[Owasp-cuiaba] [Full-disclosure] [ MDVSA-2012:081 ] firefox :p

Kembolle Amilkar haxorcoding em gmail.com
Quinta Maio 24 15:59:31 UTC 2012


encaminhando..

*Att. Kembolle Amilkar *
#/[ kembolle.com.br <http://www.kembolle.com.br> ] - Consultoria Segurança
da Informação.
#/ [ samurayconsultoria.com.br ] - Chief Security Officer - Samuray
Consultoria.
#/ Systems Analyst | Esp. Information Security | Computer Forensic Expert |
#/ Owasp Chapter Lider Cuiabá - https://www.owasp.org/index.php/Cuiaba
#/ Mobile: [65] 9979-2925  && contato[at]kembolle.com.br.
**



2012/5/24 <security em mandriva.com>

> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
>  _______________________________________________________________________
>
>  Mandriva Linux Security Advisory                         MDVSA-2012:081
>  http://www.mandriva.com/security/
>  _______________________________________________________________________
>
>  Package : firefox
>  Date    : May 24, 2012
>  Affected: Enterprise Server 5.0
>  _______________________________________________________________________
>
>  Problem Description:
>
>  Security issues were identified and fixed in mozilla firefox:
>
>  Mozilla developers identified and fixed several memory safety
>  bugs in the browser engine used in Firefox and other Mozilla-based
>  products. Some of these bugs showed evidence of memory corruption
>  under certain circumstances, and we presume that with enough effort
>  at least some of these could be exploited to run arbitrary code
>  (CVE-2012-0468, CVE-2012-0467).
>
>  Using the Address Sanitizer tool, security researcher Aki Helin from
>  OUSPG found that IDBKeyRange of indexedDB remains in the XPConnect
>  hashtable instead of being unlinked before being destroyed. When
>  it is destroyed, this causes a use-after-free, which is potentially
>  exploitable (CVE-2012-0469).
>
>  Using the Address Sanitizer tool, security researcher Atte Kettunen
>  from OUSPG found a heap corruption in gfxImageSurface which allows for
>  invalid frees and possible remote code execution. This happens due
>  to float error, resulting from graphics values being passed through
>  different number systems (CVE-2012-0470).
>
>  Anne van Kesteren of Opera Software found a multi-octet encoding
>  issue where certain octets will destroy the following octets in the
>  processing of some multibyte character sets. This can leave users
>  vulnerable to cross-site scripting (XSS) attacks on maliciously
>  crafted web pages (CVE-2012-0471).
>
>  Security research firm iDefense reported that researcher wushi of
>  team509 discovered a memory corruption on Windows Vista and Windows
>  7 systems with hardware acceleration disabled or using incompatible
>  video drivers. This is created by using cairo-dwrite to attempt to
>  render fonts on an unsupported code path. This corruption causes a
>  potentially exploitable crash on affected systems (CVE-2012-0472).
>
>  Mozilla community member Matias Juntunen discovered an error in
>  WebGLBuffer where FindMaxElementInSubArray receives wrong template
>  arguments from FindMaxUshortElement. This bug causes maximum index
>  to be computed incorrectly within WebGL.drawElements, allowing the
>  reading of illegal video memory (CVE-2012-0473).
>
>  Security researchers Jordi Chancel and Eddy Bordi reported that they
>  could short-circuit page loads to show the address of a different
>  site than what is loaded in the window in the addressbar. Security
>  researcher Chris McGowen independently reported the same flaw, and
>  further demonstrated that this could lead to loading scripts from
>  the attacker's site, leaving users vulnerable to cross-site scripting
>  (XSS) attacks (CVE-2012-0474).
>
>  Security researcher Masato Kinugawa found that during the decoding
>  of ISO-2022-KR and ISO-2022-CN character sets, characters near 1024
>  bytes are treated incorrectly, either doubling or deleting bytes. On
>  certain pages it might be possible for an attacker to pad the output of
>  the page such that these errors fall in the right place to affect the
>  structure of the page, allowing for cross-site script (XSS) injection
>  (CVE-2012-0477).
>
>  Mozilla community member Ms2ger found an image rendering issue
>  with WebGL when texImage2D uses use JSVAL_TO_OBJECT on arbitrary
>  objects. This can lead to a crash on a maliciously crafted web
>  page. While there is no evidence that this is directly exploitable,
>  there is a possibility of remote code execution (CVE-2012-0478).
