Race condition in the JavaScript garbage collection in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code by causing the garbage collector to delete a temporary variable while it is still being used during the creation of a new Function object.
{"mozilla": [{"lastseen": "2021-12-29T14:15:22", "description": "H. D. Moore reported a testcase that was able to trigger a race condition where JavaScript garbage collection deleted a temporary variable still being used in the creation of a new Function object. The resulting use of a deleted object may be potentially exploitable to run native code provided by the attacker.\n", "cvss3": {}, "published": "2006-07-25T00:00:00", "type": "mozilla", "title": "JavaScript new Function race condition \u2014 Mozilla", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 4.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "HIGH", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 5.1, "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": true}, "cvelist": ["CVE-2006-3803"], "modified": "2006-07-25T00:00:00", "id": "MFSA2006-48", "href": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-48/", "cvss": {"score": 5.1, "vector": "AV:N/AC:H/Au:N/C:P/I:P/A:P"}}], "checkpoint_advisories": [{"lastseen": "2021-12-18T04:23:27", "description": "A code execution vulnerability has been reported in Mozilla Firefox. A remote attacker could trigger this vulnerability by causing the garbage collector to delete a temporary variable while it is still being used during the creation of a new Function object. Successful exploitation of this vulnerability could allow a remote attacker to execute arbitrary code on the affected system.", "cvss3": {}, "published": "2014-01-07T00:00:00", "type": "checkpoint_advisories", "title": "Mozilla Firefox New Function Garbage Collection Code Execution - Ver2 (CVE-2006-3803)", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 4.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "HIGH", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 5.1, "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": true}, "cvelist": ["CVE-2006-3803"], "modified": "2014-01-07T00:00:00", "id": "CPAI-2014-0092", "href": "", "cvss": {"score": 5.1, "vector": "AV:N/AC:H/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-07-07T15:27:18", "description": "A code execution vulnerability has been reported in Mozilla Firefox. A remote attacker could trigger this vulnerability by causing the garbage collector to delete a temporary variable while it is still being used during the creation of a new Function object. Successful exploitation of this vulnerability could allow a remote attacker to execute arbitrary code on the affected system.", "cvss3": {}, "published": "2014-02-03T00:00:00", "type": "checkpoint_advisories", "title": "Mozilla Firefox New Function Garbage Collection Code Execution - Ver2 (CVE-2006-3803)", "bulletinFamily": "info", "cvss2": {}, "cvelist": ["CVE-2006-3803"], "modified": "2022-07-07T00:00:00", "id": "CPAI-2014-0839", "href": "", "cvss": {"score": 0.0, "vector": "NONE"}}], "cert": [{"lastseen": "2021-09-28T17:52:10", "description": "### Overview\n\nMozilla products contain a race condition. This vulnerability may allow a remote attacker to execute arbitrary code on a vulnerable system. \n\n### Description\n\nThe Mozilla products JavaScript garbage collection process may delete a variable while that variable is still in use. This may corrupt memory in a way that can allow an attacker to execute arbitrary code. \n\n\nFor complete list of affected products refer to Mozilla Foundation Security Advisory [2006-48](<http://www.mozilla.org/security/announce/2006/mfsa2006-48.html>). \n \n--- \n \n### Impact\n\nA remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. The attacker could also cause the vulnerable application to crash. \n \n--- \n \n### Solution\n\n**Apply an update** \nThis vulnerability is addressed in [Firefox 1.5.0.5](<http://www.mozilla.com/firefox/>), [Thunderbird 1.5.0.5](<http://www.mozilla.com/thunderbird/releases/1.5.0.5.html>), and [SeaMonkey 1.0.3](<http://www.mozilla.org/projects/seamonkey/>), according to the Mozilla Foundation Security Update [2006-48](<http://www.mozilla.org/security/announce/2006/mfsa2006-48.html>). \n \n--- \n \n \n**Disable JavaScript** \n \nThis vulnerability can be mitigated by disabling JavaScript. \n \n--- \n \n### Vendor Information\n\n265964\n\nFilter by status: All Affected Not Affected Unknown\n\nFilter by content: __ Additional information available\n\n__ Sort by: Status Alphabetical\n\nExpand all\n\n**Javascript is disabled. Click here to view vendors.**\n\n### Mozilla, Inc. __ Affected\n\nUpdated: July 27, 2006 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Addendum\n\nRefer to <http://www.mozilla.org/security/announce/2006/mfsa2006-48.html>.\n\nIf you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:cert@cert.org?Subject=VU%23265964 Feedback>).\n\n \n\n\n### CVSS Metrics\n\nGroup | Score | Vector \n---|---|--- \nBase | | \nTemporal | | \nEnvironmental | | \n \n \n\n\n### References\n\n * <http://www.mozilla.org/security/announce/2006/mfsa2006-48.html>\n * <https://bugzilla.mozilla.org/show_bug.cgi?id=344759>\n * <https://bugzilla.mozilla.org/show_bug.cgi?id=344960>\n * <http://secunia.com/advisories/19873/>\n * <http://secunia.com/advisories/21216/>\n * <http://www.securityfocus.com/bid/19181>\n\n### Acknowledgements\n\nThis vulnerability was reported in Mozilla Foundation Security Advisory 2006-48. Mozilla credits H. D. Moore with reporting this vulnerability.\n\nThis document was written by Jeff Gennari.\n\n### Other Information\n\n**CVE IDs:** | [CVE-2006-3803](<http://web.nvd.nist.gov/vuln/detail/CVE-2006-3803>) \n---|--- \n**Severity Metric:** | 16.03 \n**Date Public:** | 2006-07-25 \n**Date First Published:** | 2006-07-27 \n**Date Last Updated: ** | 2007-02-09 14:05 UTC \n**Document Revision: ** | 14 \n", "cvss3": {}, "published": "2006-07-27T00:00:00", "type": "cert", "title": "Mozilla products contain a race condition", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 4.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "HIGH", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 5.1, "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": true}, "cvelist": ["CVE-2006-3803"], "modified": "2007-02-09T14:05:00", "id": "VU:265964", "href": "https://www.kb.cert.org/vuls/id/265964", "cvss": {"score": 5.1, "vector": "AV:N/AC:H/Au:N/C:P/I:P/A:P"}}], "ubuntucve": [{"lastseen": "2021-11-22T22:03:14", "description": "Race condition in the JavaScript garbage collection in Mozilla Firefox 1.5\nbefore 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3\nmight allow remote attackers to execute arbitrary code by causing the\ngarbage collector to delete a temporary variable while it is still being\nused during the creation of a new Function object.", "cvss3": {}, "published": "2006-07-27T00:00:00", "type": "ubuntucve", "title": "CVE-2006-3803", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 4.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "HIGH", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 5.1, "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": true}, "cvelist": ["CVE-2006-3803"], "modified": "2006-07-27T00:00:00", "id": "UB:CVE-2006-3803", "href": "https://ubuntu.com/security/CVE-2006-3803", "cvss": {"score": 5.1, "vector": "AV:N/AC:H/Au:N/C:P/I:P/A:P"}}], "debiancve": [{"lastseen": "2022-07-04T05:58:36", "description": "Race condition in the JavaScript garbage collection in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code by causing the garbage collector to delete a temporary variable while it is still being used during the creation of a new Function object.", "cvss3": {}, "published": "2006-07-27T19:04:00", "type": "debiancve", "title": "CVE-2006-3803", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 4.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "HIGH", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 5.1, "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": true}, "cvelist": ["CVE-2006-3803"], "modified": "2006-07-27T19:04:00", "id": "DEBIANCVE:CVE-2006-3803", "href": "https://security-tracker.debian.org/tracker/CVE-2006-3803", "cvss": {"score": 5.1, "vector": "AV:N/AC:H/Au:N/C:P/I:P/A:P"}}], "securityvulns": [{"lastseen": "2018-08-31T11:10:18", "description": "\r\n\r\n-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\n National Cyber Alert System\r\n\r\n Technical Cyber Security Alert TA06-208A\r\n\r\n\r\nMozilla Products Contain Multiple Vulnerabilities\r\n\r\n Original release date: July 27, 2006\r\n Last revised: --\r\n Source: US-CERT\r\n\r\n\r\nSystems Affected\r\n\r\n * Mozilla SeaMonkey\r\n * Mozilla Firefox\r\n * Mozilla Thunderbird\r\n\r\n Any products based on Mozilla components, specifically Gecko, may also\r\n be affected.\r\n\r\n\r\nOverview\r\n\r\n The Mozilla web browser and derived products contain several\r\n vulnerabilities, the most serious of which could allow a remote\r\n attacker to execute arbitrary code on an affected system.\r\n\r\n\r\nI. Description\r\n\r\n Several vulnerabilities have been reported in the Mozilla web browser\r\n and derived products. More detailed information is available in the\r\n individual vulnerability notes, including the following:\r\n\r\n\r\n VU#476724 - Mozilla products fail to properly handle frame references \r\n\r\n Mozilla products fail to properly handle frame or window references.\r\n This may allow a remote attacker to execute arbitrary code on a\r\n vulnerable system.\r\n (CVE-2006-3801)\r\n\r\n\r\n VU#670060 - Mozilla fails to properly release JavaScript references \r\n\r\n Mozilla products fail to properly release memory. This vulnerability\r\n may allow a remote attacker to execute code on a vulnerable system.\r\n (CVE-2006-3677)\r\n\r\n\r\n VU#239124 - Mozilla fails to properly handle simultaneous XPCOM events\r\n \r\n Mozilla products are vulnerable to memory corruption via simultaneous\r\n XPCOM events. This may allow a remote attacker to execute arbitrary\r\n code on a vulnerable system.\r\n (CVE-2006-3113)\r\n\r\n\r\n VU#265964 - Mozilla products contain a race condition \r\n\r\n Mozilla products contain a race condition. This vulnerability may\r\n allow a remote attacker to execute code on a vulnerable system.\r\n (CVE-2006-3803)\r\n\r\n\r\n VU#897540 - Mozilla products VCard attachment buffer overflow \r\n\r\n Mozilla products fail to properly handle malformed VCard attachments,\r\n allowing a buffer overflow to occur. This vulnerability may allow a\r\n remote attacker to execute arbitrary code on a vulnerable system.\r\n (CVE-2006-3804)\r\n\r\n\r\n VU#876420 - Mozilla fails to properly handle garbage collection \r\n\r\n The Mozilla JavaScript engine fails to properly perform garbage\r\n collection, which may allow a remote attacker to execute arbitrary\r\n code on a vulnerable system.\r\n (CVE-2006-3805)\r\n\r\n\r\n VU#655892 - Mozilla JavaScript engine contains multiple integer\r\n overflows \r\n\r\n The Mozilla JavaScript engine contains multiple integer overflows.\r\n This vulnerability may allow a remote attacker to execute arbitrary\r\n code on a vulnerable system.\r\n (CVE-2006-3806)\r\n\r\n\r\n VU#687396 - Mozilla products fail to properly validate JavaScript\r\n constructors \r\n\r\n Mozilla products fail to properly validate references returned by\r\n JavaScript constructors. This vulnerability may allow a remote\r\n attacker to execute arbitrary code on a vulnerable system.\r\n (CVE-2006-3807)\r\n\r\n\r\n VU#527676 - Mozilla contains multiple memory corruption\r\n vulnerabilities \r\n\r\n Mozilla products contain multiple vulnerabilities that can cause\r\n memory corruption. This may allow a remote attacker to execute\r\n arbitrary code on a vulnerable system.\r\n (CVE-2006-3811)\r\n\r\n\r\nII. Impact\r\n\r\n A remote, unauthenticated attacker could execute arbitrary code on a\r\n vulnerable system. An attacker may also be able to cause the\r\n vulnerable application to crash.\r\n\r\n\r\nIII. Solution\r\n\r\nUpgrade\r\n\r\n Upgrade to Mozilla Firefox 1.5.0.5, Mozilla Thunderbird 1.5.0.5, or\r\n SeaMonkey 1.0.3.\r\n\r\nDisable JavaScript and Java\r\n\r\n These vulnerabilities can be mitigated by disabling JavaScript and\r\n Java in all affected products. Instructions for disabling Java in\r\n Firefox can be found in the "Securing Your Web Browser" document.\r\n\r\n\r\nAppendix A. References\r\n\r\n * US-CERT Vulnerability Notes Related to July Mozilla Security\r\n Advisories -\r\n <http://www.kb.cert.org/vuls/byid?searchview&query=firefox_1505>\r\n\r\n * CVE-2006-3081 -\r\n <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3801>\r\n\r\n * CVE-2006-3677 -\r\n <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3677>\r\n\r\n * CVE-2006-3113 -\r\n <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3113>\r\n\r\n * CVE-2006-3803 -\r\n <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3803>\r\n\r\n * CVE-2006-3804 -\r\n <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3804>\r\n\r\n * CVE-2006-3805 -\r\n <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3805>\r\n\r\n * CVE-2006-3806 -\r\n <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3806>\r\n\r\n * CVE-2006-3807 -\r\n <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3807>\r\n\r\n * CVE-2006-3811 -\r\n <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3811>\r\n\r\n * Mozilla Foundation Security Advisories -\r\n <http://www.mozilla.org/security/announce/>\r\n\r\n * Known Vulnerabilities in Mozilla Products -\r\n <http://www.mozilla.org/projects/security/known-vulnerabilities.html>\r\n\r\n * Securing Your Web Browser -\r\n <http://www.us-cert.gov/reading_room/securing_browser/browser_security.html#Mozilla_Firefox>\r\n\r\n\r\n ____________________________________________________________________\r\n\r\n The most recent version of this document can be found at:\r\n\r\n <http://www.us-cert.gov/cas/techalerts/TA06-208A.html>\r\n ____________________________________________________________________\r\n\r\n Feedback can be directed to US-CERT Technical Staff. Please send\r\n email to <cert@cert.org> with "TA06-208A Feedback VU#239124" in the\r\n subject.\r\n ____________________________________________________________________\r\n\r\n For instructions on subscribing to or unsubscribing from this\r\n mailing list, visit <http://www.us-cert.gov/cas/signup.html>.\r\n ____________________________________________________________________\r\n\r\n Produced 2006 by US-CERT, a government organization.\r\n\r\n Terms of use:\r\n\r\n <http://www.us-cert.gov/legal.html>\r\n ____________________________________________________________________\r\n\r\n\r\nRevision History\r\n\r\n Jul 27, 2006: Initial release\r\n\r\n\r\n \r\n \r\n\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1.2.1 (GNU/Linux)\r\n\r\niQEVAwUBRMkgNexOF3G+ig+rAQIFsAgAoWoMkxxhkzb+xgLVCJF7h4k4EBCgJGWa\r\nBSOiFfL4Gs4vv4lNooDRCIOdxiBfXYL71XsIOT4aWry5852/6kyYnyAiXXYj1Uv0\r\nSbPY2sQSZ5EaG+G9i8HDIy3fpJN4XgH3ng1uzUnJihY19IfndbXicpZE+debIUri\r\nqt9NRD2f5FW5feKo1cBpYxtmxQAEePOa2dJHh7I7cnFGtG3MixHx4kVEyuYUutCX\r\n5tHDsfTIdySNkIdCQ4vhk846bErB/kaHiKMQDfMglllb3GOSc07OQ0CDo2eTPVsA\r\n9DtKkiDP1C4dh1mxco8CWlS6327+EB0KXGGoqDF2+j/rrpsW0oc8nA==\r\n=HwuK\r\n-----END PGP SIGNATURE-----", "edition": 1, "cvss3": {}, "published": "2006-07-28T00:00:00", "title": "US-CERT Technical Cyber Security Alert TA06-208A -- Mozilla Products Contain Multiple Vulnerabilities", "type": "securityvulns", "bulletinFamily": "software", "cvss2": {}, "cvelist": ["CVE-2006-3806", "CVE-2006-3081", "CVE-2006-3803", "CVE-2006-3807", "CVE-2006-3811", "CVE-2006-3677", "CVE-2006-3804", "CVE-2006-3801", "CVE-2006-3113", "CVE-2006-3805"], "modified": "2006-07-28T00:00:00", "id": "SECURITYVULNS:DOC:13656", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:13656", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "nessus": [{"lastseen": "2021-08-19T13:15:24", "description": "The remote host is affected by the vulnerability described in GLSA-200608-04 (Mozilla Thunderbird: Multiple vulnerabilities)\n\n The following vulnerabilities have been reported:\n Benjamin Smedberg discovered that chrome URLss could be made to reference remote files.\n Developers in the Mozilla community looked for and fixed several crash bugs to improve the stability of Mozilla clients.\n 'shutdown' reports that cross-site scripting (XSS) attacks could be performed using the construct XPCNativeWrapper(window).Function(...), which created a function that appeared to belong to the window in question even after it had been navigated to the target site.\n 'shutdown' reports that scripts granting the UniversalBrowserRead privilege can leverage that into the equivalent of the far more powerful UniversalXPConnect since they are allowed to 'read' into a privileged context.\n 'moz_bug_r_a4' discovered that Named JavaScript functions have a parent object created using the standard Object() constructor (ECMA-specified behavior) and that this constructor can be redefined by script (also ECMA-specified behavior).\n Igor Bukanov and shutdown found additional places where an untimely garbage collection could delete a temporary object that was in active use.\n Georgi Guninski found potential integer overflow issues with long strings in the toSource() methods of the Object, Array and String objects as well as string function arguments.\n H. D. Moore reported a testcase that was able to trigger a race condition where JavaScript garbage collection deleted a temporary variable still being used in the creation of a new Function object.\n A malicious page can hijack native DOM methods on a document object in another domain, which will run the attacker's script when called by the victim page.\n Secunia Research has discovered a vulnerability which is caused due to an memory corruption error within the handling of simultaneously happening XPCOM events.\n This leads to use of a deleted timer object.\n Impact :\n\n A user can be enticed to open specially crafted URLs, visit webpages containing malicious JavaScript or execute a specially crafted script.\n These events could lead to the execution of arbitrary code, or the installation of malware on the user's computer.\n Workaround :\n\n There is no known workaround at this time.", "cvss3": {"score": null, "vector": null}, "published": "2006-08-04T00:00:00", "type": "nessus", "title": "GLSA-200608-04 : Mozilla Thunderbird: Multiple vulnerabilities", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2006-3113", "CVE-2006-3802", "CVE-2006-3803", "CVE-2006-3804", "CVE-2006-3805", "CVE-2006-3806", "CVE-2006-3807", "CVE-2006-3809", "CVE-2006-3810", "CVE-2006-3811", "CVE-2006-3812"], "modified": "2021-01-06T00:00:00", "cpe": ["p-cpe:/a:gentoo:linux:mozilla-thunderbird", "p-cpe:/a:gentoo:linux:mozilla-thunderbird-bin", "cpe:/o:gentoo:linux"], "id": "GENTOO_GLSA-200608-04.NASL", "href": "https://www.tenable.com/plugins/nessus/22146", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Gentoo Linux Security Advisory GLSA 200608-04.\n#\n# The advisory text is Copyright (C) 2001-2016 Gentoo Foundation, Inc.\n# and licensed under the Creative Commons - Attribution / Share Alike \n# license. See http://creativecommons.org/licenses/by-sa/3.0/\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(22146);\n script_version(\"1.17\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2006-3113\", \"CVE-2006-3802\", \"CVE-2006-3803\", \"CVE-2006-3804\", \"CVE-2006-3805\", \"CVE-2006-3806\", \"CVE-2006-3807\", \"CVE-2006-3809\", \"CVE-2006-3810\", \"CVE-2006-3811\", \"CVE-2006-3812\");\n script_xref(name:\"GLSA\", value:\"200608-04\");\n\n script_name(english:\"GLSA-200608-04 : Mozilla Thunderbird: Multiple vulnerabilities\");\n script_summary(english:\"Checks for updated package(s) in /var/db/pkg\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Gentoo host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote host is affected by the vulnerability described in GLSA-200608-04\n(Mozilla Thunderbird: Multiple vulnerabilities)\n\n The following vulnerabilities have been reported:\n Benjamin Smedberg discovered that chrome URLss could be made to\n reference remote files.\n Developers in the Mozilla community\n looked for and fixed several crash bugs to improve the stability of\n Mozilla clients.\n 'shutdown' reports that cross-site scripting\n (XSS) attacks could be performed using the construct\n XPCNativeWrapper(window).Function(...), which created a function that\n appeared to belong to the window in question even after it had been\n navigated to the target site.\n 'shutdown' reports that scripts\n granting the UniversalBrowserRead privilege can leverage that into the\n equivalent of the far more powerful UniversalXPConnect since they are\n allowed to 'read' into a privileged context.\n 'moz_bug_r_a4'\n discovered that Named JavaScript functions have a parent object created\n using the standard Object() constructor (ECMA-specified behavior) and\n that this constructor can be redefined by script (also ECMA-specified\n behavior).\n Igor Bukanov and shutdown found additional places\n where an untimely garbage collection could delete a temporary object\n that was in active use.\n Georgi Guninski found potential\n integer overflow issues with long strings in the toSource() methods of\n the Object, Array and String objects as well as string function\n arguments.\n H. D. Moore reported a testcase that was able to\n trigger a race condition where JavaScript garbage collection deleted a\n temporary variable still being used in the creation of a new Function\n object.\n A malicious page can hijack native DOM methods on a\n document object in another domain, which will run the attacker's script\n when called by the victim page.\n Secunia Research has\n discovered a vulnerability which is caused due to an memory corruption\n error within the handling of simultaneously happening XPCOM events.\n This leads to use of a deleted timer object.\n \nImpact :\n\n A user can be enticed to open specially crafted URLs, visit webpages\n containing malicious JavaScript or execute a specially crafted script.\n These events could lead to the execution of arbitrary code, or the\n installation of malware on the user's computer.\n \nWorkaround :\n\n There is no known workaround at this time.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.gentoo.org/glsa/200608-04\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"All Mozilla Thunderbird users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=mail-client/mozilla-thunderbird-1.5.0.5'\n All Mozilla Thunderbird binary users should upgrade to the latest\n version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=mail-client/mozilla-thunderbird-bin-1.5.0.5'\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:mozilla-thunderbird\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:mozilla-thunderbird-bin\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:gentoo:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/08/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/08/04\");\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2006/07/25\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Gentoo Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Gentoo/release\", \"Host/Gentoo/qpkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"qpkg.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Gentoo/release\")) audit(AUDIT_OS_NOT, \"Gentoo\");\nif (!get_kb_item(\"Host/Gentoo/qpkg-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (qpkg_check(package:\"mail-client/mozilla-thunderbird-bin\", unaffected:make_list(\"ge 1.5.0.5\"), vulnerable:make_list(\"lt 1.5.0.5\"))) flag++;\nif (qpkg_check(package:\"mail-client/mozilla-thunderbird\", unaffected:make_list(\"ge 1.5.0.5\"), vulnerable:make_list(\"lt 1.5.0.5\"))) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = qpkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"Mozilla Thunderbird\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T13:15:28", "description": "The remote version of Mozilla Thunderbird suffers from various security issues, at least one of which may lead to execution of arbitrary code on the affected host subject to the user's privileges.", "cvss3": {"score": null, "vector": null}, "published": "2006-07-27T00:00:00", "type": "nessus", "title": "Mozilla Thunderbird < 1.5.0.5 Multiple Vulnerabilities", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2006-3113", "CVE-2006-3801", "CVE-2006-3802", "CVE-2006-3803", "CVE-2006-3804", "CVE-2006-3805", "CVE-2006-3806", "CVE-2006-3807", "CVE-2006-3809", "CVE-2006-3810", "CVE-2006-3811"], "modified": "2018-07-16T00:00:00", "cpe": ["cpe:/a:mozilla:thunderbird"], "id": "MOZILLA_THUNDERBIRD_1505.NASL", "href": "https://www.tenable.com/plugins/nessus/22096", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(22096);\n script_version(\"1.22\");\n script_cvs_date(\"Date: 2018/07/16 14:09:15\");\n\n script_cve_id(\n \"CVE-2006-3113\",\n \"CVE-2006-3801\",\n \"CVE-2006-3802\",\n \"CVE-2006-3803\",\n \"CVE-2006-3804\",\n \"CVE-2006-3805\",\n \"CVE-2006-3806\",\n \"CVE-2006-3807\",\n \"CVE-2006-3809\",\n \"CVE-2006-3810\",\n \"CVE-2006-3811\"\n );\n script_bugtraq_id(19181, 19197);\n script_xref(name:\"CERT\", value:\"655892\");\n\n script_name(english:\"Mozilla Thunderbird < 1.5.0.5 Multiple Vulnerabilities\");\n script_summary(english:\"Checks version of Mozilla Thunderbird\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host contains a mail client that is affected by\nmultiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote version of Mozilla Thunderbird suffers from various\nsecurity issues, at least one of which may lead to execution of\narbitrary code on the affected host subject to the user's privileges.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-44/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-46/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-47/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-48/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-49/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-50/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-51/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-53/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-54/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-55/\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Mozilla Thunderbird 1.5.0.5 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/07/27\");\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2006/07/25\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/07/25\");\nscript_set_attribute(attribute:\"plugin_type\", value:\"local\");\nscript_set_attribute(attribute:\"cpe\", value:\"cpe:/a:mozilla:thunderbird\");\nscript_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n script_copyright(english:\"This script is Copyright (C) 2006-2018 Tenable Network Security, Inc.\");\n script_dependencies(\"mozilla_org_installed.nasl\");\n script_require_keys(\"Mozilla/Thunderbird/Version\");\n exit(0);\n}\n\ninclude(\"mozilla_version.inc\");\nport = get_kb_item_or_exit(\"SMB/transport\");\n\ninstalls = get_kb_list(\"SMB/Mozilla/Thunderbird/*\");\nif (isnull(installs)) audit(AUDIT_NOT_INST, \"Thunderbird\");\n\nmozilla_check_version(installs:installs, product:'thunderbird', esr:FALSE, fix:'1.5.0.5', severity:SECURITY_HOLE);\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T13:13:31", "description": "This security update brings Mozilla Thunderbird to version 1.5.0.6.\n\nNote that on SUSE Linux 9.2, 9.3 and 10.0 this is a major version upgrade.\n\nMore Details can be found on this page:\nhttp://www.mozilla.org/projects/security/known-vulnerabilities.html\n\nIt includes fixes to the following security problems :\n\n - CVE-2006-3801/MFSA 2006-44: Code execution through deleted frame reference\n\n Thilo Girmann discovered that in certain circumstances a JavaScript reference to a frame or window was not properly cleared when the referenced content went away, and he demonstrated that this pointer to a deleted object could be used to execute native code supplied by the attacker.\n\n - CVE-2006-3113/MFSA 2006-46: Memory corruption with simultaneous events\n\n Secunia Research has discovered a vulnerability in Mozilla Firefox 1.5 branch, which can be exploited by malicious people to compromise a user's system.\n\n The vulnerability is caused due to an memory corruption error within the handling of simultaneously happening XPCOM events, which leads to use of a deleted timer object. This generally results in a crash but potentially could be exploited to execute arbitrary code on a user's system when a malicious website is visited.\n\n - CVE-2006-3802/MFSA 2006-47: Native DOM methods can be hijacked across domains\n\n A malicious page can hijack native DOM methods on a document object in another domain, which will run the attacker's script when called by the victim page. This could be used to steal login cookies, password, or other sensitive data on the target page, or to perform actions on behalf of a logged-in user.\n\n Access checks on all other properties and document nodes are performed correctly. This cross-site scripting (XSS) attack is limited to pages which use standard DOM methods of the top-level document object, such as document.getElementById(). This includes many popular sites, especially the newer ones that offer rich interaction to the user.\n\n - CVE-2006-3803/MFSA 2006-48: JavaScript new Function race condition\n\n H. D. Moore reported a testcase that was able to trigger a race condition where JavaScript garbage collection deleted a temporary variable still being used in the creation of a new Function object. The resulting use of a deleted object may be potentially exploitable to run native code provided by the attacker.\n\n - CVE-2006-3804/MFSA 2006-49: Heap buffer overwrite on malformed VCard\n\n A VCard attachment with a malformed base64 field (such as a photo) can trigger a heap buffer overwrite. These have proven exploitable in the past, though in this case the overwrite is accompanied by an integer underflow that would attempt to copy more data than the typical machine has, leading to a crash.\n\n - CVE-2006-3805/CVE-2006-3806/MFSA 2006-50: JavaScript engine vulnerabilities\n\n Continuing our security audit of the JavaScript engine, Mozilla developers found and fixed several potential vulnerabilities.\n\n Igor Bukanov and shutdown found additional places where an untimely garbage collection could delete a temporary object that was in active use (similar to MFSA 2006-01 and MFSA 2006-10). Some of these may allow an attacker to run arbitrary code given the right conditions.\n\n Georgi Guninski found potential integer overflow issues with long strings in the toSource() methods of the Object, Array and String objects as well as string function arguments.\n\n - CVE-2006-3807/MFSA 2006-51: Privilege escalation using named-functions and redefined 'new Object()'\n\n moz_bug_r_a4 discovered that named JavaScript functions have a parent object created using the standard Object() constructor (ECMA-specified behavior) and that this constructor can be redefined by script (also ECMA-specified behavior). If the Object() constructor is changed to return a reference to a privileged object with useful properties it is possible to have attacker-supplied script excuted with elevated privileges by calling the function. This could be used to install malware or take other malicious actions.\n\n Our fix involves calling the internal Object constructor which appears to be what other ECMA-compatible interpreters do.\n\n - CVE-2006-3808/MFSA 2006-52: PAC privilege escalation using Function.prototype.call\n\n moz_bug_r_a4 reports that a malicious Proxy AutoConfig (PAC) server could serve a PAC script that can execute code with elevated privileges by setting the required FindProxyForURL function to the eval method on a privileged object that leaked into the PAC sandbox. By redirecting the victim to a specially crafted URL -- easily done since the PAC script controls which proxy to use -- the URL 'hostname' can be executed as privileged script.\n\n A malicious proxy server can perform spoofing attacks on the user so it was already important to use a trustworthy PAC server.\n\n - CVE-2006-3809/MFSA 2006-53: UniversalBrowserRead privilege escalation\n\n shutdown reports that scripts granted the UniversalBrowserRead privilege can leverage that into the equivalent of the far more powerful UniversalXPConnect since they are allowed to 'read' into a privileged context. This allows the attacker the ability to run scripts with the full privelege of the user running the browser, possibly installing malware or snooping on private data. This has been fixed so that UniversalBrowserRead and UniversalBrowserWrite are limited to reading from and writing into only normally-privileged browser windows and frames.\n\n - CVE-2006-3810/MFSA 2006-54: XSS with XPCNativeWrapper(window).Function(...)\n\n shutdown reports that cross-site scripting (XSS) attacks could be performed using the construct XPCNativeWrapper(window).Function(...), which created a function that appeared to belong to the window in question even after it had been navigated to the target site.\n\n - CVE-2006-3811/MFSA 2006-55: Crashes with evidence of memory corruption\n\n As part of the Firefox 1.5.0.5 stability and security release, developers in the Mozilla community looked for and fixed several crash bugs to improve the stability of Mozilla clients. Some of these crashes showed evidence of memory corruption that we presume could be exploited to run arbitrary code with enough effort.", "cvss3": {"score": null, "vector": null}, "published": "2007-10-17T00:00:00", "type": "nessus", "title": "openSUSE 10 Security Update : MozillaThunderbird (MozillaThunderbird-1924)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2006-3113", "CVE-2006-3801", "CVE-2006-3802", "CVE-2006-3803", "CVE-2006-3804", "CVE-2006-3805", "CVE-2006-3806", "CVE-2006-3807", "CVE-2006-3808", "CVE-2006-3809", "CVE-2006-3810", "CVE-2006-3811"], "modified": "2021-01-14T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:MozillaThunderbird", "p-cpe:/a:novell:opensuse:MozillaThunderbird-translations", "cpe:/o:novell:opensuse:10.1"], "id": "SUSE_MOZILLATHUNDERBIRD-1924.NASL", "href": "https://www.tenable.com/plugins/nessus/27125", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update MozillaThunderbird-1924.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(27125);\n script_version(\"1.15\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2006-3113\", \"CVE-2006-3801\", \"CVE-2006-3802\", \"CVE-2006-3803\", \"CVE-2006-3804\", \"CVE-2006-3805\", \"CVE-2006-3806\", \"CVE-2006-3807\", \"CVE-2006-3808\", \"CVE-2006-3809\", \"CVE-2006-3810\", \"CVE-2006-3811\");\n\n script_name(english:\"openSUSE 10 Security Update : MozillaThunderbird (MozillaThunderbird-1924)\");\n script_summary(english:\"Check for the MozillaThunderbird-1924 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This security update brings Mozilla Thunderbird to version 1.5.0.6.\n\nNote that on SUSE Linux 9.2, 9.3 and 10.0 this is a major version\nupgrade.\n\nMore Details can be found on this page:\nhttp://www.mozilla.org/projects/security/known-vulnerabilities.html\n\nIt includes fixes to the following security problems :\n\n - CVE-2006-3801/MFSA 2006-44: Code execution through\n deleted frame reference\n\n Thilo Girmann discovered that in certain circumstances a\n JavaScript reference to a frame or window was not\n properly cleared when the referenced content went away,\n and he demonstrated that this pointer to a deleted\n object could be used to execute native code supplied by\n the attacker.\n\n - CVE-2006-3113/MFSA 2006-46: Memory corruption with\n simultaneous events\n\n Secunia Research has discovered a vulnerability in\n Mozilla Firefox 1.5 branch, which can be exploited by\n malicious people to compromise a user's system.\n\n The vulnerability is caused due to an memory corruption\n error within the handling of simultaneously happening\n XPCOM events, which leads to use of a deleted timer\n object. This generally results in a crash but\n potentially could be exploited to execute arbitrary code\n on a user's system when a malicious website is visited.\n\n - CVE-2006-3802/MFSA 2006-47: Native DOM methods can be\n hijacked across domains\n\n A malicious page can hijack native DOM methods on a\n document object in another domain, which will run the\n attacker's script when called by the victim page. This\n could be used to steal login cookies, password, or other\n sensitive data on the target page, or to perform actions\n on behalf of a logged-in user.\n\n Access checks on all other properties and document nodes\n are performed correctly. This cross-site scripting (XSS)\n attack is limited to pages which use standard DOM\n methods of the top-level document object, such as\n document.getElementById(). This includes many popular\n sites, especially the newer ones that offer rich\n interaction to the user.\n\n - CVE-2006-3803/MFSA 2006-48: JavaScript new Function race\n condition\n\n H. D. Moore reported a testcase that was able to trigger\n a race condition where JavaScript garbage collection\n deleted a temporary variable still being used in the\n creation of a new Function object. The resulting use of\n a deleted object may be potentially exploitable to run\n native code provided by the attacker.\n\n - CVE-2006-3804/MFSA 2006-49: Heap buffer overwrite on\n malformed VCard\n\n A VCard attachment with a malformed base64 field (such\n as a photo) can trigger a heap buffer overwrite. These\n have proven exploitable in the past, though in this case\n the overwrite is accompanied by an integer underflow\n that would attempt to copy more data than the typical\n machine has, leading to a crash.\n\n - CVE-2006-3805/CVE-2006-3806/MFSA 2006-50: JavaScript\n engine vulnerabilities\n\n Continuing our security audit of the JavaScript engine,\n Mozilla developers found and fixed several potential\n vulnerabilities.\n\n Igor Bukanov and shutdown found additional places where\n an untimely garbage collection could delete a temporary\n object that was in active use (similar to MFSA 2006-01\n and MFSA 2006-10). Some of these may allow an attacker\n to run arbitrary code given the right conditions.\n\n Georgi Guninski found potential integer overflow issues\n with long strings in the toSource() methods of the\n Object, Array and String objects as well as string\n function arguments.\n\n - CVE-2006-3807/MFSA 2006-51: Privilege escalation using\n named-functions and redefined 'new Object()'\n\n moz_bug_r_a4 discovered that named JavaScript functions\n have a parent object created using the standard Object()\n constructor (ECMA-specified behavior) and that this\n constructor can be redefined by script (also\n ECMA-specified behavior). If the Object() constructor is\n changed to return a reference to a privileged object\n with useful properties it is possible to have\n attacker-supplied script excuted with elevated\n privileges by calling the function. This could be used\n to install malware or take other malicious actions.\n\n Our fix involves calling the internal Object constructor\n which appears to be what other ECMA-compatible\n interpreters do.\n\n - CVE-2006-3808/MFSA 2006-52: PAC privilege escalation\n using Function.prototype.call\n\n moz_bug_r_a4 reports that a malicious Proxy AutoConfig\n (PAC) server could serve a PAC script that can execute\n code with elevated privileges by setting the required\n FindProxyForURL function to the eval method on a\n privileged object that leaked into the PAC sandbox. By\n redirecting the victim to a specially crafted URL --\n easily done since the PAC script controls which proxy to\n use -- the URL 'hostname' can be executed as privileged\n script.\n\n A malicious proxy server can perform spoofing attacks on\n the user so it was already important to use a\n trustworthy PAC server.\n\n - CVE-2006-3809/MFSA 2006-53: UniversalBrowserRead\n privilege escalation\n\n shutdown reports that scripts granted the\n UniversalBrowserRead privilege can leverage that into\n the equivalent of the far more powerful\n UniversalXPConnect since they are allowed to 'read' into\n a privileged context. This allows the attacker the\n ability to run scripts with the full privelege of the\n user running the browser, possibly installing malware or\n snooping on private data. This has been fixed so that\n UniversalBrowserRead and UniversalBrowserWrite are\n limited to reading from and writing into only\n normally-privileged browser windows and frames.\n\n - CVE-2006-3810/MFSA 2006-54: XSS with\n XPCNativeWrapper(window).Function(...)\n\n shutdown reports that cross-site scripting (XSS) attacks\n could be performed using the construct\n XPCNativeWrapper(window).Function(...), which created a\n function that appeared to belong to the window in\n question even after it had been navigated to the target\n site.\n\n - CVE-2006-3811/MFSA 2006-55: Crashes with evidence of\n memory corruption\n\n As part of the Firefox 1.5.0.5 stability and security\n release, developers in the Mozilla community looked for\n and fixed several crash bugs to improve the stability of\n Mozilla clients. Some of these crashes showed evidence\n of memory corruption that we presume could be exploited\n to run arbitrary code with enough effort.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.mozilla.org/projects/security/known-vulnerabilities.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected MozillaThunderbird packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:MozillaThunderbird\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:MozillaThunderbird-translations\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:10.