Updated: September 19, 2005
Affected
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
The Fedora Project has release the following update notifications in response to this issue: FEDORA-2005-871 FEDORA-2005-872 FEDORA-2005-873 FEDORA-2005-874 Users are encouraged to review these notices and apply the appropriate patches that they refer to.
Updated: September 19, 2005
Affected
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
The Gentoo Linux security team has published Gentoo Linux Security Advisory GLSA 200509-11 in response to this issue. Users are encouraged to review this advisory and apply the patches it refers to.
Notified: September 09, 2005 Updated: September 09, 2005
Affected
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
The Mozilla Foundation Security Team has published preliminary solution information in the following document: What Mozilla users should know about the IDN buffer overflow security issue
Updated: September 16, 2005
Affected
This issue affects the Firefox browser as shipped in Red Hat Enterprise Linux 4, and the Mozilla browser in Red Hat Enterprise Linux 2.1, 3, and 4. Updated Firefox and Mozilla packages to correct this issue are available at the URL below and by using the Red Hat Network 'up2date' tool. http://rhn.redhat.com/errata/CAN-2005-2871.html
The vendor has not provided us with any further information regarding this vulnerability.
Updated: September 16, 2005
Affected
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
The Ubuntu Linux security team has published Ubuntu Security Notice USN-181-1 in response to this issue. Users are encouraged to review this notice and apply the patches that it refers to.