>
>  Mateusz Jurczyk of the Google Security Team discovered an off-by-one
>  error in the OpenType Sanitizer using the Address Sanitizer tool. This
>  can lead to an out-of-bounds read and execution of an uninitialized
>  function pointer during parsing and possible remote code execution
>  (CVE-2011-3062).
>
>  Security researcher Jeroen van der Gun reported that if RSS or Atom
>  XML invalid content is loaded over HTTPS, the addressbar updates
>  to display the new location of the loaded resource, including SSL
>  indicators, while the main window still displays the previously loaded
>  content. This allows for phishing attacks where a malicious page can
>  spoof the identify of another seemingly secure site (CVE-2012-0479).
>
>  Additionally the OpenJDK java plugin (icedtea-web) has been upgraded
>  to the 1.1.5 version which has better support for firefox 10.x+.
>
>  The mozilla firefox packages has been upgraded to the latest version
>  (10.0.4) which is unaffected by these security flaws.
>  _______________________________________________________________________
>
>  References:
>
>  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0468
>  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0467
>  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0469
>  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0470
>  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0471
>  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0472
>  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0473
>  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0474
>  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0477
>  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0478
>  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3062
>  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0479
>  http://www.mozilla.org/security/announce/2012/mfsa2012-20.html
>  http://www.mozilla.org/security/announce/2012/mfsa2012-22.html
>  http://www.mozilla.org/security/announce/2012/mfsa2012-23.html
>  http://www.mozilla.org/security/announce/2012/mfsa2012-24.html
>  http://www.mozilla.org/security/announce/2012/mfsa2012-25.html
>  http://www.mozilla.org/security/announce/2012/mfsa2012-26.html
>  http://www.mozilla.org/security/announce/2012/mfsa2012-27.html
>  http://www.mozilla.org/security/announce/2012/mfsa2012-29.html
>  http://www.mozilla.org/security/announce/2012/mfsa2012-30.html
>  http://www.mozilla.org/security/announce/2012/mfsa2012-31.html
>  http://www.mozilla.org/security/announce/2012/mfsa2012-33.html
>  _______________________________________________________________________
>
>  Updated Packages:
>
>  Mandriva Enterprise Server 5:
>  193b2b0679d513564e53284307f2102b
>  mes5/i586/firefox-10.0.4-0.1mdvmes5.2.i586.rpm