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/08/01\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2007/10/17\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2007-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE10\\.1)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"10.1\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE10.1\", reference:\"MozillaThunderbird-1.5.0.5-0.1\") ) flag++;\nif ( rpm_check(release:\"SUSE10.1\", reference:\"MozillaThunderbird-translations-1.5.0.5-0.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"MozillaThunderbird\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T13:12:46", "description": "Various flaws have been reported that allow an attacker to execute arbitrary code with user privileges by tricking the user into opening a malicious email containing JavaScript. Please note that JavaScript is disabled by default for emails, and it is not recommended to enable it. (CVE-2006-3113, CVE-2006-3802, CVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3807, CVE-2006-3809, CVE-2006-3810, CVE-2006-3811, CVE-2006-3812)\n\nA buffer overflow has been discovered in the handling of .vcard files.\nBy tricking a user into importing a malicious vcard into his contacts, this could be exploited to execute arbitrary code with the user's privileges. (CVE-2006-3084)\n\nThe 'enigmail' plugin has been updated to work with the new Thunderbird version.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": null, "vector": null}, "published": "2007-11-10T00:00:00", "type": "nessus", "title": "Ubuntu 6.06 LTS : mozilla-thunderbird vulnerabilities (USN-329-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2006-3084", "CVE-2006-3113", "CVE-2006-3802", "CVE-2006-3803", "CVE-2006-3804", "CVE-2006-3805", "CVE-2006-3806", "CVE-2006-3807", "CVE-2006-3809", "CVE-2006-3810", "CVE-2006-3811", "CVE-2006-3812", "CVE-2007-1794"], "modified": "2021-01-19T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:mozilla-thunderbird", "p-cpe:/a:canonical:ubuntu_linux:mozilla-thunderbird-dev", "p-cpe:/a:canonical:ubuntu_linux:mozilla-thunderbird-enigmail", "p-cpe:/a:canonical:ubuntu_linux:mozilla-thunderbird-inspector", "p-cpe:/a:canonical:ubuntu_linux:mozilla-thunderbird-typeaheadfind", "cpe:/o:canonical:ubuntu_linux:6.06:-:lts"], "id": "UBUNTU_USN-329-1.NASL", "href": "https://www.tenable.com/plugins/nessus/27908", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-329-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(27908);\n script_version(\"1.17\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2006-3084\", \"CVE-2006-3113\", \"CVE-2006-3802\", \"CVE-2006-3803\", \"CVE-2006-3804\", \"CVE-2006-3805\", \"CVE-2006-3806\", \"CVE-2006-3807\", \"CVE-2006-3809\", \"CVE-2006-3810\", \"CVE-2006-3811\", \"CVE-2006-3812\", \"CVE-2007-1794\");\n script_xref(name:\"USN\", value:\"329-1\");\n\n script_name(english:\"Ubuntu 6.06 LTS : mozilla-thunderbird vulnerabilities (USN-329-1)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Various flaws have been reported that allow an attacker to execute\narbitrary code with user privileges by tricking the user into opening\na malicious email containing JavaScript. Please note that JavaScript\nis disabled by default for emails, and it is not recommended to enable\nit. (CVE-2006-3113, CVE-2006-3802, CVE-2006-3803, CVE-2006-3805,\nCVE-2006-3806, CVE-2006-3807, CVE-2006-3809, CVE-2006-3810,\nCVE-2006-3811, CVE-2006-3812)\n\nA buffer overflow has been discovered in the handling of .vcard files.\nBy tricking a user into importing a malicious vcard into his contacts,\nthis could be exploited to execute arbitrary code with the user's\nprivileges. (CVE-2006-3084)\n\nThe 'enigmail' plugin has been updated to work with the new\nThunderbird version.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/329-1/\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mozilla-thunderbird\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mozilla-thunderbird-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mozilla-thunderbird-enigmail\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mozilla-thunderbird-inspector\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mozilla-thunderbird-typeaheadfind\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:6.06:-:lts\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/07/29\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2007/11/10\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2007-2019 Canonical, Inc. / NASL script (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! ereg(pattern:\"^(6\\.06)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 6.06\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"6.06\", pkgname:\"mozilla-thunderbird\", pkgver:\"1.5.0.5-0ubuntu0.6.06\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"mozilla-thunderbird-dev\", pkgver:\"1.5.0.5-0ubuntu0.6.06\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"mozilla-thunderbird-enigmail\", pkgver:\"2:0.94-0ubuntu4.2\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"mozilla-thunderbird-inspector\", pkgver:\"1.5.0.5-0ubuntu0.6.06\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"mozilla-thunderbird-typeaheadfind\", pkgver:\"1.5.0.5-0ubuntu0.6.06\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"mozilla-thunderbird / mozilla-thunderbird-dev / etc\");\n}\n", "cvss": {"score": 10, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-05-15T13:38:38", "description": "The installed version of Firefox is affected by various security issues, some of which may lead to execution of arbitrary code on the affected host subject to the user's privileges.", "cvss3": {"score": null, "vector": null}, "published": "2006-07-27T00:00:00", "type": "nessus", "title": "Firefox < 1.5.0.5 Multiple Vulnerabilities", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2006-3113", "CVE-2006-3677", "CVE-2006-3801", "CVE-2006-3802", "CVE-2006-3803", "CVE-2006-3805", "CVE-2006-3806", "CVE-2006-3807", "CVE-2006-3808", "CVE-2006-3809", "CVE-2006-3810", "CVE-2006-3811", "CVE-2006-3812"], "modified": "2018-07-16T00:00:00", "cpe": ["cpe:/a:mozilla:firefox"], "id": "MOZILLA_FIREFOX_1505.NASL", "href": "https://www.tenable.com/plugins/nessus/22095", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\n\nif (NASL_LEVEL < 3004) exit(0);\n\n\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(22095);\n script_version(\"1.23\");\n script_cvs_date(\"Date: 2018/07/16 14:09:14\");\n\n script_cve_id(\"CVE-2006-3113\", \"CVE-2006-3677\", \"CVE-2006-3801\", \"CVE-2006-3802\", \"CVE-2006-3803\",\n \"CVE-2006-3805\", \"CVE-2006-3806\", \"CVE-2006-3807\", \"CVE-2006-3808\", \"CVE-2006-3809\",\n \"CVE-2006-3810\", \"CVE-2006-3811\", \"CVE-2006-3812\");\n script_bugtraq_id(19181, 19192, 19197);\n script_xref(name:\"CERT\", value:\"655892\");\n\n script_name(english:\"Firefox < 1.5.0.5 Multiple Vulnerabilities\");\n script_summary(english:\"Checks version of Firefox\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host contains a web browser that is affected by\nmultiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The installed version of Firefox is affected by various security\nissues, some of which may lead to execution of arbitrary code on the\naffected host subject to the user's privileges.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-44/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-45/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-46/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-47/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-48/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-50/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-51/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-52/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-53/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-54/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-55/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-56/\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Firefox 1.5.0.5 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Mozilla Suite/Firefox Navigator Object Code Execution');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/07/27\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/07/25\");\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2006/07/25\");\nscript_set_attribute(attribute:\"plugin_type\", value:\"local\");\nscript_set_attribute(attribute:\"cpe\", value:\"cpe:/a:mozilla:firefox\");\nscript_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n script_copyright(english:\"This script is Copyright (C) 2006-2018 Tenable Network Security, Inc.\");\n script_dependencies(\"mozilla_org_installed.nasl\");\n script_require_keys(\"Mozilla/Firefox/Version\");\n exit(0);\n}\n\ninclude(\"mozilla_version.inc\");\nport = get_kb_item_or_exit(\"SMB/transport\");\n\ninstalls = get_kb_list(\"SMB/Mozilla/Firefox/*\");\nif (isnull(installs)) audit(AUDIT_NOT_INST, \"Firefox\");\n\nmozilla_check_version(installs:installs, product:'firefox', esr:FALSE, fix:'1.5.0.5', severity:SECURITY_HOLE);", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-05-15T13:38:52", "description": "The remote host is affected by the vulnerability described in GLSA-200608-03 (Mozilla Firefox: Multiple vulnerabilities)\n\n The following vulnerabilities have been reported:\n Benjamin Smedberg discovered that chrome URL's could be made to reference remote files.\n Developers in the Mozilla community looked for and fixed several crash bugs to improve the stability of Mozilla clients.\n 'shutdown' reports that cross-site scripting (XSS) attacks could be performed using the construct XPCNativeWrapper(window).Function(...), which created a function that appeared to belong to the window in question even after it had been navigated to the target site.\n 'shutdown' reports that scripts granting the UniversalBrowserRead privilege can leverage that into the equivalent of the far more powerful UniversalXPConnect since they are allowed to 'read' into a privileged context.\n 'moz_bug_r_a4' reports that A malicious Proxy AutoConfig (PAC) server could serve a PAC script that can execute code with elevated privileges by setting the required FindProxyForURL function to the eval method on a privileged object that leaked into the PAC sandbox.\n 'moz_bug_r_a4' discovered that Named JavaScript functions have a parent object created using the standard Object() constructor (ECMA-specified behavior) and that this constructor can be redefined by script (also ECMA-specified behavior).\n Igor Bukanov and shutdown found additional places where an untimely garbage collection could delete a temporary object that was in active use.\n Georgi Guninski found potential integer overflow issues with long strings in the toSource() methods of the Object, Array and String objects as well as string function arguments.\n H. D. Moore reported a testcase that was able to trigger a race condition where JavaScript garbage collection deleted a temporary variable still being used in the creation of a new Function object.\n A malicious page can hijack native DOM methods on a document object in another domain, which will run the attacker's script when called by the victim page.\n Secunia Research has discovered a vulnerability which is caused due to an memory corruption error within the handling of simultaneously happening XPCOM events. This leads to use of a deleted timer object.\n An anonymous researcher for TippingPoint and the Zero Day Initiative showed that when used in a web page Java would reference properties of the window.navigator object as it started up.\n Thilo Girmann discovered that in certain circumstances a JavaScript reference to a frame or window was not properly cleared when the referenced content went away.\n Impact :\n\n A user can be enticed to open specially crafted URLs, visit webpages containing malicious JavaScript or execute a specially crafted script.\n These events could lead to the execution of arbitrary code, or the installation of malware on the user's computer.\n Workaround :\n\n There is no known workaround at this time.", "cvss3": {"score": null, "vector": null}, "published": "2006-08-04T00:00:00", "type": "nessus", "title": "GLSA-200608-03 : Mozilla Firefox: Multiple vulnerabilities", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2006-3113", "CVE-2006-3677", "CVE-2006-3801", "CVE-2006-3802", "CVE-2006-3803", "CVE-2006-3805", "CVE-2006-3806", "CVE-2006-3807", "CVE-2006-3808", "CVE-2006-3809", "CVE-2006-3810", "CVE-2006-3811", "CVE-2006-3812"], "modified": "2021-01-06T00:00:00", "cpe": ["p-cpe:/a:gentoo:linux:mozilla-firefox", "p-cpe:/a:gentoo:linux:mozilla-firefox-bin", "cpe:/o:gentoo:linux"], "id": "GENTOO_GLSA-200608-03.NASL", "href": "https://www.tenable.com/plugins/nessus/22145", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Gentoo Linux Security Advisory GLSA 200608-03.\n#\n# The advisory text is Copyright (C) 2001-2016 Gentoo Foundation, Inc.\n# and licensed under the Creative Commons - Attribution / Share Alike \n# license. See http://creativecommons.org/licenses/by-sa/3.0/\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(22145);\n script_version(\"1.19\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2006-3113\", \"CVE-2006-3677\", \"CVE-2006-3801\", \"CVE-2006-3802\", \"CVE-2006-3803\", \"CVE-2006-3805\", \"CVE-2006-3806\", \"CVE-2006-3807\", \"CVE-2006-3808\", \"CVE-2006-3809\", \"CVE-2006-3810\", \"CVE-2006-3811\", \"CVE-2006-3812\");\n script_xref(name:\"GLSA\", value:\"200608-03\");\n\n script_name(english:\"GLSA-200608-03 : Mozilla Firefox: Multiple vulnerabilities\");\n script_summary(english:\"Checks for updated package(s) in /var/db/pkg\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Gentoo host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote host is affected by the vulnerability described in GLSA-200608-03\n(Mozilla Firefox: Multiple vulnerabilities)\n\n The following vulnerabilities have been reported:\n Benjamin Smedberg discovered that chrome URL's could be made to\n reference remote files.\n Developers in the Mozilla community\n looked for and fixed several crash bugs to improve the stability of\n Mozilla clients.\n 'shutdown' reports that cross-site scripting\n (XSS) attacks could be performed using the construct\n XPCNativeWrapper(window).Function(...), which created a function that\n appeared to belong to the window in question even after it had been\n navigated to the target site.\n 'shutdown' reports that scripts\n granting the UniversalBrowserRead privilege can leverage that into the\n equivalent of the far more powerful UniversalXPConnect since they are\n allowed to 'read' into a privileged context.\n 'moz_bug_r_a4'\n reports that A malicious Proxy AutoConfig (PAC) server could serve a\n PAC script that can execute code with elevated privileges by setting\n the required FindProxyForURL function to the eval method on a\n privileged object that leaked into the PAC sandbox.\n 'moz_bug_r_a4' discovered that Named JavaScript functions have a\n parent object created using the standard Object() constructor\n (ECMA-specified behavior) and that this constructor can be redefined by\n script (also ECMA-specified behavior).\n Igor Bukanov and\n shutdown found additional places where an untimely garbage collection\n could delete a temporary object that was in active use.\n Georgi\n Guninski found potential integer overflow issues with long strings in\n the toSource() methods of the Object, Array and String objects as well\n as string function arguments.\n H. D. Moore reported a testcase\n that was able to trigger a race condition where JavaScript garbage\n collection deleted a temporary variable still being used in the\n creation of a new Function object.\n A malicious page can hijack\n native DOM methods on a document object in another domain, which will\n run the attacker's script when called by the victim page.\n Secunia Research has discovered a vulnerability which is caused due\n to an memory corruption error within the handling of simultaneously\n happening XPCOM events. This leads to use of a deleted timer\n object.\n An anonymous researcher for TippingPoint and the Zero\n Day Initiative showed that when used in a web page Java would reference\n properties of the window.navigator object as it started up.\n Thilo Girmann discovered that in certain circumstances a JavaScript\n reference to a frame or window was not properly cleared when the\n referenced content went away.\n \nImpact :\n\n A user can be enticed to open specially crafted URLs, visit webpages\n containing malicious JavaScript or execute a specially crafted script.\n These events could lead to the execution of arbitrary code, or the\n installation of malware on the user's computer.\n \nWorkaround :\n\n There is no known workaround at this time.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.gentoo.org/glsa/200608-03\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"All Mozilla Firefox users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=www-client/mozilla-firefox-1.5.0.5'\n Users of the binary package should upgrade as well:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=www-client/mozilla-firefox-bin-1.5.0.5'\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Mozilla Suite/Firefox Navigator Object Code Execution');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:mozilla-firefox\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:mozilla-firefox-bin\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:gentoo:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/08/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/08/04\");\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2006/07/25\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Gentoo Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Gentoo/release\", \"Host/Gentoo/qpkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"qpkg.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Gentoo/release\")) audit(AUDIT_OS_NOT, \"Gentoo\");\nif (!get_kb_item(\"Host/Gentoo/qpkg-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (qpkg_check(package:\"www-client/mozilla-firefox-bin\", unaffected:make_list(\"ge 1.5.0.5\"), vulnerable:make_list(\"lt 1.5.0.5\"))) flag++;\nif (qpkg_check(package:\"www-client/mozilla-firefox\", unaffected:make_list(\"ge 1.5.0.5\"), vulnerable:make_list(\"lt 1.5.0.5\"))) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = qpkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"Mozilla Firefox\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-05-15T13:36:53", "description": "This security update brings Mozilla SeaMonkey to version 1.0.4.\n\nPlease also see http://www.mozilla.org/projects/security/known-vulnerabilities.html for more details.\n\nIt includes fixes to the following security problems :\n\n - CVE-2006-3801/MFSA 2006-44: Code execution through deleted frame reference\n\n Thilo Girmann discovered that in certain circumstances a JavaScript reference to a frame or window was not properly cleared when the referenced content went away, and he demonstrated that this pointer to a deleted object could be used to execute native code supplied by the attacker.\n\n - CVE-2006-3677/MFSA 2006-45: JavaScript navigator Object Vulnerability\n\n An anonymous researcher for TippingPoint and the Zero Day Initiative showed that when used in a web page Java would reference properties of the window.navigator object as it started up. If the page replaced the navigator object before starting Java then the browser would crash in a way that could be exploited to run native code supplied by the attacker.\n\n - CVE-2006-3113/MFSA 2006-46: Memory corruption with simultaneous events\n\n Secunia Research has discovered a vulnerability in Mozilla Firefox 1.5 branch, which can be exploited by malicious people to compromise a user's system.\n\n The vulnerability is caused due to an memory corruption error within the handling of simultaneously happening XPCOM events, which leads to use of a deleted timer object. This generally results in a crash but potentially could be exploited to execute arbitrary code on a user's system when a malicious website is visited.\n\n - CVE-2006-3802/MFSA 2006-47: Native DOM methods can be hijacked across domains\n\n A malicious page can hijack native DOM methods on a document object in another domain, which will run the attacker's script when called by the victim page. This could be used to steal login cookies, password, or other sensitive data on the target page, or to perform actions on behalf of a logged-in user.\n\n Access checks on all other properties and document nodes are performed correctly. This cross-site scripting (XSS) attack is limited to pages which use standard DOM methods of the top-level document object, such as document.getElementById(). This includes many popular sites, especially the newer ones that offer rich interaction to the user.\n\n - CVE-2006-3803/MFSA 2006-48: JavaScript new Function race condition\n\n H. D. Moore reported a testcase that was able to trigger a race condition where JavaScript garbage collection deleted a temporary variable still being used in the creation of a new Function object. The resulting use of a deleted object may be potentially exploitable to run native code provided by the attacker.\n\n - CVE-2006-3804/MFSA 2006-49: Heap buffer overwrite on malformed VCard\n\n A VCard attachment with a malformed base64 field (such as a photo) can trigger a heap buffer overwrite. These have proven exploitable in the past, though in this case the overwrite is accompanied by an integer underflow that would attempt to copy more data than the typical machine has, leading to a crash.\n\n - CVE-2006-3806/MFSA 2006-50: JavaScript engine vulnerabilities\n\n Continuing our security audit of the JavaScript engine, Mozilla developers found and fixed several potential vulnerabilities.\n\n Igor Bukanov and shutdown found additional places where an untimely garbage collection could delete a temporary object that was in active use (similar to MFSA 2006-01 and MFSA 2006-10). Some of these may allow an attacker to run arbitrary code given the right conditions.\n\n Georgi Guninski found potential integer overflow issues with long strings in the toSource() methods of the Object, Array and String objects as well as string function arguments.\n\n - CVE-2006-3807/MFSA 2006-51: Privilege escalation using named-functions and redefined 'new Object()'\n\n moz_bug_r_a4 discovered that named JavaScript functions have a parent object created using the standard Object() constructor (ECMA-specified behavior) and that this constructor can be redefined by script (also ECMA-specified behavior). If the Object() constructor is changed to return a reference to a privileged object with useful properties it is possible to have attacker-supplied script excuted with elevated privileges by calling the function. This could be used to install malware or take other malicious actions.\n\n Our fix involves calling the internal Object constructor which appears to be what other ECMA-compatible interpreters do.\n\n - CVE-2006-3808/MFSA 2006-52: PAC privilege escalation using Function.prototype.call\n\n moz_bug_r_a4 reports that a malicious Proxy AutoConfig (PAC) server could serve a PAC script that can execute code with elevated privileges by setting the required FindProxyForURL function to the eval method on a privileged object that leaked into the PAC sandbox. By redirecting the victim to a specially crafted URL -- easily done since the PAC script controls which proxy to use -- the URL 'hostname' can be executed as privileged script.\n\n A malicious proxy server can perform spoofing attacks on the user so it was already important to use a trustworthy PAC server.\n\n - CVE-2006-3809/MFSA 2006-53: UniversalBrowserRead privilege escalation\n\n shutdown reports that scripts granted the UniversalBrowserRead privilege can leverage that into the equivalent of the far more powerful UniversalXPConnect since they are allowed to 'read' into a privileged context. This allows the attacker the ability to run scripts with the full privelege of the user running the browser, possibly installing malware or snooping on private data. This has been fixed so that UniversalBrowserRead and UniversalBrowserWrite are limited to reading from and writing into only normally-privileged browser windows and frames.\n\n - CVE-2006-3810/MFSA 2006-54: XSS with XPCNativeWrapper(window).Function(...)\n\n shutdown reports that cross-site scripting (XSS) attacks could be performed using the construct XPCNativeWrapper(window).Function(...), which created a function that appeared to belong to the window in question even after it had been navigated to the target site.\n\n - CVE-2006-3811/MFSA 2006-55: Crashes with evidence of memory corruption\n\n As part of the Firefox 1.5.0.5 stability and security release, developers in the Mozilla community looked for and fixed several crash bugs to improve the stability of Mozilla clients. Some of these crashes showed evidence of memory corruption that we presume could be exploited to run arbitrary code with enough effort.\n\n - CVE-2006-3812/MFSA 2006-56: chrome: scheme loading remote content\n\n Benjamin Smedberg discovered that chrome URL's could be made to reference remote files, which would run scripts with full privilege. There is no known way for web content to successfully load a chrome: url, but if a user could be convinced to do so manually (perhaps by copying a link and pasting it into the location bar) this could be exploited.", "cvss3": {"score": null, "vector": null}, "published": "2007-10-17T00:00:00", "type": "nessus", "title": "openSUSE 10 Security Update : seamonkey (seamonkey-1952)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2006-3113", "CVE-2006-3677", "CVE-2006-3801", "CVE-2006-3802", "CVE-2006-3803", "CVE-2006-3804", "CVE-2006-3806", "CVE-2006-3807", "CVE-2006-3808", "CVE-2006-3809", "CVE-2006-3810", "CVE-2006-3811", "CVE-2006-3812"], "modified": "2021-01-14T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:seamonkey", "p-cpe:/a:novell:opensuse:seamonkey-calendar", "p-cpe:/a:novell:opensuse:seamonkey-dom-inspector", "p-cpe:/a:novell:opensuse:seamonkey-irc", "p-cpe:/a:novell:opensuse:seamonkey-mail", "p-cpe:/a:novell:opensuse:seamonkey-spellchecker", "p-cpe:/a:novell:opensuse:seamonkey-venkman", "cpe:/o:novell:opensuse:10.1"], "id": "SUSE_SEAMONKEY-1952.NASL", "href": "https://www.tenable.com/plugins/nessus/27435", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update seamonkey-1952.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(27435);\n script_version(\"1.20\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2006-3113\", \"CVE-2006-3677\", \"CVE-2006-3801\", \"CVE-2006-3802\", \"CVE-2006-3803\", \"CVE-2006-3804\", \"CVE-2006-3806\", \"CVE-2006-3807\", \"CVE-2006-3808\", \"CVE-2006-3809\", \"CVE-2006-3810\", \"CVE-2006-3811\", \"CVE-2006-3812\");\n\n script_name(english:\"openSUSE 10 Security Update : seamonkey (seamonkey-1952)\");\n script_summary(english:\"Check for the seamonkey-1952 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This security update brings Mozilla SeaMonkey to version 1.0.4.\n\nPlease also see\nhttp://www.mozilla.org/projects/security/known-vulnerabilities.html\nfor more details.\n\nIt includes fixes to the following security problems :\n\n - CVE-2006-3801/MFSA 2006-44: Code execution through\n deleted frame reference\n\n Thilo Girmann discovered that in certain circumstances a\n JavaScript reference to a frame or window was not\n properly cleared when the referenced content went away,\n and he demonstrated that this pointer to a deleted\n object could be used to execute native code supplied by\n the attacker.\n\n - CVE-2006-3677/MFSA 2006-45: JavaScript navigator Object\n Vulnerability\n\n An anonymous researcher for TippingPoint and the Zero\n Day Initiative showed that when used in a web page Java\n would reference properties of the window.navigator\n object as it started up. If the page replaced the\n navigator object before starting Java then the browser\n would crash in a way that could be exploited to run\n native code supplied by the attacker.\n\n - CVE-2006-3113/MFSA 2006-46: Memory corruption with\n simultaneous events\n\n Secunia Research has discovered a vulnerability in\n Mozilla Firefox 1.5 branch, which can be exploited by\n malicious people to compromise a user's system.\n\n The vulnerability is caused due to an memory corruption\n error within the handling of simultaneously happening\n XPCOM events, which leads to use of a deleted timer\n object. This generally results in a crash but\n potentially could be exploited to execute arbitrary code\n on a user's system when a malicious website is visited.\n\n - CVE-2006-3802/MFSA 2006-47: Native DOM methods can be\n hijacked across domains\n\n A malicious page can hijack native DOM methods on a\n document object in another domain, which will run the\n attacker's script when called by the victim page. This\n could be used to steal login cookies, password, or other\n sensitive data on the target page, or to perform actions\n on behalf of a logged-in user.\n\n Access checks on all other properties and document nodes\n are performed correctly. This cross-site scripting (XSS)\n attack is limited to pages which use standard DOM\n methods of the top-level document object, such as\n document.getElementById(). This includes many popular\n sites, especially the newer ones that offer rich\n interaction to the user.\n\n - CVE-2006-3803/MFSA 2006-48: JavaScript new Function race\n condition\n\n H. D. Moore reported a testcase that was able to trigger\n a race condition where JavaScript garbage collection\n deleted a temporary variable still being used in the\n creation of a new Function object. The resulting use of\n a deleted object may be potentially exploitable to run\n native code provided by the attacker.\n\n - CVE-2006-3804/MFSA 2006-49: Heap buffer overwrite on\n malformed VCard\n\n A VCard attachment with a malformed base64 field (such\n as a photo) can trigger a heap buffer overwrite. These\n have proven exploitable in the past, though in this case\n the overwrite is accompanied by an integer underflow\n that would attempt to copy more data than the typical\n machine has, leading to a crash.\n\n - CVE-2006-3806/MFSA 2006-50: JavaScript engine\n vulnerabilities\n\n Continuing our security audit of the JavaScript engine,\n Mozilla developers found and fixed several potential\n vulnerabilities.\n\n Igor Bukanov and shutdown found additional places where\n an untimely garbage collection could delete a temporary\n object that was in active use (similar to MFSA 2006-01\n and MFSA 2006-10). Some of these may allow an attacker\n to run arbitrary code given the right conditions.\n\n Georgi Guninski found potential integer overflow issues\n with long strings in the toSource() methods of the\n Object, Array and String objects as well as string\n function arguments.\n\n - CVE-2006-3807/MFSA 2006-51: Privilege escalation using\n named-functions and redefined 'new Object()'\n\n moz_bug_r_a4 discovered that named JavaScript functions\n have a parent object created using the standard Object()\n constructor (ECMA-specified behavior) and that this\n constructor can be redefined by script (also\n ECMA-specified behavior). If the Object() constructor is\n changed to return a reference to a privileged object\n with useful properties it is possible to have\n attacker-supplied script excuted with elevated\n privileges by calling the function. This could be used\n to install malware or take other malicious actions.\n\n Our fix involves calling the internal Object constructor\n which appears to be what other ECMA-compatible\n interpreters do.\n\n - CVE-2006-3808/MFSA 2006-52: PAC privilege escalation\n using Function.prototype.call\n\n moz_bug_r_a4 reports that a malicious Proxy AutoConfig\n (PAC) server could serve a PAC script that can execute\n code with elevated privileges by setting the required\n FindProxyForURL function to the eval method on a\n privileged object that leaked into the PAC sandbox. By\n redirecting the victim to a specially crafted URL --\n easily done since the PAC script controls which proxy to\n use -- the URL 'hostname' can be executed as privileged\n script.\n\n A malicious proxy server can perform spoofing attacks on\n the user so it was already important to use a\n trustworthy PAC server.\n\n - CVE-2006-3809/MFSA 2006-53: UniversalBrowserRead\n privilege escalation\n\n shutdown reports that scripts granted the\n UniversalBrowserRead privilege can leverage that into\n the equivalent of the far more powerful\n UniversalXPConnect since they are allowed to 'read' into\n a privileged context. This allows the attacker the\n ability to run scripts with the full privelege of the\n user running the browser, possibly installing malware or\n snooping on private data. This has been fixed so that\n UniversalBrowserRead and UniversalBrowserWrite are\n limited to reading from and writing into only\n normally-privileged browser windows and frames.\n\n - CVE-2006-3810/MFSA 2006-54: XSS with\n XPCNativeWrapper(window).Function(...)\n\n shutdown reports that cross-site scripting (XSS) attacks\n could be performed using the construct\n XPCNativeWrapper(window).Function(...), which created a\n function that appeared to belong to the window in\n question even after it had been navigated to the target\n site.\n\n - CVE-2006-3811/MFSA 2006-55: Crashes with evidence of\n memory corruption\n\n As part of the Firefox 1.5.0.5 stability and security\n release, developers in the Mozilla community looked for\n and fixed several crash bugs to improve the stability of\n Mozilla clients. Some of these crashes showed evidence\n of memory corruption that we presume could be exploited\n to run arbitrary code with enough effort.\n\n - CVE-2006-3812/MFSA 2006-56: chrome: scheme loading\n remote content\n\n Benjamin Smedberg discovered that chrome URL's could be\n made to reference remote files, which would run scripts\n with full privilege. There is no known way for web\n content to successfully load a chrome: url, but if a\n user could be convinced to do so manually (perhaps by\n copying a link and pasting it into the location bar)\n this could be exploited.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.mozilla.org/projects/security/known-vulnerabilities.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected seamonkey packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Mozilla Suite/Firefox Navigator Object Code Execution');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:seamonkey\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:seamonkey-calendar\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:seamonkey-dom-inspector\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:seamonkey-irc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:seamonkey-mail\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:seamonkey-spellchecker\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:seamonkey-venkman\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:10.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/08/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2007/10/17\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2007-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE10\\.1)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"10.1\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE10.1\", reference:\"seamonkey-1.0.4-2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE10.1\", reference:\"seamonkey-calendar-1.0.4-2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE10.1\", reference:\"seamonkey-dom-inspector-1.0.4-2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE10.1\", reference:\"seamonkey-irc-1.0.4-2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE10.1\", reference:\"seamonkey-mail-1.0.4-2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE10.1\", reference:\"seamonkey-spellchecker-1.0.4-2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE10.1\", reference:\"seamonkey-venkman-1.0.4-2.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"seamonkey\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-05-15T13:42:04", "description": "This security update brings Mozilla Firefox to version 1.5.0.6.\n\nMore details can be found on:\nhttp://www.mozilla.org/projects/security/known-vulnerabiliti es.html\n\nIt includes fixes to the following security problems :\n\n - Code execution through deleted frame reference.\n (CVE-2006-3801 / MFSA 2006-44)\n\n Thilo Girmann discovered that in certain circumstances a JavaScript reference to a frame or window was not properly cleared when the referenced content went away, and he demonstrated that this pointer to a deleted object could be used to execute native code supplied by the attacker.\n\n - JavaScript navigator Object Vulnerability.\n (CVE-2006-3677 / MFSA 2006-45)\n\n An anonymous researcher for TippingPoint and the Zero Day Initiative showed that when used in a web page Java would reference properties of the window.navigator object as it started up. If the page replaced the navigator object before starting Java then the browser would crash in a way that could be exploited to run native code supplied by the attacker.\n\n - Memory corruption with simultaneous events.\n (CVE-2006-3113 / MFSA 2006-46)\n\n Secunia Research has discovered a vulnerability in Mozilla Firefox 1.5 branch, which can be exploited by malicious people to compromise a user's system.\n\n The vulnerability is caused due to an memory corruption error within the handling of simultaneously happening XPCOM events, which leads to use of a deleted timer object. This generally results in a crash but potentially could be exploited to execute arbitrary code on a user's system when a malicious website is visited.\n\n - Native DOM methods can be hijacked across domains.\n (CVE-2006-3802 / MFSA 2006-47)\n\n A malicious page can hijack native DOM methods on a document object in another domain, which will run the attacker's script when called by the victim page. This could be used to steal login cookies, password, or other sensitive data on the target page, or to perform actions on behalf of a logged-in user.\n\n Access checks on all other properties and document nodes are performed correctly. This cross-site scripting (XSS) attack is limited to pages which use standard DOM methods of the top-level document object, such as document.getElementById(). This includes many popular sites, especially the newer ones that offer rich interaction to the user.\n\n - JavaScript new Function race condition. (CVE-2006-3803 / MFSA 2006-48)\n\n H. D. Moore reported a testcase that was able to trigger a race condition where JavaScript garbage collection deleted a temporary variable still being used in the creation of a new Function object. The resulting use of a deleted object may be potentially exploitable to run native code provided by the attacker.\n\n - Heap buffer overwrite on malformed VCard. (CVE-2006-3804 / MFSA 2006-49)\n\n A VCard attachment with a malformed base64 field (such as a photo) can trigger a heap buffer overwrite. These have proven exploitable in the past, though in this case the overwrite is accompanied by an integer underflow that would attempt to copy more data than the typical machine has, leading to a crash.\n\n - JavaScript engine vulnerabilities. (CVE-2006-3805 / CVE-2006-3806 / MFSA 2006-50)\n\n Continuing our security audit of the JavaScript engine, Mozilla developers found and fixed several potential vulnerabilities.\n\n Igor Bukanov and shutdown found additional places where an untimely garbage collection could delete a temporary object that was in active use (similar to MFSA 2006-01 / MFSA 2006-10). Some of these may allow an attacker to run arbitrary code given the right conditions.\n\n Georgi Guninski found potential integer overflow issues with long strings in the toSource() methods of the Object, Array and String objects as well as string function arguments.\n\n - Privilege escalation using named-functions and redefined 'new Object()'. (CVE-2006-3807 / MFSA 2006-51)\n\n moz_bug_r_a4 discovered that named JavaScript functions have a parent object created using the standard Object() constructor (ECMA-specified behavior) and that this constructor can be redefined by script (also ECMA-specified behavior). If the Object() constructor is changed to return a reference to a privileged object with useful properties it is possible to have attacker-supplied script excuted with elevated privileges by calling the function. This could be used to install malware or take other malicious actions.\n\n Our fix involves calling the internal Object constructor which appears to be what other ECMA-compatible interpreters do.\n\n - PAC privilege escalation using Function.prototype.call.\n (CVE-2006-3808 / MFSA 2006-52)\n\n moz_bug_r_a4 reports that a malicious Proxy AutoConfig (PAC) server could serve a PAC script that can execute code with elevated privileges by setting the required FindProxyForURL function to the eval method on a privileged object that leaked into the PAC sandbox. By redirecting the victim to a specially crafted URL -- easily done since the PAC script controls which proxy to use -- the URL 'hostname' can be executed as privileged script.\n\n A malicious proxy server can perform spoofing attacks on the user so it was already important to use a trustworthy PAC server.\n\n - UniversalBrowserRead privilege escalation.\n (CVE-2006-3809 / MFSA 2006-53)\n\n shutdown reports that scripts granted the UniversalBrowserRead privilege can leverage that into the equivalent of the far more powerful UniversalXPConnect since they are allowed to 'read' into a privileged context. This allows the attacker the ability to run scripts with the full privelege of the user running the browser, possibly installing malware or snooping on private data. This has been fixed so that UniversalBrowserRead and UniversalBrowserWrite are limited to reading from and writing into only normally-privileged browser windows and frames.