OpenPKG CVS Repository
  http://cvs.openpkg.org/
  ____________________________________________________________________________

  Server: cvs.openpkg.org                  Name:   Ralf S. Engelschall
  Root:   /e/openpkg/cvs                   Email:  [EMAIL PROTECTED]
  Module: openpkg-web                      Date:   18-Feb-2003 13:32:59
  Branch: HEAD                             Handle: 2003021812325800

  Modified files:
    openpkg-web/security    OpenPKG-SA-2003.009-w3m.txt

  Log:
    final par(1) formatting and use non-escaped URLs

  Summary:
    Revision    Changes     Path
    1.3         +11 -11     openpkg-web/security/OpenPKG-SA-2003.009-w3m.txt
  ____________________________________________________________________________

  patch -p0 <<'@@ .'
  Index: openpkg-web/security/OpenPKG-SA-2003.009-w3m.txt
  ============================================================================
  $ cvs diff -u -r1.2 -r1.3 OpenPKG-SA-2003.009-w3m.txt
  --- openpkg-web/security/OpenPKG-SA-2003.009-w3m.txt  18 Feb 2003 12:13:40 -0000     
 1.2
  +++ openpkg-web/security/OpenPKG-SA-2003.009-w3m.txt  18 Feb 2003 12:32:58 -0000     
 1.3
  @@ -20,17 +20,17 @@
   
   Description:
     According to Hironori Sakamoto, one of the w3m developers, two
  -  security vulnerabilities exist in w3m [0]. Releases before 0.3.2.1 do
  -  not escape an HTML tag in a frame, which allows remote attackers to
  -  access files or cookies [1].  Releases before 0.3.2.2 do not properly
  -  escape HTML tags in the ALT attribute of an IMG tag, which could allow
  -  remote attackers to access files or cookies [2].  The Common
  -  Vulnerabilities and Exposures (CVE) project assigned the ids
  -  CAN-2002-1335 [3] and CAN-2002-1348 [4] to these problems.  We have
  +  security vulnerabilities exist in w3m [0]. Releases before 0.3.2.1
  +  do not escape an HTML tag in a frame, which allows remote attackers
  +  to access files or cookies [1]. Releases before 0.3.2.2 do not
  +  properly escape HTML tags in the ALT attribute of an IMG tag, which
  +  could allow remote attackers to access files or cookies [2]. The
  +  Common Vulnerabilities and Exposures (CVE) project assigned the ids
  +  CAN-2002-1335 [3] and CAN-2002-1348 [4] to these problems. We have
     backported the patch to the 0.3.1 release.
   
  -  Please check whether you are affected by running "<prefix>/bin/rpm -q
  -  w3m". If you have the "w3m" package installed and its version is
  +  Please check whether you are affected by running "<prefix>/bin/rpm
  +  -q w3m". If you have the "w3m" package installed and its version is
     affected (see above), we recommend that you immediately upgrade it
     (see Solution) [5][6].
   
  @@ -56,8 +56,8 @@
   
   References:
     [0] http://w3m.sourceforge.net/
  -  [1] http://mi.med.tohoku.ac.jp/%7Esatodai/w3m-dev-en/200211.month/838.html
  -  [2] http://mi.med.tohoku.ac.jp/%7Esatodai/w3m-dev-en/200212.month/843.html
  +  [1] http://mi.med.tohoku.ac.jp/~satodai/w3m-dev-en/200211.month/838.html
  +  [2] http://mi.med.tohoku.ac.jp/~satodai/w3m-dev-en/200212.month/843.html
     [3] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1335
     [4] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1348
     [5] http://www.openpkg.org/tutorial.html#regular-source
  @@ .
______________________________________________________________________
The OpenPKG Project                                    www.openpkg.org
CVS Repository Commit List                     [EMAIL PROTECTED]

Reply via email to