>  6b2a368e5f7dd9d8b4c82d1a2cd14d57
>  mes5/i586/firefox-af-10.0.4-0.1mdvmes5.2.i586.rpm
>  fed44fb471b0c182dab2a9d83e1d5a8a
>  mes5/i586/firefox-ar-10.0.4-0.1mdvmes5.2.i586.rpm
>  e934b53194435db948ddf167feeabff2
>  mes5/i586/firefox-be-10.0.4-0.1mdvmes5.2.i586.rpm
>  1029a3368c2e03c6e5fca29d919b95b1
>  mes5/i586/firefox-bg-10.0.4-0.1mdvmes5.2.i586.rpm
>  0acffa710c2ffd613248a5fea527a2c6
>  mes5/i586/firefox-bn-10.0.4-0.1mdvmes5.2.i586.rpm
>  fe36d262aa3837c06daf4c6d69b84108
>  mes5/i586/firefox-ca-10.0.4-0.1mdvmes5.2.i586.rpm
>  c6d115880df0d6c1587797c31fba8879
>  mes5/i586/firefox-cs-10.0.4-0.1mdvmes5.2.i586.rpm
>  9f581bb0b11552d002b3c399b7531968
>  mes5/i586/firefox-cy-10.0.4-0.1mdvmes5.2.i586.rpm
>  51ed7ecfcf67292847315994a746bbf3
>  mes5/i586/firefox-da-10.0.4-0.1mdvmes5.2.i586.rpm
>  94d85793d298a3eb8c75cebd898fbd6c
>  mes5/i586/firefox-de-10.0.4-0.1mdvmes5.2.i586.rpm
>  3a880a7e39bac5a9b9fc160d51046b19
>  mes5/i586/firefox-devel-10.0.4-0.1mdvmes5.2.i586.rpm
>  1b604c75e4fd7e302ed2627a8147e7c1
>  mes5/i586/firefox-el-10.0.4-0.1mdvmes5.2.i586.rpm
>  efe949479fa2eaeb7a5be876caaa5049
>  mes5/i586/firefox-en_GB-10.0.4-0.1mdvmes5.2.i586.rpm
>  4c787581a75a5a8a5a14b4a3a20280f2
>  mes5/i586/firefox-eo-10.0.4-0.1mdvmes5.2.i586.rpm
>  646f56e3b288de9f1e39947f05969014
>  mes5/i586/firefox-es_AR-10.0.4-0.1mdvmes5.2.i586.rpm
>  3185f5ea5ba41dc9251617ff103841ab
>  mes5/i586/firefox-es_ES-10.0.4-0.1mdvmes5.2.i586.rpm
>  241655d4834edc69928640717ecedd60
>  mes5/i586/firefox-et-10.0.4-0.1mdvmes5.2.i586.rpm
>  7c42f3b9eda430e9cc71bcec89a4a988
>  mes5/i586/firefox-eu-10.0.4-0.1mdvmes5.2.i586.rpm
>  808b3c7dcd7e3fdd638dcaf85ea92710
>  mes5/i586/firefox-fi-10.0.4-0.1mdvmes5.2.i586.rpm
>  4ca2cec95c0eb52b8cf0ddbc417d6fb7
>  mes5/i586/firefox-fr-10.0.4-0.1mdvmes5.2.i586.rpm
>  7e466b6cdee00044853b5d904de982b0
>  mes5/i586/firefox-fy-10.0.4-0.1mdvmes5.2.i586.rpm
>  2386807b47816840462a48f4307b73da
>  mes5/i586/firefox-ga_IE-10.0.4-0.1mdvmes5.2.i586.rpm
>  39d9141bb98506677c406b350195571a
>  mes5/i586/firefox-gl-10.0.4-0.1mdvmes5.2.i586.rpm
>  6d15fbe0824957df7248eb387c3703aa
>  mes5/i586/firefox-gu_IN-10.0.4-0.1mdvmes5.2.i586.rpm
>  aae9db3b4a6b0fb4eb590454368aa7fc
>  mes5/i586/firefox-he-10.0.4-0.1mdvmes5.2.i586.rpm
>  f196eab619bc51ef64f97bb620814253
>  mes5/i586/firefox-hi-10.0.4-0.1mdvmes5.2.i586.rpm
>  f069a4806971ea41b48d2af769d93132
>  mes5/i586/firefox-hu-10.0.4-0.1mdvmes5.2.i586.rpm
>  a3beac338a793a0a287fc1862462d068
>  mes5/i586/firefox-id-10.0.4-0.1mdvmes5.2.i586.rpm
>  6123e1459dc5b0bbe63b674d33995693
>  mes5/i586/firefox-is-10.0.4-0.1mdvmes5.2.i586.rpm
>  d73c85d5eefe09d6a3e91d0ccdb8d622
>  mes5/i586/firefox-it-10.0.4-0.1mdvmes5.2.i586.rpm
>  aaf9b48f8716e095ec7df1d19cad69c7
>  mes5/i586/firefox-ja-10.0.4-0.1mdvmes5.2.i586.rpm
>  cfa80f3ff847df2992fbb6405454e7ca