\n\n - XSS with XPCNativeWrapper(window).Function(...).\n (CVE-2006-3810 / MFSA 2006-54)\n\n shutdown reports that cross-site scripting (XSS) attacks could be performed using the construct XPCNativeWrapper(window).Function(...), which created a function that appeared to belong to the window in question even after it had been navigated to the target site.\n\n - Crashes with evidence of memory corruption.\n (CVE-2006-3811 / MFSA 2006-55)\n\n As part of the Firefox 1.5.0.5 stability and security release, developers in the Mozilla community looked for and fixed several crash bugs to improve the stability of Mozilla clients. Some of these crashes showed evidence of memory corruption that we presume could be exploited to run arbitrary code with enough effort.\n\n - chrome: scheme loading remote content. (CVE-2006-3812 / MFSA 2006-56)\n\n Benjamin Smedberg discovered that chrome URL's could be made to reference remote files, which would run scripts with full privilege. There is no known way for web content to successfully load a chrome: url, but if a user could be convinced to do so manually (perhaps by copying a link and pasting it into the location bar) this could be exploited.", "cvss3": {"score": null, "vector": null}, "published": "2007-12-13T00:00:00", "type": "nessus", "title": "SuSE 10 Security Update : Firefox (ZYPP Patch Number 1960)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2006-3113", "CVE-2006-3677", "CVE-2006-3801", "CVE-2006-3802", "CVE-2006-3803", "CVE-2006-3804", "CVE-2006-3805", "CVE-2006-3806", "CVE-2006-3807", "CVE-2006-3808", "CVE-2006-3809", "CVE-2006-3810", "CVE-2006-3811", "CVE-2006-3812"], "modified": "2021-01-14T00:00:00", "cpe": ["cpe:/o:suse:suse_linux"], "id": "SUSE_MOZILLAFIREFOX-1960.NASL", "href": "https://www.tenable.com/plugins/nessus/29354", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The text description of this plugin is (C) Novell, Inc.\n#\n\nif (NASL_LEVEL < 3000) exit(0);\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(29354);\n script_version(\"1.21\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2006-3113\", \"CVE-2006-3677\", \"CVE-2006-3801\", \"CVE-2006-3802\", \"CVE-2006-3803\", \"CVE-2006-3804\", \"CVE-2006-3805\", \"CVE-2006-3806\", \"CVE-2006-3807\", \"CVE-2006-3808\", \"CVE-2006-3809\", \"CVE-2006-3810\", \"CVE-2006-3811\", \"CVE-2006-3812\");\n\n script_name(english:\"SuSE 10 Security Update : Firefox (ZYPP Patch Number 1960)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SuSE 10 host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This security update brings Mozilla Firefox to version 1.5.0.6.\n\nMore details can be found on:\nhttp://www.mozilla.org/projects/security/known-vulnerabiliti es.html\n\nIt includes fixes to the following security problems :\n\n - Code execution through deleted frame reference.\n (CVE-2006-3801 / MFSA 2006-44)\n\n Thilo Girmann discovered that in certain circumstances a\n JavaScript reference to a frame or window was not\n properly cleared when the referenced content went away,\n and he demonstrated that this pointer to a deleted\n object could be used to execute native code supplied by\n the attacker.\n\n - JavaScript navigator Object Vulnerability.\n (CVE-2006-3677 / MFSA 2006-45)\n\n An anonymous researcher for TippingPoint and the Zero\n Day Initiative showed that when used in a web page Java\n would reference properties of the window.navigator\n object as it started up. If the page replaced the\n navigator object before starting Java then the browser\n would crash in a way that could be exploited to run\n native code supplied by the attacker.\n\n - Memory corruption with simultaneous events.\n (CVE-2006-3113 / MFSA 2006-46)\n\n Secunia Research has discovered a vulnerability in\n Mozilla Firefox 1.5 branch, which can be exploited by\n malicious people to compromise a user's system.\n\n The vulnerability is caused due to an memory corruption\n error within the handling of simultaneously happening\n XPCOM events, which leads to use of a deleted timer\n object. This generally results in a crash but\n potentially could be exploited to execute arbitrary code\n on a user's system when a malicious website is visited.\n\n - Native DOM methods can be hijacked across domains.\n (CVE-2006-3802 / MFSA 2006-47)\n\n A malicious page can hijack native DOM methods on a\n document object in another domain, which will run the\n attacker's script when called by the victim page. This\n could be used to steal login cookies, password, or other\n sensitive data on the target page, or to perform actions\n on behalf of a logged-in user.\n\n Access checks on all other properties and document nodes\n are performed correctly. This cross-site scripting (XSS)\n attack is limited to pages which use standard DOM\n methods of the top-level document object, such as\n document.getElementById(). This includes many popular\n sites, especially the newer ones that offer rich\n interaction to the user.\n\n - JavaScript new Function race condition. (CVE-2006-3803 /\n MFSA 2006-48)\n\n H. D. Moore reported a testcase that was able to trigger\n a race condition where JavaScript garbage collection\n deleted a temporary variable still being used in the\n creation of a new Function object. The resulting use of\n a deleted object may be potentially exploitable to run\n native code provided by the attacker.\n\n - Heap buffer overwrite on malformed VCard. (CVE-2006-3804\n / MFSA 2006-49)\n\n A VCard attachment with a malformed base64 field (such\n as a photo) can trigger a heap buffer overwrite. These\n have proven exploitable in the past, though in this case\n the overwrite is accompanied by an integer underflow\n that would attempt to copy more data than the typical\n machine has, leading to a crash.\n\n - JavaScript engine vulnerabilities. (CVE-2006-3805 /\n CVE-2006-3806 / MFSA 2006-50)\n\n Continuing our security audit of the JavaScript engine,\n Mozilla developers found and fixed several potential\n vulnerabilities.\n\n Igor Bukanov and shutdown found additional places where\n an untimely garbage collection could delete a temporary\n object that was in active use (similar to MFSA 2006-01 /\n MFSA 2006-10). Some of these may allow an attacker to\n run arbitrary code given the right conditions.\n\n Georgi Guninski found potential integer overflow issues\n with long strings in the toSource() methods of the\n Object, Array and String objects as well as string\n function arguments.\n\n - Privilege escalation using named-functions and redefined\n 'new Object()'. (CVE-2006-3807 / MFSA 2006-51)\n\n moz_bug_r_a4 discovered that named JavaScript functions\n have a parent object created using the standard Object()\n constructor (ECMA-specified behavior) and that this\n constructor can be redefined by script (also\n ECMA-specified behavior). If the Object() constructor is\n changed to return a reference to a privileged object\n with useful properties it is possible to have\n attacker-supplied script excuted with elevated\n privileges by calling the function. This could be used\n to install malware or take other malicious actions.\n\n Our fix involves calling the internal Object constructor\n which appears to be what other ECMA-compatible\n interpreters do.\n\n - PAC privilege escalation using Function.prototype.call.\n (CVE-2006-3808 / MFSA 2006-52)\n\n moz_bug_r_a4 reports that a malicious Proxy AutoConfig\n (PAC) server could serve a PAC script that can execute\n code with elevated privileges by setting the required\n FindProxyForURL function to the eval method on a\n privileged object that leaked into the PAC sandbox. By\n redirecting the victim to a specially crafted URL --\n easily done since the PAC script controls which proxy to\n use -- the URL 'hostname' can be executed as privileged\n script.\n\n A malicious proxy server can perform spoofing attacks on\n the user so it was already important to use a\n trustworthy PAC server.\n\n - UniversalBrowserRead privilege escalation.\n (CVE-2006-3809 / MFSA 2006-53)\n\n shutdown reports that scripts granted the\n UniversalBrowserRead privilege can leverage that into\n the equivalent of the far more powerful\n UniversalXPConnect since they are allowed to 'read' into\n a privileged context. This allows the attacker the\n ability to run scripts with the full privelege of the\n user running the browser, possibly installing malware or\n snooping on private data. This has been fixed so that\n UniversalBrowserRead and UniversalBrowserWrite are\n limited to reading from and writing into only\n normally-privileged browser windows and frames.\n\n - XSS with XPCNativeWrapper(window).Function(...).\n (CVE-2006-3810 / MFSA 2006-54)\n\n shutdown reports that cross-site scripting (XSS) attacks\n could be performed using the construct\n XPCNativeWrapper(window).Function(...), which created a\n function that appeared to belong to the window in\n question even after it had been navigated to the target\n site.\n\n - Crashes with evidence of memory corruption.\n (CVE-2006-3811 / MFSA 2006-55)\n\n As part of the Firefox 1.5.0.5 stability and security\n release, developers in the Mozilla community looked for\n and fixed several crash bugs to improve the stability of\n Mozilla clients. Some of these crashes showed evidence\n of memory corruption that we presume could be exploited\n to run arbitrary code with enough effort.\n\n - chrome: scheme loading remote content. (CVE-2006-3812 /\n MFSA 2006-56)\n\n Benjamin Smedberg discovered that chrome URL's could be\n made to reference remote files, which would run scripts\n with full privilege. There is no known way for web\n content to successfully load a chrome: url, but if a\n user could be convinced to do so manually (perhaps by\n copying a link and pasting it into the location bar)\n this could be exploited.\"\n );\n # http://www.mozilla.org/security/announce/2006/mfsa2006-01.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-01/\"\n );\n # http://www.mozilla.org/security/announce/2006/mfsa2006-10.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-10/\"\n );\n # http://www.mozilla.org/security/announce/2006/mfsa2006-44.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-44/\"\n );\n # http://www.mozilla.org/security/announce/2006/mfsa2006-45.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-45/\"\n );\n # http://www.mozilla.org/security/announce/2006/mfsa2006-46.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-46/\"\n );\n # http://www.mozilla.org/security/announce/2006/mfsa2006-47.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-47/\"\n );\n # http://www.mozilla.org/security/announce/2006/mfsa2006-48.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-48/\"\n );\n # http://www.mozilla.org/security/announce/2006/mfsa2006-49.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-49/\"\n );\n # http://www.mozilla.org/security/announce/2006/mfsa2006-50.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-50/\"\n );\n # http://www.mozilla.org/security/announce/2006/mfsa2006-51.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-51/\"\n );\n # http://www.mozilla.org/security/announce/2006/mfsa2006-52.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-52/\"\n );\n # http://www.mozilla.org/security/announce/2006/mfsa2006-53.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-53/\"\n );\n # http://www.mozilla.org/security/announce/2006/mfsa2006-54.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-54/\"\n );\n # http://www.mozilla.org/security/announce/2006/mfsa2006-55.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-55/\"\n );\n # http://www.mozilla.org/security/announce/2006/mfsa2006-56.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-56/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2006-3113.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2006-3677.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2006-3801.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2006-3802.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2006-3803.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2006-3804.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2006-3805.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2006-3806.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2006-3807.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2006-3808.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2006-3809.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2006-3810.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2006-3811.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2006-3812.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Apply ZYPP patch number 1960.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Mozilla Suite/Firefox Navigator Object Code Execution');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:suse:suse_linux\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2006/07/27\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/08/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2007/12/13\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2007-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) exit(0, \"Local checks are not enabled.\");\nif (!get_kb_item(\"Host/SuSE/release\")) exit(0, \"The host is not running SuSE.\");\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) exit(1, \"Could not obtain the list of installed packages.\");\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) exit(1, \"Failed to determine the architecture type.\");\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") exit(1, \"Local checks for SuSE 10 on the '\"+cpu+\"' architecture have not been implemented.\");\n\n\nflag = 0;\nif (rpm_check(release:\"SLED10\", sp:0, reference:\"MozillaFirefox-1.5.0.6-1.2\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:0, reference:\"MozillaFirefox-translations-1.5.0.6-1.2\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:0, reference:\"MozillaFirefox-1.5.0.6-1.2\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:0, reference:\"MozillaFirefox-translations-1.5.0.6-1.2\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse exit(0, \"The host is not affected.\");\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-05-15T13:38:00", "description": "A Mozilla Foundation Security Advisory reports of multiple issues.\nSeveral of which can be used to run arbitrary code with the privilege of the user running the program.\n\n- MFSA 2006-56 chrome: scheme loading remote content\n\n- MFSA 2006-55 Crashes with evidence of memory corruption (rv:1.8.0.5)\n\n- MFSA 2006-54 XSS with XPCNativeWrapper(window).Function(...)\n\n- MFSA 2006-53 UniversalBrowserRead privilege escalation\n\n- MFSA 2006-52 PAC privilege escalation using Function.prototype.call\n\n- MFSA 2006-51 Privilege escalation using named-functions and redefined 'new Object()'\n\n- MFSA 2006-50 JavaScript engine vulnerabilities\n\n- MFSA 2006-49 Heap buffer overwrite on malformed VCard\n\n- MFSA 2006-48 JavaScript new Function race condition\n\n- MFSA 2006-47 Native DOM methods can be hijacked across domains\n\n- MFSA 2006-46 Memory corruption with simultaneous events\n\n- MFSA 2006-45 JavaScript navigator Object Vulnerability\n\n- MFSA 2006-44 Code execution through deleted frame reference", "cvss3": {"score": null, "vector": null}, "published": "2006-07-28T00:00:00", "type": "nessus", "title": "FreeBSD : mozilla -- multiple vulnerabilities (e2a92664-1d60-11db-88cf-000c6ec775d9)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2006-3113", "CVE-2006-3677", "CVE-2006-3801", "CVE-2006-3802", "CVE-2006-3803", "CVE-2006-3804", "CVE-2006-3805", "CVE-2006-3806", "CVE-2006-3807", "CVE-2006-3808", "CVE-2006-3809", "CVE-2006-3810", "CVE-2006-3811", "CVE-2006-3812"], "modified": "2021-01-06T00:00:00", "cpe": ["p-cpe:/a:freebsd:freebsd:firefox", "p-cpe:/a:freebsd:freebsd:linux-firefox", "p-cpe:/a:freebsd:freebsd:linux-firefox-devel", "p-cpe:/a:freebsd:freebsd:linux-mozilla", "p-cpe:/a:freebsd:freebsd:linux-mozilla-devel", "p-cpe:/a:freebsd:freebsd:linux-seamonkey", "p-cpe:/a:freebsd:freebsd:linux-thunderbird", "p-cpe:/a:freebsd:freebsd:mozilla", "p-cpe:/a:freebsd:freebsd:mozilla-thunderbird", "p-cpe:/a:freebsd:freebsd:seamonkey", "p-cpe:/a:freebsd:freebsd:thunderbird", "cpe:/o:freebsd:freebsd"], "id": "FREEBSD_PKG_E2A926641D6011DB88CF000C6EC775D9.NASL", "href": "https://www.tenable.com/plugins/nessus/22105", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2018 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(22105);\n script_version(\"1.22\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2006-3113\", \"CVE-2006-3677\", \"CVE-2006-3801\", \"CVE-2006-3802\", \"CVE-2006-3803\", \"CVE-2006-3804\", \"CVE-2006-3805\", \"CVE-2006-3806\", \"CVE-2006-3807\", \"CVE-2006-3808\", \"CVE-2006-3809\", \"CVE-2006-3810\", \"CVE-2006-3811\", \"CVE-2006-3812\");\n\n script_name(english:\"FreeBSD : mozilla -- multiple vulnerabilities (e2a92664-1d60-11db-88cf-000c6ec775d9)\");\n script_summary(english:\"Checks for updated packages in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote FreeBSD host is missing one or more security-related\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"A Mozilla Foundation Security Advisory reports of multiple issues.\nSeveral of which can be used to run arbitrary code with the privilege\nof the user running the program.\n\n- MFSA 2006-56 chrome: scheme loading remote content\n\n- MFSA 2006-55 Crashes with evidence of memory corruption (rv:1.8.0.5)\n\n- MFSA 2006-54 XSS with XPCNativeWrapper(window).Function(...)\n\n- MFSA 2006-53 UniversalBrowserRead privilege escalation\n\n- MFSA 2006-52 PAC privilege escalation using Function.prototype.call\n\n- MFSA 2006-51 Privilege escalation using named-functions and\nredefined 'new Object()'\n\n- MFSA 2006-50 JavaScript engine vulnerabilities\n\n- MFSA 2006-49 Heap buffer overwrite on malformed VCard\n\n- MFSA 2006-48 JavaScript new Function race condition\n\n- MFSA 2006-47 Native DOM methods can be hijacked across domains\n\n- MFSA 2006-46 Memory corruption with simultaneous events\n\n- MFSA 2006-45 JavaScript navigator Object Vulnerability\n\n- MFSA 2006-44 Code execution through deleted frame reference\"\n );\n # http://www.mozilla.org/projects/security/known-vulnerabilities.html#seamonkey1.0.3\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?69974ef6\"\n );\n # http://www.mozilla.org/security/announce/2006/mfsa2006-44.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-44/\"\n );\n # http://www.mozilla.org/security/announce/2006/mfsa2006-45.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-45/\"\n );\n # http://www.mozilla.org/security/announce/2006/mfsa2006-46.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-46/\"\n );\n # http://www.mozilla.org/security/announce/2006/mfsa2006-47.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-47/\"\n );\n # http://www.mozilla.org/security/announce/2006/mfsa2006-48.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-48/\"\n );\n # http://www.mozilla.org/security/announce/2006/mfsa2006-49.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-49/\"\n );\n # http://www.mozilla.org/security/announce/2006/mfsa2006-50.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-50/\"\n );\n # http://www.mozilla.org/security/announce/2006/mfsa2006-51.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-51/\"\n );\n # http://www.mozilla.org/security/announce/2006/mfsa2006-52.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-52/\"\n );\n # http://www.mozilla.org/security/announce/2006/mfsa2006-53.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-53/\"\n );\n # http://www.mozilla.org/security/announce/2006/mfsa2006-54.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-54/\"\n );\n # http://www.mozilla.org/security/announce/2006/mfsa2006-55.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-55/\"\n );\n # http://www.mozilla.org/security/announce/2006/mfsa2006-56.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-56/\"\n );\n # https://vuxml.freebsd.org/freebsd/e2a92664-1d60-11db-88cf-000c6ec775d9.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?6806fa7f\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Mozilla Suite/Firefox Navigator Object Code Execution');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:firefox\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:linux-firefox\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:linux-firefox-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:linux-mozilla\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:linux-mozilla-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:linux-seamonkey\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:linux-thunderbird\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:mozilla\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:mozilla-thunderbird\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:seamonkey\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:thunderbird\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2006/07/25\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/07/27\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/07/28\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"firefox<1.5.0.5,1\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"firefox>2.*,1<2.0_1,1\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"linux-firefox<1.5.0.5\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"linux-firefox-devel<3.0.a2006.07.26\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"seamonkey<1.0.3\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"linux-seamonkey<1.0.3\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"thunderbird<1.5.0.5\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"linux-thunderbird<1.5.0.5\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"mozilla-thunderbird<1.5.0.5\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"mozilla>0\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"linux-mozilla>0\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"linux-mozilla-devel>0\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:pkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-05-15T13:39:02", "description": "The remote host is affected by the vulnerability described in GLSA-200608-02 (Mozilla SeaMonkey: Multiple vulnerabilities)\n\n The following vulnerabilities have been reported:\n Benjamin Smedberg discovered that chrome URL's could be made to reference remote files.\n Developers in the Mozilla community looked for and fixed several crash bugs to improve the stability of Mozilla clients, which could lead to the execution of arbitrary code by a remote attacker.\n 'shutdown' reports that cross-site scripting (XSS) attacks could be performed using the construct XPCNativeWrapper(window).Function(...), which created a function that appeared to belong to the window in question even after it had been navigated to the target site.\n 'shutdown' reports that scripts granting the UniversalBrowserRead privilege can leverage that into the equivalent of the far more powerful UniversalXPConnect since they are allowed to 'read' into a privileged context.\n 'moz_bug_r_a4' reports that A malicious Proxy AutoConfig (PAC) server could serve a PAC script that can execute code with elevated privileges by setting the required FindProxyForURL function to the eval method on a privileged object that leaked into the PAC sandbox.\n 'moz_bug_r_a4' discovered that Named JavaScript functions have a parent object created using the standard Object() constructor (ECMA-specified behavior) and that this constructor can be redefined by script (also ECMA-specified behavior).\n Igor Bukanov and shutdown found additional places where an untimely garbage collection could delete a temporary object that was in active use.\n Georgi Guninski found potential integer overflow issues with long strings in the toSource() methods of the Object, Array and String objects as well as string function arguments.\n H. D. Moore reported a testcase that was able to trigger a race condition where JavaScript garbage collection deleted a temporary variable still being used in the creation of a new Function object.\n A malicious page can hijack native DOM methods on a document object in another domain, which will run the attacker's script when called by the victim page.\n Secunia Research has discovered a vulnerability which is caused due to an memory corruption error within the handling of simultaneously happening XPCOM events. This leads to use of a deleted timer object.\n An anonymous researcher for TippingPoint and the Zero Day Initiative showed that when used in a web page Java would reference properties of the window.navigator object as it started up.\n Thilo Girmann discovered that in certain circumstances a JavaScript reference to a frame or window was not properly cleared when the referenced content went away.\n Impact :\n\n A user can be enticed to open specially crafted URLs, visit webpages containing malicious JavaScript or execute a specially crafted script.\n These events could lead to the execution of arbitrary code, or the installation of malware on the user's computer.\n Workaround :\n\n There is no known workaround at this time.", "cvss3": {"score": null, "vector": null}, "published": "2006-08-04T00:00:00", "type": "nessus", "title": "GLSA-200608-02 : Mozilla SeaMonkey: Multiple vulnerabilities", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2006-3113", "CVE-2006-3677", "CVE-2006-3801", "CVE-2006-3802", "CVE-2006-3803", "CVE-2006-3804", "CVE-2006-3805", "CVE-2006-3806", "CVE-2006-3807", "CVE-2006-3808", "CVE-2006-3809", "CVE-2006-3810", "CVE-2006-3811", "CVE-2006-3812"], "modified": "2021-01-06T00:00:00", "cpe": ["p-cpe:/a:gentoo:linux:seamonkey", "cpe:/o:gentoo:linux"], "id": "GENTOO_GLSA-200608-02.NASL", "href": "https://www.tenable.com/plugins/nessus/22144", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Gentoo Linux Security Advisory GLSA 200608-02.\n#\n# The advisory text is Copyright (C) 2001-2016 Gentoo Foundation, Inc.\n# and licensed under the Creative Commons - Attribution / Share Alike \n# license. See http://creativecommons.org/licenses/by-sa/3.0/\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(22144);\n script_version(\"1.19\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2006-3113\", \"CVE-2006-3677\", \"CVE-2006-3801\", \"CVE-2006-3802\", \"CVE-2006-3803\", \"CVE-2006-3804\", \"CVE-2006-3805\", \"CVE-2006-3806\", \"CVE-2006-3807\", \"CVE-2006-3808\", \"CVE-2006-3809\", \"CVE-2006-3810\", \"CVE-2006-3811\", \"CVE-2006-3812\");\n script_xref(name:\"GLSA\", value:\"200608-02\");\n\n script_name(english:\"GLSA-200608-02 : Mozilla SeaMonkey: Multiple vulnerabilities\");\n script_summary(english:\"Checks for updated package(s) in /var/db/pkg\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Gentoo host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote host is affected by the vulnerability described in GLSA-200608-02\n(Mozilla SeaMonkey: Multiple vulnerabilities)\n\n The following vulnerabilities have been reported:\n Benjamin Smedberg discovered that chrome URL's could be made to\n reference remote files.\n Developers in the Mozilla community\n looked for and fixed several crash bugs to improve the stability of\n Mozilla clients, which could lead to the execution of arbitrary code by\n a remote attacker.\n 'shutdown' reports that cross-site\n scripting (XSS) attacks could be performed using the construct\n XPCNativeWrapper(window).Function(...), which created a function that\n appeared to belong to the window in question even after it had been\n navigated to the target site.\n 'shutdown' reports that scripts\n granting the UniversalBrowserRead privilege can leverage that into the\n equivalent of the far more powerful UniversalXPConnect since they are\n allowed to 'read' into a privileged context.\n 'moz_bug_r_a4'\n reports that A malicious Proxy AutoConfig (PAC) server could serve a\n PAC script that can execute code with elevated privileges by setting\n the required FindProxyForURL function to the eval method on a\n privileged object that leaked into the PAC sandbox.\n 'moz_bug_r_a4' discovered that Named JavaScript functions have a\n parent object created using the standard Object() constructor\n (ECMA-specified behavior) and that this constructor can be redefined by\n script (also ECMA-specified behavior).\n Igor Bukanov and\n shutdown found additional places where an untimely garbage collection\n could delete a temporary object that was in active use.\n Georgi\n Guninski found potential integer overflow issues with long strings in\n the toSource() methods of the Object, Array and String objects as well\n as string function arguments.\n H. D. Moore reported a testcase\n that was able to trigger a race condition where JavaScript garbage\n collection deleted a temporary variable still being used in the\n creation of a new Function object.\n A malicious page can hijack\n native DOM methods on a document object in another domain, which will\n run the attacker's script when called by the victim page.\n Secunia Research has discovered a vulnerability which is caused due\n to an memory corruption error within the handling of simultaneously\n happening XPCOM events. This leads to use of a deleted timer\n object.\n An anonymous researcher for TippingPoint and the Zero\n Day Initiative showed that when used in a web page Java would reference\n properties of the window.navigator object as it started up.\n Thilo Girmann discovered that in certain circumstances a JavaScript\n reference to a frame or window was not properly cleared when the\n referenced content went away.\n \nImpact :\n\n A user can be enticed to open specially crafted URLs, visit webpages\n containing malicious JavaScript or execute a specially crafted script.\n These events could lead to the execution of arbitrary code, or the\n installation of malware on the user's computer.\n \nWorkaround :\n\n There is no known workaround at this time.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.gentoo.org/glsa/200608-02\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"All Thunderbird users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=www-client/seamonkey-1.0.3'\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Mozilla Suite/Firefox Navigator Object Code Execution');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:seamonkey\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:gentoo:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/08/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/08/04\");\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2006/07/25\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Gentoo Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Gentoo/release\", \"Host/Gentoo/qpkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"qpkg.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Gentoo/release\")) audit(AUDIT_OS_NOT, \"Gentoo\");\nif (!get_kb_item(\"Host/Gentoo/qpkg-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (qpkg_check(package:\"www-client/seamonkey\", unaffected:make_list(\"ge 1.0.3\"), vulnerable:make_list(\"lt 1.0.3\"))) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = qpkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"Mozilla SeaMonkey\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-05-15T13:37:46", "description": "Updated SeaMonkey packages that fix several security bugs are now available for Red Hat Enterprise Linux 3.\n\nThis update has been rated as having critical security impact by the Red Hat Security Response Team.\n\nSeaMonkey is an open source Web browser, advanced email and newsgroup client, IRC chat client, and HTML editor.\n\nSeveral flaws were found in the way SeaMonkey processed certain JavaScript actions. A malicious web page could execute arbitrary JavaScript instructions with the permissions of 'chrome', allowing the page to steal sensitive information or install browser malware.\n(CVE-2006-3807, CVE-2006-3809, CVE-2006-3812)\n\nSeveral denial of service flaws were found in the way SeaMonkey processed certain web content. A malicious web page could crash the browser or possibly execute arbitrary code as the user running SeaMonkey. (CVE-2006-3801, CVE-2006-3677, CVE-2006-3113, CVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3811)\n\nA buffer overflow flaw was found in the way SeaMonkey Messenger displayed malformed inline vcard attachments. If a victim viewed an email message containing a carefully crafted vcard, it was possible to execute arbitrary code as the user running SeaMonkey Messenger.\n(CVE-2006-3804)\n\nSeveral flaws were found in the way SeaMonkey processed certain JavaScript actions. A malicious web page could conduct a cross-site scripting attack or steal sensitive information (such as cookies owned by other domains). (CVE-2006-3802, CVE-2006-3810)\n\nA flaw was found in the way SeaMonkey processed Proxy AutoConfig scripts. A malicious Proxy AutoConfig server could execute arbitrary JavaScript instructions with the permissions of 'chrome', allowing the page to steal sensitive information or install browser malware.\n(CVE-2006-3808)\n\nUsers of SeaMonkey are advised to upgrade to this update, which contains SeaMonkey version 1.0.3 that corrects these issues.", "cvss3": {"score": null, "vector": null}, "published": "2006-07-28T00:00:00", "type": "nessus", "title": "RHEL 3 : seamonkey (RHSA-2006:0608)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2006-3113", "CVE-2006-3677", "CVE-2006-3801", "CVE-2006-3802", "CVE-2006-3803", "CVE-2006-3804", "CVE-2006-3805", "CVE-2006-3806", "CVE-2006-3807", "CVE-2006-3808", "CVE-2006-3809", "CVE-2006-3810", "CVE-2006-3811", "CVE-2006-3812"], "modified": "2021-01-14T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:seamonkey", "p-cpe:/a:redhat:enterprise_linux:seamonkey-chat", "p-cpe:/a:redhat:enterprise_linux:seamonkey-devel", "p-cpe:/a:redhat:enterprise_linux:seamonkey-dom-inspector", "p-cpe:/a:redhat:enterprise_linux:seamonkey-js-debugger", "p-cpe:/a:redhat:enterprise_linux:seamonkey-mail", "p-cpe:/a:redhat:enterprise_linux:seamonkey-nspr", "p-cpe:/a:redhat:enterprise_linux:seamonkey-nspr-devel", "p-cpe:/a:redhat:enterprise_linux:seamonkey-nss", "p-cpe:/a:redhat:enterprise_linux:seamonkey-nss-devel", "cpe:/o:redhat:enterprise_linux:3"], "id": "REDHAT-RHSA-2006-0608.NASL", "href": "https://www.tenable.com/plugins/nessus/22114", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2006:0608. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(22114);\n script_version(\"1.31\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2006-3113\", \"CVE-2006-3677\", \"CVE-2006-3801\", \"CVE-2006-3802\", \"CVE-2006-3803\", \"CVE-2006-3804\", \"CVE-2006-3805\", \"CVE-2006-3806\", \"CVE-2006-3807\", \"CVE-2006-3808\", \"CVE-2006-3809\", \"CVE-2006-3810\", \"CVE-2006-3811\", \"CVE-2006-3812\");\n script_xref(name:\"RHSA\", value:\"2006:0608\");\n\n script_name(english:\"RHEL 3 : seamonkey (RHSA-2006:0608)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated SeaMonkey packages that fix several security bugs are now\navailable for Red Hat Enterprise Linux 3.\n\nThis update has been rated as having critical security impact by the\nRed Hat Security Response Team.\n\nSeaMonkey is an open source Web browser, advanced email and newsgroup\nclient, IRC chat client, and HTML editor.\n\nSeveral flaws were found in the way SeaMonkey processed certain\nJavaScript actions. A malicious web page could execute arbitrary\nJavaScript instructions with the permissions of 'chrome', allowing the\npage to steal sensitive information or install browser malware.\n(CVE-2006-3807, CVE-2006-3809, CVE-2006-3812)\n\nSeveral denial of service flaws were found in the way SeaMonkey\nprocessed certain web content. A malicious web page could crash the\nbrowser or possibly execute arbitrary code as the user running\nSeaMonkey. (CVE-2006-3801, CVE-2006-3677, CVE-2006-3113,\nCVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3811)\n\nA buffer overflow flaw was found in the way SeaMonkey Messenger\ndisplayed malformed inline vcard attachments. If a victim viewed an\nemail message containing a carefully crafted vcard, it was possible to\nexecute arbitrary code as the user running SeaMonkey Messenger.\n(CVE-2006-3804)\n\nSeveral flaws were found in the way SeaMonkey processed certain\nJavaScript actions. A malicious web page could conduct a cross-site\nscripting attack or steal sensitive information (such as cookies owned\nby other domains). (CVE-2006-3802, CVE-2006-3810)\n\nA flaw was found in the way SeaMonkey processed Proxy AutoConfig\nscripts. A malicious Proxy AutoConfig server could execute arbitrary\nJavaScript instructions with the permissions of 'chrome', allowing the\npage to steal sensitive information or install browser malware.\n(CVE-2006-3808)\n\nUsers of SeaMonkey are advised to upgrade to this update, which\ncontains SeaMonkey version 1.0.3 that corrects these issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3113\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3677\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3801\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3802\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3803\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3804\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3805\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3806\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3807\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3808\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3809\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3810\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3811\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3812\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2006:0608\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Mozilla Suite/Firefox Navigator Object Code Execution');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:seamonkey\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:seamonkey-chat\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:seamonkey-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:seamonkey-dom-inspector\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:seamonkey-js-debugger\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:seamonkey-mail\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:seamonkey-nspr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:seamonkey-nspr-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:seamonkey-nss\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:seamonkey-nss-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:3\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2006/07/27\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/07/27\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/07/28\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^3([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 3.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2006:0608\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL3\", reference:\"seamonkey-1.0.3-0.el3.1\")) flag++;\n if (rpm_check(release:\"RHEL3\", reference:\"seamonkey-chat-1.0.3-0.el3.1\")) flag++;\n if (rpm_check(release:\"RHEL3\", reference:\"seamonkey-devel-1.0.3-0.el3.1\")) flag++;\n if (rpm_check(release:\"RHEL3\", reference:\"seamonkey-dom-inspector-1.0.3-0.el3.1\")) flag++;\n if (rpm_check(release:\"RHEL3\", reference:\"seamonkey-js-debugger-1.0.3-0.el3.1\")) flag++;\n if (rpm_check(release:\"RHEL3\", reference:\"seamonkey-mail-1.0.3-0.el3.1\")) flag++;\n if (rpm_check(release:\"RHEL3\", reference:\"seamonkey-nspr-1.0.3-0.el3.1\")) flag++;\n if (rpm_check(release:\"RHEL3\", reference:\"seamonkey-nspr-devel-1.0.3-0.el3.1\")) flag++;\n if (rpm_check(release:\"RHEL3\", reference:\"seamonkey-nss-1.0.3-0.el3.1\")) flag++;\n if (rpm_check(release:\"RHEL3\", reference:\"seamonkey-nss-devel-1.0.3-0.el3.1\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"seamonkey / seamonkey-chat / seamonkey-devel / etc\");\n }\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-05-15T13:39:07", "description": "Updated SeaMonkey packages that fix several security bugs are now available for Red Hat Enterprise Linux 3.\n\nThis update has been rated as having critical security impact by the Red Hat Security Response Team.\n\nSeaMonkey is an open source Web browser, advanced email and newsgroup client, IRC chat client, and HTML editor.\n\nSeveral flaws were found in the way SeaMonkey processed certain JavaScript actions. A malicious web page could execute arbitrary JavaScript instructions with the permissions of 'chrome', allowing the page to steal sensitive information or install browser malware.\n(CVE-2006-3807, CVE-2006-3809, CVE-2006-3812)\n\nSeveral denial of service flaws were found in the way SeaMonkey processed certain web content. A malicious web page could crash the browser or possibly execute arbitrary code as the user running SeaMonkey. (CVE-2006-3801, CVE-2006-3677, CVE-2006-3113, CVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3811)\n\nA buffer overflow flaw was found in the way SeaMonkey Messenger displayed malformed inline vcard attachments. If a victim viewed an email message containing a carefully crafted vcard, it was possible to execute arbitrary code as the user running SeaMonkey Messenger.\n(CVE-2006-3804)\n\nSeveral flaws were found in the way SeaMonkey processed certain JavaScript actions. A malicious web page could conduct a cross-site scripting attack or steal sensitive information (such as cookies owned by other domains). (CVE-2006-3802, CVE-2006-3810)\n\nA flaw was found in the way SeaMonkey processed Proxy AutoConfig scripts. A malicious Proxy AutoConfig server could execute arbitrary JavaScript instructions with the permissions of 'chrome', allowing the page to steal sensitive information or install browser malware.