AntiAbuse: Original Domain - bugs.debian.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - cheney.cx
X-Source: 
X-Source-Args: 
X-Source-Dir: 
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-0.2 required=4.0 tests=BAYES_40 autolearn=no 
        version=2.60-bugs.debian.org_2004_03_25
X-Spam-Level: 


--3VRmKSg17yJg2MZg
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

This bug was fixed by uploading kdebase 3.2.3-1 to sid yesterday.

Thanks,
Chris Cheney

--3VRmKSg17yJg2MZg
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (GNU/Linux)

iD8DBQFBEIrG0QZas444SvIRAgRlAJ9wc3cQ9guC4pYQTEWZgo0EG3AP/wCcDJQT
17DnQuJLt54ABVpk2LqDHPk=
=FeW+
-----END PGP SIGNATURE-----

--3VRmKSg17yJg2MZg--

Reply via email to