>  mes5/i586/firefox-ka-10.0.4-0.1mdvmes5.2.i586.rpm
>  4fca93a01e923f4eb358aefc692cad67
>  mes5/i586/firefox-kn-10.0.4-0.1mdvmes5.2.i586.rpm
>  6ee5808baeff6813bd76e33e4f18d28e
>  mes5/i586/firefox-ko-10.0.4-0.1mdvmes5.2.i586.rpm
>  0effcc290c9c326724ccfa28e7139ada
>  mes5/i586/firefox-ku-10.0.4-0.1mdvmes5.2.i586.rpm
>  cc7675d4172f14c8940b49bbf61bb18e
>  mes5/i586/firefox-lt-10.0.4-0.1mdvmes5.2.i586.rpm
>  a60078f103dfd3075d95097a31d62bd5
>  mes5/i586/firefox-lv-10.0.4-0.1mdvmes5.2.i586.rpm
>  2e2046d3e59ea8be6fa5eb4b45addb72
>  mes5/i586/firefox-mk-10.0.4-0.1mdvmes5.2.i586.rpm
>  f7ffed193940d943ae9631a6e8692eef
>  mes5/i586/firefox-mr-10.0.4-0.1mdvmes5.2.i586.rpm
>  a9a6d3315312d9a6f4d5909e1b906b8f
>  mes5/i586/firefox-nb_NO-10.0.4-0.1mdvmes5.2.i586.rpm
>  b632687cb2e381baba9c02421aadadfe
>  mes5/i586/firefox-nl-10.0.4-0.1mdvmes5.2.i586.rpm
>  a9d63c103db37373a86e0e5648894987
>  mes5/i586/firefox-nn_NO-10.0.4-0.1mdvmes5.2.i586.rpm
>  84f88308a0db841160a2a0dd18aee4a1
>  mes5/i586/firefox-oc-10.0.4-0.1mdvmes5.2.i586.rpm
>  4dcc39e7525ccba672726c7f3cae8168
>  mes5/i586/firefox-pa_IN-10.0.4-0.1mdvmes5.2.i586.rpm
>  052c9e85efea6f6ed62ea53f5472e53b
>  mes5/i586/firefox-pl-10.0.4-0.1mdvmes5.2.i586.rpm
>  77c518708e77a54817935af188e55477
>  mes5/i586/firefox-pt_BR-10.0.4-0.1mdvmes5.2.i586.rpm
>  99f055ac36c6d7fe56b9f3a6009d08da
>  mes5/i586/firefox-pt_PT-10.0.4-0.1mdvmes5.2.i586.rpm
>  a442c67bf58bb90b96a54a234f24bd72
>  mes5/i586/firefox-ro-10.0.4-0.1mdvmes5.2.i586.rpm
>  164d1c5a9a15abf1063634159deba9f2
>  mes5/i586/firefox-ru-10.0.4-0.1mdvmes5.2.i586.rpm
>  32df9fd644919935a2bfbcc7421cd204
>  mes5/i586/firefox-si-10.0.4-0.1mdvmes5.2.i586.rpm
>  d80be6f7b223a2deaae25f6dec1b6370
>  mes5/i586/firefox-sk-10.0.4-0.1mdvmes5.2.i586.rpm
>  f4b629c6a8e892cb8571219f13879783
>  mes5/i586/firefox-sl-10.0.4-0.1mdvmes5.2.i586.rpm
>  cc1b2f9cf959bfbc96e5856d89b5adb8
>  mes5/i586/firefox-sq-10.0.4-0.1mdvmes5.2.i586.rpm
>  237d759dc2018d4b18e3d475709c8041
>  mes5/i586/firefox-sr-10.0.4-0.1mdvmes5.2.i586.rpm
>  7d79a7670c7833b7c2334f8ba55db0d4
>  mes5/i586/firefox-sv_SE-10.0.4-0.1mdvmes5.2.i586.rpm
>  d0ee70491cc8125fbbdf4256a635bd59
>  mes5/i586/firefox-te-10.0.4-0.1mdvmes5.2.i586.rpm
>  db978375a4a46f4d4d7c9e352a0a72cb
>  mes5/i586/firefox-th-10.0.4-0.1mdvmes5.2.i586.rpm
>  d68633a0b80316f2893b15ad9c6b8fe7
>  mes5/i586/firefox-tr-10.0.4-0.1mdvmes5.2.i586.rpm
>  0a8b368dd05e641df6a2c78098a180e1
>  mes5/i586/firefox-uk-10.0.4-0.1mdvmes5.2.i586.rpm
>  66658c77030de0388b00260f8c344f47
>  mes5/i586/firefox-zh_CN-10.0.4-0.1mdvmes5.2.i586.rpm
>  c188b5e42b350bbd55493bdcde83860c
>  mes5/i586/firefox-zh_TW-10.0.4-0.1mdvmes5.2.i586.rpm
>  30bfd413c74c33b9015d15cd3d9ada2b
>  mes5/i586/icedtea-web-1.1.5-0.1mdvmes5.2.i586.rpm
>  70fca946067f3e89d68c32f5f6a9006a
