ID CESA-2012:1361 Type centos Reporter CentOS Project Modified 2012-10-12T22:27:24
Description
CentOS Errata and Security Advisory CESA-2012:1361
XULRunner provides the XUL Runtime environment for applications using the
Gecko layout engine.
A flaw was found in the way XULRunner handled security wrappers. A web page
containing malicious content could possibly cause an application linked
against XULRunner (such as Mozilla Firefox) to execute arbitrary code with
the privileges of the user running the application. (CVE-2012-4193)
For technical details regarding this flaw, refer to the Mozilla security
advisories. You can find a link to the Mozilla advisories in the References
section of this erratum.
Red Hat would like to thank the Mozilla project for reporting this issue.
Upstream acknowledges moz_bug_r_a4 as the original reporter.
All XULRunner users should upgrade to these updated packages, which correct
this issue. After installing the update, applications using XULRunner must
be restarted for the changes to take effect.
Merged security bulletin from advisories:
http://lists.centos.org/pipermail/centos-announce/2012-October/018936.html
http://lists.centos.org/pipermail/centos-announce/2012-October/018940.html
Affected packages:
xulrunner
xulrunner-devel
Upstream details at:
https://rhn.redhat.com/errata/RHSA-2012-1361.html
{"bulletinFamily": "unix", "affectedPackage": [{"OS": "CentOS", "packageVersion": "10.0.8-2.el5_8", "packageFilename": "xulrunner-10.0.8-2.el5_8.x86_64.rpm", "packageName": "xulrunner", "operator": "lt", "arch": "x86_64", "OSVersion": "5"}, {"OS": "CentOS", "packageVersion": "10.0.8-2.el6.centos", "packageFilename": "xulrunner-10.0.8-2.el6.centos.src.rpm", "packageName": "xulrunner", "operator": "lt", "arch": "any", "OSVersion": "6"}, {"OS": "CentOS", "packageVersion": "10.0.8-2.el6.centos", "packageFilename": "xulrunner-devel-10.0.8-2.el6.centos.i686.rpm", "packageName": "xulrunner-devel", "operator": "lt", "arch": "i686", "OSVersion": "6"}, {"OS": "CentOS", "packageVersion": "10.0.8-2.el6.centos", "packageFilename": "xulrunner-devel-10.0.8-2.el6.centos.i686.rpm", "packageName": "xulrunner-devel", "operator": "lt", "arch": "i686", "OSVersion": "6"}, {"OS": "CentOS", "packageVersion": "10.0.8-2.el6.centos", "packageFilename": "xulrunner-10.0.8-2.el6.centos.i686.rpm", "packageName": "xulrunner", "operator": "lt", "arch": "i686", "OSVersion": "6"}, {"OS": "CentOS", "packageVersion": "10.0.8-2.el6.centos", "packageFilename": "xulrunner-10.0.8-2.el6.centos.i686.rpm", "packageName": "xulrunner", "operator": "lt", "arch": "i686", "OSVersion": "6"}, {"OS": "CentOS", "packageVersion": "10.0.8-2.el5_8", "packageFilename": "xulrunner-devel-10.0.8-2.el5_8.x86_64.rpm", "packageName": "xulrunner-devel", "operator": "lt", "arch": "x86_64", "OSVersion": "5"}, {"OS": "CentOS", "packageVersion": "10.0.8-2.el5_8", "packageFilename": "xulrunner-10.0.8-2.el5_8.i386.rpm", "packageName": "xulrunner", "operator": "lt", "arch": "i386", "OSVersion": "5"}, {"OS": "CentOS", "packageVersion": "10.0.8-2.el5_8", "packageFilename": "xulrunner-10.0.8-2.el5_8.i386.rpm", "packageName": "xulrunner", "operator": "lt", "arch": "i386", "OSVersion": "5"}, {"OS": "CentOS", "packageVersion": "10.0.8-2.el5_8", "packageFilename": "xulrunner-10.0.8-2.el5_8.src.rpm", "packageName": "xulrunner", "operator": "lt", "arch": "any", "OSVersion": "5"}, {"OS": "CentOS", "packageVersion": "10.0.8-2.el5_8", "packageFilename": "xulrunner-devel-10.0.8-2.el5_8.i386.rpm", "packageName": "xulrunner-devel", "operator": "lt", "arch": "i386", "OSVersion": "5"}, {"OS": "CentOS", "packageVersion": "10.0.8-2.el5_8", "packageFilename": "xulrunner-devel-10.0.8-2.el5_8.i386.rpm", "packageName": "xulrunner-devel", "operator": "lt", "arch": "i386", "OSVersion": "5"}, {"OS": "CentOS", "packageVersion": "10.0.8-2.el6.centos", "packageFilename": "xulrunner-devel-10.0.8-2.el6.centos.x86_64.rpm", "packageName": "xulrunner-devel", "operator": "lt", "arch": "x86_64", "OSVersion": "6"}, {"OS": "CentOS", "packageVersion": "10.0.8-2.el6.centos", "packageFilename": "xulrunner-10.0.8-2.el6.centos.x86_64.rpm", "packageName": "xulrunner", "operator": "lt", "arch": "x86_64", "OSVersion": "6"}], "viewCount": 1, "reporter": "CentOS Project", "references": ["http://rhn.redhat.com/errata/RHSA-2012-1361.html", "https://rhn.redhat.com/errata/RHSA-2012-1361.html"], "description": "**CentOS Errata and Security Advisory** CESA-2012:1361\n\n\nXULRunner provides the XUL Runtime environment for applications using the\nGecko layout engine.\n\nA flaw was found in the way XULRunner handled security wrappers. A web page\ncontaining malicious content could possibly cause an application linked\nagainst XULRunner (such as Mozilla Firefox) to execute arbitrary code with\nthe privileges of the user running the application. (CVE-2012-4193)\n\nFor technical details regarding this flaw, refer to the Mozilla security\nadvisories. You can find a link to the Mozilla advisories in the References\nsection of this erratum.\n\nRed Hat would like to thank the Mozilla project for reporting this issue.\nUpstream acknowledges moz_bug_r_a4 as the original reporter.\n\nAll XULRunner users should upgrade to these updated packages, which correct\nthis issue. After installing the update, applications using XULRunner must\nbe restarted for the changes to take effect.\n\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2012-October/018936.html\nhttp://lists.centos.org/pipermail/centos-announce/2012-October/018940.html\n\n**Affected packages:**\nxulrunner\nxulrunner-devel\n\n**Upstream details at:**\n\nhttps://rhn.redhat.com/errata/RHSA-2012-1361.html", "hashmap": [{"key": "affectedPackage", "hash": "cf4184ea46050b702d79626c76d1c3c4"}, {"key": "bulletinFamily", "hash": "4913a9178621eadcdf191db17915fbcb"}, {"key": "cvelist", "hash": "9d92c4c225c119d8975bb214855e82c9"}, {"key": "cvss", "hash": "d726e774add6189e33cf2ea0c61a2ba5"}, {"key": "description", "hash": "efe92717e16a4cff8ada7e5a96c2c5f7"}, {"key": "href", "hash": "0aa41bc2d56cf45fc2e52db0f68f48e1"}, {"key": "modified", "hash": "84367a10e68111c8e01ae1925bb5b054"}, {"key": "published", "hash": "86c684bcc42e901c0b6049223d6b0b90"}, {"key": "references", "hash": "004f548fc4ef213a14b88b4d42e3eb50"}, {"key": "reporter", "hash": "9855627921475e40e00f92d60af14cb3"}, {"key": "title", "hash": "e58a6a8e7ed8390e913744a81f9cb4ef"}, {"key": "type", "hash": "cdc872db616ac66adb3166c75e9ad183"}], "href": "http://lists.centos.org/pipermail/centos-announce/2012-October/018936.html", "modified": "2012-10-12T22:27:24", "objectVersion": "1.3", "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2012-4193"]}, {"type": "openvas", "idList": ["OPENVAS:881518", "OPENVAS:1361412562310881521", "OPENVAS:870848", "OPENVAS:1361412562310881518", "OPENVAS:881523", "OPENVAS:1361412562310123802", "OPENVAS:881517", "OPENVAS:1361412562310870846", "OPENVAS:881521", "OPENVAS:1361412562310870848"]}, {"type": "nessus", "idList": ["ORACLELINUX_ELSA-2012-1361.NASL", "CENTOS_RHSA-2012-1361.NASL", "REDHAT-RHSA-2012-1362.NASL", "SL_20121012_XULRUNNER_ON_SL5_X.NASL", "REDHAT-RHSA-2012-1361.NASL", "ORACLELINUX_ELSA-2012-1362.NASL", "CENTOS_RHSA-2012-1362.NASL", "MOZILLA_FIREFOX_1009.NASL", "MOZILLA_THUNDERBIRD_1009.NASL", "MACOSX_THUNDERBIRD_10_0_9.NASL"]}, {"type": "oraclelinux", "idList": ["ELSA-2012-1361", "ELSA-2012-1362"]}, {"type": "redhat", "idList": ["RHSA-2012:1361", "RHSA-2012:1362"]}, {"type": "centos", "idList": ["CESA-2012:1362"]}, {"type": "mozilla", "idList": ["MFSA2012-89"]}, {"type": "suse", "idList": ["OPENSUSE-SU-2012:1345-1", "SUSE-SU-2012:1351-1", "OPENSUSE-SU-2014:1100-1"]}, {"type": "ubuntu", "idList": ["USN-1611-1"]}, {"type": "freebsd", "idList": ["6E5A9AFD-12D3-11E2-B47D-C8600054B392"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:VULN:12639"]}, {"type": "gentoo", "idList": ["GLSA-201301-01"]}], "modified": "2019-05-29T18:34:04"}, "score": {"value": 8.2, "vector": "NONE", "modified": "2019-05-29T18:34:04"}, "vulnersScore": 8.2}, "id": "CESA-2012:1361", "title": "xulrunner security update", "hash": "ed91ab72b3972fce304e2a74a51da33f0b35f285265bff822c59eb6b6c1ecb6f", "edition": 2, "published": "2012-10-12T17:47:30", "type": "centos", "history": [{"bulletin": {"affectedPackage": [{"OS": "CentOS", "OSVersion": "5", "arch": "x86_64", "operator": "lt", "packageFilename": "xulrunner-10.0.8-2.el5_8.x86_64.rpm", "packageName": "xulrunner", "packageVersion": "10.0.8-2.el5_8"}, {"OS": "CentOS", "OSVersion": "6", "arch": "any", "operator": "lt", "packageFilename": "xulrunner-10.0.8-2.el6.centos.src.rpm", "packageName": "xulrunner", "packageVersion": "10.0.8-2.el6.centos"}, {"OS": "CentOS", "OSVersion": "6", "arch": "i686", "operator": "lt", "packageFilename": "xulrunner-devel-10.0.8-2.el6.centos.i686.rpm", "packageName": "xulrunner-devel", "packageVersion": "10.0.8-2.el6.centos"}, {"OS": "CentOS", "OSVersion": "6", "arch": "i686", "operator": "lt", "packageFilename": "xulrunner-devel-10.0.8-2.el6.centos.i686.rpm", "packageName": "xulrunner-devel", "packageVersion": "10.0.8-2.el6.centos"}, {"OS": "CentOS", "OSVersion": "6", "arch": "i686", "operator": "lt", "packageFilename": "xulrunner-10.0.8-2.el6.centos.i686.rpm", "packageName": "xulrunner", "packageVersion": "10.0.8-2.el6.centos"}, {"OS": "CentOS", "OSVersion": "6", "arch": "i686", "operator": "lt", "packageFilename": "xulrunner-10.0.8-2.el6.centos.i686.rpm", "packageName": "xulrunner", "packageVersion": "10.0.8-2.el6.centos"}, {"OS": "CentOS", "OSVersion": "5", "arch": "x86_64", "operator": "lt", "packageFilename": "xulrunner-devel-10.0.8-2.el5_8.x86_64.rpm", "packageName": "xulrunner-devel", "packageVersion": "10.0.8-2.el5_8"}, {"OS": "CentOS", "OSVersion": "5", "arch": "i386", "operator": "lt", "packageFilename": "xulrunner-10.0.8-2.el5_8.i386.rpm", "packageName": "xulrunner", "packageVersion": "10.0.8-2.el5_8"}, {"OS": "CentOS", "OSVersion": "5", "arch": "i386", "operator": "lt", "packageFilename": "xulrunner-10.0.8-2.el5_8.i386.rpm", "packageName": "xulrunner", "packageVersion": "10.0.8-2.el5_8"}, {"OS": "CentOS", "OSVersion": "5", "arch": "any", "operator": "lt", "packageFilename": "xulrunner-10.0.8-2.el5_8.src.rpm", "packageName": "xulrunner", "packageVersion": "10.0.8-2.el5_8"}, {"OS": "CentOS", "OSVersion": "5", "arch": "i386", "operator": "lt", "packageFilename": "xulrunner-devel-10.0.8-2.el5_8.i386.rpm", "packageName": "xulrunner-devel", "packageVersion": "10.0.8-2.el5_8"}, {"OS": "CentOS", "OSVersion": "5", "arch": "i386", "operator": "lt", "packageFilename": "xulrunner-devel-10.0.8-2.el5_8.i386.rpm", "packageName": "xulrunner-devel", "packageVersion": "10.0.8-2.el5_8"}, {"OS": "CentOS", "OSVersion": "6", "arch": "x86_64", "operator": "lt", "packageFilename": "xulrunner-devel-10.0.8-2.el6.centos.x86_64.rpm", "packageName": "xulrunner-devel", "packageVersion": "10.0.8-2.el6.centos"}, {"OS": "CentOS", "OSVersion": "6", "arch": "x86_64", "operator": "lt", "packageFilename": "xulrunner-10.0.8-2.el6.centos.x86_64.rpm", "packageName": "xulrunner", "packageVersion": "10.0.8-2.el6.centos"}], "bulletinFamily": "unix", "cvelist": ["CVE-2012-4193"], "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "description": "**CentOS Errata and Security Advisory** CESA-2012:1361\n\n\nXULRunner provides the XUL Runtime environment for applications using the\nGecko layout engine.\n\nA flaw was found in the way XULRunner handled security wrappers. A web page\ncontaining malicious content could possibly cause an application linked\nagainst XULRunner (such as Mozilla Firefox) to execute arbitrary code with\nthe privileges of the user running the application. (CVE-2012-4193)\n\nFor technical details regarding this flaw, refer to the Mozilla security\nadvisories. You can find a link to the Mozilla advisories in the References\nsection of this erratum.\n\nRed Hat would like to thank the Mozilla project for reporting this issue.\nUpstream acknowledges moz_bug_r_a4 as the original reporter.\n\nAll XULRunner users should upgrade to these updated packages, which correct\nthis issue. After installing the update, applications using XULRunner must\nbe restarted for the changes to take effect.\n\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2012-October/018936.html\nhttp://lists.centos.org/pipermail/centos-announce/2012-October/018940.html\n\n**Affected packages:**\nxulrunner\nxulrunner-devel\n\n**Upstream details at:**\n\nhttps://rhn.redhat.com/errata/RHSA-2012-1361.html", "edition": 1, "enchantments": {"dependencies": {"modified": "2017-10-03T18:24:29", "references": [{"idList": ["6E5A9AFD-12D3-11E2-B47D-C8600054B392"], "type": "freebsd"}, {"idList": ["CVE-2012-4193"], "type": "cve"}, {"idList": ["OPENVAS:881517", "OPENVAS:1361412562310881523", "OPENVAS:870846", "OPENVAS:1361412562310123799", "OPENVAS:1361412562310870846", "OPENVAS:1361412562310870848", "OPENVAS:1361412562310881518", "OPENVAS:881518", "OPENVAS:1361412562310881521", "OPENVAS:1361412562310123802"], "type": "openvas"}, {"idList": ["RHSA-2012:1362", "RHSA-2012:1361"], "type": "redhat"}, {"idList": ["OPENSUSE-SU-2012:1345-1", "OPENSUSE-SU-2014:1100-1", "SUSE-SU-2012:1351-1"], "type": "suse"}, {"idList": ["CESA-2012:1362"], "type": "centos"}, {"idList": ["SECURITYVULNS:VULN:12639"], "type": "securityvulns"}, {"idList": ["REDHAT-RHSA-2012-1361.NASL", "ORACLELINUX_ELSA-2012-1361.NASL", "MOZILLA_THUNDERBIRD_1009.NASL", "SL_20121012_XULRUNNER_ON_SL5_X.NASL", "MOZILLA_FIREFOX_1009.NASL", "ORACLELINUX_ELSA-2012-1362.NASL", "CENTOS_RHSA-2012-1361.NASL", "MACOSX_THUNDERBIRD_10_0_9.NASL", "CENTOS_RHSA-2012-1362.NASL", "REDHAT-RHSA-2012-1362.NASL"], "type": "nessus"}, {"idList": ["USN-1611-1"], "type": "ubuntu"}, {"idList": ["MFSA2012-89"], "type": "mozilla"}, {"idList": ["ELSA-2012-1362", "ELSA-2012-1361"], "type": "oraclelinux"}, {"idList": ["GLSA-201301-01"], "type": "gentoo"}]}, "score": {"value": 9.3, "vector": "NONE"}}, "hash": "c76787dd5a6819ef577f74e687845e4f821bd3be460a6b3b1a432d9f9203918e", "hashmap": [{"hash": "2076413bdcb42307d016f5286cbae795", "key": "cvss"}, {"hash": "cf4184ea46050b702d79626c76d1c3c4", "key": "affectedPackage"}, {"hash": "84367a10e68111c8e01ae1925bb5b054", "key": "modified"}, {"hash": "9855627921475e40e00f92d60af14cb3", "key": "reporter"}, {"hash": "86c684bcc42e901c0b6049223d6b0b90", "key": "published"}, {"hash": "efe92717e16a4cff8ada7e5a96c2c5f7", "key": "description"}, {"hash": "4913a9178621eadcdf191db17915fbcb", "key": "bulletinFamily"}, {"hash": "9d92c4c225c119d8975bb214855e82c9", "key": "cvelist"}, {"hash": "cdc872db616ac66adb3166c75e9ad183", "key": "type"}, {"hash": "004f548fc4ef213a14b88b4d42e3eb50", "key": "references"}, {"hash": "e58a6a8e7ed8390e913744a81f9cb4ef", "key": "title"}, {"hash": "0aa41bc2d56cf45fc2e52db0f68f48e1", "key": "href"}], "history": [], "href": "http://lists.centos.org/pipermail/centos-announce/2012-October/018936.html", "id": "CESA-2012:1361", "lastseen": "2017-10-03T18:24:29", "modified": "2012-10-12T22:27:24", "objectVersion": "1.3", "published": "2012-10-12T17:47:30", "references": ["http://rhn.redhat.com/errata/RHSA-2012-1361.html", "https://rhn.redhat.com/errata/RHSA-2012-1361.html"], "reporter": "CentOS Project", "title": "xulrunner security update", "type": "centos", "viewCount": 1}, "differentElements": ["cvss"], "edition": 1, "lastseen": "2017-10-03T18:24:29"}], "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}, "cvelist": ["CVE-2012-4193"], "lastseen": "2019-05-29T18:34:04", "scheme": null}