\n(CVE-2006-3808)\n\nUsers of SeaMonkey are advised to upgrade to this update, which contains SeaMonkey version 1.0.3 that corrects these issues.", "cvss3": {"score": null, "vector": null}, "published": "2006-08-07T00:00:00", "type": "nessus", "title": "CentOS 3 : seamonkey (CESA-2006:0608)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2006-3113", "CVE-2006-3677", "CVE-2006-3801", "CVE-2006-3802", "CVE-2006-3803", "CVE-2006-3804", "CVE-2006-3805", "CVE-2006-3806", "CVE-2006-3807", "CVE-2006-3808", "CVE-2006-3809", "CVE-2006-3810", "CVE-2006-3811", "CVE-2006-3812"], "modified": "2021-01-04T00:00:00", "cpe": ["p-cpe:/a:centos:centos:seamonkey", "p-cpe:/a:centos:centos:seamonkey-chat", "p-cpe:/a:centos:centos:seamonkey-devel", "p-cpe:/a:centos:centos:seamonkey-dom-inspector", "p-cpe:/a:centos:centos:seamonkey-js-debugger", "p-cpe:/a:centos:centos:seamonkey-mail", "p-cpe:/a:centos:centos:seamonkey-nspr", "p-cpe:/a:centos:centos:seamonkey-nspr-devel", "p-cpe:/a:centos:centos:seamonkey-nss", "p-cpe:/a:centos:centos:seamonkey-nss-devel", "cpe:/o:centos:centos:3"], "id": "CENTOS_RHSA-2006-0608.NASL", "href": "https://www.tenable.com/plugins/nessus/22162", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2006:0608 and \n# CentOS Errata and Security Advisory 2006:0608 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(22162);\n script_version(\"1.22\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2006-3113\", \"CVE-2006-3677\", \"CVE-2006-3801\", \"CVE-2006-3802\", \"CVE-2006-3803\", \"CVE-2006-3804\", \"CVE-2006-3805\", \"CVE-2006-3806\", \"CVE-2006-3807\", \"CVE-2006-3808\", \"CVE-2006-3809\", \"CVE-2006-3810\", \"CVE-2006-3811\", \"CVE-2006-3812\");\n script_xref(name:\"RHSA\", value:\"2006:0608\");\n\n script_name(english:\"CentOS 3 : seamonkey (CESA-2006:0608)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated SeaMonkey packages that fix several security bugs are now\navailable for Red Hat Enterprise Linux 3.\n\nThis update has been rated as having critical security impact by the\nRed Hat Security Response Team.\n\nSeaMonkey is an open source Web browser, advanced email and newsgroup\nclient, IRC chat client, and HTML editor.\n\nSeveral flaws were found in the way SeaMonkey processed certain\nJavaScript actions. A malicious web page could execute arbitrary\nJavaScript instructions with the permissions of 'chrome', allowing the\npage to steal sensitive information or install browser malware.\n(CVE-2006-3807, CVE-2006-3809, CVE-2006-3812)\n\nSeveral denial of service flaws were found in the way SeaMonkey\nprocessed certain web content. A malicious web page could crash the\nbrowser or possibly execute arbitrary code as the user running\nSeaMonkey. (CVE-2006-3801, CVE-2006-3677, CVE-2006-3113,\nCVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3811)\n\nA buffer overflow flaw was found in the way SeaMonkey Messenger\ndisplayed malformed inline vcard attachments. If a victim viewed an\nemail message containing a carefully crafted vcard, it was possible to\nexecute arbitrary code as the user running SeaMonkey Messenger.\n(CVE-2006-3804)\n\nSeveral flaws were found in the way SeaMonkey processed certain\nJavaScript actions. A malicious web page could conduct a cross-site\nscripting attack or steal sensitive information (such as cookies owned\nby other domains). (CVE-2006-3802, CVE-2006-3810)\n\nA flaw was found in the way SeaMonkey processed Proxy AutoConfig\nscripts. A malicious Proxy AutoConfig server could execute arbitrary\nJavaScript instructions with the permissions of 'chrome', allowing the\npage to steal sensitive information or install browser malware.\n(CVE-2006-3808)\n\nUsers of SeaMonkey are advised to upgrade to this update, which\ncontains SeaMonkey version 1.0.3 that corrects these issues.\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2006-August/013115.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?46fc1784\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2006-August/013123.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?49c91b51\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2006-August/013124.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?a782cb4c\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected seamonkey packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Mozilla Suite/Firefox Navigator Object Code Execution');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:seamonkey\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:seamonkey-chat\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:seamonkey-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:seamonkey-dom-inspector\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:seamonkey-js-debugger\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:seamonkey-mail\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:seamonkey-nspr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:seamonkey-nspr-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:seamonkey-nss\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:seamonkey-nss-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:3\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2006/07/27\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/08/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/08/07\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^3([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 3.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-3\", reference:\"seamonkey-1.0.3-0.el3.1.centos3\")) flag++;\nif (rpm_check(release:\"CentOS-3\", reference:\"seamonkey-chat-1.0.3-0.el3.1.centos3\")) flag++;\nif (rpm_check(release:\"CentOS-3\", reference:\"seamonkey-devel-1.0.3-0.el3.1.centos3\")) flag++;\nif (rpm_check(release:\"CentOS-3\", reference:\"seamonkey-dom-inspector-1.0.3-0.el3.1.centos3\")) flag++;\nif (rpm_check(release:\"CentOS-3\", reference:\"seamonkey-js-debugger-1.0.3-0.el3.1.centos3\")) flag++;\nif (rpm_check(release:\"CentOS-3\", reference:\"seamonkey-mail-1.0.3-0.el3.1.centos3\")) flag++;\nif (rpm_check(release:\"CentOS-3\", reference:\"seamonkey-nspr-1.0.3-0.el3.1.centos3\")) flag++;\nif (rpm_check(release:\"CentOS-3\", reference:\"seamonkey-nspr-devel-1.0.3-0.el3.1.centos3\")) flag++;\nif (rpm_check(release:\"CentOS-3\", reference:\"seamonkey-nss-1.0.3-0.el3.1.centos3\")) flag++;\nif (rpm_check(release:\"CentOS-3\", reference:\"seamonkey-nss-devel-1.0.3-0.el3.1.centos3\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"seamonkey / seamonkey-chat / seamonkey-devel / etc\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-05-15T13:40:58", "description": "Various flaws have been reported that allow an attacker to execute arbitrary code with user privileges by tricking the user into opening a malicious URL. (CVE-2006-3113, CVE-2006-3677, CVE-2006-3801, CVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3807, CVE-2006-3809, CVE-2006-3811, CVE-2006-3812)\n\ncross-site scripting vulnerabilities were found in the XPCNativeWrapper() function and native DOM method handlers. A malicious website could exploit these to modify the contents or steal confidential data (such as passwords) from other opened web pages.\n(CVE-2006-3802, CVE-2006-3810)\n\nA bug was found in the script handler for automatic proxy configuration. A malicious proxy could send scripts which could execute arbitrary code with the user's privileges. (CVE-2006-3808)\n\nPlease see \n\nhttp://www.mozilla.org/projects/security/known-vulnerabilities.html#Fi refox\n\nfor technical details of these vulnerabilities.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": null, "vector": null}, "published": "2007-11-10T00:00:00", "type": "nessus", "title": "Ubuntu 6.06 LTS : firefox vulnerabilities (USN-327-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2006-3113", "CVE-2006-3677", "CVE-2006-3801", "CVE-2006-3802", "CVE-2006-3803", "CVE-2006-3805", "CVE-2006-3806", "CVE-2006-3807", "CVE-2006-3808", "CVE-2006-3809", "CVE-2006-3810", "CVE-2006-3811", "CVE-2006-3812", "CVE-2007-1794"], "modified": "2021-01-19T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:firefox", "p-cpe:/a:canonical:ubuntu_linux:firefox-dbg", "p-cpe:/a:canonical:ubuntu_linux:firefox-dev", "p-cpe:/a:canonical:ubuntu_linux:firefox-dom-inspector", "p-cpe:/a:canonical:ubuntu_linux:firefox-gnome-support", "p-cpe:/a:canonical:ubuntu_linux:libnspr-dev", "p-cpe:/a:canonical:ubuntu_linux:libnspr4", "p-cpe:/a:canonical:ubuntu_linux:libnss-dev", "p-cpe:/a:canonical:ubuntu_linux:libnss3", "p-cpe:/a:canonical:ubuntu_linux:mozilla-firefox", "p-cpe:/a:canonical:ubuntu_linux:mozilla-firefox-dev", "cpe:/o:canonical:ubuntu_linux:6.06:-:lts"], "id": "UBUNTU_USN-327-1.NASL", "href": "https://www.tenable.com/plugins/nessus/27905", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-327-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(27905);\n script_version(\"1.19\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2006-3113\", \"CVE-2006-3677\", \"CVE-2006-3801\", \"CVE-2006-3802\", \"CVE-2006-3803\", \"CVE-2006-3805\", \"CVE-2006-3806\", \"CVE-2006-3807\", \"CVE-2006-3808\", \"CVE-2006-3809\", \"CVE-2006-3810\", \"CVE-2006-3811\", \"CVE-2006-3812\", \"CVE-2007-1794\");\n script_xref(name:\"USN\", value:\"327-1\");\n\n script_name(english:\"Ubuntu 6.06 LTS : firefox vulnerabilities (USN-327-1)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Various flaws have been reported that allow an attacker to execute\narbitrary code with user privileges by tricking the user into opening\na malicious URL. (CVE-2006-3113, CVE-2006-3677, CVE-2006-3801,\nCVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3807,\nCVE-2006-3809, CVE-2006-3811, CVE-2006-3812)\n\ncross-site scripting vulnerabilities were found in the\nXPCNativeWrapper() function and native DOM method handlers. A\nmalicious website could exploit these to modify the contents or steal\nconfidential data (such as passwords) from other opened web pages.\n(CVE-2006-3802, CVE-2006-3810)\n\nA bug was found in the script handler for automatic proxy\nconfiguration. A malicious proxy could send scripts which could\nexecute arbitrary code with the user's privileges. (CVE-2006-3808)\n\nPlease see \n\nhttp://www.mozilla.org/projects/security/known-vulnerabilities.html#Fi\nrefox\n\nfor technical details of these vulnerabilities.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/327-1/\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Mozilla Suite/Firefox Navigator Object Code Execution');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-dom-inspector\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-gnome-support\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libnspr-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libnspr4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libnss-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libnss3\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mozilla-firefox\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mozilla-firefox-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:6.06:-:lts\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/07/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2007/11/10\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2007-2019 Canonical, Inc. / NASL script (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! ereg(pattern:\"^(6\\.06)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 6.06\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"6.06\", pkgname:\"firefox\", pkgver:\"1.5.dfsg+1.5.0.5-0ubuntu6.06\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"firefox-dbg\", pkgver:\"1.5.dfsg+1.5.0.5-0ubuntu6.06\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"firefox-dev\", pkgver:\"1.5.dfsg+1.5.0.5-0ubuntu6.06\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"firefox-dom-inspector\", pkgver:\"1.5.dfsg+1.5.0.5-0ubuntu6.06\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"firefox-gnome-support\", pkgver:\"1.5.dfsg+1.5.0.5-0ubuntu6.06\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"libnspr-dev\", pkgver:\"1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"libnspr4\", pkgver:\"1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"libnss-dev\", pkgver:\"1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"libnss3\", pkgver:\"1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"mozilla-firefox\", pkgver:\"1.5.dfsg+1.5.0.5-0ubuntu6.06\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"mozilla-firefox-dev\", pkgver:\"1.5.dfsg+1.5.0.5-0ubuntu6.06\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"firefox / firefox-dbg / firefox-dev / firefox-dom-inspector / etc\");\n}\n", "cvss": {"score": 10, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-05-15T13:36:53", "description": "This security update brings Mozilla Firefox to version 1.5.0.6.\n\nNote that on SUSE Linux 9.2, 9.3 and 10.0 this is a major version upgrade, please check if your manually installed extensions and plugins are still working.\n\nPlease also see http://www.mozilla.org/projects/security/known-vulnerabilities.html for more details.\n\nIt includes fixes to the following security problems :\n\n - CVE-2006-3801/MFSA 2006-44: Code execution through deleted frame reference\n\n Thilo Girmann discovered that in certain circumstances a JavaScript reference to a frame or window was not properly cleared when the referenced content went away, and he demonstrated that this pointer to a deleted object could be used to execute native code supplied by the attacker.\n\n - CVE-2006-3677/MFSA 2006-45: JavaScript navigator Object Vulnerability\n\n An anonymous researcher for TippingPoint and the Zero Day Initiative showed that when used in a web page Java would reference properties of the window.navigator object as it started up. If the page replaced the navigator object before starting Java then the browser would crash in a way that could be exploited to run native code supplied by the attacker.\n\n - CVE-2006-3113/MFSA 2006-46: Memory corruption with simultaneous events\n\n Secunia Research has discovered a vulnerability in Mozilla Firefox 1.5 branch, which can be exploited by malicious people to compromise a user's system.\n\n The vulnerability is caused due to an memory corruption error within the handling of simultaneously happening XPCOM events, which leads to use of a deleted timer object. This generally results in a crash but potentially could be exploited to execute arbitrary code on a user's system when a malicious website is visited.\n\n - CVE-2006-3802/MFSA 2006-47: Native DOM methods can be hijacked across domains\n\n A malicious page can hijack native DOM methods on a document object in another domain, which will run the attacker's script when called by the victim page. This could be used to steal login cookies, password, or other sensitive data on the target page, or to perform actions on behalf of a logged-in user.\n\n Access checks on all other properties and document nodes are performed correctly. This cross-site scripting (XSS) attack is limited to pages which use standard DOM methods of the top-level document object, such as document.getElementById(). This includes many popular sites, especially the newer ones that offer rich interaction to the user.\n\n - CVE-2006-3803/MFSA 2006-48: JavaScript new Function race condition\n\n H. D. Moore reported a testcase that was able to trigger a race condition where JavaScript garbage collection deleted a temporary variable still being used in the creation of a new Function object. The resulting use of a deleted object may be potentially exploitable to run native code provided by the attacker.\n\n - CVE-2006-3804/MFSA 2006-49: Heap buffer overwrite on malformed VCard\n\n A VCard attachment with a malformed base64 field (such as a photo) can trigger a heap buffer overwrite. These have proven exploitable in the past, though in this case the overwrite is accompanied by an integer underflow that would attempt to copy more data than the typical machine has, leading to a crash.\n\n - CVE-2006-3805/CVE-2006-3806/MFSA 2006-50: JavaScript engine vulnerabilities\n\n Continuing our security audit of the JavaScript engine, Mozilla developers found and fixed several potential vulnerabilities.\n\n Igor Bukanov and shutdown found additional places where an untimely garbage collection could delete a temporary object that was in active use (similar to MFSA 2006-01 and MFSA 2006-10). Some of these may allow an attacker to run arbitrary code given the right conditions.\n\n Georgi Guninski found potential integer overflow issues with long strings in the toSource() methods of the Object, Array and String objects as well as string function arguments.\n\n - CVE-2006-3807/MFSA 2006-51: Privilege escalation using named-functions and redefined 'new Object()'\n\n moz_bug_r_a4 discovered that named JavaScript functions have a parent object created using the standard Object() constructor (ECMA-specified behavior) and that this constructor can be redefined by script (also ECMA-specified behavior). If the Object() constructor is changed to return a reference to a privileged object with useful properties it is possible to have attacker-supplied script excuted with elevated privileges by calling the function. This could be used to install malware or take other malicious actions.\n\n Our fix involves calling the internal Object constructor which appears to be what other ECMA-compatible interpreters do.\n\n - CVE-2006-3808/MFSA 2006-52: PAC privilege escalation using Function.prototype.call\n\n moz_bug_r_a4 reports that a malicious Proxy AutoConfig (PAC) server could serve a PAC script that can execute code with elevated privileges by setting the required FindProxyForURL function to the eval method on a privileged object that leaked into the PAC sandbox. By redirecting the victim to a specially crafted URL -- easily done since the PAC script controls which proxy to use -- the URL 'hostname' can be executed as privileged script.\n\n A malicious proxy server can perform spoofing attacks on the user so it was already important to use a trustworthy PAC server.\n\n - CVE-2006-3809/MFSA 2006-53: UniversalBrowserRead privilege escalation\n\n shutdown reports that scripts granted the UniversalBrowserRead privilege can leverage that into the equivalent of the far more powerful UniversalXPConnect since they are allowed to 'read' into a privileged context. This allows the attacker the ability to run scripts with the full privelege of the user running the browser, possibly installing malware or snooping on private data. This has been fixed so that UniversalBrowserRead and UniversalBrowserWrite are limited to reading from and writing into only normally-privileged browser windows and frames.\n\n - CVE-2006-3810/MFSA 2006-54: XSS with XPCNativeWrapper(window).Function(...)\n\n shutdown reports that cross-site scripting (XSS) attacks could be performed using the construct XPCNativeWrapper(window).Function(...), which created a function that appeared to belong to the window in question even after it had been navigated to the target site.\n\n - CVE-2006-3811/MFSA 2006-55: Crashes with evidence of memory corruption\n\n As part of the Firefox 1.5.0.5 stability and security release, developers in the Mozilla community looked for and fixed several crash bugs to improve the stability of Mozilla clients. Some of these crashes showed evidence of memory corruption that we presume could be exploited to run arbitrary code with enough effort.\n\n - CVE-2006-3812/MFSA 2006-56: chrome: scheme loading remote content\n\n Benjamin Smedberg discovered that chrome URL's could be made to reference remote files, which would run scripts with full privilege. There is no known way for web content to successfully load a chrome: url, but if a user could be convinced to do so manually (perhaps by copying a link and pasting it into the location bar) this could be exploited.", "cvss3": {"score": null, "vector": null}, "published": "2007-10-17T00:00:00", "type": "nessus", "title": "openSUSE 10 Security Update : MozillaFirefox (MozillaFirefox-1981)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2006-3113", "CVE-2006-3677", "CVE-2006-3801", "CVE-2006-3802", "CVE-2006-3803", "CVE-2006-3804", "CVE-2006-3805", "CVE-2006-3806", "CVE-2006-3807", "CVE-2006-3808", "CVE-2006-3809", "CVE-2006-3810", "CVE-2006-3811", "CVE-2006-3812"], "modified": "2021-01-14T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:MozillaFirefox", "p-cpe:/a:novell:opensuse:MozillaFirefox-translations", "cpe:/o:novell:opensuse:10.1"], "id": "SUSE_MOZILLAFIREFOX-1981.NASL", "href": "https://www.tenable.com/plugins/nessus/27113", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update MozillaFirefox-1981.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(27113);\n script_version(\"1.18\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2006-3113\", \"CVE-2006-3677\", \"CVE-2006-3801\", \"CVE-2006-3802\", \"CVE-2006-3803\", \"CVE-2006-3804\", \"CVE-2006-3805\", \"CVE-2006-3806\", \"CVE-2006-3807\", \"CVE-2006-3808\", \"CVE-2006-3809\", \"CVE-2006-3810\", \"CVE-2006-3811\", \"CVE-2006-3812\");\n\n script_name(english:\"openSUSE 10 Security Update : MozillaFirefox (MozillaFirefox-1981)\");\n script_summary(english:\"Check for the MozillaFirefox-1981 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This security update brings Mozilla Firefox to version 1.5.0.6.\n\nNote that on SUSE Linux 9.2, 9.3 and 10.0 this is a major version\nupgrade, please check if your manually installed extensions and\nplugins are still working.\n\nPlease also see\nhttp://www.mozilla.org/projects/security/known-vulnerabilities.html\nfor more details.\n\nIt includes fixes to the following security problems :\n\n - CVE-2006-3801/MFSA 2006-44: Code execution through\n deleted frame reference\n\n Thilo Girmann discovered that in certain circumstances a\n JavaScript reference to a frame or window was not\n properly cleared when the referenced content went away,\n and he demonstrated that this pointer to a deleted\n object could be used to execute native code supplied by\n the attacker.\n\n - CVE-2006-3677/MFSA 2006-45: JavaScript navigator Object\n Vulnerability\n\n An anonymous researcher for TippingPoint and the Zero\n Day Initiative showed that when used in a web page Java\n would reference properties of the window.navigator\n object as it started up. If the page replaced the\n navigator object before starting Java then the browser\n would crash in a way that could be exploited to run\n native code supplied by the attacker.\n\n - CVE-2006-3113/MFSA 2006-46: Memory corruption with\n simultaneous events\n\n Secunia Research has discovered a vulnerability in\n Mozilla Firefox 1.5 branch, which can be exploited by\n malicious people to compromise a user's system.\n\n The vulnerability is caused due to an memory corruption\n error within the handling of simultaneously happening\n XPCOM events, which leads to use of a deleted timer\n object. This generally results in a crash but\n potentially could be exploited to execute arbitrary code\n on a user's system when a malicious website is visited.\n\n - CVE-2006-3802/MFSA 2006-47: Native DOM methods can be\n hijacked across domains\n\n A malicious page can hijack native DOM methods on a\n document object in another domain, which will run the\n attacker's script when called by the victim page. This\n could be used to steal login cookies, password, or other\n sensitive data on the target page, or to perform actions\n on behalf of a logged-in user.\n\n Access checks on all other properties and document nodes\n are performed correctly. This cross-site scripting (XSS)\n attack is limited to pages which use standard DOM\n methods of the top-level document object, such as\n document.getElementById(). This includes many popular\n sites, especially the newer ones that offer rich\n interaction to the user.\n\n - CVE-2006-3803/MFSA 2006-48: JavaScript new Function race\n condition\n\n H. D. Moore reported a testcase that was able to trigger\n a race condition where JavaScript garbage collection\n deleted a temporary variable still being used in the\n creation of a new Function object. The resulting use of\n a deleted object may be potentially exploitable to run\n native code provided by the attacker.\n\n - CVE-2006-3804/MFSA 2006-49: Heap buffer overwrite on\n malformed VCard\n\n A VCard attachment with a malformed base64 field (such\n as a photo) can trigger a heap buffer overwrite. These\n have proven exploitable in the past, though in this case\n the overwrite is accompanied by an integer underflow\n that would attempt to copy more data than the typical\n machine has, leading to a crash.\n\n - CVE-2006-3805/CVE-2006-3806/MFSA 2006-50: JavaScript\n engine vulnerabilities\n\n Continuing our security audit of the JavaScript engine,\n Mozilla developers found and fixed several potential\n vulnerabilities.\n\n Igor Bukanov and shutdown found additional places where\n an untimely garbage collection could delete a temporary\n object that was in active use (similar to MFSA 2006-01\n and MFSA 2006-10). Some of these may allow an attacker\n to run arbitrary code given the right conditions.\n\n Georgi Guninski found potential integer overflow issues\n with long strings in the toSource() methods of the\n Object, Array and String objects as well as string\n function arguments.\n\n - CVE-2006-3807/MFSA 2006-51: Privilege escalation using\n named-functions and redefined 'new Object()'\n\n moz_bug_r_a4 discovered that named JavaScript functions\n have a parent object created using the standard Object()\n constructor (ECMA-specified behavior) and that this\n constructor can be redefined by script (also\n ECMA-specified behavior). If the Object() constructor is\n changed to return a reference to a privileged object\n with useful properties it is possible to have\n attacker-supplied script excuted with elevated\n privileges by calling the function. This could be used\n to install malware or take other malicious actions.\n\n Our fix involves calling the internal Object constructor\n which appears to be what other ECMA-compatible\n interpreters do.\n\n - CVE-2006-3808/MFSA 2006-52: PAC privilege escalation\n using Function.prototype.call\n\n moz_bug_r_a4 reports that a malicious Proxy AutoConfig\n (PAC) server could serve a PAC script that can execute\n code with elevated privileges by setting the required\n FindProxyForURL function to the eval method on a\n privileged object that leaked into the PAC sandbox. By\n redirecting the victim to a specially crafted URL --\n easily done since the PAC script controls which proxy to\n use -- the URL 'hostname' can be executed as privileged\n script.\n\n A malicious proxy server can perform spoofing attacks on\n the user so it was already important to use a\n trustworthy PAC server.\n\n - CVE-2006-3809/MFSA 2006-53: UniversalBrowserRead\n privilege escalation\n\n shutdown reports that scripts granted the\n UniversalBrowserRead privilege can leverage that into\n the equivalent of the far more powerful\n UniversalXPConnect since they are allowed to 'read' into\n a privileged context. This allows the attacker the\n ability to run scripts with the full privelege of the\n user running the browser, possibly installing malware or\n snooping on private data. This has been fixed so that\n UniversalBrowserRead and UniversalBrowserWrite are\n limited to reading from and writing into only\n normally-privileged browser windows and frames.\n\n - CVE-2006-3810/MFSA 2006-54: XSS with\n XPCNativeWrapper(window).Function(...)\n\n shutdown reports that cross-site scripting (XSS) attacks\n could be performed using the construct\n XPCNativeWrapper(window).Function(...), which created a\n function that appeared to belong to the window in\n question even after it had been navigated to the target\n site.\n\n - CVE-2006-3811/MFSA 2006-55: Crashes with evidence of\n memory corruption\n\n As part of the Firefox 1.5.0.5 stability and security\n release, developers in the Mozilla community looked for\n and fixed several crash bugs to improve the stability of\n Mozilla clients. Some of these crashes showed evidence\n of memory corruption that we presume could be exploited\n to run arbitrary code with enough effort.\n\n - CVE-2006-3812/MFSA 2006-56: chrome: scheme loading\n remote content\n\n Benjamin Smedberg discovered that chrome URL's could be\n made to reference remote files, which would run scripts\n with full privilege. There is no known way for web\n content to successfully load a chrome: url, but if a\n user could be convinced to do so manually (perhaps by\n copying a link and pasting it into the location bar)\n this could be exploited.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.mozilla.org/projects/security/known-vulnerabilities.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected MozillaFirefox packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Mozilla Suite/Firefox Navigator Object Code Execution');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:MozillaFirefox\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:MozillaFirefox-translations\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:10.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/08/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2007/10/17\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2007-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE10\\.1)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"10.1\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE10.1\", reference:\"MozillaFirefox-1.5.0.6-1.3\") ) flag++;\nif ( rpm_check(release:\"SUSE10.1\", reference:\"MozillaFirefox-translations-1.5.0.6-1.3\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"MozillaFirefox\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-05-15T13:38:38", "description": "The installed version of SeaMonkey contains various security issues, some of which could lead to execution of arbitrary code on the affected host subject to the user's privileges.", "cvss3": {"score": null, "vector": null}, "published": "2006-07-27T00:00:00", "type": "nessus", "title": "SeaMonkey < 1.0.3 Multiple Vulnerabilities", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2006-3113", "CVE-2006-3677", "CVE-2006-3801", "CVE-2006-3802", "CVE-2006-3803", "CVE-2006-3804", "CVE-2006-3805", "CVE-2006-3806", "CVE-2006-3807", "CVE-2006-3808", "CVE-2006-3809", "CVE-2006-3810", "CVE-2006-3811", "CVE-2006-3812"], "modified": "2018-07-27T00:00:00", "cpe": ["cpe:/a:mozilla:seamonkey"], "id": "SEAMONKEY_103.NASL", "href": "https://www.tenable.com/plugins/nessus/22097", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(22097);\n script_version(\"1.27\");\n script_cvs_date(\"Date: 2018/07/27 18:38:15\");\n\n script_cve_id(\"CVE-2006-3113\", \"CVE-2006-3677\", \"CVE-2006-3801\", \"CVE-2006-3802\",\n \"CVE-2006-3803\", \"CVE-2006-3804\", \"CVE-2006-3805\", \"CVE-2006-3806\",\n \"CVE-2006-3807\", \"CVE-2006-3808\", \"CVE-2006-3809\", \"CVE-2006-3810\",\n \"CVE-2006-3811\", \"CVE-2006-3812\");\n script_bugtraq_id(19181, 19192, 19197);\n script_xref(name:\"CERT\", value:\"655892\");\n\n script_name(english:\"SeaMonkey < 1.0.3 Multiple Vulnerabilities\");\n script_summary(english:\"Checks version of SeaMonkey\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"A web browser on the remote host is prone to multiple flaws.\");\n script_set_attribute(attribute:\"description\", value:\n\"The installed version of SeaMonkey contains various security issues,\nsome of which could lead to execution of arbitrary code on the affected\nhost subject to the user's privileges.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-44/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-45/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-46/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-47/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-48/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-49/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-50/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-51/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-52/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-53/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-54/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-55/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-56/\");\n script_set_attribute(attribute:\"solution\", value:\"Upgrade to SeaMonkey 1.0.3 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Mozilla Suite/Firefox Navigator Object Code Execution');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/07/27\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/07/25\");\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2006/07/25\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:mozilla:seamonkey\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2006-2018 Tenable Network Security, Inc.\");\n\n script_dependencies(\"mozilla_org_installed.nasl\");\n script_require_keys(\"SeaMonkey/Version\");\n\n\n exit(0);\n}\n\ninclude(\"mozilla_version.inc\");\nport = get_kb_item(\"SMB/transport\");\nif (!port) port = 445;\n\ninstalls = get_kb_list(\"SMB/SeaMonkey/*\");\nif (isnull(installs)) audit(AUDIT_NOT_INST, \"SeaMonkey\");\n\nmozilla_check_version(installs:installs, product:'seamonkey', fix:'1.0.3', severity:SECURITY_HOLE);\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T13:14:34", "description": "A number of security vulnerabilities have been discovered and corrected in the latest Mozilla Thunderbird program.\n\nCorporate 3 had contained the Mozilla suite however, due to the support cycle for Mozilla, it was felt that upgrading Mozilla to Firefox and Thunderbird would allow for better future support for Corporate 3 users. To that end, the latest Thunderbird is being provided for Corporate 3 users which fix all known vulnerabilities up to version 1.5.0.5, as well as providing new and enhanced features.\n\nCorporate users who were using Mozilla for mail may need to explicitly install the new mozilla-thunderbird packages.\n\nFor 2006 users, no explicit installs are necessary.\n\nThe following CVE names have been corrected with this update:\nCVE-2006-2775, CVE-2006-2776, CVE-2006-2778, CVE-2006-2779, CVE-2006-2780, CVE-2006-2781, CVE-2006-2783, CVE-2006-2787, CVE-2006-3803, CVE-2006-3804, CVE-2006-3806, CVE-2006-3807, CVE-2006-3113, CVE-2006-3802, CVE-2006-3805, CVE-2006-3809, CVE-2006-3810, CVE-2006-3811, CVE-2006-3812.", "cvss3": {"score": null, "vector": null}, "published": "2006-12-16T00:00:00", "type": "nessus", "title": "Mandrake Linux Security Advisory : mozilla-thunderbird (MDKSA-2006:146)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2006-2775", "CVE-2006-2776", "CVE-2006-2778", "CVE-2006-2779", "CVE-2006-2780", "CVE-2006-2781", "CVE-2006-2783", "CVE-2006-2787", "CVE-2006-3113", "CVE-2006-3802", "CVE-2006-3803", "CVE-2006-3804", "CVE-2006-3805", "CVE-2006-3806", "CVE-2006-3807", "CVE-2006-3809", "CVE-2006-3810", "CVE-2006-3811", "CVE-2006-3812", "CVE-2007-1794"], "modified": "2021-01-06T00:00:00", "cpe": ["p-cpe:/a:mandriva:linux:mozilla-thunderbird", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-br", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-ca", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-cs", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-da", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-de", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-devel", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-el", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-ca", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-cs", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-de", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-es", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-fi", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-fr", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-hu", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-it", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-ja", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-nb", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-nl", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-pl", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-pt", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-pt_BR", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-ru", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-zh", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-zh_CN", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-es", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-fi", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-fr", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-he", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-hu", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-it", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-ja", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-ko", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-nb", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-nl", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-pl", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-pt_BR", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-ru", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-sk", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-sl", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-sv", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-tr", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-zh_CN", "p-cpe:/a:mandriva:linux:nsinstall", "cpe:/o:mandriva:linux:2006"], "id": "MANDRAKE_MDKSA-2006-146.NASL", "href": "https://www.tenable.com/plugins/nessus/23894", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Mandrake Linux Security Advisory MDKSA-2006:146. \n# The text itself is copyright (C) Mandriva S.A.\n#\n\nif (NASL_LEVEL < 3000) exit(0);\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(23894);\n script_version(\"1.19\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2006-2775\", \"CVE-2006-2776\", \"CVE-2006-2778\", \"CVE-2006-2779\", \"CVE-2006-2780\", \"CVE-2006-2781\", \"CVE-2006-2783\", \"CVE-2006-2787\", \"CVE-2006-3113\", \"CVE-2006-3802\", \"CVE-2006-3803\", \"CVE-2006-3804\", \"CVE-2006-3805\", \"CVE-2006-3806\", \"CVE-2006-3807\", \"CVE-2006-3809\", \"CVE-2006-3810\", \"CVE-2006-3811\", \"CVE-2006-3812\", \"CVE-2007-1794\");\n script_xref(name:\"MDKSA\", value:\"2006:146\");\n\n script_name(english:\"Mandrake Linux Security Advisory : mozilla-thunderbird (MDKSA-2006:146)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Mandrake Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"A number of security vulnerabilities have been discovered and\ncorrected in the latest Mozilla Thunderbird program.\n\nCorporate 3 had contained the Mozilla suite however, due to the\nsupport cycle for Mozilla, it was felt that upgrading Mozilla to\nFirefox and Thunderbird would allow for better future support for\nCorporate 3 users. To that end, the latest Thunderbird is being\nprovided for Corporate 3 users which fix all known vulnerabilities up\nto version 1.5.0.5, as well as providing new and enhanced features.\n\nCorporate users who were using Mozilla for mail may need to explicitly\ninstall the new mozilla-thunderbird packages.\n\nFor 2006 users, no explicit installs are necessary.\n\nThe following CVE names have been corrected with this update:\nCVE-2006-2775, CVE-2006-2776, CVE-2006-2778, CVE-2006-2779,\nCVE-2006-2780, CVE-2006-2781, CVE-2006-2783, CVE-2006-2787,\nCVE-2006-3803, CVE-2006-3804, CVE-2006-3806, CVE-2006-3807,\nCVE-2006-3113, CVE-2006-3802, CVE-2006-3805, CVE-2006-3809,\nCVE-2006-3810, CVE-2006-3811, CVE-2006-3812.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-31/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-32/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-33/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-35/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-40/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-42/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.mozilla.org/security/announce/2006/mfsa2006-46.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.mozilla.org/security/announce/2006/mfsa2006-47.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.mozilla.org/security/announce/2006/mfsa2006-48.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.mozilla.org/security/announce/2006/mfsa2006-49.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.mozilla.org/security/announce/2006/mfsa2006-50.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.mozilla.org/security/announce/2006/mfsa2006-51.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.mozilla.org/security/announce/2006/mfsa2006-53.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.mozilla.org/security/announce/2006/mfsa2006-54.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.mozilla.org/security/announce/2006/mfsa2006-55.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.mozilla.org/security/announce/2006/mfsa2006-56.