>  mes5/i586/icedtea-web-javadoc-1.1.5-0.1mdvmes5.2.i586.rpm
>  41534a23821ffaf40bee803faf0ec983  mes5/i586/libiw29-29-3.1mnb2.i586.rpm
>  19a2baf2b5445c8d4accbbbda1e4a6bd
>  mes5/i586/libiw29-devel-29-3.1mnb2.i586.rpm
>  9cc77cc785d29e3e30bcf0c160c76799
>  mes5/i586/libvpx0-0.9.7-0.2mdvmes5.2.i586.rpm
>  a826b46bb2e25beed537a72ca05a9e20
>  mes5/i586/libvpx-devel-0.9.7-0.2mdvmes5.2.i586.rpm
>  c14d94ba2816633883c013303014a0b2
>  mes5/i586/libvpx-utils-0.9.7-0.2mdvmes5.2.i586.rpm
>  d579056b5b169241daf27841cc013790
>  mes5/i586/libxulrunner10.0.4-10.0.4-0.1mdvmes5.2.i586.rpm
>  adf745f8a727f3bcba53e596fd88950a
>  mes5/i586/libxulrunner-devel-10.0.4-0.1mdvmes5.2.i586.rpm
>  9ea303afba3bb08905f6421b6493ecd4
>  mes5/i586/python-cython-0.15-0.1mdvmes5.2.i586.rpm
>  e56c57897156842a7ba4f90c472a47c9
>  mes5/i586/wireless-tools-29-3.1mnb2.i586.rpm
>  a0329158463abcbad918047c84186141
>  mes5/i586/xulrunner-10.0.4-0.1mdvmes5.2.i586.rpm
>  1e93694bd386fa384d62db462e0a4031
>  mes5/i586/yasm-1.1.0-0.1mdvmes5.2.i586.rpm
>  32ded032cb69d5c70178f9651d62e10b
>  mes5/i586/yasm-devel-1.1.0-0.1mdvmes5.2.i586.rpm
>  feab3a138317b8df1d7a72eba74b2543
>  mes5/i586/yasm-python-1.1.0-0.1mdvmes5.2.i586.rpm
>  cab2fb3795af9ee2b730ab4609ff5d38
>  mes5/SRPMS/firefox-10.0.4-0.1mdvmes5.2.src.rpm
>  bd3fbc028e30d73714793c5fb08f8609
>  mes5/SRPMS/firefox-l10n-10.0.4-0.1mdvmes5.2.src.rpm
>  2522a91d944b8156c3ddb82fccc25539
>  mes5/SRPMS/icedtea-web-1.1.5-0.1mdvmes5.2.src.rpm
>  78481843cb9aa5279b0975d75242e809
>  mes5/SRPMS/libvpx-0.9.7-0.2mdvmes5.2.src.rpm
>  6d47b4c4cd98073ed9435bae941dd665
>  mes5/SRPMS/python-cython-0.15-0.1mdvmes5.2.src.rpm
>  34c2cc5a16145dfcc969c0224bffdae4
>  mes5/SRPMS/wireless-tools-29-3.1mnb2.src.rpm
>  e4f47ab68daf56f0a376ed5de58219cb
>  mes5/SRPMS/xulrunner-10.0.4-0.1mdvmes5.2.src.rpm
>  38698452301ff1bd0eb5fb221a9d35d2
>  mes5/SRPMS/yasm-1.1.0-0.1mdvmes5.2.src.rpm
>
>  Mandriva Enterprise Server 5/X86_64:
>  72143cae4c12bbf399202a03cfbc05cd
>  mes5/x86_64/firefox-10.0.4-0.1mdvmes5.2.x86_64.rpm
>  d160a5a991f647a5bd6b4c0dd3562266
>  mes5/x86_64/firefox-af-10.0.4-0.1mdvmes5.2.x86_64.rpm
>  8753f1bbe4100b5f0314470a0cae3d8c
>  mes5/x86_64/firefox-ar-10.0.4-0.1mdvmes5.2.x86_64.rpm
>  ff9d47d7ff3fd90958f9e951d0c76da9
>  mes5/x86_64/firefox-be-10.0.4-0.1mdvmes5.2.x86_64.rpm
>  35393856a12c8a6328726619eb303126
>  mes5/x86_64/firefox-bg-10.0.4-0.1mdvmes5.2.x86_64.rpm
>  4b6e778539052f275cb9b7bc09a6c4ae
>  mes5/x86_64/firefox-bn-10.0.4-0.1mdvmes5.2.x86_64.rpm
>  0531167486bb429a92e35373d6b76fc2
>  mes5/x86_64/firefox-ca-10.0.4-0.1mdvmes5.2.x86_64.rpm
>  60d0cdcc11d04d0d6f26c2cd62f8a4d0
>  mes5/x86_64/firefox-cs-10.0.4-0.1mdvmes5.2.x86_64.rpm
>  63e3ae053f255455b50f1e6a1bfdd3c4
>  mes5/x86_64/firefox-cy-10.0.4-0.1mdvmes5.2.x86_64.rpm