{"cve": [{"lastseen": "2019-05-29T18:12:24", "bulletinFamily": "NVD", "description": "Mozilla Firefox before 16.0.1, Firefox ESR 10.x before 10.0.9, Thunderbird before 16.0.1, Thunderbird ESR 10.x before 10.0.9, and SeaMonkey before 2.13.1 omit a security check in the defaultValue function during the unwrapping of security wrappers, which allows remote attackers to bypass the Same Origin Policy and read the properties of a Location object, or execute arbitrary JavaScript code, via a crafted web site.", "modified": "2017-09-19T01:35:00", "id": "CVE-2012-4193", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-4193", "published": "2012-10-12T10:44:00", "title": "CVE-2012-4193", "type": "cve", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "openvas": [{"lastseen": "2019-05-29T18:39:14", "bulletinFamily": "scanner", "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2012-10-16T00:00:00", "id": "OPENVAS:1361412562310881518", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310881518", "title": "CentOS Update for thunderbird CESA-2012:1362 centos6", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for thunderbird CESA-2012:1362 centos6\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.centos.org/pipermail/centos-announce/2012-October/018939.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.881518\");\n script_version(\"$Revision: 14222 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 13:50:48 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2012-10-16 09:45:13 +0530 (Tue, 16 Oct 2012)\");\n script_cve_id(\"CVE-2012-4193\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_xref(name:\"CESA\", value:\"2012:1362\");\n script_name(\"CentOS Update for thunderbird CESA-2012:1362 centos6\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'thunderbird'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\", re:\"ssh/login/release=CentOS6\");\n script_tag(name:\"affected\", value:\"thunderbird on CentOS 6\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n script_tag(name:\"insight\", value:\"Mozilla Thunderbird is a standalone mail and newsgroup client.\n\n A flaw was found in the way Thunderbird handled security wrappers.\n Malicious content could cause Thunderbird to execute arbitrary code with\n the privileges of the user running Thunderbird. (CVE-2012-4193)\n\n Red Hat would like to thank the Mozilla project for reporting this issue.\n Upstream acknowledges moz_bug_r_a4 as the original reporter.\n\n Note: This issue cannot be exploited by a specially-crafted HTML mail\n message as JavaScript is disabled by default for mail messages. It could be\n exploited another way in Thunderbird, for example, when viewing the full\n remote content of an RSS feed.\n\n All Thunderbird users should upgrade to this updated package, which\n corrects this issue. After installing the update, Thunderbird must be\n restarted for the changes to take effect.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"CentOS6\")\n{\n\n if ((res = isrpmvuln(pkg:\"thunderbird\", rpm:\"thunderbird~10.0.8~2.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2018-01-11T11:07:25", "bulletinFamily": "scanner", "description": "Check for the Version of xulrunner", "modified": "2018-01-10T00:00:00", "published": "2012-10-16T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=881523", "id": "OPENVAS:881523", "title": "CentOS Update for xulrunner CESA-2012:1361 centos6 ", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for xulrunner CESA-2012:1361 centos6 \n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"XULRunner provides the XUL Runtime environment for applications using the\n Gecko layout engine.\n\n A flaw was found in the way XULRunner handled security wrappers. A web page\n containing malicious content could possibly cause an application linked\n against XULRunner (such as Mozilla Firefox) to execute arbitrary code with\n the privileges of the user running the application. (CVE-2012-4193)\n \n For technical details regarding this flaw, refer to the Mozilla security\n advisories. You can find a link to the Mozilla advisories in the References\n section of this erratum.\n \n Red Hat would like to thank the Mozilla project for reporting this issue.\n Upstream acknowledges moz_bug_r_a4 as the original reporter.\n \n All XULRunner users should upgrade to these updated packages, which correct\n this issue. After installing the update, applications using XULRunner must\n be restarted for the changes to take effect.\";\n\ntag_affected = \"xulrunner on CentOS 6\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.centos.org/pipermail/centos-announce/2012-October/018940.html\");\n script_id(881523);\n script_version(\"$Revision: 8352 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-10 08:01:57 +0100 (Wed, 10 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2012-10-16 09:45:38 +0530 (Tue, 16 Oct 2012)\");\n script_cve_id(\"CVE-2012-4193\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"CESA\", value: \"2012:1361\");\n script_name(\"CentOS Update for xulrunner CESA-2012:1361 centos6 \");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of xulrunner\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"CentOS6\")\n{\n\n if ((res = isrpmvuln(pkg:\"xulrunner\", rpm:\"xulrunner~10.0.8~2.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner-devel\", rpm:\"xulrunner-devel~10.0.8~2.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-01-02T10:57:33", "bulletinFamily": "scanner", "description": "Check for the Version of thunderbird", "modified": "2018-01-02T00:00:00", "published": "2012-10-16T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=870848", "id": "OPENVAS:870848", "title": "RedHat Update for thunderbird RHSA-2012:1362-01", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for thunderbird RHSA-2012:1362-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Mozilla Thunderbird is a standalone mail and newsgroup client.\n\n A flaw was found in the way Thunderbird handled security wrappers.\n Malicious content could cause Thunderbird to execute arbitrary code with\n the privileges of the user running Thunderbird. (CVE-2012-4193)\n\n Red Hat would like to thank the Mozilla project for reporting this issue.\n Upstream acknowledges moz_bug_r_a4 as the original reporter.\n\n Note: This issue cannot be exploited by a specially-crafted HTML mail\n message as JavaScript is disabled by default for mail messages. It could be\n exploited another way in Thunderbird, for example, when viewing the full\n remote content of an RSS feed.\n\n All Thunderbird users should upgrade to this updated package, which\n corrects this issue. After installing the update, Thunderbird must be\n restarted for the changes to take effect.\";\n\ntag_affected = \"thunderbird on Red Hat Enterprise Linux Desktop (v. 6),\n Red Hat Enterprise Linux Workstation (v. 6)\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/rhsa-announce/2012-October/msg00015.html\");\n script_id(870848);\n script_version(\"$Revision: 8267 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-02 07:29:17 +0100 (Tue, 02 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2012-10-16 09:44:30 +0530 (Tue, 16 Oct 2012)\");\n script_cve_id(\"CVE-2012-4193\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"RHSA\", value: \"2012:1362-01\");\n script_name(\"RedHat Update for thunderbird RHSA-2012:1362-01\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of thunderbird\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"RHENT_6\")\n{\n\n if ((res = isrpmvuln(pkg:\"thunderbird\", rpm:\"thunderbird~10.0.8~2.el6_3\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"thunderbird-debuginfo\", rpm:\"thunderbird-debuginfo~10.0.8~2.el6_3\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-01-02T10:57:09", "bulletinFamily": "scanner", "description": "Check for the Version of thunderbird", "modified": "2017-12-28T00:00:00", "published": "2012-10-16T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=881518", "id": "OPENVAS:881518", "title": "CentOS Update for thunderbird CESA-2012:1362 centos6 ", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for thunderbird CESA-2012:1362 centos6 \n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Mozilla Thunderbird is a standalone mail and newsgroup client.\n\n A flaw was found in the way Thunderbird handled security wrappers.\n Malicious content could cause Thunderbird to execute arbitrary code with\n the privileges of the user running Thunderbird. (CVE-2012-4193)\n \n Red Hat would like to thank the Mozilla project for reporting this issue.\n Upstream acknowledges moz_bug_r_a4 as the original reporter.\n \n Note: This issue cannot be exploited by a specially-crafted HTML mail\n message as JavaScript is disabled by default for mail messages. It could be\n exploited another way in Thunderbird, for example, when viewing the full\n remote content of an RSS feed.\n \n All Thunderbird users should upgrade to this updated package, which\n corrects this issue. After installing the update, Thunderbird must be\n restarted for the changes to take effect.\";\n\ntag_affected = \"thunderbird on CentOS 6\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.centos.org/pipermail/centos-announce/2012-October/018939.html\");\n script_id(881518);\n script_version(\"$Revision: 8253 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-28 07:29:51 +0100 (Thu, 28 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2012-10-16 09:45:13 +0530 (Tue, 16 Oct 2012)\");\n script_cve_id(\"CVE-2012-4193\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"CESA\", value: \"2012:1362\");\n script_name(\"CentOS Update for thunderbird CESA-2012:1362 centos6 \");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of thunderbird\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"CentOS6\")\n{\n\n if ((res = isrpmvuln(pkg:\"thunderbird\", rpm:\"thunderbird~10.0.8~2.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-05-29T18:38:32", "bulletinFamily": "scanner", "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2012-10-16T00:00:00", "id": "OPENVAS:1361412562310881521", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310881521", "title": "CentOS Update for thunderbird CESA-2012:1362 centos5", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for thunderbird CESA-2012:1362 centos5\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.centos.org/pipermail/centos-announce/2012-October/018937.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.881521\");\n script_version(\"$Revision: 14222 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 13:50:48 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2012-10-16 09:45:28 +0530 (Tue, 16 Oct 2012)\");\n script_cve_id(\"CVE-2012-4193\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_xref(name:\"CESA\", value:\"2012:1362\");\n script_name(\"CentOS Update for thunderbird CESA-2012:1362 centos5\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'thunderbird'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\", re:\"ssh/login/release=CentOS5\");\n script_tag(name:\"affected\", value:\"thunderbird on CentOS 5\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n script_tag(name:\"insight\", value:\"Mozilla Thunderbird is a standalone mail and newsgroup client.\n\n A flaw was found in the way Thunderbird handled security wrappers.\n Malicious content could cause Thunderbird to execute arbitrary code with\n the privileges of the user running Thunderbird. (CVE-2012-4193)\n\n Red Hat would like to thank the Mozilla project for reporting this issue.\n Upstream acknowledges moz_bug_r_a4 as the original reporter.\n\n Note: This issue cannot be exploited by a specially-crafted HTML mail\n message as JavaScript is disabled by default for mail messages. It could be\n exploited another way in Thunderbird, for example, when viewing the full\n remote content of an RSS feed.