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_cwe_id(94, 119);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-br\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-ca\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-cs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-da\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-de\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-el\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-ca\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-cs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-de\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-es\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-fi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-fr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-hu\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-it\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-ja\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-nb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-nl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-pl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-pt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-pt_BR\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-ru\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-zh\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail-zh_CN\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-es\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-fi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-fr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-he\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-hu\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-it\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-ja\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-ko\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-nb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-nl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-pl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-pt_BR\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-ru\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-sk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-sl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-sv\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-tr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-zh_CN\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:nsinstall\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:linux:2006\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/08/21\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/12/16\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Mandriva Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/Mandrake/release\", \"Host/Mandrake/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Mandrake/release\")) audit(AUDIT_OS_NOT, \"Mandriva / Mandake Linux\");\nif (!get_kb_item(\"Host/Mandrake/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^(amd64|i[3-6]86|x86_64)$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Mandriva / Mandrake Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-thunderbird-1.5.0.5-2.1.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-thunderbird-br-1.5.0.5-0.2.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-thunderbird-ca-1.5.0.5-0.2.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-thunderbird-cs-1.5.0.5-0.2.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-thunderbird-da-1.5.0.5-0.2.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-thunderbird-de-1.5.0.5-0.2.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-thunderbird-devel-1.5.0.5-2.1.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-thunderbird-el-1.5.0.5-0.2.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-thunderbird-enigmail-1.5.0.5-2.1.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-thunderbird-enigmail-ca-1.5.0.5-0.1.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-thunderbird-enigmail-cs-1.5.0.5-0.1.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-thunderbird-enigmail-de-1.5.0.5-0.1.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-thunderbird-enigmail-es-1.5.0.5-0.1.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-thunderbird-enigmail-fi-1.5.0.5-0.1.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-thunderbird-enigmail-fr-1.5.0.5-0.1.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-thunderbird-enigmail-hu-1.5.0.5-0.1.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-thunderbird-enigmail-it-1.5.0.5-0.1.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-thunderbird-enigmail-ja-1.5.0.5-0.1.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-thunderbird-enigmail-nb-1.5.0.5-0.1.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-thunderbird-enigmail-nl-1.5.0.5-0.1.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-thunderbird-enigmail-pl-1.5.0.5-0.1.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-thunderbird-enigmail-pt-1.5.0.5-0.1.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-thunderbird-enigmail-pt_BR-1.5.0.5-0.1.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-thunderbird-enigmail-ru-1.5.0.5-0.1.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-thunderbird-enigmail-zh-1.5.0.5-0.1.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-thunderbird-enigmail-zh_CN-1.5.0.5-0.1.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-thunderbird-es-1.5.0.5-0.2.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-thunderbird-fi-1.5.0.5-0.2.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-thunderbird-fr-1.5.0.5-0.2.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-thunderbird-he-1.5.0.5-0.2.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-thunderbird-hu-1.5.0.5-0.2.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-thunderbird-it-1.5.0.5-0.2.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-thunderbird-ja-1.5.0.5-0.2.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-thunderbird-ko-1.5.0.5-0.2.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-thunderbird-nb-1.5.0.5-0.2.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-thunderbird-nl-1.5.0.5-0.2.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-thunderbird-pl-1.5.0.5-0.2.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-thunderbird-pt_BR-1.5.0.5-0.2.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-thunderbird-ru-1.5.0.5-0.2.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-thunderbird-sk-1.5.0.5-0.2.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-thunderbird-sl-1.5.0.5-0.2.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-thunderbird-sv-1.5.0.5-0.2.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-thunderbird-tr-1.5.0.5-0.2.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-thunderbird-zh_CN-1.5.0.5-0.2.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"nsinstall-1.5.0.5-2.1.20060mdk\", yank:\"mdk\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 10, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-08-19T13:12:43", "description": "This update upgrades Thunderbird from 1.0.8 to 1.5.0.7. This step was necessary since the 1.0.x series is not supported by upstream any more.\n\nVarious flaws have been reported that allow an attacker to execute arbitrary code with user privileges by tricking the user into opening a malicious email containing JavaScript. Please note that JavaScript is disabled by default for emails, and it is not recommended to enable it. (CVE-2006-3113, CVE-2006-3802, CVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3807, CVE-2006-3809, CVE-2006-3810, CVE-2006-3811, CVE-2006-3812, CVE-2006-4253, CVE-2006-4565, CVE-2006-4566, CVE-2006-4571)\n\nA buffer overflow has been discovered in the handling of .vcard files.\nBy tricking a user into importing a malicious vcard into his contacts, this could be exploited to execute arbitrary code with the user's privileges. (CVE-2006-3804)\n\nThe NSS library did not sufficiently check the padding of PKCS #1 v1.5 signatures if the exponent of the public key is 3 (which is widely used for CAs). This could be exploited to forge valid signatures without the need of the secret key. (CVE-2006-4340)\n\nJon Oberheide reported a way how a remote attacker could trick users into downloading arbitrary extensions with circumventing the normal SSL certificate check. The attacker would have to be in a position to spoof the victim's DNS, causing them to connect to sites of the attacker's choosing rather than the sites intended by the victim. If they gained that control and the victim accepted the attacker's cert for the Mozilla update site, then the next update check could be hijacked and redirected to the attacker's site without detection.\n(CVE-2006-4567)\n\nGeorgi Guninski discovered that even with JavaScript disabled, a malicous email could still execute JavaScript when the message is viewed, replied to, or forwarded by putting the script in a remote XBL file loaded by the message. (CVE-2006-4570)\n\nThe 'enigmail' plugin and the translation packages have been updated to work with the new Thunderbird version.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": null, "vector": null}, "published": "2007-11-10T00:00:00", "type": "nessus", "title": "Ubuntu 5.10 : mozilla-thunderbird vulnerabilities (USN-350-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2001-0734", "CVE-2006-3113", "CVE-2006-3802", "CVE-2006-3803", "CVE-2006-3804", "CVE-2006-3805", "CVE-2006-3806", "CVE-2006-3807", "CVE-2006-3809", "CVE-2006-3810", "CVE-2006-3811", "CVE-2006-3812", "CVE-2006-4253", "CVE-2006-4340", "CVE-2006-4565", "CVE-2006-4566", "CVE-2006-4567", "CVE-2006-4570", "CVE-2006-4571", "CVE-2006-5462", "CVE-2007-1794"], "modified": "2021-01-19T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:mozilla-thunderbird", "p-cpe:/a:canonical:ubuntu_linux:mozilla-thunderbird-dev", "p-cpe:/a:canonical:ubuntu_linux:mozilla-thunderbird-enigmail", "p-cpe:/a:canonical:ubuntu_linux:mozilla-thunderbird-inspector", "p-cpe:/a:canonical:ubuntu_linux:mozilla-thunderbird-locale-ca", "p-cpe:/a:canonical:ubuntu_linux:mozilla-thunderbird-locale-de", "p-cpe:/a:canonical:ubuntu_linux:mozilla-thunderbird-locale-fr", "p-cpe:/a:canonical:ubuntu_linux:mozilla-thunderbird-locale-it", "p-cpe:/a:canonical:ubuntu_linux:mozilla-thunderbird-locale-nl", "p-cpe:/a:canonical:ubuntu_linux:mozilla-thunderbird-locale-pl", "p-cpe:/a:canonical:ubuntu_linux:mozilla-thunderbird-locale-uk", "p-cpe:/a:canonical:ubuntu_linux:mozilla-thunderbird-typeaheadfind", "cpe:/o:canonical:ubuntu_linux:5.10"], "id": "UBUNTU_USN-350-1.NASL", "href": "https://www.tenable.com/plugins/nessus/27930", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-350-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(27930);\n script_version(\"1.21\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2001-0734\", \"CVE-2006-3113\", \"CVE-2006-3802\", \"CVE-2006-3803\", \"CVE-2006-3804\", \"CVE-2006-3805\", \"CVE-2006-3806\", \"CVE-2006-3807\", \"CVE-2006-3809\", \"CVE-2006-3810\", \"CVE-2006-3811\", \"CVE-2006-3812\", \"CVE-2006-4253\", \"CVE-2006-4340\", \"CVE-2006-4565\", \"CVE-2006-4566\", \"CVE-2006-4567\", \"CVE-2006-4570\", \"CVE-2006-4571\", \"CVE-2006-5462\", \"CVE-2007-1794\");\n script_bugtraq_id(19849, 20042);\n script_xref(name:\"USN\", value:\"350-1\");\n\n script_name(english:\"Ubuntu 5.10 : mozilla-thunderbird vulnerabilities (USN-350-1)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update upgrades Thunderbird from 1.0.8 to 1.5.0.7. This step was\nnecessary since the 1.0.x series is not supported by upstream any\nmore.\n\nVarious flaws have been reported that allow an attacker to execute\narbitrary code with user privileges by tricking the user into opening\na malicious email containing JavaScript. Please note that JavaScript\nis disabled by default for emails, and it is not recommended to enable\nit. (CVE-2006-3113, CVE-2006-3802, CVE-2006-3803, CVE-2006-3805,\nCVE-2006-3806, CVE-2006-3807, CVE-2006-3809, CVE-2006-3810,\nCVE-2006-3811, CVE-2006-3812, CVE-2006-4253, CVE-2006-4565,\nCVE-2006-4566, CVE-2006-4571)\n\nA buffer overflow has been discovered in the handling of .vcard files.\nBy tricking a user into importing a malicious vcard into his contacts,\nthis could be exploited to execute arbitrary code with the user's\nprivileges. (CVE-2006-3804)\n\nThe NSS library did not sufficiently check the padding of PKCS #1 v1.5\nsignatures if the exponent of the public key is 3 (which is widely\nused for CAs). This could be exploited to forge valid signatures\nwithout the need of the secret key. (CVE-2006-4340)\n\nJon Oberheide reported a way how a remote attacker could trick users\ninto downloading arbitrary extensions with circumventing the normal\nSSL certificate check. The attacker would have to be in a position to\nspoof the victim's DNS, causing them to connect to sites of the\nattacker's choosing rather than the sites intended by the victim. If\nthey gained that control and the victim accepted the attacker's cert\nfor the Mozilla update site, then the next update check could be\nhijacked and redirected to the attacker's site without detection.\n(CVE-2006-4567)\n\nGeorgi Guninski discovered that even with JavaScript disabled, a\nmalicous email could still execute JavaScript when the message is\nviewed, replied to, or forwarded by putting the script in a remote XBL\nfile loaded by the message. (CVE-2006-4570)\n\nThe 'enigmail' plugin and the translation packages have been updated\nto work with the new Thunderbird version.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_cwe_id(20, 119, 264);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mozilla-thunderbird\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mozilla-thunderbird-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mozilla-thunderbird-enigmail\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mozilla-thunderbird-inspector\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mozilla-thunderbird-locale-ca\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mozilla-thunderbird-locale-de\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mozilla-thunderbird-locale-fr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mozilla-thunderbird-locale-it\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mozilla-thunderbird-locale-nl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mozilla-thunderbird-locale-pl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mozilla-thunderbird-locale-uk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mozilla-thunderbird-typeaheadfind\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:5.10\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/09/21\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2007/11/10\");\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2001/05/29\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2006-2019 Canonical, Inc. / NASL script (C) 2007-2016 Tenable Network Security, Inc.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! ereg(pattern:\"^(5\\.10)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 5.10\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"5.10\", pkgname:\"mozilla-thunderbird\", pkgver:\"1.5.0.7-0ubuntu0.5.10\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"mozilla-thunderbird-dev\", pkgver:\"1.5.0.7-0ubuntu0.5.10\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"mozilla-thunderbird-enigmail\", pkgver:\"2:0.94-0ubuntu0.5.10\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"mozilla-thunderbird-inspector\", pkgver:\"1.5.0.7-0ubuntu0.5.10\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"mozilla-thunderbird-locale-ca\", pkgver:\"1.5-ubuntu5.10\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"mozilla-thunderbird-locale-de\", pkgver:\"1.5-ubuntu5.10\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"mozilla-thunderbird-locale-fr\", pkgver:\"1.5-ubuntu5.10\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"mozilla-thunderbird-locale-it\", pkgver:\"1.5-ubuntu5.10\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"mozilla-thunderbird-locale-nl\", pkgver:\"1.5-ubuntu5.10\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"mozilla-thunderbird-locale-pl\", pkgver:\"1.5-ubuntu5.10\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"mozilla-thunderbird-locale-uk\", pkgver:\"1.5-ubuntu5.10\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"mozilla-thunderbird-typeaheadfind\", pkgver:\"1.5.0.7-0ubuntu0.5.10\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"mozilla-thunderbird / mozilla-thunderbird-dev / etc\");\n}\n", "cvss": {"score": 10, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-05-15T13:39:12", "description": "Updated thunderbird packages that fix several security bugs are now available for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having critical security impact by the Red Hat Security Response Team.\n\nMozilla Thunderbird is a standalone mail and newsgroup client.\n\nThe Mozilla Foundation has discontinued support for the Mozilla Thunderbird 1.0 branch. This update deprecates the Mozilla Thunderbird 1.0 branch in Red Hat Enterprise Linux 4 in favor of the supported Mozilla Thunderbird 1.5 branch.\n\nThis update also resolves a number of outstanding Thunderbird security issues :\n\nSeveral flaws were found in the way Thunderbird processed certain JavaScript actions. A malicious mail message could execute arbitrary JavaScript instructions with the permissions of 'chrome', allowing the page to steal sensitive information or install browser malware.\n(CVE-2006-2776, CVE-2006-2784, CVE-2006-2785, CVE-2006-2787, CVE-2006-3807, CVE-2006-3809)\n\nSeveral denial of service flaws were found in the way Thunderbird processed certain mail messages. A malicious web page could crash the browser or possibly execute arbitrary code as the user running Thunderbird. (CVE-2006-2779, CVE-2006-2780, CVE-2006-3801, CVE-2006-3677, CVE-2006-3113, CVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3811)\n\nSeveral flaws were found in the way Thunderbird processed certain JavaScript actions. A malicious mail message could conduct a cross-site scripting attack or steal sensitive information (such as cookies owned by other domains). (CVE-2006-3802, CVE-2006-3810)\n\nA form file upload flaw was found in the way Thunderbird handled JavaScript input object mutation. A malicious mail message could upload an arbitrary local file at form submission time without user interaction. (CVE-2006-2782)\n\nA denial of service flaw was found in the way Thunderbird called the crypto.signText() JavaScript function. A malicious mail message could crash the browser if the victim had a client certificate loaded.\n(CVE-2006-2778)\n\nA flaw was found in the way Thunderbird processed Proxy AutoConfig scripts. A malicious Proxy AutoConfig server could execute arbitrary JavaScript instructions with the permissions of 'chrome', allowing the page to steal sensitive information or install client malware.\n(CVE-2006-3808)\n\nNote: Please note that JavaScript support is disabled by default in Thunderbird. The above issues are not exploitable with JavaScript disabled.\n\nTwo flaws were found in the way Thunderbird displayed malformed inline vcard attachments. If a victim viewed an email message containing a carefully crafted vcard it was possible to execute arbitrary code as the user running Thunderbird. (CVE-2006-2781, CVE-2006-3804)\n\nA cross site scripting flaw was found in the way Thunderbird processed Unicode Byte-order-Mark (BOM) markers in UTF-8 mail messages. A malicious web page could execute a script within the browser that a web input sanitizer could miss due to a malformed 'script' tag.\n(CVE-2006-2783)\n\nTwo HTTP response smuggling flaws were found in the way Thunderbird processed certain invalid HTTP response headers. A malicious website could return specially crafted HTTP response headers which may bypass HTTP proxy restrictions. (CVE-2006-2786)\n\nA double free flaw was found in the way the nsIX509::getRawDER method was called. If a victim visited a carefully crafted web page, it was possible to crash Thunderbird. (CVE-2006-2788)\n\nUsers of Thunderbird are advised to upgrade to this update, which contains Thunderbird version 1.5.0.5 that corrects these issues.", "cvss3": {"score": null, "vector": null}, "published": "2006-08-04T00:00:00", "type": "nessus", "title": "CentOS 4 : thunderbird (CESA-2006:0611)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2006-2776", "CVE-2006-2778", "CVE-2006-2779", "CVE-2006-2780", "CVE-2006-2781", "CVE-2006-2782", "CVE-2006-2783", "CVE-2006-2784", "CVE-2006-2785", "CVE-2006-2786", "CVE-2006-2787", "CVE-2006-2788", "CVE-2006-3113", "CVE-2006-3677", "CVE-2006-3801", "CVE-2006-3802", "CVE-2006-3803", "CVE-2006-3804", "CVE-2006-3805", "CVE-2006-3806", "CVE-2006-3807", "CVE-2006-3808", "CVE-2006-3809", "CVE-2006-3810", "CVE-2006-3811"], "modified": "2021-01-04T00:00:00", "cpe": ["p-cpe:/a:centos:centos:thunderbird", "cpe:/o:centos:centos:4"], "id": "CENTOS_RHSA-2006-0611.NASL", "href": "https://www.tenable.com/plugins/nessus/22138", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2006:0611 and \n# CentOS Errata and Security Advisory 2006:0611 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(22138);\n script_version(\"1.23\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2006-2776\", \"CVE-2006-2778\", \"CVE-2006-2779\", \"CVE-2006-2780\", \"CVE-2006-2781\", \"CVE-2006-2782\", \"CVE-2006-2783\", \"CVE-2006-2784\", \"CVE-2006-2785\", \"CVE-2006-2786\", \"CVE-2006-2787\", \"CVE-2006-2788\", \"CVE-2006-3113\", \"CVE-2006-3677\", \"CVE-2006-3801\", \"CVE-2006-3802\", \"CVE-2006-3803\", \"CVE-2006-3804\", \"CVE-2006-3805\", \"CVE-2006-3806\", \"CVE-2006-3807\", \"CVE-2006-3808\", \"CVE-2006-3809\", \"CVE-2006-3810\", \"CVE-2006-3811\");\n script_xref(name:\"RHSA\", value:\"2006:0611\");\n\n script_name(english:\"CentOS 4 : thunderbird (CESA-2006:0611)\");\n script_summary(english:\"Checks rpm output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated thunderbird packages that fix several security bugs are now\navailable for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having critical security impact by the\nRed Hat Security Response Team.\n\nMozilla Thunderbird is a standalone mail and newsgroup client.\n\nThe Mozilla Foundation has discontinued support for the Mozilla\nThunderbird 1.0 branch. This update deprecates the Mozilla Thunderbird\n1.0 branch in Red Hat Enterprise Linux 4 in favor of the supported\nMozilla Thunderbird 1.5 branch.\n\nThis update also resolves a number of outstanding Thunderbird security\nissues :\n\nSeveral flaws were found in the way Thunderbird processed certain\nJavaScript actions. A malicious mail message could execute arbitrary\nJavaScript instructions with the permissions of 'chrome', allowing the\npage to steal sensitive information or install browser malware.\n(CVE-2006-2776, CVE-2006-2784, CVE-2006-2785, CVE-2006-2787,\nCVE-2006-3807, CVE-2006-3809)\n\nSeveral denial of service flaws were found in the way Thunderbird\nprocessed certain mail messages. A malicious web page could crash the\nbrowser or possibly execute arbitrary code as the user running\nThunderbird. (CVE-2006-2779, CVE-2006-2780, CVE-2006-3801,\nCVE-2006-3677, CVE-2006-3113, CVE-2006-3803, CVE-2006-3805,\nCVE-2006-3806, CVE-2006-3811)\n\nSeveral flaws were found in the way Thunderbird processed certain\nJavaScript actions. A malicious mail message could conduct a\ncross-site scripting attack or steal sensitive information (such as\ncookies owned by other domains). (CVE-2006-3802, CVE-2006-3810)\n\nA form file upload flaw was found in the way Thunderbird handled\nJavaScript input object mutation. A malicious mail message could\nupload an arbitrary local file at form submission time without user\ninteraction. (CVE-2006-2782)\n\nA denial of service flaw was found in the way Thunderbird called the\ncrypto.signText() JavaScript function. A malicious mail message could\ncrash the browser if the victim had a client certificate loaded.\n(CVE-2006-2778)\n\nA flaw was found in the way Thunderbird processed Proxy AutoConfig\nscripts. A malicious Proxy AutoConfig server could execute arbitrary\nJavaScript instructions with the permissions of 'chrome', allowing the\npage to steal sensitive information or install client malware.\n(CVE-2006-3808)\n\nNote: Please note that JavaScript support is disabled by default in\nThunderbird. The above issues are not exploitable with JavaScript\ndisabled.\n\nTwo flaws were found in the way Thunderbird displayed malformed inline\nvcard attachments. If a victim viewed an email message containing a\ncarefully crafted vcard it was possible to execute arbitrary code as\nthe user running Thunderbird. (CVE-2006-2781, CVE-2006-3804)\n\nA cross site scripting flaw was found in the way Thunderbird processed\nUnicode Byte-order-Mark (BOM) markers in UTF-8 mail messages. A\nmalicious web page could execute a script within the browser that a\nweb input sanitizer could miss due to a malformed 'script' tag.\n(CVE-2006-2783)\n\nTwo HTTP response smuggling flaws were found in the way Thunderbird\nprocessed certain invalid HTTP response headers. A malicious website\ncould return specially crafted HTTP response headers which may bypass\nHTTP proxy restrictions. (CVE-2006-2786)\n\nA double free flaw was found in the way the nsIX509::getRawDER method\nwas called. If a victim visited a carefully crafted web page, it was\npossible to crash Thunderbird. (CVE-2006-2788)\n\nUsers of Thunderbird are advised to upgrade to this update, which\ncontains Thunderbird version 1.5.0.5 that corrects these issues.\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2006-July/013073.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?1644ce03\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2006-July/013074.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?58494fb6\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2006-July/013085.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?90ad4ee2\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected thunderbird package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Mozilla Suite/Firefox Navigator Object Code Execution');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n script_cwe_id(20, 94, 119);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:thunderbird\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:4\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2006/06/02\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/07/29\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/08/04\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^4([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 4.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-4\", reference:\"thunderbird-1.5.0.5-0.el4.1.centos4\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"thunderbird\");\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-05-15T13:39:02", "description": "Updated firefox packages that fix several security bugs are now available for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having critical security impact by the Red Hat Security Response Team.\n\nMozilla Firefox is an open source Web browser.\n\nThe Mozilla Foundation has discontinued support for the Mozilla Firefox 1.0 branch. This update deprecates the Mozilla Firefox 1.0 branch in Red Hat Enterprise Linux 4 in favor of the supported Mozilla Firefox 1.5 branch.\n\nThis update also resolves a number of outstanding Firefox security issues :\n\nSeveral flaws were found in the way Firefox processed certain JavaScript actions. A malicious web page could execute arbitrary JavaScript instructions with the permissions of 'chrome', allowing the page to steal sensitive information or install browser malware.\n(CVE-2006-2776, CVE-2006-2784, CVE-2006-2785, CVE-2006-2787, CVE-2006-3807, CVE-2006-3809, CVE-2006-3812)\n\nSeveral denial of service flaws were found in the way Firefox processed certain web content. A malicious web page could crash the browser or possibly execute arbitrary code as the user running Firefox. (CVE-2006-2779, CVE-2006-2780, CVE-2006-3801, CVE-2006-3677, CVE-2006-3113, CVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3811)\n\nA cross-site scripting flaw was found in the way Firefox processed Unicode Byte-Order-Mark (BOM) markers in UTF-8 web pages. A malicious web page could execute a script within the browser that a web input sanitizer could miss due to a malformed 'script' tag. (CVE-2006-2783)\n\nSeveral flaws were found in the way Firefox processed certain JavaScript actions. A malicious web page could conduct a cross-site scripting attack or steal sensitive information (such as cookies owned by other domains). (CVE-2006-3802, CVE-2006-3810)\n\nA form file upload flaw was found in the way Firefox handled JavaScript input object mutation. A malicious web page could upload an arbitrary local file at form submission time without user interaction.\n(CVE-2006-2782)\n\nA denial of service flaw was found in the way Firefox called the crypto.signText() JavaScript function. A malicious web page could crash the browser if the victim had a client certificate loaded.\n(CVE-2006-2778)\n\nTwo HTTP response smuggling flaws were found in the way Firefox processed certain invalid HTTP response headers. A malicious website could return specially crafted HTTP response headers which may bypass HTTP proxy restrictions. (CVE-2006-2786)\n\nA flaw was found in the way Firefox processed Proxy AutoConfig scripts. A malicious Proxy AutoConfig server could execute arbitrary JavaScript instructions with the permissions of 'chrome', allowing the page to steal sensitive information or install browser malware.\n(CVE-2006-3808)\n\nA double free flaw was found in the way the nsIX509::getRawDER method was called. If a victim visited a carefully crafted web page, it was possible to execute arbitrary code as the user running Firefox.\n(CVE-2006-2788)\n\nUsers of Firefox are advised to upgrade to this update, which contains Firefox version 1.5.0.5 that corrects these issues.", "cvss3": {"score": null, "vector": null}, "published": "2006-08-04T00:00:00", "type": "nessus", "title": "CentOS 4 : Firefox (CESA-2006:0610)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2006-2776", "CVE-2006-2778", "CVE-2006-2779", "CVE-2006-2780", "CVE-2006-2782", "CVE-2006-2783", "CVE-2006-2784", "CVE-2006-2785", "CVE-2006-2786", "CVE-2006-2787", "CVE-2006-2788", "CVE-2006-3113", "CVE-2006-3677", "CVE-2006-3801", "CVE-2006-3802", "CVE-2006-3803", "CVE-2006-3805", "CVE-2006-3806", "CVE-2006-3807", "CVE-2006-3808", "CVE-2006-3809", "CVE-2006-3810", "CVE-2006-3811", "CVE-2006-3812"], "modified": "2021-01-04T00:00:00", "cpe": ["p-cpe:/a:centos:centos:firefox", "cpe:/o:centos:centos:4"], "id": "CENTOS_RHSA-2006-0610.NASL", "href": "https://www.tenable.com/plugins/nessus/22137", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2006:0610 and \n# CentOS Errata and Security Advisory 2006:0610 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(22137);\n script_version(\"1.23\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2006-2776\", \"CVE-2006-2778\", \"CVE-2006-2779\", \"CVE-2006-2780\", \"CVE-2006-2782\", \"CVE-2006-2783\", \"CVE-2006-2784\", \"CVE-2006-2785\", \"CVE-2006-2786\", \"CVE-2006-2787\", \"CVE-2006-2788\", \"CVE-2006-3113\", \"CVE-2006-3677\", \"CVE-2006-3801\", \"CVE-2006-3802\", \"CVE-2006-3803\", \"CVE-2006-3805\", \"CVE-2006-3806\", \"CVE-2006-3807\", \"CVE-2006-3808\", \"CVE-2006-3809\", \"CVE-2006-3810\", \"CVE-2006-3811\", \"CVE-2006-3812\");\n script_xref(name:\"RHSA\", value:\"2006:0610\");\n\n script_name(english:\"CentOS 4 : Firefox (CESA-2006:0610)\");\n script_summary(english:\"Checks rpm output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated firefox packages that fix several security bugs are now\navailable for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having critical security impact by the\nRed Hat Security Response Team.\n\nMozilla Firefox is an open source Web browser.\n\nThe Mozilla Foundation has discontinued support for the Mozilla\nFirefox 1.0 branch. This update deprecates the Mozilla Firefox 1.0\nbranch in Red Hat Enterprise Linux 4 in favor of the supported Mozilla\nFirefox 1.5 branch.\n\nThis update also resolves a number of outstanding Firefox security\nissues :\n\nSeveral flaws were found in the way Firefox processed certain\nJavaScript actions. A malicious web page could execute arbitrary\nJavaScript instructions with the permissions of 'chrome', allowing the\npage to steal sensitive information or install browser malware.\n(CVE-2006-2776, CVE-2006-2784, CVE-2006-2785, CVE-2006-2787,\nCVE-2006-3807, CVE-2006-3809, CVE-2006-3812)\n\nSeveral denial of service flaws were found in the way Firefox\nprocessed certain web content. A malicious web page could crash the\nbrowser or possibly execute arbitrary code as the user running\nFirefox. (CVE-2006-2779, CVE-2006-2780, CVE-2006-3801, CVE-2006-3677,\nCVE-2006-3113, CVE-2006-3803, CVE-2006-3805, CVE-2006-3806,\nCVE-2006-3811)\n\nA cross-site scripting flaw was found in the way Firefox processed\nUnicode Byte-Order-Mark (BOM) markers in UTF-8 web pages. A malicious\nweb page could execute a script within the browser that a web input\nsanitizer could miss due to a malformed 'script' tag. (CVE-2006-2783)\n\nSeveral flaws were found in the way Firefox processed certain\nJavaScript actions. A malicious web page could conduct a cross-site\nscripting attack or steal sensitive information (such as cookies owned\nby other domains). (CVE-2006-3802, CVE-2006-3810)\n\nA form file upload flaw was found in the way Firefox handled\nJavaScript input object mutation. A malicious web page could upload an\narbitrary local file at form submission time without user interaction.\n(CVE-2006-2782)\n\nA denial of service flaw was found in the way Firefox called the\ncrypto.signText() JavaScript function. A malicious web page could\ncrash the browser if the victim had a client certificate loaded.\n(CVE-2006-2778)\n\nTwo HTTP response smuggling flaws were found in the way Firefox\nprocessed certain invalid HTTP response headers. A malicious website\ncould return specially crafted HTTP response headers which may bypass\nHTTP proxy restrictions. (CVE-2006-2786)\n\nA flaw was found in the way Firefox processed Proxy AutoConfig\nscripts. A malicious Proxy AutoConfig server could execute arbitrary\nJavaScript instructions with the permissions of 'chrome', allowing the\npage to steal sensitive information or install browser malware.\n(CVE-2006-3808)\n\nA double free flaw was found in the way the nsIX509::getRawDER method\nwas called. If a victim visited a carefully crafted web page, it was\npossible to execute arbitrary code as the user running Firefox.\n(CVE-2006-2788)\n\nUsers of Firefox are advised to upgrade to this update, which contains\nFirefox version 1.5.0.5 that corrects these issues.\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2006-July/013071.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?944d3248\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2006-July/013072.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?2fc400b0\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2006-July/013084.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?deef7c43\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected firefox package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Mozilla Suite/Firefox Navigator Object Code Execution');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n script_cwe_id(20, 94, 119);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:firefox\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:4\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2006/06/02\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/07/31\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/08/04\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^4([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 4.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-4\", reference:\"firefox-1.5.0.5-0.el4.1.centos4\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"firefox\");\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-05-15T13:38:12", "description": "Updated firefox packages that fix several security bugs are now available for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having critical security impact by the Red Hat Security Response Team.\n\nMozilla Firefox is an open source Web browser.\n\nThe Mozilla Foundation has discontinued support for the Mozilla Firefox 1.0 branch. This update deprecates the Mozilla Firefox 1.0 branch in Red Hat Enterprise Linux 4 in favor of the supported Mozilla Firefox 1.5 branch.\n\nThis update also resolves a number of outstanding Firefox security issues :\n\nSeveral flaws were found in the way Firefox processed certain JavaScript actions. A malicious web page could execute arbitrary JavaScript instructions with the permissions of 'chrome', allowing the page to steal sensitive information or install browser malware.\n(CVE-2006-2776, CVE-2006-2784, CVE-2006-2785, CVE-2006-2787, CVE-2006-3807, CVE-2006-3809, CVE-2006-3812)\n\nSeveral denial of service flaws were found in the way Firefox processed certain web content. A malicious web page could crash the browser or possibly execute arbitrary code as the user running Firefox. (CVE-2006-2779, CVE-2006-2780, CVE-2006-3801, CVE-2006-3677, CVE-2006-3113, CVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3811)\n\nA cross-site scripting flaw was found in the way Firefox processed Unicode Byte-Order-Mark (BOM) markers in UTF-8 web pages. A malicious web page could execute a script within the browser that a web input sanitizer could miss due to a malformed 'script' tag. (CVE-2006-2783)\n\nSeveral flaws were found in the way Firefox processed certain JavaScript actions. A malicious web page could conduct a cross-site scripting attack or steal sensitive information (such as cookies owned by other domains). (CVE-2006-3802, CVE-2006-3810)\n\nA form file upload flaw was found in the way Firefox handled JavaScript input object mutation. A malicious web page could upload an arbitrary local file at form submission time without user interaction.\n(CVE-2006-2782)\n\nA denial of service flaw was found in the way Firefox called the crypto.signText() JavaScript function. A malicious web page could crash the browser if the victim had a client certificate loaded.\n(CVE-2006-2778)\n\nTwo HTTP response smuggling flaws were found in the way Firefox processed certain invalid HTTP response headers. A malicious website could return specially crafted HTTP response headers which may bypass HTTP proxy restrictions. (CVE-2006-2786)\n\nA flaw was found in the way Firefox processed Proxy AutoConfig scripts. A malicious Proxy AutoConfig server could execute arbitrary JavaScript instructions with the permissions of 'chrome', allowing the page to steal sensitive information or install browser malware.\n(CVE-2006-3808)\n\nA double free flaw was found in the way the nsIX509::getRawDER method was called. If a victim visited a carefully crafted web page, it was possible to execute arbitrary code as the user running Firefox.\n(CVE-2006-2788)\n\nUsers of Firefox are advised to upgrade to this update, which contains Firefox version 1.5.0.5 that corrects these issues.", "cvss3": {"score": null, "vector": null}, "published": "2006-07-29T00:00:00", "type": "nessus", "title": "RHEL 4 : firefox (RHSA-2006:0610)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2006-2776", "CVE-2006-2778", "CVE-2006-2779", "CVE-2006-2780", "CVE-2006-2782", "CVE-2006-2783", "CVE-2006-2784", "CVE-2006-2785", "CVE-2006-2786", "CVE-2006-2787", "CVE-2006-2788", "CVE-2006-3113", "CVE-2006-3677", "CVE-2006-3801", "CVE-2006-3802", "CVE-2006-3803", "CVE-2006-3805", "CVE-2006-3806", "CVE-2006-3807", "CVE-2006-3808", "CVE-2006-3809", "CVE-2006-3810", "CVE-2006-3811", "CVE-2006-3812"], "modified": "2021-01-14T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:firefox", "cpe:/o:redhat:enterprise_linux:4"], "id": "REDHAT-RHSA-2006-0610.NASL", "href": "https://www.tenable.com/plugins/nessus/22121", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2006:0610. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(22121);\n script_version(\"1.30\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2006-2776\", \"CVE-2006-2778\", \"CVE-2006-2779\", \"CVE-2006-2780\", \"CVE-2006-2782\", \"CVE-2006-2783\", \"CVE-2006-2784\", \"CVE-2006-2785\", \"CVE-2006-2786\", \"CVE-2006-2787\", \"CVE-2006-2788\", \"CVE-2006-3113\", \"CVE-2006-3677\", \"CVE-2006-3801\", \"CVE-2006-3802\", \"CVE-2006-3803\", \"CVE-2006-3805\", \"CVE-2006-3806\", \"CVE-2006-3807\", \"CVE-2006-3808\", \"CVE-2006-3809\", \"CVE-2006-3810\", \"CVE-2006-3811\", \"CVE-2006-3812\");\n script_xref(name:\"RHSA\", value:\"2006:0610\");\n\n script_name(english:\"RHEL 4 : firefox (RHSA-2006:0610)\");\n script_summary(english:\"Checks the rpm output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated firefox packages that fix several security bugs are now\navailable for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having critical security impact by the\nRed Hat Security Response Team.\n\nMozilla Firefox is an open source Web browser.\n\nThe Mozilla Foundation has discontinued support for the Mozilla\nFirefox 1.0 branch. This update deprecates the Mozilla Firefox 1.0\nbranch in Red Hat Enterprise Linux 4 in favor of the supported Mozilla\nFirefox 1.5 branch.\n\nThis update also resolves a number of outstanding Firefox security\nissues :\n\nSeveral flaws were found in the way Firefox processed certain\nJavaScript actions. A malicious web page could execute arbitrary\nJavaScript instructions with the permissions of 'chrome', allowing the\npage to steal sensitive information or install browser malware.\n(CVE-2006-2776, CVE-2006-2784, CVE-2006-2785, CVE-2006-2787,\nCVE-2006-3807, CVE-2006-3809, CVE-2006-3812)\n\nSeveral denial of service flaws were found in the way Firefox\nprocessed certain web content. A malicious web page could crash the\nbrowser or possibly execute arbitrary code as the user running\nFirefox. (CVE-2006-2779, CVE-2006-2780, CVE-2006-3801, CVE-2006-3677,\nCVE-2006-3113, CVE-2006-3803, CVE-2006-3805, CVE-2006-3806,\nCVE-2006-3811)\n\nA cross-site scripting flaw was found in the way Firefox processed\nUnicode Byte-Order-Mark (BOM) markers in UTF-8 web pages. A malicious\nweb page could execute a script within the browser that a web input\nsanitizer could miss due to a malformed 'script' tag. (CVE-2006-2783)\n\nSeveral flaws were found in the way Firefox processed certain\nJavaScript actions. A malicious web page could conduct a cross-site\nscripting attack or steal sensitive information (such as cookies owned\nby other domains). (CVE-2006-3802, CVE-2006-3810)\n\nA form file upload flaw was found in the way Firefox handled\nJavaScript input object mutation. A malicious web page could upload an\narbitrary local file at form submission time without user interaction.