>  b64491e5877443ca01497b98e39b68a7
>  mes5/x86_64/firefox-da-10.0.4-0.1mdvmes5.2.x86_64.rpm
>  5fd25b8b8147bc793951578d423f5595
>  mes5/x86_64/firefox-de-10.0.4-0.1mdvmes5.2.x86_64.rpm
>  69ec5adbb4ca050933956de9ff2f65fd
>  mes5/x86_64/firefox-devel-10.0.4-0.1mdvmes5.2.x86_64.rpm
>  2c9dae2af88ffef107c7c7ad8c109e66
>  mes5/x86_64/firefox-el-10.0.4-0.1mdvmes5.2.x86_64.rpm
>  a11181e8b5534c94e5e895bd91697060
>  mes5/x86_64/firefox-en_GB-10.0.4-0.1mdvmes5.2.x86_64.rpm
>  2366be0bea1669c7556b3edb18a19cb6
>  mes5/x86_64/firefox-eo-10.0.4-0.1mdvmes5.2.x86_64.rpm
>  8d8816da7fe34870c0f1e1a2064b8560
>  mes5/x86_64/firefox-es_AR-10.0.4-0.1mdvmes5.2.x86_64.rpm
>  c53a83000c1f5e88e799b3a20176b1e6
>  mes5/x86_64/firefox-es_ES-10.0.4-0.1mdvmes5.2.x86_64.rpm
>  6d266df455ecc2a407ff1b3db3b62316
>  mes5/x86_64/firefox-et-10.0.4-0.1mdvmes5.2.x86_64.rpm
>  56e606eb0283317a74ac495bc93db377
>  mes5/x86_64/firefox-eu-10.0.4-0.1mdvmes5.2.x86_64.rpm
>  1ee31760392f7e567842fc60823af9d6
>  mes5/x86_64/firefox-fi-10.0.4-0.1mdvmes5.2.x86_64.rpm
>  a6bda9a063c0908786d37cf3ccc4ffee
>  mes5/x86_64/firefox-fr-10.0.4-0.1mdvmes5.2.x86_64.rpm
>  0d6bc328dc776c74f3ee53fbc62deb33
>  mes5/x86_64/firefox-fy-10.0.4-0.1mdvmes5.2.x86_64.rpm
>  4413cdb1172541e31e149583c39869eb
>  mes5/x86_64/firefox-ga_IE-10.0.4-0.1mdvmes5.2.x86_64.rpm
>  03ebe55c3e5de4687506a6fa978866cc
>  mes5/x86_64/firefox-gl-10.0.4-0.1mdvmes5.2.x86_64.rpm
>  e00f877f64a468d3074b56535b5f272d
>  mes5/x86_64/firefox-gu_IN-10.0.4-0.1mdvmes5.2.x86_64.rpm
>  02250f114481f7c38f127890fd74bf11
>  mes5/x86_64/firefox-he-10.0.4-0.1mdvmes5.2.x86_64.rpm
>  178981447a8dc0a19fded1c25a619ee7
>  mes5/x86_64/firefox-hi-10.0.4-0.1mdvmes5.2.x86_64.rpm
>  67f84f481561ca2a094f65fa5ecca25a
>  mes5/x86_64/firefox-hu-10.0.4-0.1mdvmes5.2.x86_64.rpm
>  54e900d106c5623ca3b748cc60d64da5
>  mes5/x86_64/firefox-id-10.0.4-0.1mdvmes5.2.x86_64.rpm
>  36c928ff015d0070af08baebf209c151
>  mes5/x86_64/firefox-is-10.0.4-0.1mdvmes5.2.x86_64.rpm
>  cc1c1b9f15e22600b98ca8b4b456833a
>  mes5/x86_64/firefox-it-10.0.4-0.1mdvmes5.2.x86_64.rpm
>  edb0b276a1d25031a96f9abf1ad9a511
>  mes5/x86_64/firefox-ja-10.0.4-0.1mdvmes5.2.x86_64.rpm
>  c011f295aec053f156ac3c3714aa0d5e
>  mes5/x86_64/firefox-ka-10.0.4-0.1mdvmes5.2.x86_64.rpm
>  8312aea506245303dc54696e86681b8d
>  mes5/x86_64/firefox-kn-10.0.4-0.1mdvmes5.2.x86_64.rpm
>  2a988ffefd6b988a812012030e0d4d10
>  mes5/x86_64/firefox-ko-10.0.4-0.1mdvmes5.2.x86_64.rpm
>  dc39ab0f62d0520cc84a94234235ca11
>  mes5/x86_64/firefox-ku-10.0.4-0.1mdvmes5.2.x86_64.rpm
>  30774bca94992d88644ddad3785fa1c7
>  mes5/x86_64/firefox-lt-10.0.4-0.1mdvmes5.2.x86_64.rpm
>  fc67b7a963fb8cb18cd892caef17df69
>  mes5/x86_64/firefox-lv-10.0.4-0.1mdvmes5.2.x86_64.rpm
>  4114f93c1a8951a445a047ce7b8b78c9
>  mes5/x86_64/firefox-mk-10.0.4-0.1mdvmes5.2.x86_64.rpm
