Bug 124397

Summary: CAN-2003-0564 Mozilla flaws (CAN-2004-0191)
Product: [Fedora] Fedora Reporter: Mark J. Cox <mjc>
Component: mozillaAssignee: Christopher Blizzard <blizzard>
Status: CLOSED CURRENTRELEASE QA Contact: Ben Levenson <benl>
Severity: medium Docs Contact:
Priority: medium    
Version: 1CC: barryn, wtogami
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2004-11-09 10:17:27 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Mark J. Cox 2004-05-26 11:07:56 UTC
NISCC testing of implementations of the S/MIME protocol uncovered a
number of bugs in NSS versions prior to 3.9. The parsing of unexpected
ASN.1 constructs within S/MIME data could cause Mozilla to crash or
consume large amounts of memory. A remote attacker could potentially
trigger these bugs by sending a carefully-crafted S/MIME message to a
victim. 

Andreas Sandblad discovered a cross-site scripting issue that affects
various versions of Mozilla. When linking to a new page it is still
possible to interact with the old page before the new page has been
successfully loaded. Any Javascript events will be invoked in the
context of the new page, making cross-site scripting possible if the
different pages belong to different domains.

        CAN-2003-0564/2004-0191 Affects: FC1
        to match http://rhn.redhat.com/errata/RHSA-2004-110.html

Comment 1 Barry K. Nathan 2004-08-26 11:16:33 UTC
Hmmm... still not fixed in FC1?

Comment 2 Mark J. Cox 2004-11-09 10:17:27 UTC
FC1 was transferred to the Fedora Legacy project.  This issue is fixed
in FC2 and FC3.