\n(CVE-2006-2782)\n\nA denial of service flaw was found in the way Firefox called the\ncrypto.signText() JavaScript function. A malicious web page could\ncrash the browser if the victim had a client certificate loaded.\n(CVE-2006-2778)\n\nTwo HTTP response smuggling flaws were found in the way Firefox\nprocessed certain invalid HTTP response headers. A malicious website\ncould return specially crafted HTTP response headers which may bypass\nHTTP proxy restrictions. (CVE-2006-2786)\n\nA flaw was found in the way Firefox processed Proxy AutoConfig\nscripts. A malicious Proxy AutoConfig server could execute arbitrary\nJavaScript instructions with the permissions of 'chrome', allowing the\npage to steal sensitive information or install browser malware.\n(CVE-2006-3808)\n\nA double free flaw was found in the way the nsIX509::getRawDER method\nwas called. If a victim visited a carefully crafted web page, it was\npossible to execute arbitrary code as the user running Firefox.\n(CVE-2006-2788)\n\nUsers of Firefox are advised to upgrade to this update, which contains\nFirefox version 1.5.0.5 that corrects these issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2776\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2778\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2779\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2780\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2782\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2783\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2784\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2785\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2786\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2787\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2788\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3113\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3677\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3801\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3802\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3803\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3805\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3806\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3807\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3808\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3809\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3810\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3811\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3812\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2006:0610\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected firefox package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Mozilla Suite/Firefox Navigator Object Code Execution');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n script_cwe_id(20, 94, 119);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:firefox\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:4\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2006/06/02\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/07/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/07/29\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^4([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 4.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2006:0610\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL4\", reference:\"firefox-1.5.0.5-0.el4.1\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"firefox\");\n }\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-05-15T13:38:00", "description": "Updated thunderbird packages that fix several security bugs are now available for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having critical security impact by the Red Hat Security Response Team.\n\nMozilla Thunderbird is a standalone mail and newsgroup client.\n\nThe Mozilla Foundation has discontinued support for the Mozilla Thunderbird 1.0 branch. This update deprecates the Mozilla Thunderbird 1.0 branch in Red Hat Enterprise Linux 4 in favor of the supported Mozilla Thunderbird 1.5 branch.\n\nThis update also resolves a number of outstanding Thunderbird security issues :\n\nSeveral flaws were found in the way Thunderbird processed certain JavaScript actions. A malicious mail message could execute arbitrary JavaScript instructions with the permissions of 'chrome', allowing the page to steal sensitive information or install browser malware.\n(CVE-2006-2776, CVE-2006-2784, CVE-2006-2785, CVE-2006-2787, CVE-2006-3807, CVE-2006-3809)\n\nSeveral denial of service flaws were found in the way Thunderbird processed certain mail messages. A malicious web page could crash the browser or possibly execute arbitrary code as the user running Thunderbird. (CVE-2006-2779, CVE-2006-2780, CVE-2006-3801, CVE-2006-3677, CVE-2006-3113, CVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3811)\n\nSeveral flaws were found in the way Thunderbird processed certain JavaScript actions. A malicious mail message could conduct a cross-site scripting attack or steal sensitive information (such as cookies owned by other domains). (CVE-2006-3802, CVE-2006-3810)\n\nA form file upload flaw was found in the way Thunderbird handled JavaScript input object mutation. A malicious mail message could upload an arbitrary local file at form submission time without user interaction. (CVE-2006-2782)\n\nA denial of service flaw was found in the way Thunderbird called the crypto.signText() JavaScript function. A malicious mail message could crash the browser if the victim had a client certificate loaded.\n(CVE-2006-2778)\n\nA flaw was found in the way Thunderbird processed Proxy AutoConfig scripts. A malicious Proxy AutoConfig server could execute arbitrary JavaScript instructions with the permissions of 'chrome', allowing the page to steal sensitive information or install client malware.\n(CVE-2006-3808)\n\nNote: Please note that JavaScript support is disabled by default in Thunderbird. The above issues are not exploitable with JavaScript disabled.\n\nTwo flaws were found in the way Thunderbird displayed malformed inline vcard attachments. If a victim viewed an email message containing a carefully crafted vcard it was possible to execute arbitrary code as the user running Thunderbird. (CVE-2006-2781, CVE-2006-3804)\n\nA cross site scripting flaw was found in the way Thunderbird processed Unicode Byte-order-Mark (BOM) markers in UTF-8 mail messages. A malicious web page could execute a script within the browser that a web input sanitizer could miss due to a malformed 'script' tag.\n(CVE-2006-2783)\n\nTwo HTTP response smuggling flaws were found in the way Thunderbird processed certain invalid HTTP response headers. A malicious website could return specially crafted HTTP response headers which may bypass HTTP proxy restrictions. (CVE-2006-2786)\n\nA double free flaw was found in the way the nsIX509::getRawDER method was called. If a victim visited a carefully crafted web page, it was possible to crash Thunderbird. (CVE-2006-2788)\n\nUsers of Thunderbird are advised to upgrade to this update, which contains Thunderbird version 1.5.0.5 that corrects these issues.", "cvss3": {"score": null, "vector": null}, "published": "2006-07-29T00:00:00", "type": "nessus", "title": "RHEL 4 : thunderbird (RHSA-2006:0611)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2006-2776", "CVE-2006-2778", "CVE-2006-2779", "CVE-2006-2780", "CVE-2006-2781", "CVE-2006-2782", "CVE-2006-2783", "CVE-2006-2784", "CVE-2006-2785", "CVE-2006-2786", "CVE-2006-2787", "CVE-2006-2788", "CVE-2006-3113", "CVE-2006-3677", "CVE-2006-3801", "CVE-2006-3802", "CVE-2006-3803", "CVE-2006-3804", "CVE-2006-3805", "CVE-2006-3806", "CVE-2006-3807", "CVE-2006-3808", "CVE-2006-3809", "CVE-2006-3810", "CVE-2006-3811"], "modified": "2021-01-14T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:thunderbird", "cpe:/o:redhat:enterprise_linux:4"], "id": "REDHAT-RHSA-2006-0611.NASL", "href": "https://www.tenable.com/plugins/nessus/22122", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2006:0611. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(22122);\n script_version(\"1.30\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2006-2776\", \"CVE-2006-2778\", \"CVE-2006-2779\", \"CVE-2006-2780\", \"CVE-2006-2781\", \"CVE-2006-2782\", \"CVE-2006-2783\", \"CVE-2006-2784\", \"CVE-2006-2785\", \"CVE-2006-2786\", \"CVE-2006-2787\", \"CVE-2006-2788\", \"CVE-2006-3113\", \"CVE-2006-3677\", \"CVE-2006-3801\", \"CVE-2006-3802\", \"CVE-2006-3803\", \"CVE-2006-3804\", \"CVE-2006-3805\", \"CVE-2006-3806\", \"CVE-2006-3807\", \"CVE-2006-3808\", \"CVE-2006-3809\", \"CVE-2006-3810\", \"CVE-2006-3811\");\n script_xref(name:\"RHSA\", value:\"2006:0611\");\n\n script_name(english:\"RHEL 4 : thunderbird (RHSA-2006:0611)\");\n script_summary(english:\"Checks the rpm output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated thunderbird packages that fix several security bugs are now\navailable for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having critical security impact by the\nRed Hat Security Response Team.\n\nMozilla Thunderbird is a standalone mail and newsgroup client.\n\nThe Mozilla Foundation has discontinued support for the Mozilla\nThunderbird 1.0 branch. This update deprecates the Mozilla Thunderbird\n1.0 branch in Red Hat Enterprise Linux 4 in favor of the supported\nMozilla Thunderbird 1.5 branch.\n\nThis update also resolves a number of outstanding Thunderbird security\nissues :\n\nSeveral flaws were found in the way Thunderbird processed certain\nJavaScript actions. A malicious mail message could execute arbitrary\nJavaScript instructions with the permissions of 'chrome', allowing the\npage to steal sensitive information or install browser malware.\n(CVE-2006-2776, CVE-2006-2784, CVE-2006-2785, CVE-2006-2787,\nCVE-2006-3807, CVE-2006-3809)\n\nSeveral denial of service flaws were found in the way Thunderbird\nprocessed certain mail messages. A malicious web page could crash the\nbrowser or possibly execute arbitrary code as the user running\nThunderbird. (CVE-2006-2779, CVE-2006-2780, CVE-2006-3801,\nCVE-2006-3677, CVE-2006-3113, CVE-2006-3803, CVE-2006-3805,\nCVE-2006-3806, CVE-2006-3811)\n\nSeveral flaws were found in the way Thunderbird processed certain\nJavaScript actions. A malicious mail message could conduct a\ncross-site scripting attack or steal sensitive information (such as\ncookies owned by other domains). (CVE-2006-3802, CVE-2006-3810)\n\nA form file upload flaw was found in the way Thunderbird handled\nJavaScript input object mutation. A malicious mail message could\nupload an arbitrary local file at form submission time without user\ninteraction. (CVE-2006-2782)\n\nA denial of service flaw was found in the way Thunderbird called the\ncrypto.signText() JavaScript function. A malicious mail message could\ncrash the browser if the victim had a client certificate loaded.\n(CVE-2006-2778)\n\nA flaw was found in the way Thunderbird processed Proxy AutoConfig\nscripts. A malicious Proxy AutoConfig server could execute arbitrary\nJavaScript instructions with the permissions of 'chrome', allowing the\npage to steal sensitive information or install client malware.\n(CVE-2006-3808)\n\nNote: Please note that JavaScript support is disabled by default in\nThunderbird. The above issues are not exploitable with JavaScript\ndisabled.\n\nTwo flaws were found in the way Thunderbird displayed malformed inline\nvcard attachments. If a victim viewed an email message containing a\ncarefully crafted vcard it was possible to execute arbitrary code as\nthe user running Thunderbird. (CVE-2006-2781, CVE-2006-3804)\n\nA cross site scripting flaw was found in the way Thunderbird processed\nUnicode Byte-order-Mark (BOM) markers in UTF-8 mail messages. A\nmalicious web page could execute a script within the browser that a\nweb input sanitizer could miss due to a malformed 'script' tag.\n(CVE-2006-2783)\n\nTwo HTTP response smuggling flaws were found in the way Thunderbird\nprocessed certain invalid HTTP response headers. A malicious website\ncould return specially crafted HTTP response headers which may bypass\nHTTP proxy restrictions. (CVE-2006-2786)\n\nA double free flaw was found in the way the nsIX509::getRawDER method\nwas called. If a victim visited a carefully crafted web page, it was\npossible to crash Thunderbird. (CVE-2006-2788)\n\nUsers of Thunderbird are advised to upgrade to this update, which\ncontains Thunderbird version 1.5.0.5 that corrects these issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2776\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2778\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2779\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2780\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2781\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2782\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2783\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2784\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2785\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2786\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2787\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2788\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3113\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3677\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3801\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3802\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3803\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3804\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3805\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3806\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3807\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3808\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3809\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3810\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3811\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2006:0611\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected thunderbird package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Mozilla Suite/Firefox Navigator Object Code Execution');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n script_cwe_id(20, 94, 119);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:thunderbird\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:4\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2006/06/02\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/07/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/07/29\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^4([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 4.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2006:0611\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL4\", reference:\"thunderbird-1.5.0.5-0.el4.1\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"thunderbird\");\n }\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-05-15T13:39:07", "description": "Updated SeaMonkey packages that fix several security bugs in the mozilla package are now available for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having critical security impact by the Red Hat Security Response Team.\n\nSeaMonkey is an open source Web browser, advanced email and newsgroup client, IRC chat client, and HTML editor.\n\nThe Mozilla Foundation has discontinued support for the Mozilla Suite.\nThis update deprecates the Mozilla Suite in Red Hat Enterprise Linux 4 in favor of the supported SeaMonkey Suite.\n\nThis update also resolves a number of outstanding Mozilla security issues :\n\nSeveral flaws were found in the way SeaMonkey processed certain JavaScript actions. A malicious web page could execute arbitrary JavaScript instructions with the permissions of 'chrome', allowing the page to steal sensitive information or install browser malware.\n(CVE-2006-2776, CVE-2006-2784, CVE-2006-2785, CVE-2006-2787, CVE-2006-3807, CVE-2006-3809, CVE-2006-3812)\n\nSeveral denial of service flaws were found in the way SeaMonkey processed certain web content. A malicious web page could crash the browser or possibly execute arbitrary code as the user running SeaMonkey. (CVE-2006-2779, CVE-2006-2780, CVE-2006-3801, CVE-2006-3677, CVE-2006-3113, CVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3811)\n\nTwo flaws were found in the way SeaMonkey-mail displayed malformed inline vcard attachments. If a victim viewed an email message containing a carefully crafted vcard it was possible to execute arbitrary code as the user running Mozilla-mail. (CVE-2006-2781, CVE-2006-3804)\n\nA cross-site scripting flaw was found in the way SeaMonkey processed Unicode Byte-Order-Mark (BOM) markers in UTF-8 web pages. A malicious web page could execute a script within the browser that a web input sanitizer could miss due to a malformed 'script' tag. (CVE-2006-2783)\n\nSeveral flaws were found in the way SeaMonkey processed certain JavaScript actions. A malicious web page could conduct a cross-site scripting attack or steal sensitive information (such as cookies owned by other domains). (CVE-2006-3802, CVE-2006-3810)\n\nA form file upload flaw was found in the way SeaMonkey handled JavaScript input object mutation. A malicious web page could upload an arbitrary local file at form submission time without user interaction.\n(CVE-2006-2782)\n\nA denial of service flaw was found in the way SeaMonkey called the crypto.signText() JavaScript function. A malicious web page could crash the browser if the victim had a client certificate loaded.\n(CVE-2006-2778)\n\nTwo HTTP response smuggling flaws were found in the way SeaMonkey processed certain invalid HTTP response headers. A malicious website could return specially crafted HTTP response headers which may bypass HTTP proxy restrictions. (CVE-2006-2786)\n\nA flaw was found in the way SeaMonkey processed Proxy AutoConfig scripts. A malicious Proxy AutoConfig server could execute arbitrary JavaScript instructions with the permissions of 'chrome', allowing the page to steal sensitive information or install browser malware.\n(CVE-2006-3808)\n\nA double free flaw was found in the way the nsIX509::getRawDER method was called. If a victim visited a carefully crafted web page, it was possible to execute arbitrary code as the user running Mozilla.\n(CVE-2006-2788)\n\nUsers of Mozilla are advised to upgrade to this update, which contains SeaMonkey version 1.0.3 that corrects these issues.", "cvss3": {"score": null, "vector": null}, "published": "2006-08-04T00:00:00", "type": "nessus", "title": "RHEL 4 : seamonkey (RHSA-2006:0609)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2006-2776", "CVE-2006-2778", "CVE-2006-2779", "CVE-2006-2780", "CVE-2006-2781", "CVE-2006-2782", "CVE-2006-2783", "CVE-2006-2784", "CVE-2006-2785", "CVE-2006-2786", "CVE-2006-2787", "CVE-2006-2788", "CVE-2006-3113", "CVE-2006-3677", "CVE-2006-3801", "CVE-2006-3802", "CVE-2006-3803", "CVE-2006-3804", "CVE-2006-3805", "CVE-2006-3806", "CVE-2006-3807", "CVE-2006-3808", "CVE-2006-3809", "CVE-2006-3810", "CVE-2006-3811", "CVE-2006-3812"], "modified": "2021-01-14T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:devhelp", "p-cpe:/a:redhat:enterprise_linux:devhelp-devel", "p-cpe:/a:redhat:enterprise_linux:seamonkey", "p-cpe:/a:redhat:enterprise_linux:seamonkey-chat", "p-cpe:/a:redhat:enterprise_linux:seamonkey-devel", "p-cpe:/a:redhat:enterprise_linux:seamonkey-dom-inspector", "p-cpe:/a:redhat:enterprise_linux:seamonkey-js-debugger", "p-cpe:/a:redhat:enterprise_linux:seamonkey-mail", "p-cpe:/a:redhat:enterprise_linux:seamonkey-nspr", "p-cpe:/a:redhat:enterprise_linux:seamonkey-nspr-devel", "p-cpe:/a:redhat:enterprise_linux:seamonkey-nss", "p-cpe:/a:redhat:enterprise_linux:seamonkey-nss-devel", "cpe:/o:redhat:enterprise_linux:4"], "id": "REDHAT-RHSA-2006-0609.NASL", "href": "https://www.tenable.com/plugins/nessus/22150", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2006:0609. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(22150);\n script_version(\"1.32\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2006-2776\", \"CVE-2006-2778\", \"CVE-2006-2779\", \"CVE-2006-2780\", \"CVE-2006-2781\", \"CVE-2006-2782\", \"CVE-2006-2783\", \"CVE-2006-2784\", \"CVE-2006-2785\", \"CVE-2006-2786\", \"CVE-2006-2787\", \"CVE-2006-2788\", \"CVE-2006-3113\", \"CVE-2006-3677\", \"CVE-2006-3801\", \"CVE-2006-3802\", \"CVE-2006-3803\", \"CVE-2006-3804\", \"CVE-2006-3805\", \"CVE-2006-3806\", \"CVE-2006-3807\", \"CVE-2006-3808\", \"CVE-2006-3809\", \"CVE-2006-3810\", \"CVE-2006-3811\", \"CVE-2006-3812\");\n script_xref(name:\"RHSA\", value:\"2006:0609\");\n\n script_name(english:\"RHEL 4 : seamonkey (RHSA-2006:0609)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated SeaMonkey packages that fix several security bugs in the\nmozilla package are now available for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having critical security impact by the\nRed Hat Security Response Team.\n\nSeaMonkey is an open source Web browser, advanced email and newsgroup\nclient, IRC chat client, and HTML editor.\n\nThe Mozilla Foundation has discontinued support for the Mozilla Suite.\nThis update deprecates the Mozilla Suite in Red Hat Enterprise Linux 4\nin favor of the supported SeaMonkey Suite.\n\nThis update also resolves a number of outstanding Mozilla security\nissues :\n\nSeveral flaws were found in the way SeaMonkey processed certain\nJavaScript actions. A malicious web page could execute arbitrary\nJavaScript instructions with the permissions of 'chrome', allowing the\npage to steal sensitive information or install browser malware.\n(CVE-2006-2776, CVE-2006-2784, CVE-2006-2785, CVE-2006-2787,\nCVE-2006-3807, CVE-2006-3809, CVE-2006-3812)\n\nSeveral denial of service flaws were found in the way SeaMonkey\nprocessed certain web content. A malicious web page could crash the\nbrowser or possibly execute arbitrary code as the user running\nSeaMonkey. (CVE-2006-2779, CVE-2006-2780, CVE-2006-3801,\nCVE-2006-3677, CVE-2006-3113, CVE-2006-3803, CVE-2006-3805,\nCVE-2006-3806, CVE-2006-3811)\n\nTwo flaws were found in the way SeaMonkey-mail displayed malformed\ninline vcard attachments. If a victim viewed an email message\ncontaining a carefully crafted vcard it was possible to execute\narbitrary code as the user running Mozilla-mail. (CVE-2006-2781,\nCVE-2006-3804)\n\nA cross-site scripting flaw was found in the way SeaMonkey processed\nUnicode Byte-Order-Mark (BOM) markers in UTF-8 web pages. A malicious\nweb page could execute a script within the browser that a web input\nsanitizer could miss due to a malformed 'script' tag. (CVE-2006-2783)\n\nSeveral flaws were found in the way SeaMonkey processed certain\nJavaScript actions. A malicious web page could conduct a cross-site\nscripting attack or steal sensitive information (such as cookies owned\nby other domains). (CVE-2006-3802, CVE-2006-3810)\n\nA form file upload flaw was found in the way SeaMonkey handled\nJavaScript input object mutation. A malicious web page could upload an\narbitrary local file at form submission time without user interaction.\n(CVE-2006-2782)\n\nA denial of service flaw was found in the way SeaMonkey called the\ncrypto.signText() JavaScript function. A malicious web page could\ncrash the browser if the victim had a client certificate loaded.\n(CVE-2006-2778)\n\nTwo HTTP response smuggling flaws were found in the way SeaMonkey\nprocessed certain invalid HTTP response headers. A malicious website\ncould return specially crafted HTTP response headers which may bypass\nHTTP proxy restrictions. (CVE-2006-2786)\n\nA flaw was found in the way SeaMonkey processed Proxy AutoConfig\nscripts. A malicious Proxy AutoConfig server could execute arbitrary\nJavaScript instructions with the permissions of 'chrome', allowing the\npage to steal sensitive information or install browser malware.\n(CVE-2006-3808)\n\nA double free flaw was found in the way the nsIX509::getRawDER method\nwas called. If a victim visited a carefully crafted web page, it was\npossible to execute arbitrary code as the user running Mozilla.\n(CVE-2006-2788)\n\nUsers of Mozilla are advised to upgrade to this update, which contains\nSeaMonkey version 1.0.3 that corrects these issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2776\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2778\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2779\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2780\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2781\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2782\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2783\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2784\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2785\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2786\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2787\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2788\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3113\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3677\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3801\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3802\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3803\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3804\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3805\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3806\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3807\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3808\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3809\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3810\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3811\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3812\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2006:0609\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Mozilla Suite/Firefox Navigator Object Code Execution');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n script_cwe_id(20, 94, 119);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:devhelp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:devhelp-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:seamonkey\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:seamonkey-chat\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:seamonkey-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:seamonkey-dom-inspector\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:seamonkey-js-debugger\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:seamonkey-mail\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:seamonkey-nspr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:seamonkey-nspr-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:seamonkey-nss\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:seamonkey-nss-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:4\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2006/06/02\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/08/02\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/08/04\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^4([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 4.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2006:0609\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL4\", cpu:\"i386\", reference:\"devhelp-0.10-0.2.el4\")) flag++;\n if (rpm_check(release:\"RHEL4\", cpu:\"x86_64\", reference:\"devhelp-0.10-0.2.el4\")) flag++;\n if (rpm_check(release:\"RHEL4\", cpu:\"i386\", reference:\"devhelp-devel-0.10-0.2.el4\")) flag++;\n if (rpm_check(release:\"RHEL4\", cpu:\"x86_64\", reference:\"devhelp-devel-0.10-0.2.el4\")) flag++;\n if (rpm_check(release:\"RHEL4\", reference:\"seamonkey-1.0.3-0.el4.1\")) flag++;\n if (rpm_check(release:\"RHEL4\", reference:\"seamonkey-chat-1.0.3-0.el4.1\")) flag++;\n if (rpm_check(release:\"RHEL4\", reference:\"seamonkey-devel-1.0.3-0.el4.1\")) flag++;\n if (rpm_check(release:\"RHEL4\", reference:\"seamonkey-dom-inspector-1.0.3-0.el4.1\")) flag++;\n if (rpm_check(release:\"RHEL4\", reference:\"seamonkey-js-debugger-1.0.3-0.el4.1\")) flag++;\n if (rpm_check(release:\"RHEL4\", reference:\"seamonkey-mail-1.0.3-0.el4.1\")) flag++;\n if (rpm_check(release:\"RHEL4\", reference:\"seamonkey-nspr-1.0.3-0.el4.1\")) flag++;\n if (rpm_check(release:\"RHEL4\", reference:\"seamonkey-nspr-devel-1.0.3-0.el4.1\")) flag++;\n if (rpm_check(release:\"RHEL4\", reference:\"seamonkey-nss-1.0.3-0.el4.1\")) flag++;\n if (rpm_check(release:\"RHEL4\", reference:\"seamonkey-nss-devel-1.0.3-0.el4.1\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"devhelp / devhelp-devel / seamonkey / seamonkey-chat / etc\");\n }\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-05-15T13:39:02", "description": "Updated SeaMonkey packages that fix several security bugs in the mozilla package are now available for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having critical security impact by the Red Hat Security Response Team.\n\nSeaMonkey is an open source Web browser, advanced email and newsgroup client, IRC chat client, and HTML editor.\n\nThe Mozilla Foundation has discontinued support for the Mozilla Suite.\nThis update deprecates the Mozilla Suite in Red Hat Enterprise Linux 4 in favor of the supported SeaMonkey Suite.\n\nThis update also resolves a number of outstanding Mozilla security issues :\n\nSeveral flaws were found in the way SeaMonkey processed certain JavaScript actions. A malicious web page could execute arbitrary JavaScript instructions with the permissions of 'chrome', allowing the page to steal sensitive information or install browser malware.\n(CVE-2006-2776, CVE-2006-2784, CVE-2006-2785, CVE-2006-2787, CVE-2006-3807, CVE-2006-3809, CVE-2006-3812)\n\nSeveral denial of service flaws were found in the way SeaMonkey processed certain web content. A malicious web page could crash the browser or possibly execute arbitrary code as the user running SeaMonkey. (CVE-2006-2779, CVE-2006-2780, CVE-2006-3801, CVE-2006-3677, CVE-2006-3113, CVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3811)\n\nTwo flaws were found in the way SeaMonkey-mail displayed malformed inline vcard attachments. If a victim viewed an email message containing a carefully crafted vcard it was possible to execute arbitrary code as the user running Mozilla-mail. (CVE-2006-2781, CVE-2006-3804)\n\nA cross-site scripting flaw was found in the way SeaMonkey processed Unicode Byte-Order-Mark (BOM) markers in UTF-8 web pages. A malicious web page could execute a script within the browser that a web input sanitizer could miss due to a malformed 'script' tag. (CVE-2006-2783)\n\nSeveral flaws were found in the way SeaMonkey processed certain JavaScript actions. A malicious web page could conduct a cross-site scripting attack or steal sensitive information (such as cookies owned by other domains). (CVE-2006-3802, CVE-2006-3810)\n\nA form file upload flaw was found in the way SeaMonkey handled JavaScript input object mutation. A malicious web page could upload an arbitrary local file at form submission time without user interaction.\n(CVE-2006-2782)\n\nA denial of service flaw was found in the way SeaMonkey called the crypto.signText() JavaScript function. A malicious web page could crash the browser if the victim had a client certificate loaded.\n(CVE-2006-2778)\n\nTwo HTTP response smuggling flaws were found in the way SeaMonkey processed certain invalid HTTP response headers. A malicious website could return specially crafted HTTP response headers which may bypass HTTP proxy restrictions. (CVE-2006-2786)\n\nA flaw was found in the way SeaMonkey processed Proxy AutoConfig scripts. A malicious Proxy AutoConfig server could execute arbitrary JavaScript instructions with the permissions of 'chrome', allowing the page to steal sensitive information or install browser malware.\n(CVE-2006-3808)\n\nA double free flaw was found in the way the nsIX509::getRawDER method was called. If a victim visited a carefully crafted web page, it was possible to execute arbitrary code as the user running Mozilla.\n(CVE-2006-2788)\n\nUsers of Mozilla are advised to upgrade to this update, which contains SeaMonkey version 1.0.3 that corrects these issues.", "cvss3": {"score": null, "vector": null}, "published": "2006-08-07T00:00:00", "type": "nessus", "title": "CentOS 4 : seamonkey (CESA-2006:0609)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2006-2776", "CVE-2006-2778", "CVE-2006-2779", "CVE-2006-2780", "CVE-2006-2781", "CVE-2006-2782", "CVE-2006-2783", "CVE-2006-2784", "CVE-2006-2785", "CVE-2006-2786", "CVE-2006-2787", "CVE-2006-2788", "CVE-2006-3113", "CVE-2006-3677", "CVE-2006-3801", "CVE-2006-3802", "CVE-2006-3803", "CVE-2006-3804", "CVE-2006-3805", "CVE-2006-3806", "CVE-2006-3807", "CVE-2006-3808", "CVE-2006-3809", "CVE-2006-3810", "CVE-2006-3811", "CVE-2006-3812"], "modified": "2021-01-04T00:00:00", "cpe": ["p-cpe:/a:centos:centos:devhelp", "p-cpe:/a:centos:centos:devhelp-devel", "p-cpe:/a:centos:centos:seamonkey", "p-cpe:/a:centos:centos:seamonkey-chat", "p-cpe:/a:centos:centos:seamonkey-devel", "p-cpe:/a:centos:centos:seamonkey-dom-inspector", "p-cpe:/a:centos:centos:seamonkey-js-debugger", "p-cpe:/a:centos:centos:seamonkey-mail", "p-cpe:/a:centos:centos:seamonkey-nspr", "p-cpe:/a:centos:centos:seamonkey-nspr-devel", "p-cpe:/a:centos:centos:seamonkey-nss", "p-cpe:/a:centos:centos:seamonkey-nss-devel", "cpe:/o:centos:centos:4"], "id": "CENTOS_RHSA-2006-0609.NASL", "href": "https://www.tenable.com/plugins/nessus/22163", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2006:0609 and \n# CentOS Errata and Security Advisory 2006:0609 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(22163);\n script_version(\"1.24\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2006-2776\", \"CVE-2006-2778\", \"CVE-2006-2779\", \"CVE-2006-2780\", \"CVE-2006-2781\", \"CVE-2006-2782\", \"CVE-2006-2783\", \"CVE-2006-2784\", \"CVE-2006-2785\", \"CVE-2006-2786\", \"CVE-2006-2787\", \"CVE-2006-2788\", \"CVE-2006-3113\", \"CVE-2006-3677\", \"CVE-2006-3801\", \"CVE-2006-3802\", \"CVE-2006-3803\", \"CVE-2006-3804\", \"CVE-2006-3805\", \"CVE-2006-3806\", \"CVE-2006-3807\", \"CVE-2006-3808\", \"CVE-2006-3809\", \"CVE-2006-3810\", \"CVE-2006-3811\", \"CVE-2006-3812\");\n script_xref(name:\"RHSA\", value:\"2006:0609\");\n\n script_name(english:\"CentOS 4 : seamonkey (CESA-2006:0609)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated SeaMonkey packages that fix several security bugs in the\nmozilla package are now available for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having critical security impact by the\nRed Hat Security Response Team.\n\nSeaMonkey is an open source Web browser, advanced email and newsgroup\nclient, IRC chat client, and HTML editor.\n\nThe Mozilla Foundation has discontinued support for the Mozilla Suite.\nThis update deprecates the Mozilla Suite in Red Hat Enterprise Linux 4\nin favor of the supported SeaMonkey Suite.\n\nThis update also resolves a number of outstanding Mozilla security\nissues :\n\nSeveral flaws were found in the way SeaMonkey processed certain\nJavaScript actions. A malicious web page could execute arbitrary\nJavaScript instructions with the permissions of 'chrome', allowing the\npage to steal sensitive information or install browser malware.\n(CVE-2006-2776, CVE-2006-2784, CVE-2006-2785, CVE-2006-2787,\nCVE-2006-3807, CVE-2006-3809, CVE-2006-3812)\n\nSeveral denial of service flaws were found in the way SeaMonkey\nprocessed certain web content. A malicious web page could crash the\nbrowser or possibly execute arbitrary code as the user running\nSeaMonkey. (CVE-2006-2779, CVE-2006-2780, CVE-2006-3801,\nCVE-2006-3677, CVE-2006-3113, CVE-2006-3803, CVE-2006-3805,\nCVE-2006-3806, CVE-2006-3811)\n\nTwo flaws were found in the way SeaMonkey-mail displayed malformed\ninline vcard attachments. If a victim viewed an email message\ncontaining a carefully crafted vcard it was possible to execute\narbitrary code as the user running Mozilla-mail. (CVE-2006-2781,\nCVE-2006-3804)\n\nA cross-site scripting flaw was found in the way SeaMonkey processed\nUnicode Byte-Order-Mark (BOM) markers in UTF-8 web pages. A malicious\nweb page could execute a script within the browser that a web input\nsanitizer could miss due to a malformed 'script' tag. (CVE-2006-2783)\n\nSeveral flaws were found in the way SeaMonkey processed certain\nJavaScript actions. A malicious web page could conduct a cross-site\nscripting attack or steal sensitive information (such as cookies owned\nby other domains). (CVE-2006-3802, CVE-2006-3810)\n\nA form file upload flaw was found in the way SeaMonkey handled\nJavaScript input object mutation. A malicious web page could upload an\narbitrary local file at form submission time without user interaction.\n(CVE-2006-2782)\n\nA denial of service flaw was found in the way SeaMonkey called the\ncrypto.signText() JavaScript function. A malicious web page could\ncrash the browser if the victim had a client certificate loaded.\n(CVE-2006-2778)\n\nTwo HTTP response smuggling flaws were found in the way SeaMonkey\nprocessed certain invalid HTTP response headers. A malicious website\ncould return specially crafted HTTP response headers which may bypass\nHTTP proxy restrictions. (CVE-2006-2786)\n\nA flaw was found in the way SeaMonkey processed Proxy AutoConfig\nscripts. A malicious Proxy AutoConfig server could execute arbitrary\nJavaScript instructions with the permissions of 'chrome', allowing the\npage to steal sensitive information or install browser malware.\n(CVE-2006-3808)\n\nA double free flaw was found in the way the nsIX509::getRawDER method\nwas called. If a victim visited a carefully crafted web page, it was\npossible to execute arbitrary code as the user running Mozilla.\n(CVE-2006-2788)\n\nUsers of Mozilla are advised to upgrade to this update, which contains\nSeaMonkey version 1.0.3 that corrects these issues.\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2006-August/013116.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?328dac8f\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2006-August/013117.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?5187bc75\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2006-August/013126.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?c986fe5f\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected seamonkey packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Mozilla Suite/Firefox Navigator Object Code Execution');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n script_cwe_id(20, 94, 119);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:devhelp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:devhelp-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:seamonkey\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:seamonkey-chat\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:seamonkey-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:seamonkey-dom-inspector\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:seamonkey-js-debugger\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:seamonkey-mail\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:seamonkey-nspr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:seamonkey-nspr-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:seamonkey-nss\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:seamonkey-nss-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:4\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2006/06/02\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/08/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/08/07\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^4([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 4.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-4\", cpu:\"i386\", reference:\"devhelp-0.10-0.2.el4\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"x86_64\", reference:\"devhelp-0.10-0.2.el4\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"i386\", reference:\"devhelp-devel-0.10-0.2.el4\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"x86_64\", reference:\"devhelp-devel-0.10-0.2.el4\")) flag++;\nif (rpm_check(release:\"CentOS-4\", reference:\"seamonkey-1.0.3-0.el4.1.centos4\")) flag++;\nif (rpm_check(release:\"CentOS-4\", reference:\"seamonkey-chat-1.0.3-0.el4.1.centos4\")) flag++;\nif (rpm_check(release:\"CentOS-4\", reference:\"seamonkey-devel-1.0.3-0.el4.1.centos4\")) flag++;\nif (rpm_check(release:\"CentOS-4\", reference:\"seamonkey-dom-inspector-1.0.3-0.el4.1.centos4\")) flag++;\nif (rpm_check(release:\"CentOS-4\", reference:\"seamonkey-js-debugger-1.0.3-0.el4.1.centos4\")) flag++;\nif (rpm_check(release:\"CentOS-4\", reference:\"seamonkey-mail-1.0.3-0.el4.1.centos4\")) flag++;\nif (rpm_check(release:\"CentOS-4\", reference:\"seamonkey-nspr-1.0.3-0.el4.1.centos4\")) flag++;\nif (rpm_check(release:\"CentOS-4\", reference:\"seamonkey-nspr-devel-1.0.3-0.el4.1.centos4\")) flag++;\nif (rpm_check(release:\"CentOS-4\", reference:\"seamonkey-nss-1.0.3-0.el4.1.centos4\")) flag++;\nif (rpm_check(release:\"CentOS-4\", reference:\"seamonkey-nss-devel-1.0.3-0.el4.1.centos4\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"devhelp / devhelp-devel / seamonkey / seamonkey-chat / etc\");\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-05-15T13:39:07", "description": "Updated SeaMonkey packages that fix several security bugs in the mozilla packages are now available for Red Hat Enterprise Linux 2.1.\n\nThis update has been rated as having critical security impact by the Red Hat Security Response Team.\n\nSeaMonkey is an open source Web browser, advanced email and newsgroup client, IRC chat client, and HTML editor.