>  93ad20b01148140463c2de67e52279a6
>  mes5/x86_64/firefox-mr-10.0.4-0.1mdvmes5.2.x86_64.rpm
>  2ae391524ed24ad727598f5e5d57d535
>  mes5/x86_64/firefox-nb_NO-10.0.4-0.1mdvmes5.2.x86_64.rpm
>  45ccf6143fce18549e19acd9af08b2ce
>  mes5/x86_64/firefox-nl-10.0.4-0.1mdvmes5.2.x86_64.rpm
>  a983bde2fd2fccc985b9ec94304849eb
>  mes5/x86_64/firefox-nn_NO-10.0.4-0.1mdvmes5.2.x86_64.rpm
>  6e4fc5cfa7087bdee36f4ad531a460d2
>  mes5/x86_64/firefox-oc-10.0.4-0.1mdvmes5.2.x86_64.rpm
>  610510a745dca777b915baa9f9fc1839
>  mes5/x86_64/firefox-pa_IN-10.0.4-0.1mdvmes5.2.x86_64.rpm
>  3d1cfd9dc0ea64666e5b74838fe8baae
>  mes5/x86_64/firefox-pl-10.0.4-0.1mdvmes5.2.x86_64.rpm
>  9711952a5b20821b43214f50d4117bfd
>  mes5/x86_64/firefox-pt_BR-10.0.4-0.1mdvmes5.2.x86_64.rpm
>  0081ebeac7e2b33f68e18656353c8ec5
>  mes5/x86_64/firefox-pt_PT-10.0.4-0.1mdvmes5.2.x86_64.rpm
>  76649e0ca0bc3e04ab05b207f76afef5
>  mes5/x86_64/firefox-ro-10.0.4-0.1mdvmes5.2.x86_64.rpm
>  88b591294728d5ccc16a95514f506a18
>  mes5/x86_64/firefox-ru-10.0.4-0.1mdvmes5.2.x86_64.rpm
>  f94710f67887628e5445635884d8177f
>  mes5/x86_64/firefox-si-10.0.4-0.1mdvmes5.2.x86_64.rpm
>  cccca986e16c4606364c5632b5e155ad
>  mes5/x86_64/firefox-sk-10.0.4-0.1mdvmes5.2.x86_64.rpm
>  af6d6a0875198e2c4644a58f35360b6a
>  mes5/x86_64/firefox-sl-10.0.4-0.1mdvmes5.2.x86_64.rpm
>  2892de558bb26ddf6dd54ee41d4fab4a
>  mes5/x86_64/firefox-sq-10.0.4-0.1mdvmes5.2.x86_64.rpm
>  f9964fd7159176c06bfaa738d9c40b22
>  mes5/x86_64/firefox-sr-10.0.4-0.1mdvmes5.2.x86_64.rpm
>  1c4866b21a43f4ff2431cc06792262e0
>  mes5/x86_64/firefox-sv_SE-10.0.4-0.1mdvmes5.2.x86_64.rpm
>  7f622fd303551c606e6fa7d50c854184
>  mes5/x86_64/firefox-te-10.0.4-0.1mdvmes5.2.x86_64.rpm
>  1eedad05b14fbabc3e7290e92d4a48eb
>  mes5/x86_64/firefox-th-10.0.4-0.1mdvmes5.2.x86_64.rpm
>  d1149e50d5329f8cd40859b1f7677d64
>  mes5/x86_64/firefox-tr-10.0.4-0.1mdvmes5.2.x86_64.rpm
>  85c659d6d503f4a18d60b2f3a68203ed
>  mes5/x86_64/firefox-uk-10.0.4-0.1mdvmes5.2.x86_64.rpm
>  3a5a6799cce49930f7263ffebfa89b60
>  mes5/x86_64/firefox-zh_CN-10.0.4-0.1mdvmes5.2.x86_64.rpm
>  3e000a956e364becab89006a451862c7
>  mes5/x86_64/firefox-zh_TW-10.0.4-0.1mdvmes5.2.x86_64.rpm
>  9574c63a42f95318a1d93f756612396e
>  mes5/x86_64/icedtea-web-1.1.5-0.1mdvmes5.2.x86_64.rpm
>  aecf70a7766eaf61e4ed42d059144569
>  mes5/x86_64/icedtea-web-javadoc-1.1.5-0.1mdvmes5.2.x86_64.rpm
>  3ef5b5b1a5618061c3f3a52c2548a3ca
>  mes5/x86_64/lib64iw29-29-3.1mnb2.x86_64.rpm
>  b1654a4badb379c481291e538c96f4b6
>  mes5/x86_64/lib64iw29-devel-29-3.1mnb2.x86_64.rpm
>  2743fbc604ba116cf998077158593393
>  mes5/x86_64/lib64vpx0-0.9.7-0.2mdvmes5.2.x86_64.rpm
>  5250078fd1ecbcde1a8ee22876d4ead2
>  mes5/x86_64/lib64vpx-devel-0.9.7-0.2mdvmes5.2.x86_64.rpm
>  806d4a550abfefc37b2b9c0dee9f5031