\n\n All Thunderbird users should upgrade to this updated package, which\n corrects this issue. After installing the update, Thunderbird must be\n restarted for the changes to take effect.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"CentOS5\")\n{\n\n if ((res = isrpmvuln(pkg:\"thunderbird\", rpm:\"thunderbird~10.0.8~2.el5.centos\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2018-01-02T10:57:50", "bulletinFamily": "scanner", "description": "Check for the Version of xulrunner", "modified": "2017-12-28T00:00:00", "published": "2012-10-16T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=881517", "id": "OPENVAS:881517", "title": "CentOS Update for xulrunner CESA-2012:1361 centos5 ", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for xulrunner CESA-2012:1361 centos5 \n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"XULRunner provides the XUL Runtime environment for applications using the\n Gecko layout engine.\n\n A flaw was found in the way XULRunner handled security wrappers. A web page\n containing malicious content could possibly cause an application linked\n against XULRunner (such as Mozilla Firefox) to execute arbitrary code with\n the privileges of the user running the application. (CVE-2012-4193)\n \n For technical details regarding this flaw, refer to the Mozilla security\n advisories. You can find a link to the Mozilla advisories in the References\n section of this erratum.\n \n Red Hat would like to thank the Mozilla project for reporting this issue.\n Upstream acknowledges moz_bug_r_a4 as the original reporter.\n \n All XULRunner users should upgrade to these updated packages, which correct\n this issue. After installing the update, applications using XULRunner must\n be restarted for the changes to take effect.\";\n\ntag_affected = \"xulrunner on CentOS 5\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.centos.org/pipermail/centos-announce/2012-October/018936.html\");\n script_id(881517);\n script_version(\"$Revision: 8253 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-28 07:29:51 +0100 (Thu, 28 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2012-10-16 09:45:07 +0530 (Tue, 16 Oct 2012)\");\n script_cve_id(\"CVE-2012-4193\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"CESA\", value: \"2012:1361\");\n script_name(\"CentOS Update for xulrunner CESA-2012:1361 centos5 \");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of xulrunner\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"CentOS5\")\n{\n\n if ((res = isrpmvuln(pkg:\"xulrunner\", rpm:\"xulrunner~10.0.8~2.el5_8\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner-devel\", rpm:\"xulrunner-devel~10.0.8~2.el5_8\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-05-29T18:39:21", "bulletinFamily": "scanner", "description": "The remote host is missing an update for the ", "modified": "2018-11-23T00:00:00", "published": "2012-10-16T00:00:00", "id": "OPENVAS:1361412562310870846", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310870846", "title": "RedHat Update for xulrunner RHSA-2012:1361-01", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for xulrunner RHSA-2012:1361-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"https://www.redhat.com/archives/rhsa-announce/2012-October/msg00014.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.870846\");\n script_version(\"$Revision: 12497 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-11-23 09:28:21 +0100 (Fri, 23 Nov 2018) $\");\n script_tag(name:\"creation_date\", value:\"2012-10-16 09:44:21 +0530 (Tue, 16 Oct 2012)\");\n script_cve_id(\"CVE-2012-4193\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_xref(name:\"RHSA\", value:\"2012:1361-01\");\n script_name(\"RedHat Update for xulrunner RHSA-2012:1361-01\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'xulrunner'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\", re:\"ssh/login/release=RHENT_(6|5)\");\n script_tag(name:\"affected\", value:\"xulrunner on Red Hat Enterprise Linux (v. 5 server),\n Red Hat Enterprise Linux Desktop (v. 6),\n Red Hat Enterprise Linux Server (v. 6),\n Red Hat Enterprise Linux Workstation (v. 6)\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"insight\", value:\"XULRunner provides the XUL Runtime environment for applications using the\n Gecko layout engine.\n\n A flaw was found in the way XULRunner handled security wrappers. A web page\n containing malicious content could possibly cause an application linked\n against XULRunner (such as Mozilla Firefox) to execute arbitrary code with\n the privileges of the user running the application. (CVE-2012-4193)\n\n For technical details regarding this flaw, refer to the Mozilla security\n advisories. You can find a link to the Mozilla advisories in the References\n section of this erratum.\n\n Red Hat would like to thank the Mozilla project for reporting this issue.\n Upstream acknowledges moz_bug_r_a4 as the original reporter.\n\n All XULRunner users should upgrade to these updated packages, which correct\n this issue. After installing the update, applications using XULRunner must\n be restarted for the changes to take effect.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"RHENT_6\")\n{\n\n if ((res = isrpmvuln(pkg:\"xulrunner\", rpm:\"xulrunner~10.0.8~2.el6_3\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner-debuginfo\", rpm:\"xulrunner-debuginfo~10.0.8~2.el6_3\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"RHENT_5\")\n{\n\n if ((res = isrpmvuln(pkg:\"xulrunner\", rpm:\"xulrunner~10.0.8~2.el5_8\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner-debuginfo\", rpm:\"xulrunner-debuginfo~10.0.8~2.el5_8\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner-devel\", rpm:\"xulrunner-devel~10.0.8~2.el5_8\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:36:10", "bulletinFamily": "scanner", "description": "Oracle Linux Local Security Checks ELSA-2012-1362", "modified": "2018-09-28T00:00:00", "published": "2015-10-06T00:00:00", "id": "OPENVAS:1361412562310123802", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310123802", "title": "Oracle Linux Local Check: ELSA-2012-1362", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: ELSA-2012-1362.nasl 11688 2018-09-28 13:36:28Z cfischer $\n#\n# Oracle Linux Local Check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.123802\");\n script_version(\"$Revision: 11688 $\");\n script_tag(name:\"creation_date\", value:\"2015-10-06 14:08:45 +0300 (Tue, 06 Oct 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-09-28 15:36:28 +0200 (Fri, 28 Sep 2018) $\");\n script_name(\"Oracle Linux Local Check: ELSA-2012-1362\");\n script_tag(name:\"insight\", value:\"ELSA-2012-1362 - thunderbird security update. Please see the references for more insight.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"summary\", value:\"Oracle Linux Local Security Checks ELSA-2012-1362\");\n script_xref(name:\"URL\", value:\"http://linux.oracle.com/errata/ELSA-2012-1362.html\");\n script_cve_id(\"CVE-2012-4193\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/oracle_linux\", \"ssh/login/release\", re:\"ssh/login/release=OracleLinux(5|6)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Eero Volotinen\");\n script_family(\"Oracle Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"OracleLinux5\")\n{\n if ((res = isrpmvuln(pkg:\"thunderbird\", rpm:\"thunderbird~10.0.8~2.0.1.el5_8\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif(release == \"OracleLinux6\")\n{\n if ((res = isrpmvuln(pkg:\"thunderbird\", rpm:\"thunderbird~10.0.8~2.0.1.el6_3\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif (__pkg_match) exit(99);\n exit(0);\n\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:38:59", "bulletinFamily": "scanner", "description": "The remote host is missing an update for the ", "modified": "2018-11-23T00:00:00", "published": "2012-10-16T00:00:00", "id": "OPENVAS:1361412562310870848", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310870848", "title": "RedHat Update for thunderbird RHSA-2012:1362-01", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for thunderbird RHSA-2012:1362-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"https://www.redhat.com/archives/rhsa-announce/2012-October/msg00015.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.870848\");\n script_version(\"$Revision: 12497 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-11-23 09:28:21 +0100 (Fri, 23 Nov 2018) $\");\n script_tag(name:\"creation_date\", value:\"2012-10-16 09:44:30 +0530 (Tue, 16 Oct 2012)\");\n script_cve_id(\"CVE-2012-4193\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_xref(name:\"RHSA\", value:\"2012:1362-01\");\n script_name(\"RedHat Update for thunderbird RHSA-2012:1362-01\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'thunderbird'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\", re:\"ssh/login/release=RHENT_6\");\n script_tag(name:\"affected\", value:\"thunderbird on Red Hat Enterprise Linux Desktop (v. 6),\n Red Hat Enterprise Linux Workstation (v. 6)\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"insight\", value:\"Mozilla Thunderbird is a standalone mail and newsgroup client.\n\n A flaw was found in the way Thunderbird handled security wrappers.\n Malicious content could cause Thunderbird to execute arbitrary code with\n the privileges of the user running Thunderbird. (CVE-2012-4193)\n\n Red Hat would like to thank the Mozilla project for reporting this issue.\n Upstream acknowledges moz_bug_r_a4 as the original reporter.\n\n Note: This issue cannot be exploited by a specially-crafted HTML mail\n message as JavaScript is disabled by default for mail messages. It could be\n exploited another way in Thunderbird, for example, when viewing the full\n remote content of an RSS feed.\n\n All Thunderbird users should upgrade to this updated package, which\n corrects this issue. After installing the update, Thunderbird must be\n restarted for the changes to take effect.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"RHENT_6\")\n{\n\n if ((res = isrpmvuln(pkg:\"thunderbird\", rpm:\"thunderbird~10.0.8~2.el6_3\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"thunderbird-debuginfo\", rpm:\"thunderbird-debuginfo~10.0.8~2.el6_3\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2018-01-02T10:57:30", "bulletinFamily": "scanner", "description": "Check for the Version of xulrunner", "modified": "2017-12-27T00:00:00", "published": "2012-10-16T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=870846", "id": "OPENVAS:870846", "title": "RedHat Update for xulrunner RHSA-2012:1361-01", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for xulrunner RHSA-2012:1361-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"XULRunner provides the XUL Runtime environment for applications using the\n Gecko layout engine.\n\n A flaw was found in the way XULRunner handled security wrappers. A web page\n containing malicious content could possibly cause an application linked\n against XULRunner (such as Mozilla Firefox) to execute arbitrary code with\n the privileges of the user running the application. (CVE-2012-4193)\n\n For technical details regarding this flaw, refer to the Mozilla security\n advisories. You can find a link to the Mozilla advisories in the References\n section of this erratum.\n\n Red Hat would like to thank the Mozilla project for reporting this issue.\n Upstream acknowledges moz_bug_r_a4 as the original reporter.\n\n All XULRunner users should upgrade to these updated packages, which correct\n this issue. After installing the update, applications using XULRunner must\n be restarted for the changes to take effect.\";\n\ntag_affected = \"xulrunner on Red Hat Enterprise Linux (v. 5 server),\n Red Hat Enterprise Linux Desktop (v. 6),\n Red Hat Enterprise Linux Server (v. 6),\n Red Hat Enterprise Linux Workstation (v. 6)\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/rhsa-announce/2012-October/msg00014.html\");\n script_id(870846);\n script_version(\"$Revision: 8249 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-27 07:29:56 +0100 (Wed, 27 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2012-10-16 09:44:21 +0530 (Tue, 16 Oct 2012)\");\n script_cve_id(\"CVE-2012-4193\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"RHSA\", value: \"2012:1361-01\");\n script_name(\"RedHat Update for xulrunner RHSA-2012:1361-01\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of xulrunner\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"RHENT_6\")\n{\n\n if ((res = isrpmvuln(pkg:\"xulrunner\", rpm:\"xulrunner~10.0.8~2.el6_3\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner-debuginfo\", rpm:\"xulrunner-debuginfo~10.0.8~2.el6_3\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"RHENT_5\")\n{\n\n if ((res = isrpmvuln(pkg:\"xulrunner\", rpm:\"xulrunner~10.0.8~2.el5_8\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner-debuginfo\", rpm:\"xulrunner-debuginfo~10.0.8~2.el5_8\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner-devel\", rpm:\"xulrunner-devel~10.0.8~2.el5_8\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "oraclelinux": [{"lastseen": "2019-05-29T18:34:14", "bulletinFamily": "unix", "description": "[10.0.8-2.0.1.el6_3]\n- Replace xulrunner-redhat-default-prefs.js with xulrunner-oracle-default-prefs.js\n[10.0.8-2]\n- Added patches from 10.0.9 ESR", "modified": "2012-10-12T00:00:00", "published": "2012-10-12T00:00:00", "id": "ELSA-2012-1361", "href": "http://linux.oracle.com/errata/ELSA-2012-1361.html", "title": "xulrunner security update", "type": "oraclelinux", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:34:30", "bulletinFamily": "unix", "description": "[10.0.8-2.0.1.el6_3]\n- Replaced thunderbird-redhat-default-prefs.js with thunderbird-oracle-default-prefs.js\n- Replace clean.gif in tarball\n[10.0.8-2]\n- Added patches from 10.0.9 ESR", "modified": "2012-10-12T00:00:00", "published": "2012-10-12T00:00:00", "id": "ELSA-2012-1362", "href": "http://linux.oracle.com/errata/ELSA-2012-1362.html", "title": "thunderbird security update", "type": "oraclelinux", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "nessus": [{"lastseen": "2019-11-01T03:14:23", "bulletinFamily": "scanner", "description": "From Red Hat Security Advisory 2012:1361 :\n\nUpdated xulrunner packages that fix one security issue are now\navailable for Red Hat Enterprise Linux 5 and 6.