\n\nThe Mozilla Foundation has discontinued support for the Mozilla Suite.\nThis update deprecates the Mozilla Suite in Red Hat Enterprise Linux 2.1 in favor of the supported SeaMonkey Suite.\n\nThis update also resolves a number of outstanding Mozilla security issues :\n\nSeveral flaws were found in the way SeaMonkey processed certain JavaScript actions. A malicious web page could execute arbitrary JavaScript instructions with the permissions of 'chrome', allowing the page to steal sensitive information or install browser malware.\n(CVE-2006-2776, CVE-2006-2784, CVE-2006-2785, CVE-2006-2787, CVE-2006-3807, CVE-2006-3809, CVE-2006-3812)\n\nSeveral denial of service flaws were found in the way SeaMonkey processed certain web content. A malicious web page could crash the browser or possibly execute arbitrary code as the user running SeaMonkey. (CVE-2006-2779, CVE-2006-2780, CVE-2006-3801, CVE-2006-3677, CVE-2006-3113, CVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3811)\n\nTwo flaws were found in the way SeaMonkey Messenger displayed malformed inline vcard attachments. If a victim viewed an email message containing a carefully crafted vcard it was possible to execute arbitrary code as the user running SeaMonkey Messenger.\n(CVE-2006-2781, CVE-2006-3804)\n\nA cross-site scripting flaw was found in the way SeaMonkey processed Unicode Byte-Order-Mark (BOM) markers in UTF-8 web pages. A malicious web page could execute a script within the browser that a web input sanitizer could miss due to a malformed 'script' tag. (CVE-2006-2783)\n\nSeveral flaws were found in the way SeaMonkey processed certain JavaScript actions. A malicious web page could conduct a cross-site scripting attack or steal sensitive information (such as cookies owned by other domains). (CVE-2006-3802, CVE-2006-3810)\n\nA form file upload flaw was found in the way SeaMonkey handled JavaScript input object mutation. A malicious web page could upload an arbitrary local file at form submission time without user interaction.\n(CVE-2006-2782)\n\nA denial of service flaw was found in the way SeaMonkey called the crypto.signText() JavaScript function. A malicious web page could crash the browser if the victim had a client certificate loaded.\n(CVE-2006-2778)\n\nTwo HTTP response smuggling flaws were found in the way SeaMonkey processed certain invalid HTTP response headers. A malicious website could return specially crafted HTTP response headers which may bypass HTTP proxy restrictions. (CVE-2006-2786)\n\nA flaw was found in the way SeaMonkey processed Proxy AutoConfig scripts. A malicious Proxy AutoConfig server could execute arbitrary JavaScript instructions with the permissions of 'chrome', allowing the page to steal sensitive information or install browser malware.\n(CVE-2006-3808)\n\nA double free flaw was found in the way the nsIX509::getRawDER method was called. If a victim visited a carefully crafted web page it was possible to execute arbitrary code as the user running SeaMonkey.\n(CVE-2006-2788)\n\nUsers of Mozilla are advised to upgrade to this update, which contains SeaMonkey version 1.0.3 that corrects these issues.", "cvss3": {"score": null, "vector": null}, "published": "2006-08-30T00:00:00", "type": "nessus", "title": "RHEL 2.1 : seamonkey (RHSA-2006:0594)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2006-2776", "CVE-2006-2778", "CVE-2006-2779", "CVE-2006-2780", "CVE-2006-2781", "CVE-2006-2782", "CVE-2006-2783", "CVE-2006-2784", "CVE-2006-2785", "CVE-2006-2786", "CVE-2006-2787", "CVE-2006-2788", "CVE-2006-3113", "CVE-2006-3677", "CVE-2006-3801", "CVE-2006-3802", "CVE-2006-3803", "CVE-2006-3804", "CVE-2006-3805", "CVE-2006-3806", "CVE-2006-3807", "CVE-2006-3808", "CVE-2006-3809", "CVE-2006-3810", "CVE-2006-3811", "CVE-2006-3812"], "modified": "2021-01-14T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:seamonkey", "p-cpe:/a:redhat:enterprise_linux:seamonkey-chat", "p-cpe:/a:redhat:enterprise_linux:seamonkey-devel", "p-cpe:/a:redhat:enterprise_linux:seamonkey-dom-inspector", "p-cpe:/a:redhat:enterprise_linux:seamonkey-js-debugger", "p-cpe:/a:redhat:enterprise_linux:seamonkey-mail", "p-cpe:/a:redhat:enterprise_linux:seamonkey-nspr", "p-cpe:/a:redhat:enterprise_linux:seamonkey-nspr-devel", "p-cpe:/a:redhat:enterprise_linux:seamonkey-nss", "p-cpe:/a:redhat:enterprise_linux:seamonkey-nss-devel", "cpe:/o:redhat:enterprise_linux:2.1"], "id": "REDHAT-RHSA-2006-0594.NASL", "href": "https://www.tenable.com/plugins/nessus/22291", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2006:0594. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(22291);\n script_version(\"1.31\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2006-2776\", \"CVE-2006-2778\", \"CVE-2006-2779\", \"CVE-2006-2780\", \"CVE-2006-2781\", \"CVE-2006-2782\", \"CVE-2006-2783\", \"CVE-2006-2784\", \"CVE-2006-2785\", \"CVE-2006-2786\", \"CVE-2006-2787\", \"CVE-2006-2788\", \"CVE-2006-3113\", \"CVE-2006-3677\", \"CVE-2006-3801\", \"CVE-2006-3802\", \"CVE-2006-3803\", \"CVE-2006-3804\", \"CVE-2006-3805\", \"CVE-2006-3806\", \"CVE-2006-3807\", \"CVE-2006-3808\", \"CVE-2006-3809\", \"CVE-2006-3810\", \"CVE-2006-3811\", \"CVE-2006-3812\");\n script_xref(name:\"RHSA\", value:\"2006:0594\");\n\n script_name(english:\"RHEL 2.1 : seamonkey (RHSA-2006:0594)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated SeaMonkey packages that fix several security bugs in the\nmozilla packages are now available for Red Hat Enterprise Linux 2.1.\n\nThis update has been rated as having critical security impact by the\nRed Hat Security Response Team.\n\nSeaMonkey is an open source Web browser, advanced email and newsgroup\nclient, IRC chat client, and HTML editor.\n\nThe Mozilla Foundation has discontinued support for the Mozilla Suite.\nThis update deprecates the Mozilla Suite in Red Hat Enterprise Linux\n2.1 in favor of the supported SeaMonkey Suite.\n\nThis update also resolves a number of outstanding Mozilla security\nissues :\n\nSeveral flaws were found in the way SeaMonkey processed certain\nJavaScript actions. A malicious web page could execute arbitrary\nJavaScript instructions with the permissions of 'chrome', allowing the\npage to steal sensitive information or install browser malware.\n(CVE-2006-2776, CVE-2006-2784, CVE-2006-2785, CVE-2006-2787,\nCVE-2006-3807, CVE-2006-3809, CVE-2006-3812)\n\nSeveral denial of service flaws were found in the way SeaMonkey\nprocessed certain web content. A malicious web page could crash the\nbrowser or possibly execute arbitrary code as the user running\nSeaMonkey. (CVE-2006-2779, CVE-2006-2780, CVE-2006-3801,\nCVE-2006-3677, CVE-2006-3113, CVE-2006-3803, CVE-2006-3805,\nCVE-2006-3806, CVE-2006-3811)\n\nTwo flaws were found in the way SeaMonkey Messenger displayed\nmalformed inline vcard attachments. If a victim viewed an email\nmessage containing a carefully crafted vcard it was possible to\nexecute arbitrary code as the user running SeaMonkey Messenger.\n(CVE-2006-2781, CVE-2006-3804)\n\nA cross-site scripting flaw was found in the way SeaMonkey processed\nUnicode Byte-Order-Mark (BOM) markers in UTF-8 web pages. A malicious\nweb page could execute a script within the browser that a web input\nsanitizer could miss due to a malformed 'script' tag. (CVE-2006-2783)\n\nSeveral flaws were found in the way SeaMonkey processed certain\nJavaScript actions. A malicious web page could conduct a cross-site\nscripting attack or steal sensitive information (such as cookies owned\nby other domains). (CVE-2006-3802, CVE-2006-3810)\n\nA form file upload flaw was found in the way SeaMonkey handled\nJavaScript input object mutation. A malicious web page could upload an\narbitrary local file at form submission time without user interaction.\n(CVE-2006-2782)\n\nA denial of service flaw was found in the way SeaMonkey called the\ncrypto.signText() JavaScript function. A malicious web page could\ncrash the browser if the victim had a client certificate loaded.\n(CVE-2006-2778)\n\nTwo HTTP response smuggling flaws were found in the way SeaMonkey\nprocessed certain invalid HTTP response headers. A malicious website\ncould return specially crafted HTTP response headers which may bypass\nHTTP proxy restrictions. (CVE-2006-2786)\n\nA flaw was found in the way SeaMonkey processed Proxy AutoConfig\nscripts. A malicious Proxy AutoConfig server could execute arbitrary\nJavaScript instructions with the permissions of 'chrome', allowing the\npage to steal sensitive information or install browser malware.\n(CVE-2006-3808)\n\nA double free flaw was found in the way the nsIX509::getRawDER method\nwas called. If a victim visited a carefully crafted web page it was\npossible to execute arbitrary code as the user running SeaMonkey.\n(CVE-2006-2788)\n\nUsers of Mozilla are advised to upgrade to this update, which contains\nSeaMonkey version 1.0.3 that corrects these issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2776\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2778\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2779\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2780\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2781\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2782\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2783\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2784\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2785\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2786\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2787\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2788\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3113\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3677\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3801\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3802\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3803\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3804\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3805\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3806\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3807\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3808\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3809\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3810\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3811\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3812\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2006:0594\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Mozilla Suite/Firefox Navigator Object Code Execution');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n script_cwe_id(20, 94, 119);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:seamonkey\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:seamonkey-chat\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:seamonkey-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:seamonkey-dom-inspector\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:seamonkey-js-debugger\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:seamonkey-mail\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:seamonkey-nspr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:seamonkey-nspr-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:seamonkey-nss\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:seamonkey-nss-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:2.1\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2006/06/02\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/08/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/08/30\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^2\\.1([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 2.1\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\nif (cpu !~ \"^i[3-6]86$\") audit(AUDIT_ARCH_NOT, \"i386\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2006:0594\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL2.1\", cpu:\"i386\", reference:\"seamonkey-1.0.3-0.0.1.5.EL2\")) flag++;\n if (rpm_check(release:\"RHEL2.1\", cpu:\"i386\", reference:\"seamonkey-chat-1.0.3-0.0.1.5.EL2\")) flag++;\n if (rpm_check(release:\"RHEL2.1\", cpu:\"i386\", reference:\"seamonkey-devel-1.0.3-0.0.1.5.EL2\")) flag++;\n if (rpm_check(release:\"RHEL2.1\", cpu:\"i386\", reference:\"seamonkey-dom-inspector-1.0.3-0.0.1.5.EL2\")) flag++;\n if (rpm_check(release:\"RHEL2.1\", cpu:\"i386\", reference:\"seamonkey-js-debugger-1.0.3-0.0.1.5.EL2\")) flag++;\n if (rpm_check(release:\"RHEL2.1\", cpu:\"i386\", reference:\"seamonkey-mail-1.0.3-0.0.1.5.EL2\")) flag++;\n if (rpm_check(release:\"RHEL2.1\", cpu:\"i386\", reference:\"seamonkey-nspr-1.0.3-0.0.1.5.EL2\")) flag++;\n if (rpm_check(release:\"RHEL2.1\", cpu:\"i386\", reference:\"seamonkey-nspr-devel-1.0.3-0.0.1.5.EL2\")) flag++;\n if (rpm_check(release:\"RHEL2.1\", cpu:\"i386\", reference:\"seamonkey-nss-1.0.3-0.0.1.5.EL2\")) flag++;\n if (rpm_check(release:\"RHEL2.1\", cpu:\"i386\", reference:\"seamonkey-nss-devel-1.0.3-0.0.1.5.EL2\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"seamonkey / seamonkey-chat / seamonkey-devel / etc\");\n }\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-08-19T13:15:24", "description": "Versions of Mozilla Firefox 1.5.x prior to 1.5.0.5 are affected by various security issues, some of which may lead to execution of arbitrary code on the affected host subject to the user's privileges.", "cvss3": {"score": 5, "vector": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"}, "published": "2006-07-28T00:00:00", "type": "nessus", "title": "Mozilla Firefox 1.5.x < 1.5.0.5 Multiple Vulnerabilities", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2006-2779", "CVE-2006-1942", "CVE-2006-2775", "CVE-2006-2776", "CVE-2006-2777", "CVE-2006-2778", "CVE-2006-2782", "CVE-2006-2783", "CVE-2006-2784", "CVE-2006-2785", "CVE-2006-2786", "CVE-2006-2787", "CVE-2006-2780", "CVE-2006-2781", "CVE-2006-3113", "CVE-2006-3677", "CVE-2006-3801", "CVE-2006-3802", "CVE-2006-3803", "CVE-2006-3804", "CVE-2006-3805", "CVE-2006-3806", "CVE-2006-3807", "CVE-2006-3808", "CVE-2006-3809", "CVE-2006-3810", "CVE-2006-3811", "CVE-2006-3812"], "modified": "2019-03-06T00:00:00", "cpe": ["cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"], "id": "3695.PRM", "href": "https://www.tenable.com/plugins/nnm/3695", "sourceData": "Binary data 3695.prm", "cvss": {"score": 5.4, "vector": "CVSS2#AV:A/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T13:15:23", "description": "The remote Windows host contains a mail client that is affected by multiple vulnerabilities. The remote version of Mozilla Thunderbird suffers from various security issues, at least one of which may lead to execution of arbitrary code on the affected host subject to the user's privileges.", "cvss3": {"score": 5, "vector": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"}, "published": "2006-07-28T00:00:00", "type": "nessus", "title": "Mozilla Thunderbird < 1.5.0.5 Multiple Vulnerabilities (deprecated)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2006-2779", "CVE-2006-1942", "CVE-2006-2775", "CVE-2006-2776", "CVE-2006-2777", "CVE-2006-2778", "CVE-2006-2782", "CVE-2006-2783", "CVE-2006-2784", "CVE-2006-2785", "CVE-2006-2786", "CVE-2006-2787", "CVE-2006-2780", "CVE-2006-2781", "CVE-2006-3113", "CVE-2006-3677", "CVE-2006-3801", "CVE-2006-3802", "CVE-2006-3803", "CVE-2006-3804", "CVE-2006-3805", "CVE-2006-3806", "CVE-2006-3807", "CVE-2006-3808", "CVE-2006-3809", "CVE-2006-3810", "CVE-2006-3811", "CVE-2006-3812"], "modified": "2019-03-06T00:00:00", "cpe": ["cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"], "id": "3694.PRM", "href": "https://www.tenable.com/plugins/nnm/3694", "sourceData": "Binary data 3694.prm", "cvss": {"score": 5.4, "vector": "CVSS2#AV:A/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-05-15T13:43:50", "description": "A number of security vulnerabilities have been discovered and corrected in the latest Mozilla Firefox program.\n\nPrevious updates to Firefox were patch fixes to Firefox 1.0.6 that brought it in sync with 1.0.8 in terms of security fixes. In this update, Mozilla Firefox 1.5.0.6 is being provided which corrects a number of vulnerabilities that were previously unpatched, as well as providing new and enhanced features.\n\nThe following CVE names have been corrected with this update:\nCVE-2006-2613, CVE-2006-2894, CVE-2006-2775, CVE-2006-2776, CVE-2006-2777, CVE-2006-2778, CVE-2006-2779, CVE-2006-2780, CVE-2006-2782, CVE-2006-2783, CVE-2006-2784, CVE-2006-2785, CVE-2006-2786, CVE-2006-2787, CVE-2006-2788, CVE-2006-3677, CVE-2006-3803, CVE-2006-3804, CVE-2006-3806, CVE-2006-3807, CVE-2006-3113, CVE-2006-3801, CVE-2006-3802, CVE-2006-3805, CVE-2006-3808, CVE-2006-3809, CVE-2006-3810, CVE-2006-3811, CVE-2006-3812.\n\nUpdate :\n\nThe previous language packages were not correctly tagged for the new Firefox which resulted in many of them not loading properly. These updated language packages correct the problem.", "cvss3": {"score": null, "vector": null}, "published": "2006-12-16T00:00:00", "type": "nessus", "title": "Mandrake Linux Security Advisory : mozilla-firefox (MDKSA-2006:143-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2006-2613", "CVE-2006-2775", "CVE-2006-2776", "CVE-2006-2777", "CVE-2006-2778", "CVE-2006-2779", "CVE-2006-2780", "CVE-2006-2782", "CVE-2006-2783", "CVE-2006-2784", "CVE-2006-2785", "CVE-2006-2786", "CVE-2006-2787", "CVE-2006-2788", "CVE-2006-2894", "CVE-2006-2900", "CVE-2006-3113", "CVE-2006-3677", "CVE-2006-3801", "CVE-2006-3802", "CVE-2006-3803", "CVE-2006-3804", "CVE-2006-3805", "CVE-2006-3806", "CVE-2006-3807", "CVE-2006-3808", "CVE-2006-3809", "CVE-2006-3810", "CVE-2006-3811", "CVE-2006-3812", "CVE-2007-1794"], "modified": "2021-01-06T00:00:00", "cpe": ["p-cpe:/a:mandriva:linux:mozilla-firefox-br", "p-cpe:/a:mandriva:linux:mozilla-firefox-ca", "p-cpe:/a:mandriva:linux:mozilla-firefox-cs", "p-cpe:/a:mandriva:linux:mozilla-firefox-da", "p-cpe:/a:mandriva:linux:mozilla-firefox-de", "p-cpe:/a:mandriva:linux:mozilla-firefox-el", "p-cpe:/a:mandriva:linux:mozilla-firefox-es", "p-cpe:/a:mandriva:linux:mozilla-firefox-fi", "p-cpe:/a:mandriva:linux:mozilla-firefox-fr", "p-cpe:/a:mandriva:linux:mozilla-firefox-ga", "p-cpe:/a:mandriva:linux:mozilla-firefox-he", "p-cpe:/a:mandriva:linux:mozilla-firefox-hu", "p-cpe:/a:mandriva:linux:mozilla-firefox-it", "p-cpe:/a:mandriva:linux:mozilla-firefox-ja", "p-cpe:/a:mandriva:linux:mozilla-firefox-ko", "p-cpe:/a:mandriva:linux:mozilla-firefox-nb", "p-cpe:/a:mandriva:linux:mozilla-firefox-nl", "p-cpe:/a:mandriva:linux:mozilla-firefox-pl", "p-cpe:/a:mandriva:linux:mozilla-firefox-pt_BR", "p-cpe:/a:mandriva:linux:mozilla-firefox-ro", "p-cpe:/a:mandriva:linux:mozilla-firefox-ru", "p-cpe:/a:mandriva:linux:mozilla-firefox-sk", "p-cpe:/a:mandriva:linux:mozilla-firefox-sl", "p-cpe:/a:mandriva:linux:mozilla-firefox-sv", "p-cpe:/a:mandriva:linux:mozilla-firefox-tr", "p-cpe:/a:mandriva:linux:mozilla-firefox-zh_CN", "p-cpe:/a:mandriva:linux:mozilla-firefox-zh_TW", "cpe:/o:mandriva:linux:2006"], "id": "MANDRAKE_MDKSA-2006-143.NASL", "href": "https://www.tenable.com/plugins/nessus/23892", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Mandrake Linux Security Advisory MDKSA-2006:143. \n# The text itself is copyright (C) Mandriva S.A.\n#\n\nif (NASL_LEVEL < 3000) exit(0);\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(23892);\n script_version(\"1.24\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2006-2613\", \"CVE-2006-2775\", \"CVE-2006-2776\", \"CVE-2006-2777\", \"CVE-2006-2778\", \"CVE-2006-2779\", \"CVE-2006-2780\", \"CVE-2006-2782\", \"CVE-2006-2783\", \"CVE-2006-2784\", \"CVE-2006-2785\", \"CVE-2006-2786\", \"CVE-2006-2787\", \"CVE-2006-2788\", \"CVE-2006-2894\", \"CVE-2006-2900\", \"CVE-2006-3113\", \"CVE-2006-3677\", \"CVE-2006-3801\", \"CVE-2006-3802\", \"CVE-2006-3803\", \"CVE-2006-3804\", \"CVE-2006-3805\", \"CVE-2006-3806\", \"CVE-2006-3807\", \"CVE-2006-3808\", \"CVE-2006-3809\", \"CVE-2006-3810\", \"CVE-2006-3811\", \"CVE-2006-3812\", \"CVE-2007-1794\");\n script_bugtraq_id(18308);\n script_xref(name:\"MDKSA\", value:\"2006:143-1\");\n\n script_name(english:\"Mandrake Linux Security Advisory : mozilla-firefox (MDKSA-2006:143-1)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Mandrake Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"A number of security vulnerabilities have been discovered and\ncorrected in the latest Mozilla Firefox program.\n\nPrevious updates to Firefox were patch fixes to Firefox 1.0.6 that\nbrought it in sync with 1.0.8 in terms of security fixes. In this\nupdate, Mozilla Firefox 1.5.0.6 is being provided which corrects a\nnumber of vulnerabilities that were previously unpatched, as well as\nproviding new and enhanced features.\n\nThe following CVE names have been corrected with this update:\nCVE-2006-2613, CVE-2006-2894, CVE-2006-2775, CVE-2006-2776,\nCVE-2006-2777, CVE-2006-2778, CVE-2006-2779, CVE-2006-2780,\nCVE-2006-2782, CVE-2006-2783, CVE-2006-2784, CVE-2006-2785,\nCVE-2006-2786, CVE-2006-2787, CVE-2006-2788, CVE-2006-3677,\nCVE-2006-3803, CVE-2006-3804, CVE-2006-3806, CVE-2006-3807,\nCVE-2006-3113, CVE-2006-3801, CVE-2006-3802, CVE-2006-3805,\nCVE-2006-3808, CVE-2006-3809, CVE-2006-3810, CVE-2006-3811,\nCVE-2006-3812.\n\nUpdate :\n\nThe previous language packages were not correctly tagged for the new\nFirefox which resulted in many of them not loading properly. These\nupdated language packages correct the problem.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-31/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-32/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-33/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-34/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-35/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-36/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-37/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-38/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-39/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-41/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-42/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-43/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.mozilla.org/security/announce/2006/mfsa2006-44.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.mozilla.org/security/announce/2006/mfsa2006-45.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.mozilla.org/security/announce/2006/mfsa2006-46.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.mozilla.org/security/announce/2006/mfsa2006-47.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.mozilla.org/security/announce/2006/mfsa2006-48.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.mozilla.org/security/announce/2006/mfsa2006-50.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.mozilla.org/security/announce/2006/mfsa2006-51.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.mozilla.org/security/announce/2006/mfsa2006-52.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.mozilla.org/security/announce/2006/mfsa2006-53.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.mozilla.org/security/announce/2006/mfsa2006-54.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.mozilla.org/security/announce/2006/mfsa2006-55.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.mozilla.org/security/announce/2006/mfsa2006-56.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Mozilla Suite/Firefox Navigator Object Code Execution');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n script_cwe_id(20, 94, 119, 200);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-firefox-br\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-firefox-ca\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-firefox-cs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-firefox-da\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-firefox-de\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-firefox-el\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-firefox-es\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-firefox-fi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-firefox-fr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-firefox-ga\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-firefox-he\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-firefox-hu\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-firefox-it\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-firefox-ja\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-firefox-ko\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-firefox-nb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-firefox-nl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-firefox-pl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-firefox-pt_BR\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-firefox-ro\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-firefox-ru\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-firefox-sk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-firefox-sl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-firefox-sv\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-firefox-tr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-firefox-zh_CN\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-firefox-zh_TW\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:linux:2006\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/08/17\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/12/16\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Mandriva Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/Mandrake/release\", \"Host/Mandrake/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Mandrake/release\")) audit(AUDIT_OS_NOT, \"Mandriva / Mandake Linux\");\nif (!get_kb_item(\"Host/Mandrake/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^(amd64|i[3-6]86|x86_64)$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Mandriva / Mandrake Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-firefox-br-1.5.0.6-0.2.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-firefox-ca-1.5.0.6-0.2.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-firefox-cs-1.5.0.6-0.2.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-firefox-da-1.5.0.6-0.2.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-firefox-de-1.5.0.6-0.2.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-firefox-el-1.5.0.6-0.2.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-firefox-es-1.5.0.6-0.2.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-firefox-fi-1.5.0.6-0.2.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-firefox-fr-1.5.0.6-0.2.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-firefox-ga-1.5.0.6-0.2.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-firefox-he-1.5.0.6-0.2.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-firefox-hu-1.5.0.6-0.2.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-firefox-it-1.5.0.6-0.2.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-firefox-ja-1.5.0.6-0.2.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-firefox-ko-1.5.0.6-0.2.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-firefox-nb-1.5.0.6-0.2.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-firefox-nl-1.5.0.6-0.2.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-firefox-pl-1.5.0.6-0.2.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-firefox-pt_BR-1.5.0.6-0.2.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-firefox-ro-1.5.0.6-0.2.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-firefox-ru-1.5.0.6-0.2.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-firefox-sk-1.5.0.6-0.2.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-firefox-sl-1.5.0.6-0.2.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-firefox-sv-1.5.0.6-0.2.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-firefox-tr-1.5.0.6-0.2.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-firefox-zh_CN-1.5.0.6-0.2.20060mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"mozilla-firefox-zh_TW-1.5.0.6-0.2.20060mdk\", yank:\"mdk\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 10, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-05-16T15:03:46", "description": "Updated thunderbird packages that fix several security bugs are now available for Red Hat Enterprise Linux 4. \n\nThis update has been rated as having critical security impact by the Red Hat Security Response Team. \n\nMozilla Thunderbird is a standalone mail and newsgroup client. \n\nUsers of Thunderbird are advised to upgrade to this update, which contains Thunderbird version 1.5.0.8 that corrects these issues. \n\n\nFrom Red Hat Security Advisory 2006:0735 :\n\nSeveral flaws were found in the way Thunderbird processes certain malformed Javascript code. A malicious HTML mail message could cause the execution of Javascript code in such a way that could cause Thunderbird to crash or execute arbitrary code as the user running Thunderbird. (CVE-2006-5463, CVE-2006-5747, CVE-2006-5748)\n\nSeveral flaws were found in the way Thunderbird renders HTML mail messages. A malicious HTML mail message could cause the mail client to crash or possibly execute arbitrary code as the user running Thunderbird. (CVE-2006-5464)\n\nA flaw was found in the way Thunderbird verifies RSA signatures. For RSA keys with exponent 3 it is possible for an attacker to forge a signature that would be incorrectly verified by the NSS library. Thunderbird as shipped trusts several root Certificate Authorities that use exponent 3. An attacker could have created a carefully crafted SSL certificate which would be incorrectly trusted when their site was visited by a victim. This flaw was previously thought to be fixed in Thunderbird 1.5.0.7, however Ulrich Kuehn discovered the fix was incomplete (CVE-2006-5462)\n\n\nFrom Red Hat Security Advisory 2006:0677 :\n\nTwo flaws were found in the way Thunderbird processed certain regular expressions. A malicious HTML email could cause a crash or possibly execute arbitrary code as the user running Thunderbird. (CVE-2006-4565, CVE-2006-4566)\n\nA flaw was found in the Thunderbird auto-update verification system. An attacker who has the ability to spoof a victim's DNS could get Firefox to download and install malicious code. In order to exploit this issue an attacker would also need to get a victim to previously accept an unverifiable certificate. (CVE-2006-4567)\n\nA flaw was found in the handling of Javascript timed events. A malicious HTML email could crash the browser or possibly execute arbitrary code as the user running Thunderbird. (CVE-2006-4253)\n\nDaniel Bleichenbacher recently described an implementation error in RSA signature verification. For RSA keys with exponent 3 it is possible for an attacker to forge a signature that which would be incorrectly verified by the NSS library. (CVE-2006-4340)\n\nA flaw was found in Thunderbird that triggered when a HTML message contained a remote image pointing to a XBL script. An attacker could have created a carefully crafted message which would execute Javascript if certain actions were performed on the email by the recipient, even if Javascript was disabled. (CVE-2006-4570)\n\nA number of flaws were found in Thunderbird. A malicious HTML email could cause a crash or possibly execute arbitrary code as the user running Thunderbird. (CVE-2006-4571)\n\n\nFrom Red Hat Bug Fix Advisory 2006:0624 :\n\nA problem was found in Thunderbird where starting the application from a graphical launcher (such as a menu item) did not work. \n\n\nFrom Red Hat Security Advisory 2006:0611 :\n\nThe Mozilla Foundation has discontinued support for the Mozilla Thunderbird 1.0 branch. This update deprecates the Mozilla Thunderbird 1.0 branch in Red Hat Enterprise Linux 4 in favor of the supported Mozilla Thunderbird 1.5 branch. \n\nThis update also resolves a number of outstanding Thunderbird security issues :\n\nSeveral flaws were found in the way Thunderbird processed certain javascript actions. A malicious mail message could execute arbitrary javascript instructions with the permissions of 'chrome', allowing the page to steal sensitive information or install browser malware. (CVE-2006-2776, CVE-2006-2784, CVE-2006-2785, CVE-2006-2787, CVE-2006-3807, CVE-2006-3809)\n\nSeveral denial of service flaws were found in the way Thunderbird processed certain mail messages. A malicious web page could crash the browser or possibly execute arbitrary code as the user running Thunderbird. (CVE-2006-2779, CVE-2006-2780, CVE-2006-3801, CVE-2006-3677, CVE-2006-3113, CVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3811)\n\nSeveral flaws were found in the way Thunderbird processed certain javascript actions. A malicious mail message could conduct a cross-site scripting attack or steal sensitive information (such as cookies owned by other domains). (CVE-2006-3802, CVE-2006-3810)\n\nA form file upload flaw was found in the way Thunderbird handled javascript input object mutation. A malicious mail message could upload an arbitrary local file at form submission time without user interaction. (CVE-2006-2782)\n\nA denial of service flaw was found in the way Thunderbird called the crypto.signText() javascript function. A malicious mail message could crash the browser if the victim had a client certificate loaded. (CVE-2006-2778)\n\nA flaw was found in the way Thunderbird processed Proxy AutoConfig scripts. A malicious Proxy AutoConfig server could execute arbitrary javascript instructions with the permissions of 'chrome', allowing the page to steal sensitive information or install client malware. (CVE-2006-3808)\n\nNote: Please note that JavaScript support is disabled by default in Thunderbird. The above issues are not exploitable with JavaScript disabled. \n\nTwo flaws were found in the way Thunderbird displayed malformed inline vcard attachments. If a victim viewed an email message containing a carefully crafted vcard it was possible to execute arbitrary code as the user running Thunderbird. (CVE-2006-2781, CVE-2006-3804)\n\nA cross site scripting flaw was found in the way Thunderbird processed Unicode Byte-order-Mark (BOM) markers in UTF-8 mail messages. A malicious web page could execute a script within the browser that a web input sanitizer could miss due to a malformed 'script' tag. (CVE-2006-2783)\n\nTwo HTTP response smuggling flaws were found in the way Thunderbird processed certain invalid HTTP response headers. A malicious web site could return specially crafted HTTP response headers which may bypass HTTP proxy restrictions. (CVE-2006-2786)\n\nA double free flaw was found in the way the nsIX509::getRawDER method was called. If a victim visited a carefully crafted web page, it was possible to crash Thunderbird. (CVE-2006-2788)", "cvss3": {"score": null, "vector": null}, "published": "2013-07-12T00:00:00", "type": "nessus", "title": "Oracle Linux 4 : thunderbird (ELSA-2006-0735 / ELSA-2006-0677 / ELBA-2006-0624 / ELSA-2006-0611)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2006-2776", "CVE-2006-2778", "CVE-2006-2779", "CVE-2006-2780", "CVE-2006-2781", "CVE-2006-2782", "CVE-2006-2783", "CVE-2006-2784", "CVE-2006-2785", "CVE-2006-2786", "CVE-2006-2787", "CVE-2006-2788", "CVE-2006-3113", "CVE-2006-3677", "CVE-2006-3801", "CVE-2006-3802", "CVE-2006-3803", "CVE-2006-3804", "CVE-2006-3805", "CVE-2006-3806", "CVE-2006-3807", "CVE-2006-3808", "CVE-2006-3809", "CVE-2006-3810", "CVE-2006-3811", "CVE-2006-4253", "CVE-2006-4340", "CVE-2006-4565", "CVE-2006-4566", "CVE-2006-4567", "CVE-2006-4570", "CVE-2006-4571", "CVE-2006-5462", "CVE-2006-5463", "CVE-2006-5464", "CVE-2006-5747", "CVE-2006-5748"], "modified": "2021-01-14T00:00:00", "cpe": ["p-cpe:/a:oracle:linux:thunderbird", "cpe:/o:oracle:linux:4"], "id": "ORACLELINUX_ELSA-2006-0735.NASL", "href": "https://www.tenable.com/plugins/nessus/67424", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Oracle Linux Security Advisories ELSA-2006-0735 / \n# ELSA-2006-0677 / ELBA-2006-0624 / ELSA-2006-0611.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(67424);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2006-2776\", \"CVE-2006-2778\", \"CVE-2006-2779\", \"CVE-2006-2780\", \"CVE-2006-2781\", \"CVE-2006-2782\", \"CVE-2006-2783\", \"CVE-2006-2784\", \"CVE-2006-2785\", \"CVE-2006-2786\", \"CVE-2006-2787\", \"CVE-2006-2788\", \"CVE-2006-3113\", \"CVE-2006-3677\", \"CVE-2006-3801\", \"CVE-2006-3802\", \"CVE-2006-3803\", \"CVE-2006-3804\", \"CVE-2006-3805\", \"CVE-2006-3806\", \"CVE-2006-3807\", \"CVE-2006-3808\", \"CVE-2006-3809\", \"CVE-2006-3810\", \"CVE-2006-3811\", \"CVE-2006-4253\", \"CVE-2006-4340\", \"CVE-2006-4565\", \"CVE-2006-4566\", \"CVE-2006-4567\", \"CVE-2006-4570\", \"CVE-2006-4571\", \"CVE-2006-5462\", \"CVE-2006-5463\", \"CVE-2006-5464\", \"CVE-2006-5747\", \"CVE-2006-5748\");\n script_bugtraq_id(19849);\n script_xref(name:\"RHSA\", value:\"2006:0611\");\n script_xref(name:\"RHSA\", value:\"2006:0677\");\n script_xref(name:\"RHSA\", value:\"2006:0735\");\n\n script_name(english:\"Oracle Linux 4 : thunderbird (ELSA-2006-0735 / ELSA-2006-0677 / ELBA-2006-0624 / ELSA-2006-0611)\");\n script_summary(english:\"Checks rpm output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Oracle Linux host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated thunderbird packages that fix several security bugs are now\navailable for Red Hat Enterprise Linux 4. \n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team. \n\nMozilla Thunderbird is a standalone mail and newsgroup client. \n\nUsers of Thunderbird are advised to upgrade to this update, which\ncontains Thunderbird version 1.5.0.8 that corrects these issues. \n\n\nFrom Red Hat Security Advisory 2006:0735 :\n\nSeveral flaws were found in the way Thunderbird processes certain\nmalformed Javascript code. A malicious HTML mail message could cause\nthe execution of Javascript code in such a way that could cause\nThunderbird to crash or execute arbitrary code as the user running\nThunderbird. (CVE-2006-5463, CVE-2006-5747, CVE-2006-5748)\n\nSeveral flaws were found in the way Thunderbird renders HTML mail\nmessages. A malicious HTML mail message could cause the mail client to\ncrash or possibly execute arbitrary code as the user running\nThunderbird. (CVE-2006-5464)\n\nA flaw was found in the way Thunderbird verifies RSA signatures. For\nRSA keys with exponent 3 it is possible for an attacker to forge a\nsignature that would be incorrectly verified by the NSS library. \nThunderbird as shipped trusts several root Certificate Authorities that\nuse exponent 3. An attacker could have created a carefully crafted SSL\ncertificate which would be incorrectly trusted when their site was\nvisited by a victim. This flaw was previously thought to be fixed in\nThunderbird 1.5.0.7, however Ulrich Kuehn discovered the fix was\nincomplete (CVE-2006-5462)\n\n\nFrom Red Hat Security Advisory 2006:0677 :\n\nTwo flaws were found in the way Thunderbird processed certain regular\nexpressions. A malicious HTML email could cause a crash or possibly\nexecute arbitrary code as the user running Thunderbird. (CVE-2006-4565,\nCVE-2006-4566)\n\nA flaw was found in the Thunderbird auto-update verification system. An\nattacker who has the ability to spoof a victim's DNS could get Firefox\nto download and install malicious code. In order to exploit this issue\nan attacker would also need to get a victim to previously accept an\nunverifiable certificate. (CVE-2006-4567)\n\nA flaw was found in the handling of Javascript timed events. A\nmalicious HTML email could crash the browser or possibly execute\narbitrary code as the user running Thunderbird. (CVE-2006-4253)\n\nDaniel Bleichenbacher recently described an implementation error in RSA\nsignature verification. For RSA keys with exponent 3 it is possible for\nan attacker to forge a signature that which would be incorrectly\nverified by the NSS library. (CVE-2006-4340)\n\nA flaw was found in Thunderbird that triggered when a HTML message\ncontained a remote image pointing to a XBL script. An attacker could\nhave created a carefully crafted message which would execute Javascript\nif certain actions were performed on the email by the recipient, even if\nJavascript was disabled. (CVE-2006-4570)\n\nA number of flaws were found in Thunderbird. A malicious HTML email\ncould cause a crash or possibly execute arbitrary code as the user\nrunning Thunderbird. (CVE-2006-4571)\n\n\nFrom Red Hat Bug Fix Advisory 2006:0624 :\n\nA problem was found in Thunderbird where starting the application from a\ngraphical launcher (such as a menu item) did not work. \n\n\nFrom Red Hat Security Advisory 2006:0611 :\n\nThe Mozilla Foundation has discontinued support for the Mozilla\nThunderbird 1.0 branch. This update deprecates the Mozilla Thunderbird\n1.0 branch in Red Hat Enterprise Linux 4 in favor of the supported\nMozilla Thunderbird 1.5 branch. \n\nThis update also resolves a number of outstanding Thunderbird security\nissues :\n\nSeveral flaws were found in the way Thunderbird processed certain\njavascript actions. A malicious mail message could execute arbitrary\njavascript instructions with the permissions of 'chrome', allowing the\npage to steal sensitive information or install browser malware. \n(CVE-2006-2776, CVE-2006-2784, CVE-2006-2785, CVE-2006-2787,\nCVE-2006-3807, CVE-2006-3809)\n\nSeveral denial of service flaws were found in the way Thunderbird\nprocessed certain mail messages. A malicious web page could crash the\nbrowser or possibly execute arbitrary code as the user running\nThunderbird. (CVE-2006-2779, CVE-2006-2780, CVE-2006-3801,\nCVE-2006-3677, CVE-2006-3113, CVE-2006-3803, CVE-2006-3805,\nCVE-2006-3806, CVE-2006-3811)\n\nSeveral flaws were found in the way Thunderbird processed certain\njavascript actions. A malicious mail message could conduct a cross-site\nscripting attack or steal sensitive information (such as cookies owned\nby other domains). (CVE-2006-3802, CVE-2006-3810)\n\nA form file upload flaw was found in the way Thunderbird handled\njavascript input object mutation. A malicious mail message could upload\nan arbitrary local file at form submission time without user\ninteraction. (CVE-2006-2782)\n\nA denial of service flaw was found in the way Thunderbird called the\ncrypto.signText() javascript function. A malicious mail message could\ncrash the browser if the victim had a client certificate loaded. \n(CVE-2006-2778)\n\nA flaw was found in the way Thunderbird processed Proxy AutoConfig\nscripts. A malicious Proxy AutoConfig server could execute arbitrary\njavascript instructions with the permissions of 'chrome', allowing the\npage to steal sensitive information or install client malware. \n(CVE-2006-3808)\n\nNote: Please note that JavaScript support is disabled by default in\nThunderbird. The above issues are not exploitable with JavaScript\ndisabled. \n\nTwo flaws were found in the way Thunderbird displayed malformed inline\nvcard attachments. If a victim viewed an email message containing a\ncarefully crafted vcard it was possible to execute arbitrary code as the\nuser running Thunderbird. (CVE-2006-2781, CVE-2006-3804)\n\nA cross site scripting flaw was found in the way Thunderbird processed\nUnicode Byte-order-Mark (BOM) markers in UTF-8 mail messages. A\nmalicious web page could execute a script within the browser that a web\ninput sanitizer could miss due to a malformed 'script' tag. \n(CVE-2006-2783)\n\nTwo HTTP response smuggling flaws were found in the way Thunderbird\nprocessed certain invalid HTTP response headers. A malicious web site\ncould return specially crafted HTTP response headers which may bypass\nHTTP proxy restrictions. (CVE-2006-2786)\n\nA double free flaw was found in the way the nsIX509::getRawDER method\nwas called. If a victim visited a carefully crafted web page, it was\npossible to crash Thunderbird. (CVE-2006-2788)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2006-December/000025.