Updated: September 20, 2004
Unknown
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Updated: October 26, 2004
Affected
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
The Conectiva security team has published Conectiva Linux Security Announcement CLSA-2004:877 in response to this issue. Users are encouraged to review this announcement and apply the patches it refers to.
Updated: October 26, 2004
Affected
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
The Gentoo development team has published Gentoo Linux Security Advisory 200409-26 in response to this issue. Users are encouraged to review this advisory and apply the patches it refers to.
Updated: September 17, 2004
Affected
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
The Mozilla project has released the following versions of the affected software that contain a patch for this issue: Mozilla 1.7.3 Firefox Preview Release Thunderbird 0.8 Users are strongly encouraged to upgrade to one of these versions.
Updated: September 20, 2004
Unknown
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Updated: October 26, 2004
Affected
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
The SuSE Security Team has published SUSE Security Announcement SUSE-SA:2004:036 in response to this issue. Users are encouraged to review this announcement and apply the patches it refers to.