\n\nThe Red Hat Security Response Team has rated this update as having\ncritical security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from\nthe CVE link in the References section.\n\nXULRunner provides the XUL Runtime environment for applications using\nthe Gecko layout engine.\n\nA flaw was found in the way XULRunner handled security wrappers. A web\npage containing malicious content could possibly cause an application\nlinked against XULRunner (such as Mozilla Firefox) to execute\narbitrary code with the privileges of the user running the\napplication. (CVE-2012-4193)\n\nFor technical details regarding this flaw, refer to the Mozilla\nsecurity advisories. You can find a link to the Mozilla advisories in\nthe References section of this erratum.\n\nRed Hat would like to thank the Mozilla project for reporting this\nissue. Upstream acknowledges moz_bug_r_a4 as the original reporter.\n\nAll XULRunner users should upgrade to these updated packages, which\ncorrect this issue. After installing the update, applications using\nXULRunner must be restarted for the changes to take effect.", "modified": "2019-11-02T00:00:00", "id": "ORACLELINUX_ELSA-2012-1361.NASL", "href": "https://www.tenable.com/plugins/nessus/68638", "published": "2013-07-12T00:00:00", "title": "Oracle Linux 5 / 6 : xulrunner (ELSA-2012-1361)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2012:1361 and \n# Oracle Linux Security Advisory ELSA-2012-1361 respectively.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(68638);\n script_version(\"1.6\");\n script_cvs_date(\"Date: 2019/09/30 10:58:17\");\n\n script_cve_id(\"CVE-2012-4193\");\n script_bugtraq_id(55889);\n script_xref(name:\"RHSA\", value:\"2012:1361\");\n\n script_name(english:\"Oracle Linux 5 / 6 : xulrunner (ELSA-2012-1361)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Oracle Linux host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"From Red Hat Security Advisory 2012:1361 :\n\nUpdated xulrunner packages that fix one security issue are now\navailable for Red Hat Enterprise Linux 5 and 6.\n\nThe Red Hat Security Response Team has rated this update as having\ncritical security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from\nthe CVE link in the References section.\n\nXULRunner provides the XUL Runtime environment for applications using\nthe Gecko layout engine.\n\nA flaw was found in the way XULRunner handled security wrappers. A web\npage containing malicious content could possibly cause an application\nlinked against XULRunner (such as Mozilla Firefox) to execute\narbitrary code with the privileges of the user running the\napplication. (CVE-2012-4193)\n\nFor technical details regarding this flaw, refer to the Mozilla\nsecurity advisories. You can find a link to the Mozilla advisories in\nthe References section of this erratum.\n\nRed Hat would like to thank the Mozilla project for reporting this\nissue. Upstream acknowledges moz_bug_r_a4 as the original reporter.\n\nAll XULRunner users should upgrade to these updated packages, which\ncorrect this issue. After installing the update, applications using\nXULRunner must be restarted for the changes to take effect.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2012-October/003077.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2012-October/003080.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected xulrunner packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:xulrunner\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:xulrunner-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:5\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:6\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2012/10/12\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/10/13\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/07/12\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/OracleLinux\")) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nos_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Oracle Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(5|6)([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Oracle Linux 5 / 6\", \"Oracle Linux \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Oracle Linux\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"EL5\", reference:\"xulrunner-10.0.8-2.0.1.el5_8\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"xulrunner-devel-10.0.8-2.0.1.el5_8\")) flag++;\n\nif (rpm_check(release:\"EL6\", reference:\"xulrunner-10.0.8-2.0.1.el6_3\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"xulrunner-devel-10.0.8-2.0.1.el6_3\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"xulrunner / xulrunner-devel\");\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-11-01T03:20:38", "bulletinFamily": "scanner", "description": "An updated thunderbird package that fixes one security issue is now\navailable for Red Hat Enterprise Linux 5 and 6.\n\nThe Red Hat Security Response Team has rated this update as having\ncritical security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from\nthe CVE link in the References section.\n\nMozilla Thunderbird is a standalone mail and newsgroup client.\n\nA flaw was found in the way Thunderbird handled security wrappers.\nMalicious content could cause Thunderbird to execute arbitrary code\nwith the privileges of the user running Thunderbird. (CVE-2012-4193)\n\nRed Hat would like to thank the Mozilla project for reporting this\nissue. Upstream acknowledges moz_bug_r_a4 as the original reporter.\n\nNote: This issue cannot be exploited by a specially crafted HTML mail\nmessage as JavaScript is disabled by default for mail messages. It\ncould be exploited another way in Thunderbird, for example, when\nviewing the full remote content of an RSS feed.\n\nAll Thunderbird users should upgrade to this updated package, which\ncorrects this issue. After installing the update, Thunderbird must be\nrestarted for the changes to take effect.", "modified": "2019-11-02T00:00:00", "id": "REDHAT-RHSA-2012-1362.NASL", "href": "https://www.tenable.com/plugins/nessus/62542", "published": "2012-10-15T00:00:00", "title": "RHEL 5 / 6 : thunderbird (RHSA-2012:1362)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2012:1362. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(62542);\n script_version (\"1.20\");\n script_cvs_date(\"Date: 2019/10/24 15:35:36\");\n\n script_cve_id(\"CVE-2012-4193\");\n script_bugtraq_id(55889);\n script_xref(name:\"RHSA\", value:\"2012:1362\");\n\n script_name(english:\"RHEL 5 / 6 : thunderbird (RHSA-2012:1362)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An updated thunderbird package that fixes one security issue is now\navailable for Red Hat Enterprise Linux 5 and 6.\n\nThe Red Hat Security Response Team has rated this update as having\ncritical security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from\nthe CVE link in the References section.\n\nMozilla Thunderbird is a standalone mail and newsgroup client.\n\nA flaw was found in the way Thunderbird handled security wrappers.\nMalicious content could cause Thunderbird to execute arbitrary code\nwith the privileges of the user running Thunderbird. (CVE-2012-4193)\n\nRed Hat would like to thank the Mozilla project for reporting this\nissue. Upstream acknowledges moz_bug_r_a4 as the original reporter.\n\nNote: This issue cannot be exploited by a specially crafted HTML mail\nmessage as JavaScript is disabled by default for mail messages. It\ncould be exploited another way in Thunderbird, for example, when\nviewing the full remote content of an RSS feed.\n\nAll Thunderbird users should upgrade to this updated package, which\ncorrects this issue. After installing the update, Thunderbird must be\nrestarted for the changes to take effect.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2012:1362\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2012-4193\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Update the affected thunderbird and / or thunderbird-debuginfo\npackages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:thunderbird\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:thunderbird-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:5\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6.3\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2012/10/12\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/10/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/10/15\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(5|6)([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 5.x / 6.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2012:1362\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"thunderbird-10.0.8-2.el5_8\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"thunderbird-10.0.8-2.el5_8\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"thunderbird-debuginfo-10.0.8-2.el5_8\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"thunderbird-debuginfo-10.0.8-2.el5_8\")) flag++;\n\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"thunderbird-10.0.8-2.el6_3\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"thunderbird-10.0.8-2.el6_3\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"thunderbird-10.0.8-2.el6_3\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"thunderbird-debuginfo-10.0.8-2.el6_3\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"thunderbird-debuginfo-10.0.8-2.el6_3\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"thunderbird-debuginfo-10.0.8-2.el6_3\")) flag++;\n\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"thunderbird / thunderbird-debuginfo\");\n }\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-11-03T12:12:58", "bulletinFamily": "scanner", "description": "A flaw was found in the way XULRunner handled security wrappers. A web\npage containing malicious content could possibly cause an application\nlinked against XULRunner (such as Mozilla Firefox) to execute\narbitrary code with the privileges of the user running the\napplication. (CVE-2012-4193)\n\nAfter installing the update, applications using XULRunner must be\nrestarted for the changes to take effect.", "modified": "2019-11-02T00:00:00", "id": "SL_20121012_XULRUNNER_ON_SL5_X.NASL", "href": "https://www.tenable.com/plugins/nessus/62556", "published": "2012-10-16T00:00:00", "title": "Scientific Linux Security Update : xulrunner on SL5.x, SL6.x i386/x86_64", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text is (C) Scientific Linux.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(62556);\n script_version(\"1.4\");\n script_cvs_date(\"Date: 2018/12/31 11:35:01\");\n\n script_cve_id(\"CVE-2012-4193\");\n\n script_name(english:\"Scientific Linux Security Update : xulrunner on SL5.x, SL6.x i386/x86_64\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Scientific Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"A flaw was found in the way XULRunner handled security wrappers. A web\npage containing malicious content could possibly cause an application\nlinked against XULRunner (such as Mozilla Firefox) to execute\narbitrary code with the privileges of the user running the\napplication. (CVE-2012-4193)\n\nAfter installing the update, applications using XULRunner must be\nrestarted for the changes to take effect.\"\n );\n # https://listserv.fnal.gov/scripts/wa.exe?A2=ind1210&L=scientific-linux-errata&T=0&P=1892\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?ccca2e88\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected xulrunner and / or xulrunner-devel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"x-cpe:/o:fermilab:scientific_linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/10/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/10/16\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Scientific Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Scientific Linux \" >!< release) audit(AUDIT_HOST_NOT, \"running Scientific Linux\");\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Scientific Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"SL5\", reference:\"xulrunner-10.0.8-2.el5_8\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"xulrunner-devel-10.0.8-2.el5_8\")) flag++;\n\nif (rpm_check(release:\"SL6\", reference:\"xulrunner-10.0.8-2.el6_3\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"xulrunner-devel-10.0.8-2.el6_3\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-11-01T02:15:19", "bulletinFamily": "scanner", "description": "Updated xulrunner packages that fix one security issue are now\navailable for Red Hat Enterprise Linux 5 and 6.\n\nThe Red Hat Security Response Team has rated this update as having\ncritical security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from\nthe CVE link in the References section.\n\nXULRunner provides the XUL Runtime environment for applications using\nthe Gecko layout engine.