>  mes5/x86_64/lib64xulrunner10.0.4-10.0.4-0.1mdvmes5.2.x86_64.rpm
>  5a6fe261614c225ecc006d6660bcd4ad
>  mes5/x86_64/lib64xulrunner-devel-10.0.4-0.1mdvmes5.2.x86_64.rpm
>  1d04326581fe942201dd7cb415e4188d
>  mes5/x86_64/libvpx-utils-0.9.7-0.2mdvmes5.2.x86_64.rpm
>  123d68df17b3c0e3bc226cb989d82e07
>  mes5/x86_64/python-cython-0.15-0.1mdvmes5.2.x86_64.rpm
>  758a5f09cce66dabd0991668da246d34
>  mes5/x86_64/wireless-tools-29-3.1mnb2.x86_64.rpm
>  9a6854a6f373d31db322ebe645900c54
>  mes5/x86_64/xulrunner-10.0.4-0.1mdvmes5.2.x86_64.rpm
>  fa368599864fdbdb114a4b16eb1873e3
>  mes5/x86_64/yasm-1.1.0-0.1mdvmes5.2.x86_64.rpm
>  3c64b6f6f8477bba975279301717d662
>  mes5/x86_64/yasm-devel-1.1.0-0.1mdvmes5.2.x86_64.rpm
>  7e03d96c771110bc6e686a33bb93c14b
>  mes5/x86_64/yasm-python-1.1.0-0.1mdvmes5.2.x86_64.rpm
>  cab2fb3795af9ee2b730ab4609ff5d38
>  mes5/SRPMS/firefox-10.0.4-0.1mdvmes5.2.src.rpm
>  bd3fbc028e30d73714793c5fb08f8609
>  mes5/SRPMS/firefox-l10n-10.0.4-0.1mdvmes5.2.src.rpm
>  2522a91d944b8156c3ddb82fccc25539
>  mes5/SRPMS/icedtea-web-1.1.5-0.1mdvmes5.2.src.rpm
>  78481843cb9aa5279b0975d75242e809
>  mes5/SRPMS/libvpx-0.9.7-0.2mdvmes5.2.src.rpm
>  6d47b4c4cd98073ed9435bae941dd665
>  mes5/SRPMS/python-cython-0.15-0.1mdvmes5.2.src.rpm
>  34c2cc5a16145dfcc969c0224bffdae4
>  mes5/SRPMS/wireless-tools-29-3.1mnb2.src.rpm
>  e4f47ab68daf56f0a376ed5de58219cb
>  mes5/SRPMS/xulrunner-10.0.4-0.1mdvmes5.2.src.rpm
>  38698452301ff1bd0eb5fb221a9d35d2
>  mes5/SRPMS/yasm-1.1.0-0.1mdvmes5.2.src.rpm
>  _______________________________________________________________________
>
>  To upgrade automatically use MandrivaUpdate or urpmi.  The verification
>  of md5 checksums and GPG signatures is performed automatically for you.
>
>  All packages are signed by Mandriva for security.  You can obtain the
>  GPG public key of the Mandriva Security Team by executing:
>
>  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
>
>  You can view other update advisories for Mandriva Linux at:
>
>  http://www.mandriva.com/security/advisories
>
>  If you want to report vulnerabilities, please contact
>
>  security_(at)_mandriva.com
>  _______________________________________________________________________
>
>  Type Bits/KeyID     Date       User ID
>  pub  1024D/22458A98 2000-07-10 Mandriva Security Team
>  <security*mandriva.com>
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.11 (GNU/Linux)
>
> iD8DBQFPvh54mqjQ0CJFipgRAh1pAKCIKPTFajKHsqpt7dKyLmwTGSeHNgCg6w+I
> ljs6Z5jE2CsfxsacA9/iaQQ=
> =S92/
> -----END PGP SIGNATURE-----
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
-------------- Próxima Parte ----------
Um anexo em HTML foi limpo...
URL: <http://lists.owasp.org/pipermail/owasp-cuiaba/attachments/20120524/edfc6097/attachment-0001.html>


More information about the Owasp-cuiaba mailing list