\n\nA flaw was found in the way XULRunner handled security wrappers. A web\npage containing malicious content could possibly cause an application\nlinked against XULRunner (such as Mozilla Firefox) to execute\narbitrary code with the privileges of the user running the\napplication. (CVE-2012-4193)\n\nFor technical details regarding this flaw, refer to the Mozilla\nsecurity advisories. You can find a link to the Mozilla advisories in\nthe References section of this erratum.\n\nRed Hat would like to thank the Mozilla project for reporting this\nissue. Upstream acknowledges moz_bug_r_a4 as the original reporter.\n\nAll XULRunner users should upgrade to these updated packages, which\ncorrect this issue. After installing the update, applications using\nXULRunner must be restarted for the changes to take effect.", "modified": "2019-11-02T00:00:00", "id": "CENTOS_RHSA-2012-1361.NASL", "href": "https://www.tenable.com/plugins/nessus/62521", "published": "2012-10-15T00:00:00", "title": "CentOS 5 / 6 : xulrunner (CESA-2012:1361)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2012:1361 and \n# CentOS Errata and Security Advisory 2012:1361 respectively.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(62521);\n script_version(\"1.11\");\n script_cvs_date(\"Date: 2019/10/02 15:30:18\");\n\n script_cve_id(\"CVE-2012-4193\");\n script_bugtraq_id(55889);\n script_xref(name:\"RHSA\", value:\"2012:1361\");\n\n script_name(english:\"CentOS 5 / 6 : xulrunner (CESA-2012:1361)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated xulrunner packages that fix one security issue are now\navailable for Red Hat Enterprise Linux 5 and 6.\n\nThe Red Hat Security Response Team has rated this update as having\ncritical security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from\nthe CVE link in the References section.\n\nXULRunner provides the XUL Runtime environment for applications using\nthe Gecko layout engine.\n\nA flaw was found in the way XULRunner handled security wrappers. A web\npage containing malicious content could possibly cause an application\nlinked against XULRunner (such as Mozilla Firefox) to execute\narbitrary code with the privileges of the user running the\napplication. (CVE-2012-4193)\n\nFor technical details regarding this flaw, refer to the Mozilla\nsecurity advisories. You can find a link to the Mozilla advisories in\nthe References section of this erratum.\n\nRed Hat would like to thank the Mozilla project for reporting this\nissue. Upstream acknowledges moz_bug_r_a4 as the original reporter.\n\nAll XULRunner users should upgrade to these updated packages, which\ncorrect this issue. After installing the update, applications using\nXULRunner must be restarted for the changes to take effect.\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2012-October/018936.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?e3d33504\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2012-October/018940.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?da250dee\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected xulrunner packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:xulrunner\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:xulrunner-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:5\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:6\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2012/10/12\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/10/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/10/15\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(5|6)([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 5.x / 6.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-5\", reference:\"xulrunner-10.0.8-2.el5_8\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"xulrunner-devel-10.0.8-2.el5_8\")) flag++;\n\nif (rpm_check(release:\"CentOS-6\", reference:\"xulrunner-10.0.8-2.el6.centos\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"xulrunner-devel-10.0.8-2.el6.centos\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"xulrunner / xulrunner-devel\");\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-11-01T03:14:23", "bulletinFamily": "scanner", "description": "From Red Hat Security Advisory 2012:1362 :\n\nAn updated thunderbird package that fixes one security issue is now\navailable for Red Hat Enterprise Linux 5 and 6.\n\nThe Red Hat Security Response Team has rated this update as having\ncritical security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from\nthe CVE link in the References section.\n\nMozilla Thunderbird is a standalone mail and newsgroup client.\n\nA flaw was found in the way Thunderbird handled security wrappers.\nMalicious content could cause Thunderbird to execute arbitrary code\nwith the privileges of the user running Thunderbird. (CVE-2012-4193)\n\nRed Hat would like to thank the Mozilla project for reporting this\nissue. Upstream acknowledges moz_bug_r_a4 as the original reporter.\n\nNote: This issue cannot be exploited by a specially crafted HTML mail\nmessage as JavaScript is disabled by default for mail messages. It\ncould be exploited another way in Thunderbird, for example, when\nviewing the full remote content of an RSS feed.\n\nAll Thunderbird users should upgrade to this updated package, which\ncorrects this issue. After installing the update, Thunderbird must be\nrestarted for the changes to take effect.", "modified": "2019-11-02T00:00:00", "id": "ORACLELINUX_ELSA-2012-1362.NASL", "href": "https://www.tenable.com/plugins/nessus/68639", "published": "2013-07-12T00:00:00", "title": "Oracle Linux 6 : thunderbird (ELSA-2012-1362)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2012:1362 and \n# Oracle Linux Security Advisory ELSA-2012-1362 respectively.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(68639);\n script_version(\"1.7\");\n script_cvs_date(\"Date: 2019/09/30 10:58:17\");\n\n script_cve_id(\"CVE-2012-4193\");\n script_bugtraq_id(55889);\n script_xref(name:\"RHSA\", value:\"2012:1362\");\n\n script_name(english:\"Oracle Linux 6 : thunderbird (ELSA-2012-1362)\");\n script_summary(english:\"Checks rpm output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Oracle Linux host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"From Red Hat Security Advisory 2012:1362 :\n\nAn updated thunderbird package that fixes one security issue is now\navailable for Red Hat Enterprise Linux 5 and 6.\n\nThe Red Hat Security Response Team has rated this update as having\ncritical security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from\nthe CVE link in the References section.\n\nMozilla Thunderbird is a standalone mail and newsgroup client.\n\nA flaw was found in the way Thunderbird handled security wrappers.\nMalicious content could cause Thunderbird to execute arbitrary code\nwith the privileges of the user running Thunderbird. (CVE-2012-4193)\n\nRed Hat would like to thank the Mozilla project for reporting this\nissue. Upstream acknowledges moz_bug_r_a4 as the original reporter.\n\nNote: This issue cannot be exploited by a specially crafted HTML mail\nmessage as JavaScript is disabled by default for mail messages. It\ncould be exploited another way in Thunderbird, for example, when\nviewing the full remote content of an RSS feed.\n\nAll Thunderbird users should upgrade to this updated package, which\ncorrects this issue. After installing the update, Thunderbird must be\nrestarted for the changes to take effect.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2012-October/003078.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected thunderbird package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:thunderbird\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:6\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2012/10/12\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/10/13\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/07/12\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/OracleLinux\")) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nos_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Oracle Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Oracle Linux 6\", \"Oracle Linux \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Oracle Linux\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"EL6\", reference:\"thunderbird-10.0.8-2.0.1.el6_3\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"thunderbird\");\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-11-01T02:15:19", "bulletinFamily": "scanner", "description": "An updated thunderbird package that fixes one security issue is now\navailable for Red Hat Enterprise Linux 5 and 6.\n\nThe Red Hat Security Response Team has rated this update as having\ncritical security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from\nthe CVE link in the References section.\n\nMozilla Thunderbird is a standalone mail and newsgroup client.\n\nA flaw was found in the way Thunderbird handled security wrappers.\nMalicious content could cause Thunderbird to execute arbitrary code\nwith the privileges of the user running Thunderbird. (CVE-2012-4193)\n\nRed Hat would like to thank the Mozilla project for reporting this\nissue. Upstream acknowledges moz_bug_r_a4 as the original reporter.\n\nNote: This issue cannot be exploited by a specially crafted HTML mail\nmessage as JavaScript is disabled by default for mail messages. It\ncould be exploited another way in Thunderbird, for example, when\nviewing the full remote content of an RSS feed.\n\nAll Thunderbird users should upgrade to this updated package, which\ncorrects this issue. After installing the update, Thunderbird must be\nrestarted for the changes to take effect.", "modified": "2019-11-02T00:00:00", "id": "CENTOS_RHSA-2012-1362.NASL", "href": "https://www.tenable.com/plugins/nessus/62522", "published": "2012-10-15T00:00:00", "title": "CentOS 5 / 6 : thunderbird (CESA-2012:1362)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2012:1362 and \n# CentOS Errata and Security Advisory 2012:1362 respectively.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(62522);\n script_version(\"1.11\");\n script_cvs_date(\"Date: 2019/10/02 15:30:18\");\n\n script_cve_id(\"CVE-2012-4193\");\n script_bugtraq_id(55889);\n script_xref(name:\"RHSA\", value:\"2012:1362\");\n\n script_name(english:\"CentOS 5 / 6 : thunderbird (CESA-2012:1362)\");\n script_summary(english:\"Checks rpm output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An updated thunderbird package that fixes one security issue is now\navailable for Red Hat Enterprise Linux 5 and 6.\n\nThe Red Hat Security Response Team has rated this update as having\ncritical security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from\nthe CVE link in the References section.\n\nMozilla Thunderbird is a standalone mail and newsgroup client.\n\nA flaw was found in the way Thunderbird handled security wrappers.\nMalicious content could cause Thunderbird to execute arbitrary code\nwith the privileges of the user running Thunderbird. (CVE-2012-4193)\n\nRed Hat would like to thank the Mozilla project for reporting this\nissue. Upstream acknowledges moz_bug_r_a4 as the original reporter.\n\nNote: This issue cannot be exploited by a specially crafted HTML mail\nmessage as JavaScript is disabled by default for mail messages. It\ncould be exploited another way in Thunderbird, for example, when\nviewing the full remote content of an RSS feed.\n\nAll Thunderbird users should upgrade to this updated package, which\ncorrects this issue. After installing the update, Thunderbird must be\nrestarted for the changes to take effect.\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2012-October/018937.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?b1a446e9\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2012-October/018939.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?7b3ada1b\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected thunderbird package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:thunderbird\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:5\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:6\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2012/10/12\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/10/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/10/15\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(5|6)([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 5.x / 6.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-5\", reference:\"thunderbird-10.0.8-2.el5.centos\")) flag++;\n\nif (rpm_check(release:\"CentOS-6\", reference:\"thunderbird-10.0.8-2.el6.centos\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"thunderbird\");\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-11-01T03:20:38", "bulletinFamily": "scanner", "description": "Updated xulrunner packages that fix one security issue are now\navailable for Red Hat Enterprise Linux 5 and 6.\n\nThe Red Hat Security Response Team has rated this update as having\ncritical security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from\nthe CVE link in the References section.\n\nXULRunner provides the XUL Runtime environment for applications using\nthe Gecko layout engine.\n\nA flaw was found in the way XULRunner handled security wrappers. A web\npage containing malicious content could possibly cause an application\nlinked against XULRunner (such as Mozilla Firefox) to execute\narbitrary code with the privileges of the user running the\napplication. (CVE-2012-4193)\n\nFor technical details regarding this flaw, refer to the Mozilla\nsecurity advisories. You can find a link to the Mozilla advisories in\nthe References section of this erratum.\n\nRed Hat would like to thank the Mozilla project for reporting this\nissue. Upstream acknowledges moz_bug_r_a4 as the original reporter.\n\nAll XULRunner users should upgrade to these updated packages, which\ncorrect this issue. After installing the update, applications using\nXULRunner must be restarted for the changes to take effect.", "modified": "2019-11-02T00:00:00", "id": "REDHAT-RHSA-2012-1361.NASL", "href": "https://www.tenable.com/plugins/nessus/62541", "published": "2012-10-15T00:00:00", "title": "RHEL 5 / 6 : xulrunner (RHSA-2012:1361)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2012:1361. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(62541);\n script_version (\"1.20\");\n script_cvs_date(\"Date: 2019/10/24 15:35:36\");\n\n script_cve_id(\"CVE-2012-4193\");\n script_bugtraq_id(55889);\n script_xref(name:\"RHSA\", value:\"2012:1361\");\n\n script_name(english:\"RHEL 5 / 6 : xulrunner (RHSA-2012:1361)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated xulrunner packages that fix one security issue are now\navailable for Red Hat Enterprise Linux 5 and 6.\n\nThe Red Hat Security Response Team has rated this update as having\ncritical security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from\nthe CVE link in the References section.\n\nXULRunner provides the XUL Runtime environment for applications using\nthe Gecko layout engine.\n\nA flaw was found in the way XULRunner handled security wrappers. A web\npage containing malicious content could possibly cause an application\nlinked against XULRunner (such as Mozilla Firefox) to execute\narbitrary code with the privileges of the user running the\napplication. (CVE-2012-4193)\n\nFor technical details regarding this flaw, refer to the Mozilla\nsecurity advisories. You can find a link to the Mozilla advisories in\nthe References section of this erratum.\n\nRed Hat would like to thank the Mozilla project for reporting this\nissue. Upstream acknowledges moz_bug_r_a4 as the original reporter.\n\nAll XULRunner users should upgrade to these updated packages, which\ncorrect this issue. After installing the update, applications using\nXULRunner must be restarted for the changes to take effect.\"\n );\n # http://www.mozilla.org/security/known-vulnerabilities/firefoxESR.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?a134523f\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2012:1361\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2012-4193\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Update the affected xulrunner, xulrunner-debuginfo and / or\nxulrunner-devel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:xulrunner\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:xulrunner-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:xulrunner-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:5\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6.3\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2012/10/12\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/10/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/10/15\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(5|6)([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 5.x / 6.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2012:1361\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL5\", reference:\"xulrunner-10.0.8-2.el5_8\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", reference:\"xulrunner-debuginfo-10.0.8-2.el5_8\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", reference:\"xulrunner-devel-10.0.8-2.el5_8\")) flag++;\n\n\n if (rpm_check(release:\"RHEL6\", reference:\"xulrunner-10.0.8-2.el6_3\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", reference:\"xulrunner-debuginfo-10.0.8-2.el6_3\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", reference:\"xulrunner-devel-10.0.8-2.el6_3\")) flag++;\n\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"xulrunner / xulrunner-debuginfo / xulrunner-devel\");\n }\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-11-01T02:55:27", "bulletinFamily": "scanner", "description": "The installed version of Firefox 10.x is potentially affected by the\nfollowing security issues :\n\n - An unspecified error exists that can allow attackers to\n bypass the ", "modified": "2019-11-02T00:00:00", "id": "MOZILLA_FIREFOX_1009.NASL", "href": "https://www.tenable.com/plugins/nessus/62588", "published": "2012-10-17T00:00:00", "title": "Firefox 10.x < 10.0.9 Multiple Vulnerabilities", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(62588);\n script_version(\"1.10\");\n script_cvs_date(\"Date: 2018/07/16 14:09:14\");\n\n script_cve_id(\"CVE-2012-4192\", \"CVE-2012-4193\");\n script_bugtraq_id(56154, 56155);\n\n script_name(english:\"Firefox 10.x < 10.0.9 Multiple Vulnerabilities\");\n script_summary(english:\"Checks version of Firefox\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\n\"The remote Windows host contains a web browser that is affected by\nmultiple vulnerabilities.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"The installed version of Firefox 10.x is potentially affected by the\nfollowing security issues :\n\n - An unspecified error exists that can allow attackers to\n bypass the 'Same Origin Policy' and access the\n 'Location' object. (CVE-2012-4192)\n\n - An error exists related to 'security wrappers' and the\n function 'defaultValue()' that can allow cross-site\n scripting attacks. (CVE-2012-4193)\"\n );\n # http://www.thespanner.co.uk/2012/10/10/firefox-knows-what-your-friends-did-last-summer/\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?8993e6b4\");\n # https://blog.mozilla.org/security/2012/10/10/security-vulnerability-in-firefox-16/\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?dc43f3c3\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2012-89/\");\n\n script_set_attribute(attribute:\"solution\", value:\"Upgrade to Firefox 10.0.9 ESR or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2012/10/10\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/10/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/10/17\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:mozilla:firefox\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2012-2018 Tenable Network Security, Inc.\");\n\n script_dependencies(\"mozilla_org_installed.nasl\");\n script_require_keys(\"Mozilla/Firefox/Version\");\n\n exit(0);\n}\n\ninclude(\"mozilla_version.inc\");\nport = get_kb_item_or_exit(\"SMB/transport\"); \n\ninstalls = get_kb_list(\"SMB/Mozilla/Firefox/*\");\nif (isnull(installs)) audit(AUDIT_NOT_INST, \"Firefox\");\n\nmozilla_check_version(installs:installs, product:'firefox', esr:TRUE, fix:'10.0.9', min:'10.0', severity:SECURITY_WARNING, xss:TRUE);", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-11-01T02:56:48", "bulletinFamily": "scanner", "description": "The installed version of Thunderbird 10.x is potentially affected by\nthe following security issues :\n\n - An unspecified error exists that can allow attackers to\n bypass the ", "modified": "2019-11-02T00:00:00", "id": "MOZILLA_THUNDERBIRD_1009.NASL", "href": "https://www.tenable.com/plugins/nessus/62590", "published": "2012-10-17T00:00:00", "title": "Mozilla Thunderbird 10.x < 10.0.9 Multiple Vulnerabilities", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(62590);\n script_version(\"1.10\");\n script_cvs_date(\"Date: 2018/07/16 14:09:15\");\n\n script_cve_id(\"CVE-2012-4192\", \"CVE-2012-4193\");\n script_bugtraq_id(56154, 56155);\n\n script_name(english:\"Mozilla Thunderbird 10.x < 10.0.9 Multiple Vulnerabilities\");\n script_summary(english:\"Checks version of Thunderbird\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\n\"The remote Windows host contains a mail client that is potentially\naffected by several vulnerabilities.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"The installed version of Thunderbird 10.x is potentially affected by\nthe following security issues :\n\n - An unspecified error exists that can allow attackers to\n bypass the 'Same Origin Policy' and access the\n 'Location' object. (CVE-2012-4192)\n\n - An error exists related to 'security wrappers' and the\n function 'defaultValue()' that can allow cross-site\n scripting attacks. (CVE-2012-4193)\"\n );\n # http://www.thespanner.co.uk/2012/10/10/firefox-knows-what-your-friends-did-last-summer/\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?8993e6b4\");\n # https://blog.mozilla.org/security/2012/10/10/security-vulnerability-in-firefox-16/\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?dc43f3c3\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2012-89/\");\n\n script_set_attribute(attribute:\"solution\", value:\"Upgrade to Thunderbird 10.0.9 ESR or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2012/10/10\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/10/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/10/17\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:mozilla:thunderbird\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2013-2018 Tenable Network Security, Inc.\");\n\n script_dependencies(\"mozilla_org_installed.nasl\");\n script_require_keys(\"Mozilla/Thunderbird/Version\");\n exit(0);\n}\n\ninclude(\"mozilla_version.inc\");\nport = get_kb_item_or_exit(\"SMB/transport\");\n\ninstalls = get_kb_list(\"SMB/Mozilla/Thunderbird/*\");\nif (isnull(installs)) audit(AUDIT_NOT_INST, \"Thunderbird\");\n\nmozilla_check_version(installs:installs, product:'thunderbird', esr:TRUE, fix:'10.0.9', min:'10.0', severity:SECURITY_WARNING, xss:TRUE);", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-11-01T02:50:48", "bulletinFamily": "scanner", "description": "The installed version of Firefox is earlier than 10.0.9 and thus, is\npotentially affected by the following security issues :\n\n - An unspecified error exists that can allow attackers to\n bypass the ", "modified": "2019-11-02T00:00:00", "id": "MACOSX_FIREFOX_10_0_9.NASL", "href": "https://www.tenable.com/plugins/nessus/62584", "published": "2012-10-17T00:00:00", "title": "Firefox < 10.0.9 Multiple Vulnerabilities (Mac OS X)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(62584);\n script_version(\"1.11\");\n script_cvs_date(\"Date: 2018/07/14 1:59:35\");\n\n script_cve_id(\"CVE-2012-4192\", \"CVE-2012-4193\");\n script_bugtraq_id(56154, 56155);\n\n script_name(english:\"Firefox < 10.0.9 Multiple Vulnerabilities (Mac OS X)\");\n script_summary(english:\"Checks version of Firefox\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\n\"The remote Mac OS X host contains a web browser that is affected by\nmultiple vulnerabilities.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"The installed version of Firefox is earlier than 10.0.9 and thus, is\npotentially affected by the following security issues :\n\n - An unspecified error exists that can allow attackers to\n bypass the 'Same Origin Policy' and access the\n 'Location' object. (CVE-2012-4192)\n\n - An error exists related to 'security wrappers' and the\n function 'defaultValue()' that can allow cross-site\n scripting attacks. (CVE-2012-4193)\"\n );\n # http://www.thespanner.co.uk/2012/10/10/firefox-knows-what-your-friends-did-last-summer/\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?8993e6b4\");\n # https://blog.mozilla.org/security/2012/10/10/security-vulnerability-in-firefox-16/\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?dc43f3c3\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2012-89/\");\n\n script_set_attribute(attribute:\"solution\", value:\"Upgrade to Firefox 10.0.9 ESR or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2012/10/10\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/10/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/10/17\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:mozilla:firefox\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"MacOS X Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2012-2018 Tenable Network Security, Inc.\");\n\n script_dependencies(\"macosx_firefox_installed.nasl\");\n script_require_keys(\"MacOSX/Firefox/Installed\");\n\n exit(0);\n}\n\ninclude(\"mozilla_version.inc\");\nkb_base = \"MacOSX/Firefox\";\nget_kb_item_or_exit(kb_base+\"/Installed\");\n\nversion = get_kb_item_or_exit(kb_base+\"/Version\", exit_code:1);\npath = get_kb_item_or_exit(kb_base+\"/Path\", exit_code:1);\n\nif (get_kb_item(kb_base + '/is_esr')) exit(0, 'The Mozilla Firefox installation is in the ESR branch.');\n\nmozilla_check_version(product:'firefox', version:version, path:path, esr:FALSE, fix:'10.0.9', severity:SECURITY_WARNING, xss:TRUE);", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "redhat": [{"lastseen": "2019-08-13T18:46:10", "bulletinFamily": "unix", "description": "Mozilla Thunderbird is a standalone mail and newsgroup client.\n\nA flaw was found in the way Thunderbird handled security wrappers.\nMalicious content could cause Thunderbird to execute arbitrary code with\nthe privileges of the user running Thunderbird. (CVE-2012-4193)\n\nRed Hat would like to thank the Mozilla project for reporting this issue.\nUpstream acknowledges moz_bug_r_a4 as the original reporter.\n\nNote: This issue cannot be exploited by a specially-crafted HTML mail\nmessage as JavaScript is disabled by default for mail messages. It could be\nexploited another way in Thunderbird, for example, when viewing the full\nremote content of an RSS feed.\n\nAll Thunderbird users should upgrade to this updated package, which\ncorrects this issue. After installing the update, Thunderbird must be\nrestarted for the changes to take effect.\n", "modified": "2018-06-06T20:24:36", "published": "2012-10-12T04:00:00", "id": "RHSA-2012:1362", "href": "https://access.redhat.com/errata/RHSA-2012:1362", "type": "redhat", "title": "(RHSA-2012:1362) Critical: thunderbird security update", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-08-13T18:47:01", "bulletinFamily": "unix", "description": "XULRunner provides the XUL Runtime environment for applications using the\nGecko layout engine.\n\nA flaw was found in the way XULRunner handled security wrappers. A web page\ncontaining malicious content could possibly cause an application linked\nagainst XULRunner (such as Mozilla Firefox) to execute arbitrary code with\nthe privileges of the user running the application. (CVE-2012-4193)\n\nFor technical details regarding this flaw, refer to the Mozilla security\nadvisories. You can find a link to the Mozilla advisories in the References\nsection of this erratum.\n\nRed Hat would like to thank the Mozilla project for reporting this issue.\nUpstream acknowledges moz_bug_r_a4 as the original reporter.\n\nAll XULRunner users should upgrade to these updated packages, which correct\nthis issue. After installing the update, applications using XULRunner must\nbe restarted for the changes to take effect.\n", "modified": "2018-06-06T20:24:28", "published": "2012-10-12T04:00:00", "id": "RHSA-2012:1361", "href": "https://access.redhat.com/errata/RHSA-2012:1361", "type": "redhat", "title": "(RHSA-2012:1361) Critical: xulrunner security update", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "centos": [{"lastseen": "2019-05-29T18:33:42", "bulletinFamily": "unix", "description": "**CentOS Errata and Security Advisory** CESA-2012:1362\n\n\nMozilla Thunderbird is a standalone mail and newsgroup client.\n\nA flaw was found in the way Thunderbird handled security wrappers.\nMalicious content could cause Thunderbird to execute arbitrary code with\nthe privileges of the user running Thunderbird. (CVE-2012-4193)\n\nRed Hat would like to thank the Mozilla project for reporting this issue.\nUpstream acknowledges moz_bug_r_a4 as the original reporter.\n\nNote: This issue cannot be exploited by a specially-crafted HTML mail\nmessage as JavaScript is disabled by default for mail messages. It could be\nexploited another way in Thunderbird, for example, when viewing the full\nremote content of an RSS feed.\n\nAll Thunderbird users should upgrade to this updated package, which\ncorrects this issue. After installing the update, Thunderbird must be\nrestarted for the changes to take effect.\n\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2012-October/018937.html\nhttp://lists.centos.org/pipermail/centos-announce/2012-October/018939.html\n\n**Affected packages:**\nthunderbird\n\n**Upstream details at:**\n", "modified": "2012-10-12T22:26:29", "published": "2012-10-12T22:05:00", "href": "http://lists.centos.org/pipermail/centos-announce/2012-October/018937.html", "id": "CESA-2012:1362", "title": "thunderbird security update", "type": "centos", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "mozilla": [{"lastseen": "2016-09-05T13:37:37", "bulletinFamily": "software", "description": "Mozilla security researcher moz_bug_r_a4 reported a regression where security wrappers are unwrapped without doing a security check in defaultValue(). This can allow for improper access to the Location object. In versions 15 and earlier of affected products, there was also the potential for arbitrary code execution. \n\nSecurity researcher Gareth Heyes also blogged about a Firefox 16 only symptom that is fixed in the updated versions.", "modified": "2012-10-11T00:00:00", "published": "2012-10-11T00:00:00", "id": "MFSA2012-89", "href": "http://www.mozilla.org/en-US/security/advisories/mfsa2012-89/", "type": "mozilla", "title": "defaultValue security checks not applied", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "suse": [{"lastseen": "2016-09-04T11:18:43", "bulletinFamily": "unix", "description": "The Mozilla suite received following security updates\n (bnc#783533):\n\n Mozilla Firefox was updated to 16.0.1. Mozilla Seamonkey\n was updated to 2.13.1. Mozilla Thunderbird was updated to\n 16.0.1. Mozilla XULRunner was updated to 16.0.1.\n\n * MFSA 2012-88/CVE-2012-4191 (bmo#798045) Miscellaneous\n memory safety hazards\n * MFSA 2012-89/CVE-2012-4192/CVE-2012-4193 (bmo#799952,\n bmo#720619) defaultValue security checks not applied\n * MFSA 2012-74/CVE-2012-3982/CVE-2012-3983 Miscellaneous\n memory safety hazards\n * MFSA 2012-75/CVE-2012-3984 (bmo#575294) select element\n persistance allows for attacks\n * MFSA 2012-76/CVE-2012-3985 (bmo#655649) Continued\n access to initial origin after setting document.domain\n * MFSA 2012-77/CVE-2012-3986 (bmo#775868) Some\n DOMWindowUtils methods bypass security checks\n * MFSA 2012-79/CVE-2012-3988 (bmo#725770) DOS and crash\n with full screen and history navigation\n * MFSA 2012-80/CVE-2012-3989 (bmo#783867) Crash with\n invalid cast when using instanceof operator\n * MFSA 2012-81/CVE-2012-3991 (bmo#783260) GetProperty\n function can bypass security checks\n * MFSA 2012-82/CVE-2012-3994 (bmo#765527) top object and\n location property accessible by plugins\n * MFSA 2012-83/CVE-2012-3993/CVE-2012-4184 (bmo#768101,\n bmo#780370) Chrome Object Wrapper (COW) does not\n disallow acces to privileged functions or properties\n * MFSA 2012-84/CVE-2012-3992 (bmo#775009) Spoofing and\n script injection through location.hash\n * MFSA 2012-85/CVE-2012-3995/CVE-2012-4179/CVE-2012-4180/\n CVE-2012-4181/CVE-2012-4182/CVE-2012-4183\n Use-after-free, buffer overflow, and out of bounds read\n issues found using Address Sanitizer\n * MFSA 2012-86/CVE-2012-4185/CVE-2012-4186/CVE-2012-4187/\n CVE-2012-4188 Heap memory corruption issues found using\n Address Sanitizer\n * MFSA 2012-87/CVE-2012-3990 (bmo#787704)\n\n", "modified": "2012-10-15T15:08:30", "published": "2012-10-15T15:08:30", "id": "OPENSUSE-SU-2012:1345-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html", "type": "suse", "title": "MozillaFirefox: update to Firefox 16.0.1 (important)", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2016-09-04T11:49:45", "bulletinFamily": "unix", "description": "MozillaFirefox was updated to the 10.0.9ESR security\n release which fixes bugs and security issues:\n\n *\n\n MFSA 2012-73 / CVE-2012-3977: Security researchers\n Thai Duong and Juliano Rizzo reported that SPDY's request\n header compression leads to information leakage, which can\n allow the extraction of private data such as session\n cookies, even over an encrypted SSL connection. (This does\n not affect Firefox 10 as it does not feature the SPDY\n extension. It was silently fixed for Firefox 15.)\n\n *\n\n MFSA 2012-74: Mozilla developers identified and fixed\n several memory safety bugs in the browser engine used in\n Firefox and other Mozilla-based products. Some of these\n bugs showed evidence of memory corruption under certain\n circumstances, and we presume that with enough effort at\n least some of these could be exploited to run arbitrary\n code.\n\n In general these flaws cannot be exploited through\n email in the Thunderbird and SeaMonkey products because\n scripting is disabled, but are potentially a risk in\n browser or browser-like contexts in those products.\n\n *\n\n CVE-2012-3983: Henrik Skupin, Jesse Ruderman and\n moz_bug_r_a4 reported memory safety problems and crashes\n that affect Firefox 15.\n\n *\n\n CVE-2012-3982: Christian Holler and Jesse Ruderman\n reported memory safety problems and crashes that affect\n Firefox ESR 10 and Firefox 15.\n\n *\n\n MFSA 2012-75 / CVE-2012-3984: Security researcher\n David Bloom of Cue discovered that "select" elements are\n always-on-top chromeless windows and that navigation away\n from a page with an active "select" menu does not remove\n this window.When another menu is opened programmatically on\n a new page, the original "select" menu can be retained and\n arbitrary HTML content within it rendered, allowing an\n attacker to cover arbitrary portions of the new page\n through absolute positioning/scrolling, leading to spoofing\n attacks. Security researcher Jordi Chancel found a\n variation that would allow for click-jacking attacks was\n well.\n\n In general these flaws cannot be exploited through\n email in the Thunderbird and SeaMonkey products because\n scripting is disabled, but are potentially a risk in\n browser or browser-like contexts in those products.\n References\n\n Navigation away from a page with an active "select"\n dropdown menu can be used for URL spoofing, other evil\n\n Firefox 10.0.1 : Navigation away from a page with\n multiple active "select" dropdown menu can be used for\n Spoofing And ClickJacking with XPI using window.open and\n geolocalisation\n\n *\n\n MFSA 2012-76 / CVE-2012-3985: Security researcher\n Collin Jackson reported a violation of the HTML5\n specifications for document.domain behavior. Specified\n behavior requires pages to only have access to windows in a\n new document.domain but the observed violation allowed\n pages to retain access to windows from the page's initial\n origin in addition to the new document.domain. This could\n potentially lead to cross-site scripting (XSS) attacks.\n\n *\n\n MFSA 2012-77 / CVE-2012-3986: Mozilla developer\n Johnny Stenback discovered that several methods of a\n feature used for testing (DOMWindowUtils) are not protected\n by existing security checks, allowing these methods to be\n called through script by web pages. This was addressed by\n adding the existing security checks to these methods.\n\n *\n\n MFSA 2012-78 / CVE-2012-3987: Security researcher\n Warren He reported that when a page is transitioned into\n Reader Mode in Firefox for Android, the resulting page has\n chrome privileges and its content is not thoroughly\n sanitized. A successful attack requires user enabling of\n reader mode for a malicious page, which could then perform\n an attack similar to cross-site scripting (XSS) to gain the\n privileges allowed to Firefox on an Android device. This\n has been fixed by changing the Reader Mode page into an\n unprivileged page.\n\n This vulnerability only affects Firefox for Android.\n\n *\n\n MFSA 2012-79 / CVE-2012-3988: Security researcher\n Soroush Dalili reported that a combination of invoking full\n screen mode and navigating backwards in history could, in\n some circumstances, cause a hang or crash due to a timing\n dependent use-after-free pointer reference. This crash may\n be potentially exploitable.\n\n *\n\n MFSA 2012-80 / CVE-2012-3989: Mozilla community\n member Ms2ger reported a crash due to an invalid cast when\n using the instanceof operator on certain types of\n JavaScript objects. This can lead to a potentially\n exploitable crash.\n\n *\n\n MFSA 2012-81 / CVE-2012-3991: Mozilla community\n member Alice White reported that when the GetProperty\n function is invoked through JSAPI, security checking can be\n bypassed when getting cross-origin properties. This\n potentially allowed for arbitrary code execution.\n\n *\n\n MFSA 2012-82 / CVE-2012-3994: Security researcher\n Mariusz Mlynski reported that the location property can be\n accessed by binary plugins through top.location and top can\n be shadowed by Object.defineProperty as well. This can\n allow for possible cross-site scripting (XSS) attacks\n through plugins.\n\n *\n\n MFSA 2012-83: Security researcher Mariusz Mlynski\n reported that when InstallTrigger fails, it throws an error\n wrapped in a Chrome Object Wrapper (COW) that fails to\n specify exposed properties. These can then be added to the\n resulting object by an attacker, allowing access to chrome\n privileged functions through script.\n\n While investigating this issue, Mozilla security\n researcher moz_bug_r_a4 found that COW did not disallow\n accessing of properties from a standard prototype in some\n situations, even when the original issue had been fixed.\n\n These issues could allow for a cross-site scripting\n (XSS) attack or arbitrary code execution.\n\n *\n\n CVE-2012-3993: XrayWrapper pollution via unsafe COW\n\n *\n\n CVE-2012-4184: ChromeObjectWrapper is not implemented\n as intended\n\n *\n\n MFSA 2012-84 / CVE-2012-3992: Security researcher\n Mariusz Mlynski reported an issue with spoofing of the\n location property. In this issue, writes to location.hash\n can be used in concert with scripted history navigation to\n cause a specific website to be loaded into the history\n object. The baseURI can then be changed to this stored\n site, allowing an attacker to inject a script or intercept\n posted data posted to a location specified with a relative\n path.\n\n *\n\n MFSA 2012-85: Security researcher Abhishek Arya\n (Inferno) of the Google Chrome Security Team discovered a\n series of use-after-free, buffer overflow, and out of\n bounds read issues using the Address Sanitizer tool in\n shipped software. These issues are potentially exploitable,\n allowing for remote code execution. We would also like to\n thank Abhishek for reporting two additional use-after-free\n flaws introduced during Firefox 16 development and fixed\n before general release.\n\n *\n\n CVE-2012-3995: Out of bounds read in\n IsCSSWordSpacingSpace\n\n *\n\n CVE-2012-4179: Heap-use-after-free in\n nsHTMLCSSUtils::CreateCSSPropertyTxn\n\n *\n\n CVE-2012-4180: Heap-buffer-overflow in\n nsHTMLEditor::IsPrevCharInNodeWhitespace\n\n *\n\n CVE-2012-4181: Heap-use-after-free in\n nsSMILAnimationController::DoSample\n\n *\n\n CVE-2012-4182: Heap-use-after-free in\n nsTextEditRules::WillInsert\n\n *\n\n CVE-2012-4183: Heap-use-after-free in\n DOMSVGTests::GetRequiredFeatures\n\n *\n\n MFSA 2012-86: Security researcher Atte Kettunen from\n OUSPG reported several heap memory corruption issues found\n using the Address Sanitizer tool. These issues are\n potentially exploitable, allowing for remote code execution.\n\n *\n\n CVE-2012-4185: Global-buffer-overflow in\n nsCharTraits::length\n\n *\n\n CVE-2012-4186: Heap-buffer-overflow in\n nsWaveReader::DecodeAudioData\n\n *\n\n CVE-2012-4187: Crash with ASSERTION: insPos too small\n\n *\n\n CVE-2012-4188: Heap-buffer-overflow in Convolve3x3\n\n *\n\n MFSA 2012-87 / CVE-2012-3990: Security researcher\n miaubiz used the Address Sanitizer tool to discover a\n use-after-free in the IME State Manager code. This could\n lead to a potentially exploitable crash.\n\n *\n\n MFSA 2012-89 / CVE-2012-4192 / CVE-2012-4193: Mozilla\n security researcher moz_bug_r_a4 reported a regression\n where security wrappers are unwrapped without doing a\n security check in defaultValue(). This can allow for\n improper access access to the Location object. In versions\n 15 and earlier of affected products, there was also the\n potential for arbitrary code execution.\n", "modified": "2012-10-16T22:08:48", "published": "2012-10-16T22:08:48", "id": "SUSE-SU-2012:1351-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html", "type": "suse", "title": "Security update for Mozilla Firefox (important)", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2016-09-04T12:21:58", "bulletinFamily": "unix", "description": "This patch contains security updates for\n\n * mozilla-nss 3.16.4\n - The following 1024-bit root CA certificate was restored to allow more\n time to develop a better transition strategy for affected sites. It\n was removed in NSS 3.16.3, but discussion in the\n mozilla.dev.security.policy forum led to the decision to keep this\n root included longer in order to give website administrators more time\n to update their web servers.\n - CN = GTE CyberTrust Global Root\n * In NSS 3.16.3, the 1024-bit "Entrust.net Secure Server Certification\n Authority" root CA certificate was removed. In NSS 3.16.4, a 2048-bit\n intermediate CA certificate has been included, without explicit trust.\n The intention is to mitigate the effects of the previous removal of\n the 1024-bit Entrust.net root certificate, because many public\n Internet sites still use the "USERTrust Legacy Secure Server CA"\n intermediate certificate that is signed by the 1024-bit Entrust.net\n root certificate. The inclusion of the intermediate certificate is a\n temporary measure to allow those sites to function, by allowing them\n to find a trust path to another 2048-bit root CA certificate. The\n temporarily included intermediate certificate expires November 1, 2015.\n\n * Firefox 31.1esr Firefox is updated from 24esr to 31esr as maintenance\n for version 24 stopped\n\n", "modified": "2014-09-09T18:04:16", "published": "2014-09-09T18:04:16", "href": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html", "id": "OPENSUSE-SU-2014:1100-1", "title": "Firefox update to 31.1esr (important)", "type": "suse", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "freebsd": [{"lastseen": "2019-05-29T18:33:45", "bulletinFamily": "unix", "description": "\nThe Mozilla Project reports:\n\n MFSA 2012-74 Miscellaneous memory safety hazards (rv:16.0/\n\t rv:10.0.8)\nMFSA 2012-75 select element persistance allows for attacks\nMFSA 2012-76 Continued access to initial origin after setting\n\t document.domain\nMFSA 2012-77 Some DOMWindowUtils methods bypass security checks\nMFSA 2012-78 Reader Mode pages have chrome privileges\nMFSA 2012-79 DOS and crash with full screen and history navigation\nMFSA 2012-80 Crash with invalid cast when using instanceof\n\t operator\nMFSA 2012-81 GetProperty function can bypass security checks\nMFSA 2012-82 top object and location property accessible by\n\t plugins\nMFSA 2012-83 Chrome Object Wrapper (COW) does not disallow acces\n\t to privileged functions or properties\nMFSA 2012-84 Spoofing and script injection through location.hash\nMFSA 2012-85 Use-after-free, buffer overflow, and out of bounds\n\t read issues found using Address Sanitizer\nMFSA 2012-86 Heap memory corruption issues found using Address\n\t Sanitizer\nMFSA 2012-87 Use-after-free in the IME State Manager\nMFSA 2012-88 Miscellaneous memory safety hazards (rv:16.0.1)\nMFSA 2012-89 defaultValue security checks not applied\n\n", "modified": "2012-10-11T00:00:00", "published": "2012-10-09T00:00:00", "id": "6E5A9AFD-12D3-11E2-B47D-C8600054B392", "href": "https://vuxml.freebsd.org/freebsd/6e5a9afd-12d3-11e2-b47d-c8600054b392.html", "title": "mozilla -- multiple vulnerabilities", "type": "freebsd", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "ubuntu": [{"lastseen": "2019-05-29T17:22:08", "bulletinFamily": "unix", "description": "Henrik Skupin, Jesse Ruderman, Christian Holler, Soroush Dalili and others discovered several memory corruption flaws in Thunderbird. If a user were tricked into opening a malicious website and had JavaScript enabled, an attacker could exploit these to execute arbitrary JavaScript code within the context of another website or arbitrary code as the user invoking the program. (CVE-2012-3982, CVE-2012-3983, CVE-2012-3988, CVE-2012-3989, CVE-2012-4191)\n\nDavid Bloom and Jordi Chancel discovered that Thunderbird did not always properly handle the <select> element. If a user were tricked into opening a malicious website and had JavaScript enabled, a remote attacker could exploit this to conduct URL spoofing and clickjacking attacks. (CVE-2012-3984)\n\nCollin Jackson discovered that Thunderbird did not properly follow the HTML5 specification for document.domain behavior. If a user were tricked into opening a malicious website and had JavaScript enabled, a remote attacker could exploit this to conduct cross-site scripting (XSS) attacks via JavaScript execution. (CVE-2012-3985)\n\nJohnny Stenback discovered that Thunderbird did not properly perform security checks on test methods for DOMWindowUtils. (CVE-2012-3986)\n\nAlice White discovered that the security checks for GetProperty could be bypassed when using JSAPI. If a user were tricked into opening a specially crafted web page and had JavaScript enabled, a remote attacker could exploit this to execute arbitrary code as the user invoking the program. (CVE-2012-3991)\n\nMariusz Mlynski discovered a history state error in Thunderbird. If a user were tricked into opening a malicious website and had JavaScript enabled, a remote attacker could exploit this to spoof the location property to inject script or intercept posted data. (CVE-2012-3992)\n\nMariusz Mlynski and others discovered several flaws in Thunderbird that allowed a remote attacker to conduct cross-site scripting (XSS) attacks. With cross-site scripting vulnerabilities, if a user were tricked into viewing a specially crafted page and had JavaScript enabled, a remote attacker could exploit these to modify the contents, or steal confidential data, within the same domain. (CVE-2012-3993, CVE-2012-3994, CVE-2012-4184)\n\nAbhishek Arya, Atte Kettunen and others discovered several memory flaws in Thunderbird when using the Address Sanitizer tool. If a user were tricked into opening a malicious website and had JavaScript enabled, an attacker could exploit these to execute arbitrary JavaScript code within the context of another website or execute arbitrary code as the user invoking the program. (CVE-2012-3990, CVE-2012-3995, CVE-2012-4179, CVE-2012-4180, CVE-2012-4181, CVE-2012-4182, CVE-2012-4183, CVE-2012-4185, CVE-2012-4186, CVE-2012-4187, CVE-2012-4188)\n\nIt was discovered that Thunderbird allowed improper access to the Location object. An attacker could exploit this to obtain sensitive information. Under certain circumstances, a remote attacker could use this vulnerability to potentially execute arbitrary code as the user invoking the program. (CVE-2012-4192, CVE-2012-4193)", "modified": "2012-10-12T00:00:00", "published": "2012-10-12T00:00:00", "id": "USN-1611-1", "href": "https://usn.ubuntu.com/1611-1/", "title": "Thunderbird vulnerabilities", "type": "ubuntu", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "securityvulns": [{"lastseen": "2018-08-31T11:09:49", "bulletinFamily": "software", "description": "Information leakage, multiple memory corruptions, crossite scripting, etc.", "modified": "2012-10-29T00:00:00", "published": "2012-10-29T00:00:00", "id": "SECURITYVULNS:VULN:12639", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:12639", "title": "Mozilla Firefox / Thunderbird / Seamonkey multiple security vulnerabilities", "type": "securityvulns", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "gentoo": [{"lastseen": "2016-09-06T19:46:13", "bulletinFamily": "unix", "description": "### Background\n\nMozilla Firefox is an open-source web browser and Mozilla Thunderbird an open-source email client, both from the Mozilla Project. The SeaMonkey project is a community effort to deliver production-quality releases of code derived from the application formerly known as the \u2018Mozilla Application Suite\u2019. XULRunner is a Mozilla runtime package that can be used to bootstrap XUL+XPCOM applications such as Firefox and Thunderbird. NSS is Mozilla\u2019s Network Security Services library that implements PKI support. IceCat is the GNU version of Firefox. \n\n### Description\n\nMultiple vulnerabilities have been discovered in Mozilla Firefox, Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner. Please review the CVE identifiers referenced below for details. \n\n### Impact\n\nA remote attacker could entice a user to view a specially crafted web page or email, possibly resulting in execution of arbitrary code or a Denial of Service condition. Furthermore, a remote attacker may be able to perform Man-in-the-Middle attacks, obtain sensitive information, bypass restrictions and protection mechanisms, force file downloads, conduct XML injection attacks, conduct XSS attacks, bypass the Same Origin Policy, spoof URL\u2019s for phishing attacks, trigger a vertical scroll, spoof the location bar, spoof an SSL indicator, modify the browser\u2019s font, conduct clickjacking attacks, or have other unspecified impact. \n\nA local attacker could gain escalated privileges, obtain sensitive information, or replace an arbitrary downloaded file. \n\n### Workaround\n\nThere is no known workaround at this time.\n\n### Resolution\n\nAll Mozilla Firefox users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=www-client/firefox-10.0.11\"\n \n\nAll users of the Mozilla Firefox binary package should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=www-client/firefox-bin-10.0.11\"\n \n\nAll Mozilla Thunderbird users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=mail-client/thunderbird-10.0.11\"\n \n\nAll users of the Mozilla Thunderbird binary package should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose\n \">=mail-client/thunderbird-bin-10.0.11\"\n \n\nAll Mozilla SeaMonkey users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=www-client/seamonkey-2.14-r1\"\n \n\nAll users of the Mozilla SeaMonkey binary package should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=www-client/seamonkey-bin-2.14\"\n \n\nAll NSS users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=dev-libs/nss-3.14\"\n \n\nThe \u201cwww-client/mozilla-firefox\u201d package has been merged into the \u201cwww-client/firefox\u201d package. To upgrade, please unmerge \u201cwww-client/mozilla-firefox\u201d and then emerge the latest \u201cwww-client/firefox\u201d package: \n \n \n # emerge --sync\n # emerge --unmerge \"www-client/mozilla-firefox\"\n # emerge --ask --oneshot --verbose \">=www-client/firefox-10.0.11\"\n \n\nThe \u201cwww-client/mozilla-firefox-bin\u201d package has been merged into the \u201cwww-client/firefox-bin\u201d package. To upgrade, please unmerge \u201cwww-client/mozilla-firefox-bin\u201d and then emerge the latest \u201cwww-client/firefox-bin\u201d package: \n \n \n # emerge --sync\n # emerge --unmerge \"www-client/mozilla-firefox-bin\"\n # emerge --ask --oneshot --verbose \">=www-client/firefox-bin-10.0.11\"\n \n\nThe \u201cmail-client/mozilla-thunderbird\u201d package has been merged into the \u201cmail-client/thunderbird\u201d package. To upgrade, please unmerge \u201cmail-client/mozilla-thunderbird\u201d and then emerge the latest \u201cmail-client/thunderbird\u201d package: \n \n \n # emerge --sync\n # emerge --unmerge \"mail-client/mozilla-thunderbird\"\n # emerge --ask --oneshot --verbose \">=mail-client/thunderbird-10.0.11\"\n \n\nThe \u201cmail-client/mozilla-thunderbird-bin\u201d package has been merged into the \u201cmail-client/thunderbird-bin\u201d package. To upgrade, please unmerge \u201cmail-client/mozilla-thunderbird-bin\u201d and then emerge the latest \u201cmail-client/thunderbird-bin\u201d package: \n \n \n # emerge --sync\n # emerge --unmerge \"mail-client/mozilla-thunderbird-bin\"\n # emerge --ask --oneshot --verbose\n \">=mail-client/thunderbird-bin-10.0.11\"\n \n\nGentoo discontinued support for GNU IceCat. We recommend that users unmerge GNU IceCat: \n \n \n # emerge --unmerge \"www-client/icecat\"\n \n\nGentoo discontinued support for XULRunner. We recommend that users unmerge XULRunner: \n \n \n # emerge --unmerge \"net-libs/xulrunner\"\n \n\nGentoo discontinued support for the XULRunner binary package. We recommend that users unmerge XULRunner: \n \n \n # emerge --unmerge \"net-libs/xulrunner-bin\"", "modified": "2013-01-08T00:00:00", "published": "2013-01-08T00:00:00", "id": "GLSA-201301-01", "href": "https://security.gentoo.org/glsa/201301-01", "type": "gentoo", "title": "Mozilla Products: Multiple vulnerabilities", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}]}