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected thunderbird package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Mozilla Suite/Firefox Navigator Object Code Execution');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n script_cwe_id(20, 94, 119, 264);\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/12/07\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/07/12\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:thunderbird\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:4\");\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2006/06/01\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/OracleLinux\")) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Oracle Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"EL4\", cpu:\"i386\", reference:\"thunderbird-1.5.0.8-0.1.1.el4\")) flag++;\nif (rpm_check(release:\"EL4\", cpu:\"x86_64\", reference:\"thunderbird-1.5.0.8-0.1.1.el4\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n\n", "cvss": {"score": 10, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-05-15T13:48:00", "description": "Updated firefox packages that fix several security bugs are now available for Red Hat Enterprise Linux 4. \n\nThis update has been rated as having critical security impact by the Red Hat Security Response Team. \n\nMozilla Firefox is an open source Web browser. \n\nUsers of Firefox are advised to upgrade to these erratum packages, which contain Firefox version 1.5.0.8 that corrects these issues. \n\n\nFrom Red Hat Security Advisory 2006:0733 :\n\nSeveral flaws were found in the way Firefox processes certain malformed Javascript code. A malicious web page could cause the execution of Javascript code in such a way that could cause Firefox to crash or execute arbitrary code as the user running Firefox. (CVE-2006-5463, CVE-2006-5747, CVE-2006-5748)\n\nSeveral flaws were found in the way Firefox renders web pages. A malicious web page could cause the browser to crash or possibly execute arbitrary code as the user running Firefox. (CVE-2006-5464)\n\nA flaw was found in the way Firefox verifies RSA signatures. For RSA keys with exponent 3 it is possible for an attacker to forge a signature that would be incorrectly verified by the NSS library. Firefox as shipped trusts several root Certificate Authorities that use exponent 3. An attacker could have created a carefully crafted SSL certificate which be incorrectly trusted when their site was visited by a victim. This flaw was previously thought to be fixed in Firefox 1.5.0.7, however Ulrich Kuehn discovered the fix was incomplete (CVE-2006-5462)\n\n\nFrom Red Hat Security Advisory 2006:0675 :\n\nTwo flaws were found in the way Firefox processed certain regular expressions. A malicious web page could crash the browser or possibly execute arbitrary code as the user running Firefox. (CVE-2006-4565, CVE-2006-4566)\n\nA number of flaws were found in Firefox. A malicious web page could crash the browser or possibly execute arbitrary code as the user running Firefox. (CVE-2006-4571)\n\nA flaw was found in the handling of Javascript timed events. A malicious web page could crash the browser or possibly execute arbitrary code as the user running Firefox. (CVE-2006-4253)\n\nDaniel Bleichenbacher recently described an implementation error in RSA signature verification. For RSA keys with exponent 3 it is possible for an attacker to forge a signature that would be incorrectly verified by the NSS library. Firefox as shipped trusts several root Certificate Authorities that use exponent 3. An attacker could have created a carefully crafted SSL certificate which be incorrectly trusted when their site was visited by a victim. (CVE-2006-4340)\n\nA flaw was found in the Firefox auto-update verification system. An attacker who has the ability to spoof a victim's DNS could get Firefox to download and install malicious code. In order to exploit this issue an attacker would also need to get a victim to previously accept an unverifiable certificate. (CVE-2006-4567)\n\nFirefox did not properly prevent a frame in one domain from injecting content into a sub-frame that belongs to another domain, which facilitates website spoofing and other attacks (CVE-2006-4568)\n\nFirefox did not load manually opened, blocked popups in the right domain context, which could lead to cross-site scripting attacks. In order to exploit this issue an attacker would need to find a site which would frame their malicious page and convince the user to manually open a blocked popup. (CVE-2006-4569)\n\n\nFrom Red Hat Security Advisory 2006:0610 :\n\nThe Mozilla Foundation has discontinued support for the Mozilla Firefox 1.0 branch. This update deprecates the Mozilla Firefox 1.0 branch in Red Hat Enterprise Linux 4 in favor of the supported Mozilla Firefox 1.5 branch. \n\nThis update also resolves a number of outstanding Firefox security issues :\n\nSeveral flaws were found in the way Firefox processed certain javascript actions. A malicious web page could execute arbitrary javascript instructions with the permissions of 'chrome', allowing the page to steal sensitive information or install browser malware. (CVE-2006-2776, CVE-2006-2784, CVE-2006-2785, CVE-2006-2787, CVE-2006-3807, CVE-2006-3809, CVE-2006-3812)\n\nSeveral denial of service flaws were found in the way Firefox processed certain web content. A malicious web page could crash the browser or possibly execute arbitrary code as the user running Firefox. (CVE-2006-2779, CVE-2006-2780, CVE-2006-3801, CVE-2006-3677, CVE-2006-3113, CVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3811)\n\nA cross-site scripting flaw was found in the way Firefox processed Unicode Byte-Order-Mark (BOM) markers in UTF-8 web pages. A malicious web page could execute a script within the browser that a web input sanitizer could miss due to a malformed 'script' tag. (CVE-2006-2783)\n\nSeveral flaws were found in the way Firefox processed certain javascript actions. A malicious web page could conduct a cross-site scripting attack or steal sensitive information (such as cookies owned by other domains). (CVE-2006-3802, CVE-2006-3810)\n\nA form file upload flaw was found in the way Firefox handled javascript input object mutation. A malicious web page could upload an arbitrary local file at form submission time without user interaction. (CVE-2006-2782)\n\nA denial of service flaw was found in the way Firefox called the crypto.signText() javascript function. A malicious web page could crash the browser if the victim had a client certificate loaded. (CVE-2006-2778)\n\nTwo HTTP response smuggling flaws were found in the way Firefox processed certain invalid HTTP response headers. A malicious web site could return specially crafted HTTP response headers which may bypass HTTP proxy restrictions. (CVE-2006-2786)\n\nA flaw was found in the way Firefox processed Proxy AutoConfig scripts. A malicious Proxy AutoConfig server could execute arbitrary javascript instructions with the permissions of 'chrome', allowing the page to steal sensitive information or install browser malware. (CVE-2006-3808)\n\nA double free flaw was found in the way the nsIX509::getRawDER method was called. If a victim visited a carefully crafted web page, it was possible to execute arbitrary code as the user running Firefox. (CVE-2006-2788)", "cvss3": {"score": null, "vector": null}, "published": "2013-07-12T00:00:00", "type": "nessus", "title": "Oracle Linux 4 : firefox (ELSA-2006-0733 / ELSA-2006-0675 / ELSA-2006-0610)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2006-2776", "CVE-2006-2778", "CVE-2006-2779", "CVE-2006-2780", "CVE-2006-2782", "CVE-2006-2783", "CVE-2006-2784", "CVE-2006-2785", "CVE-2006-2786", "CVE-2006-2787", "CVE-2006-2788", "CVE-2006-3113", "CVE-2006-3677", "CVE-2006-3801", "CVE-2006-3802", "CVE-2006-3803", "CVE-2006-3805", "CVE-2006-3806", "CVE-2006-3807", "CVE-2006-3808", "CVE-2006-3809", "CVE-2006-3810", "CVE-2006-3811", "CVE-2006-3812", "CVE-2006-4253", "CVE-2006-4340", "CVE-2006-4565", "CVE-2006-4566", "CVE-2006-4567", "CVE-2006-4568", "CVE-2006-4569", "CVE-2006-4571", "CVE-2006-5462", "CVE-2006-5463", "CVE-2006-5464", "CVE-2006-5747", "CVE-2006-5748"], "modified": "2021-01-14T00:00:00", "cpe": ["p-cpe:/a:oracle:linux:firefox", "cpe:/o:oracle:linux:4"], "id": "ORACLELINUX_ELSA-2006-0733.NASL", "href": "https://www.tenable.com/plugins/nessus/67422", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Oracle Linux Security Advisories ELSA-2006-0733 / \n# ELSA-2006-0675 / ELSA-2006-0610. \n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(67422);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2006-2776\", \"CVE-2006-2778\", \"CVE-2006-2779\", \"CVE-2006-2780\", \"CVE-2006-2782\", \"CVE-2006-2783\", \"CVE-2006-2784\", \"CVE-2006-2785\", \"CVE-2006-2786\", \"CVE-2006-2787\", \"CVE-2006-2788\", \"CVE-2006-3113\", \"CVE-2006-3677\", \"CVE-2006-3801\", \"CVE-2006-3802\", \"CVE-2006-3803\", \"CVE-2006-3805\", \"CVE-2006-3806\", \"CVE-2006-3807\", \"CVE-2006-3808\", \"CVE-2006-3809\", \"CVE-2006-3810\", \"CVE-2006-3811\", \"CVE-2006-3812\", \"CVE-2006-4253\", \"CVE-2006-4340\", \"CVE-2006-4565\", \"CVE-2006-4566\", \"CVE-2006-4567\", \"CVE-2006-4568\", \"CVE-2006-4569\", \"CVE-2006-4571\", \"CVE-2006-5462\", \"CVE-2006-5463\", \"CVE-2006-5464\", \"CVE-2006-5747\", \"CVE-2006-5748\");\n script_bugtraq_id(19849);\n script_xref(name:\"RHSA\", value:\"2006:0610\");\n script_xref(name:\"RHSA\", value:\"2006:0675\");\n script_xref(name:\"RHSA\", value:\"2006:0733\");\n\n script_name(english:\"Oracle Linux 4 : firefox (ELSA-2006-0733 / ELSA-2006-0675 / ELSA-2006-0610)\");\n script_summary(english:\"Checks rpm output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Oracle Linux host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated firefox packages that fix several security bugs are now\navailable for Red Hat Enterprise Linux 4. \n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team. \n\nMozilla Firefox is an open source Web browser. \n\nUsers of Firefox are advised to upgrade to these erratum packages, which\ncontain Firefox version 1.5.0.8 that corrects these issues. \n\n\nFrom Red Hat Security Advisory 2006:0733 :\n\nSeveral flaws were found in the way Firefox processes certain malformed\nJavascript code. A malicious web page could cause the execution of\nJavascript code in such a way that could cause Firefox to crash or\nexecute arbitrary code as the user running Firefox. (CVE-2006-5463,\nCVE-2006-5747, CVE-2006-5748)\n\nSeveral flaws were found in the way Firefox renders web pages. A\nmalicious web page could cause the browser to crash or possibly execute\narbitrary code as the user running Firefox. (CVE-2006-5464)\n\nA flaw was found in the way Firefox verifies RSA signatures. For RSA\nkeys with exponent 3 it is possible for an attacker to forge a signature\nthat would be incorrectly verified by the NSS library. Firefox as\nshipped trusts several root Certificate Authorities that use exponent 3. \nAn attacker could have created a carefully crafted SSL certificate which\nbe incorrectly trusted when their site was visited by a victim. This\nflaw was previously thought to be fixed in Firefox 1.5.0.7, however\nUlrich Kuehn discovered the fix was incomplete (CVE-2006-5462)\n\n\nFrom Red Hat Security Advisory 2006:0675 :\n\nTwo flaws were found in the way Firefox processed certain regular\nexpressions. A malicious web page could crash the browser or possibly\nexecute arbitrary code as the user running Firefox. (CVE-2006-4565,\nCVE-2006-4566)\n\nA number of flaws were found in Firefox. A malicious web page could\ncrash the browser or possibly execute arbitrary code as the user running\nFirefox. (CVE-2006-4571)\n\nA flaw was found in the handling of Javascript timed events. A\nmalicious web page could crash the browser or possibly execute arbitrary\ncode as the user running Firefox. (CVE-2006-4253)\n\nDaniel Bleichenbacher recently described an implementation error in RSA\nsignature verification. For RSA keys with exponent 3 it is possible for\nan attacker to forge a signature that would be incorrectly verified by\nthe NSS library. Firefox as shipped trusts several root Certificate\nAuthorities that use exponent 3. An attacker could have created a\ncarefully crafted SSL certificate which be incorrectly trusted when\ntheir site was visited by a victim. (CVE-2006-4340)\n\nA flaw was found in the Firefox auto-update verification system. An\nattacker who has the ability to spoof a victim's DNS could get Firefox\nto download and install malicious code. In order to exploit this issue\nan attacker would also need to get a victim to previously accept an\nunverifiable certificate. (CVE-2006-4567)\n\nFirefox did not properly prevent a frame in one domain from injecting\ncontent into a sub-frame that belongs to another domain, which\nfacilitates website spoofing and other attacks (CVE-2006-4568)\n\nFirefox did not load manually opened, blocked popups in the right domain\ncontext, which could lead to cross-site scripting attacks. In order to\nexploit this issue an attacker would need to find a site which would\nframe their malicious page and convince the user to manually open a\nblocked popup. (CVE-2006-4569)\n\n\nFrom Red Hat Security Advisory 2006:0610 :\n\nThe Mozilla Foundation has discontinued support for the Mozilla Firefox\n1.0 branch. This update deprecates the Mozilla Firefox 1.0 branch in\nRed Hat Enterprise Linux 4 in favor of the supported Mozilla Firefox 1.5\nbranch. \n\nThis update also resolves a number of outstanding Firefox security\nissues :\n\nSeveral flaws were found in the way Firefox processed certain javascript\nactions. A malicious web page could execute arbitrary javascript\ninstructions with the permissions of 'chrome', allowing the page to\nsteal sensitive information or install browser malware. (CVE-2006-2776,\nCVE-2006-2784, CVE-2006-2785, CVE-2006-2787, CVE-2006-3807,\nCVE-2006-3809, CVE-2006-3812)\n\nSeveral denial of service flaws were found in the way Firefox processed\ncertain web content. A malicious web page could crash the browser or\npossibly execute arbitrary code as the user running Firefox. \n(CVE-2006-2779, CVE-2006-2780, CVE-2006-3801, CVE-2006-3677,\nCVE-2006-3113, CVE-2006-3803, CVE-2006-3805, CVE-2006-3806,\nCVE-2006-3811)\n\nA cross-site scripting flaw was found in the way Firefox processed\nUnicode Byte-Order-Mark (BOM) markers in UTF-8 web pages. A malicious\nweb page could execute a script within the browser that a web input\nsanitizer could miss due to a malformed 'script' tag. (CVE-2006-2783)\n\nSeveral flaws were found in the way Firefox processed certain javascript\nactions. A malicious web page could conduct a cross-site scripting\nattack or steal sensitive information (such as cookies owned by other\ndomains). (CVE-2006-3802, CVE-2006-3810)\n\nA form file upload flaw was found in the way Firefox handled javascript\ninput object mutation. A malicious web page could upload an arbitrary\nlocal file at form submission time without user interaction. \n(CVE-2006-2782)\n\nA denial of service flaw was found in the way Firefox called the\ncrypto.signText() javascript function. A malicious web page could crash\nthe browser if the victim had a client certificate loaded. \n(CVE-2006-2778)\n\nTwo HTTP response smuggling flaws were found in the way Firefox\nprocessed certain invalid HTTP response headers. A malicious web site\ncould return specially crafted HTTP response headers which may bypass\nHTTP proxy restrictions. (CVE-2006-2786)\n\nA flaw was found in the way Firefox processed Proxy AutoConfig scripts. \nA malicious Proxy AutoConfig server could execute arbitrary javascript\ninstructions with the permissions of 'chrome', allowing the page to\nsteal sensitive information or install browser malware. (CVE-2006-3808)\n\nA double free flaw was found in the way the nsIX509::getRawDER method\nwas called. If a victim visited a carefully crafted web page, it was\npossible to execute arbitrary code as the user running Firefox. \n(CVE-2006-2788)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2006-December/000023.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected firefox package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Mozilla Suite/Firefox Navigator Object Code Execution');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n script_cwe_id(20, 79, 94, 119, 264);\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/12/07\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/07/12\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:firefox\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:4\");\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2006/06/01\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/OracleLinux\")) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Oracle Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"EL4\", cpu:\"i386\", reference:\"firefox-1.5.0.8-0.1.1.el4\")) flag++;\nif (rpm_check(release:\"EL4\", cpu:\"x86_64\", reference:\"firefox-1.5.0.8-0.1.1.el4\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n\n", "cvss": {"score": 10, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "openvas": [{"lastseen": "2017-07-24T12:50:15", "description": "The remote host is missing updates announced in\nadvisory GLSA 200608-04.", "cvss3": {}, "published": "2008-09-24T00:00:00", "type": "openvas", "title": "Gentoo Security Advisory GLSA 200608-04 (Thunderbird)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2006-3806", "CVE-2006-3809", "CVE-2006-3803", "CVE-2006-3807", "CVE-2006-3811", "CVE-2006-3804", "CVE-2006-3810", "CVE-2006-3812", "CVE-2006-3113", "CVE-2006-3805", "CVE-2006-3802"], "modified": "2017-07-07T00:00:00", "id": "OPENVAS:57854", "href": "http://plugins.openvas.org/nasl.php?oid=57854", "sourceData": "# OpenVAS Vulnerability Test\n# $\n# Description: Auto generated from Gentoo's XML based advisory\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The Mozilla Foundation has reported numerous security vulnerabilities\nrelated to Mozilla Thunderbird.\";\ntag_solution = \"All Mozilla Thunderbird users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose\n'>=mail-client/mozilla-thunderbird-1.5.0.5'\n\nAll Mozilla Thunderbird binary users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose\n'>=mail-client/mozilla-thunderbird-bin-1.5.0.5'\n\nhttp://www.securityspace.com/smysecure/catid.html?in=GLSA%20200608-04\nhttp://bugs.gentoo.org/show_bug.cgi?id=141842\";\ntag_summary = \"The remote host is missing updates announced in\nadvisory GLSA 200608-04.\";\n\n \n\nif(description)\n{\n script_id(57854);\n script_version(\"$Revision: 6596 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 11:21:37 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)\");\n script_cve_id(\"CVE-2006-3113\", \"CVE-2006-3802\", \"CVE-2006-3803\", \"CVE-2006-3804\", \"CVE-2006-3805\", \"CVE-2006-3806\", \"CVE-2006-3807\", \"CVE-2006-3809\", \"CVE-2006-3810\", \"CVE-2006-3811\", \"CVE-2006-3812\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_name(\"Gentoo Security Advisory GLSA 200608-04 (Thunderbird)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Gentoo Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/gentoo\", \"ssh/login/pkg\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-gentoo.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = ispkgvuln(pkg:\"mail-client/mozilla-thunderbird\", unaffected: make_list(\"ge 1.5.0.5\"), vulnerable: make_list(\"lt 1.5.0.5\"))) != NULL) {\n report += res;\n}\nif ((res = ispkgvuln(pkg:\"mail-client/mozilla-thunderbird-bin\", unaffected: make_list(\"ge 1.5.0.5\"), vulnerable: make_list(\"lt 1.5.0.5\"))) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-07-24T12:50:08", "description": "The remote host is missing updates announced in\nadvisory GLSA 200608-03.", "cvss3": {}, "published": "2008-09-24T00:00:00", "type": "openvas", "title": "Gentoo Security Advisory GLSA 200608-03 (Firefox)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2006-3806", "CVE-2006-3809", "CVE-2006-3803", "CVE-2006-3807", "CVE-2006-3811", "CVE-2006-3677", "CVE-2006-3810", "CVE-2006-3801", "CVE-2006-3812", "CVE-2006-3113", "CVE-2006-3805", "CVE-2006-3808", "CVE-2006-3802"], "modified": "2017-07-07T00:00:00", "id": "OPENVAS:57853", "href": "http://plugins.openvas.org/nasl.php?oid=57853", "sourceData": "# OpenVAS Vulnerability Test\n# $\n# Description: Auto generated from Gentoo's XML based advisory\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The Mozilla Foundation has reported numerous security vulnerabilities\nrelated to Mozilla Firefox.\";\ntag_solution = \"All Mozilla Firefox users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose\n'>=www-client/mozilla-firefox-1.5.0.5'\n\nUsers of the binary package should upgrade as well:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose\n'>=www-client/mozilla-firefox-bin-1.5.0.5'\n\nhttp://www.securityspace.com/smysecure/catid.html?in=GLSA%20200608-03\nhttp://bugs.gentoo.org/show_bug.cgi?id=141842\";\ntag_summary = \"The remote host is missing updates announced in\nadvisory GLSA 200608-03.\";\n\n \n\nif(description)\n{\n script_id(57853);\n script_version(\"$Revision: 6596 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 11:21:37 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)\");\n script_cve_id(\"CVE-2006-3113\", \"CVE-2006-3677\", \"CVE-2006-3801\", \"CVE-2006-3802\", \"CVE-2006-3803\", \"CVE-2006-3805\", \"CVE-2006-3806\", \"CVE-2006-3807\", \"CVE-2006-3808\", \"CVE-2006-3809\", \"CVE-2006-3810\", \"CVE-2006-3811\", \"CVE-2006-3812\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_name(\"Gentoo Security Advisory GLSA 200608-03 (Firefox)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Gentoo Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/gentoo\", \"ssh/login/pkg\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-gentoo.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = ispkgvuln(pkg:\"www-client/mozilla-firefox\", unaffected: make_list(\"ge 1.5.0.5\"), vulnerable: make_list(\"lt 1.5.0.5\"))) != NULL) {\n report += res;\n}\nif ((res = ispkgvuln(pkg:\"www-client/mozilla-firefox-bin\", unaffected: make_list(\"ge 1.5.0.5\"), vulnerable: make_list(\"lt 1.5.0.5\"))) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-07-02T21:10:11", "description": "The remote host is missing an update to the system\nas announced in the referenced advisory.", "cvss3": {}, "published": "2008-09-04T00:00:00", "type": "openvas", "title": "FreeBSD Ports: firefox", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2006-3806", "CVE-2006-3809", "CVE-2006-3803", "CVE-2006-3807", "CVE-2006-3811", "CVE-2006-3677", "CVE-2006-3804", "CVE-2006-3810", "CVE-2006-3801", "CVE-2006-3812", "CVE-2006-3113", "CVE-2006-3805", "CVE-2006-3808", "CVE-2006-3802"], "modified": "2016-09-19T00:00:00", "id": "OPENVAS:57146", "href": "http://plugins.openvas.org/nasl.php?oid=57146", "sourceData": "#\n#VID e2a92664-1d60-11db-88cf-000c6ec775d9\n# OpenVAS Vulnerability Test\n# $\n# Description: Auto generated from vuxml or freebsd advisories\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The following packages are affected:\n firefox\n linux-firefox\n linux-firefox-devel\n seamonkey\n linux-seamonkey\n thunderbird\n linux-thunderbird\n mozilla-thunderbird\n mozilla\n linux-mozilla\n linux-mozilla-devel\";\ntag_solution = \"Update your system with the appropriate patches or\nsoftware upgrades.\n\nhttp://www.mozilla.org/projects/security/known-vulnerabilities.html#seamonkey1.0.3\nhttp://www.mozilla.org/security/announce/2006/mfsa2006-44.html\nhttp://www.mozilla.org/security/announce/2006/mfsa2006-45.html\nhttp://www.mozilla.org/security/announce/2006/mfsa2006-46.html\nhttp://www.mozilla.org/security/announce/2006/mfsa2006-47.html\nhttp://www.mozilla.org/security/announce/2006/mfsa2006-48.html\nhttp://www.mozilla.org/security/announce/2006/mfsa2006-49.html\nhttp://www.mozilla.org/security/announce/2006/mfsa2006-50.html\nhttp://www.mozilla.org/security/announce/2006/mfsa2006-51.html\nhttp://www.mozilla.org/security/announce/2006/mfsa2006-52.html\nhttp://www.mozilla.org/security/announce/2006/mfsa2006-53.html\nhttp://www.mozilla.org/security/announce/2006/mfsa2006-54.html\nhttp://www.mozilla.org/security/announce/2006/mfsa2006-55.html\nhttp://www.mozilla.org/security/announce/2006/mfsa2006-56.html\nhttp://www.vuxml.org/freebsd/e2a92664-1d60-11db-88cf-000c6ec775d9.html\";\ntag_summary = \"The remote host is missing an update to the system\nas announced in the referenced advisory.\";\n\n\nif(description)\n{\n script_id(57146);\n script_version(\"$Revision: 4112 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2016-09-19 15:17:59 +0200 (Mon, 19 Sep 2016) $\");\n script_tag(name:\"creation_date\", value:\"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)\");\n script_cve_id(\"CVE-2006-3113\", \"CVE-2006-3677\", \"CVE-2006-3801\", \"CVE-2006-3802\", \"CVE-2006-3803\", \"CVE-2006-3804\", \"CVE-2006-3805\", \"CVE-2006-3806\", \"CVE-2006-3807\", \"CVE-2006-3808\", \"CVE-2006-3809\", \"CVE-2006-3810\", \"CVE-2006-3811\", \"CVE-2006-3812\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_name(\"FreeBSD Ports: firefox\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2006 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"FreeBSD Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/freebsdrel\", \"login/SSH/success\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-bsd.inc\");\n\ntxt = \"\";\nvuln = 0;\nbver = portver(pkg:\"firefox\");\nif(!isnull(bver) && revcomp(a:bver, b:\"1.5.0.5,1\")<0) {\n txt += 'Package firefox version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\nif(!isnull(bver) && revcomp(a:bver, b:\"2.*,1\")>0) {\n txt += 'Package firefox version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\nbver = portver(pkg:\"linux-firefox\");\nif(!isnull(bver) && revcomp(a:bver, b:\"1.5.0.5\")<0) {\n txt += 'Package linux-firefox version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\nbver = portver(pkg:\"linux-firefox-devel\");\nif(!isnull(bver) && revcomp(a:bver, b:\"3.0.a2006.07.26\")<0) {\n txt += 'Package linux-firefox-devel version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\nbver = portver(pkg:\"seamonkey\");\nif(!isnull(bver) && revcomp(a:bver, b:\"1.0.3\")<0) {\n txt += 'Package seamonkey version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\nbver = portver(pkg:\"linux-seamonkey\");\nif(!isnull(bver) && revcomp(a:bver, b:\"1.0.3\")<0) {\n txt += 'Package linux-seamonkey version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\nbver = portver(pkg:\"thunderbird\");\nif(!isnull(bver) && revcomp(a:bver, b:\"1.5.0.5\")<0) {\n txt += 'Package thunderbird version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\nbver = portver(pkg:\"linux-thunderbird\");\nif(!isnull(bver) && revcomp(a:bver, b:\"1.5.0.5\")<0) {\n txt += 'Package linux-thunderbird version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\nbver = portver(pkg:\"mozilla-thunderbird\");\nif(!isnull(bver) && revcomp(a:bver, b:\"1.5.0.5\")<0) {\n txt += 'Package mozilla-thunderbird version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\nbver = portver(pkg:\"mozilla\");\nif(!isnull(bver) && revcomp(a:bver, b:\"0\")>0) {\n txt += 'Package mozilla version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\nbver = portver(pkg:\"linux-mozilla\");\nif(!isnull(bver) && revcomp(a:bver, b:\"0\")>0) {\n txt += 'Package linux-mozilla version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\nbver = portver(pkg:\"linux-mozilla-devel\");\nif(!isnull(bver) && revcomp(a:bver, b:\"0\")>0) {\n txt += 'Package linux-mozilla-devel version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\n\nif(vuln) {\n security_message(data:string(txt));\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-07-24T12:50:25", "description": "The remote host is missing updates announced in\nadvisory GLSA 200608-02.", "cvss3": {}, "published": "2008-09-24T00:00:00", "type": "openvas", "title": "Gentoo Security Advisory GLSA 200608-02 (SeaMonkey)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2006-3806", "CVE-2006-3809", "CVE-2006-3803", "CVE-2006-3807", "CVE-2006-3811", "CVE-2006-3677", "CVE-2006-3804", "CVE-2006-3810", "CVE-2006-3801", "CVE-2006-3812", "CVE-2006-3113", "CVE-2006-3805", "CVE-2006-3808", "CVE-2006-3802"], "modified": "2017-07-07T00:00:00", "id": "OPENVAS:57852", "href": "http://plugins.openvas.org/nasl.php?oid=57852", "sourceData": "# OpenVAS Vulnerability Test\n# $\n# Description: Auto generated from Gentoo's XML based advisory\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The Mozilla Foundation has reported numerous security vulnerabilities\nrelated to Mozilla SeaMonkey.\";\ntag_solution = \"All Thunderbird users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=www-client/seamonkey-1.0.3'\n\nhttp://www.securityspace.com/smysecure/catid.html?in=GLSA%20200608-02\nhttp://bugs.gentoo.org/show_bug.cgi?id=141842\";\ntag_summary = \"The remote host is missing updates announced in\nadvisory GLSA 200608-02.\";\n\n \n\nif(description)\n{\n script_id(57852);\n script_version(\"$Revision: 6596 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 11:21:37 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)\");\n script_cve_id(\"CVE-2006-3113\", \"CVE-2006-3677\", \"CVE-2006-3801\", \"CVE-2006-3802\", \"CVE-2006-3803\", \"CVE-2006-3804\", \"CVE-2006-3805\", \"CVE-2006-3806\", \"CVE-2006-3807\", \"CVE-2006-3808\", \"CVE-2006-3809\", \"CVE-2006-3810\", \"CVE-2006-3811\", \"CVE-2006-3812\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_name(\"Gentoo Security Advisory GLSA 200608-02 (SeaMonkey)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Gentoo Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/gentoo\", \"ssh/login/pkg\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-gentoo.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = ispkgvuln(pkg:\"www-client/seamonkey\", unaffected: make_list(\"ge 1.0.3\"), vulnerable: make_list(\"lt 1.0.3\"))) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-04-09T11:39:59", "description": "Check for the Version of Thunderbird", "cvss3": {}, "published": "2009-05-05T00:00:00", "type": "openvas", "title": "HP-UX Update for Thunderbird HPSBUX02156", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-1558", "CVE-2006-1531", "CVE-2007-3734", "CVE-2007-2868", "CVE-2006-1530", "CVE-2006-0748", "CVE-2007-3845", "CVE-2006-0299", "CVE-2006-3806", "CVE-2006-3809", "CVE-2006-1728", "CVE-2006-1730", "CVE-2006-0293", "CVE-2007-5340", "CVE-2006-3803", "CVE-2006-1726", "CVE-2006-2780", "CVE-2006-3807", "CVE-2006-3811", "CVE-2007-3844", "CVE-2006-0292", "CVE-2006-0884", "CVE-2006-2776", "CVE-2007-3670", "CVE-2006-3804", "CVE-2006-2778", "CVE-2006-1727", "CVE-2006-3810", "CVE-2006-2779", "CVE-2006-2781", "CVE-2006-1045", "CVE-2006-3801", "CVE-2007-2867", "CVE-2006-2786", "CVE-2006-1529", "CVE-2006-3113", "CVE-2007-5339", "CVE-2006-2783", "CVE-2006-3805", "CVE-2006-0296", "CVE-2006-0294", "CVE-2006-2787", "CVE-2007-3735", "CVE-2006-0295", "CVE-2006-2775", "CVE-2006-1724", "CVE-2006-1723", "CVE-2006-0298", "CVE-2006-3808", "CVE-2006-0297", "CVE-2007-4841", "CVE-2006-3802"], "modified": "2018-04-06T00:00:00", "id": "OPENVAS:1361412562310835179", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310835179", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# HP-UX Update for Thunderbird HPSBUX02156\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_impact = \"Remote unauthorized access\n elevation of privileges\n Denial of Service (DoS)\";\ntag_affected = \"Thunderbird on\n Thunderbird email application prior to v2.0.0.9 running on HP-UX B.11.11, \n B.11.23, and B.11.31.\";\ntag_insight = \"Potential security vulnerabilities have been identified with Thunderbird \n running on HP-UX. These vulnerabilities could be exploited remotely \n resulting in unauthorized access, elevation of privileges, or Denial of \n Service (DoS).\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00774579-4\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.835179\");\n script_version(\"$Revision: 9370 $\");\n script_cve_id(\"CVE-2006-0292\", \"CVE-2006-0293\", \"CVE-2006-0294\", \"CVE-2006-0295\", \n \"CVE-2006-0296\", \"CVE-2006-0297\", \"CVE-2006-0298\", \"CVE-2006-0299\", \n \"CVE-2006-0748\", \"CVE-2006-0884\", \"CVE-2006-1045\", \"CVE-2006-1529\", \n \"CVE-2006-1530\", \"CVE-2006-1531\", \"CVE-2006-1723\", \"CVE-2006-1724\", \n \"CVE-2006-1726\", \"CVE-2006-1727\", \"CVE-2006-1728\", \"CVE-2006-1730\", \n \"CVE-2006-2775\", \"CVE-2006-2776\", \"CVE-2006-2778\", \"CVE-2006-2779\", \n \"CVE-2006-2780\", \"CVE-2006-2781\", \"CVE-2006-2783\", \"CVE-2006-2786\", \n \"CVE-2006-2787\", \"CVE-2006-3113\", \"CVE-2006-3801\", \"CVE-2006-3802\", \n \"CVE-2006-3803\", \"CVE-2006-3804\", \"CVE-2006-3805\", \"CVE-2006-3806\", \n \"CVE-2006-3807\", \"CVE-2006-3808\", \"CVE-2006-3809\", \"CVE-2006-3810\", \n \"CVE-2006-3811\", \"CVE-2007-1558\", \"CVE-2007-2867\", \"CVE-2007-2868\", \n \"CVE-2007-3670\", \"CVE-2007-3734\", \"CVE-2007-3735\", \"CVE-2007-3844\", \n \"CVE-2007-3845\", \"CVE-2007-4841\", \"CVE-2007-5339\", \"CVE-2007-5340\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 10:53:14 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-05-05 12:14:23 +0200 (Tue, 05 May 2009)\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"HPSBUX\", value: \"02156\");\n script_name( \"HP-UX Update for Thunderbird HPSBUX02156\");\n\n script_tag(name:\"summary\", value:\"Check for the Version of Thunderbird\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"HP-UX Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/hp_hp-ux\", \"ssh/login/release\");\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-hpux.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"HPUX11.31\")\n{\n\n if ((res = ishpuxpkgvuln(pkg:\"Tbird.TBIRD-COM\", revision:\"2.0.0.9\", rls:\"HPUX11.31\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"HPUX11.23\")\n{\n\n if ((res = ishpuxpkgvuln(pkg:\"Tbird.TBIRD-COM\", revision:\"2.0.0.9\", rls:\"HPUX11.23\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"HPUX11.11\")\n{\n\n if ((res = ishpuxpkgvuln(pkg:\"Tbird.TBIRD-COM\", revision:\"2.0.0.9\", rls:\"HPUX11.11\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-24T12:56:34", "description": "Check for the Version of Thunderbird", "cvss3": {}, "published": "2009-05-05T00:00:00", "type": "openvas", "title": "HP-UX Update for Thunderbird HPSBUX02156", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-1558", "CVE-2006-1531", "CVE-2007-3734", "CVE-2007-2868", "CVE-2006-1530", "CVE-2006-0748", "CVE-2007-3845", "CVE-2006-0299", "CVE-2006-3806", "CVE-2006-3809", "CVE-2006-1728", "CVE-2006-1730", "CVE-2006-0293", "CVE-2007-5340", "CVE-2006-3803", "CVE-2006-1726", "CVE-2006-2780", "CVE-2006-3807", "CVE-2006-3811", "CVE-2007-3844", "CVE-2006-0292", "CVE-2006-0884", "CVE-2006-2776", "CVE-2007-3670", "CVE-2006-3804", "CVE-2006-2778", "CVE-2006-1727", "CVE-2006-3810", "CVE-2006-2779", "CVE-2006-2781", "CVE-2006-1045", "CVE-2006-3801", "CVE-2007-2867", "CVE-2006-2786", "CVE-2006-1529", "CVE-2006-3113", "CVE-2007-5339", "CVE-2006-2783", "CVE-2006-3805", "CVE-2006-0296", "CVE-2006-0294", "CVE-2006-2787", "CVE-2007-3735", "CVE-2006-0295", "CVE-2006-2775", "CVE-2006-1724", "CVE-2006-1723", "CVE-2006-0298", "CVE-2006-3808", "CVE-2006-0297", "CVE-2007-4841", "CVE-2006-3802"], "modified": "2017-07-06T00:00:00", "id": "OPENVAS:835179", "href": "http://plugins.openvas.org/nasl.php?oid=835179", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# HP-UX Update for Thunderbird HPSBUX02156\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_impact = \"Remote unauthorized access\n elevation of privileges\n Denial of Service (DoS)\";\ntag_affected = \"Thunderbird on\n Thunderbird email application prior to v2.0.0.9 running on HP-UX B.11.11, \n B.11.23, and B.11.31.\";\ntag_insight = \"Potential security vulnerabilities have been identified with Thunderbird \n running on HP-UX. These vulnerabilities could be exploited remotely \n resulting in unauthorized access, elevation of privileges, or Denial of \n Service (DoS).\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c00774579-4\");\n script_id(835179);\n script_version(\"$Revision: 6584 $\");\n script_cve_id(\"CVE-2006-0292\", \"CVE-2006-0293\", \"CVE-2006-0294\", \"CVE-2006-0295\", \n \"CVE-2006-0296\", \"CVE-2006-0297\", \"CVE-2006-0298\", \"CVE-2006-0299\", \n \"CVE-2006-0748\", \"CVE-2006-0884\", \"CVE-2006-1045\", \"CVE-2006-1529\", \n \"CVE-2006-1530\", \"CVE-2006-1531\", \"CVE-2006-1723\", \"CVE-2006-1724\", \n \"CVE-2006-1726\", \"CVE-2006-1727\", \"CVE-2006-1728\", \"CVE-2006-1730\", \n \"CVE-2006-2775\", \"CVE-2006-2776\", \"CVE-2006-2778\", \"CVE-2006-2779\", \n \"CVE-2006-2780\", \"CVE-2006-2781\", \"CVE-2006-2783\", \"CVE-2006-2786\", \n \"CVE-2006-2787\", \"CVE-2006-3113\", \"CVE-2006-3801\", \"CVE-2006-3802\", \n \"CVE-2006-3803\", \"CVE-2006-3804\", \"CVE-2006-3805\", \"CVE-2006-3806\", \n \"CVE-2006-3807\", \"CVE-2006-3808\", \"CVE-2006-3809\", \"CVE-2006-3810\", \n \"CVE-2006-3811\", \"CVE-2007-1558\", \"CVE-2007-2867\", \"CVE-2007-2868\", \n \"CVE-2007-3670\", \"CVE-2007-3734\", \"CVE-2007-3735\", \"CVE-2007-3844\", \n \"CVE-2007-3845\", \"CVE-2007-4841\", \"CVE-2007-5339\", \"CVE-2007-5340\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-06 16:13:23 +0200 (Thu, 06 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-05-05 12:14:23 +0200 (Tue, 05 May 2009)\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"HPSBUX\", value: \"02156\");\n script_name( \"HP-UX Update for Thunderbird HPSBUX02156\");\n\n script_summary(\"Check for the Version of Thunderbird\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"HP-UX Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/hp_hp-ux\", \"ssh/login/release\");\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-hpux.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"HPUX11.31\")\n{\n\n if ((res = ishpuxpkgvuln(pkg:\"Tbird.TBIRD-COM\", revision:\"2.0.0.9\", rls:\"HPUX11.31\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"HPUX11.23\")\n{\n\n if ((res = ishpuxpkgvuln(pkg:\"Tbird.TBIRD-COM\", revision:\"2.0.0.9\", rls:\"HPUX11.23\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"HPUX11.11\")\n{\n\n if ((res = ishpuxpkgvuln(pkg:\"Tbird.TBIRD-COM\", revision:\"2.0.0.9\", rls:\"HPUX11.11\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "gentoo": [{"lastseen": "2022-01-17T19:17:38", "description": "### Background\n\nThe Mozilla Thunderbird mail client is a redesign of the Mozilla Mail component. The goal is to produce a cross-platform stand-alone mail application using XUL (XML User Interface Language). \n\n### Description\n\nThe following vulnerabilities have been reported: \n\n * Benjamin Smedberg discovered that chrome URLss could be made to reference remote files.\n * Developers in the Mozilla community looked for and fixed several crash bugs to improve the stability of Mozilla clients.\n * \"shutdown\" reports that cross-site scripting (XSS) attacks could be performed using the construct XPCNativeWrapper(window).Function(...), which created a function that appeared to belong to the window in question even after it had been navigated to the target site.\n * \"shutdown\" reports that scripts granting the UniversalBrowserRead privilege can leverage that into the equivalent of the far more powerful UniversalXPConnect since they are allowed to \"read\" into a privileged context.\n * \"moz_bug_r_a4\" discovered that Named JavaScript functions have a parent object created using the standard Object() constructor (ECMA-specified behavior) and that this constructor can be redefined by script (also ECMA-specified behavior).\n * Igor Bukanov and shutdown found additional places where an untimely garbage collection could delete a temporary object that was in active use.\n * Georgi Guninski found potential integer overflow issues with long strings in the toSource() methods of the Object, Array and String objects as well as string function arguments.\n * H. D. Moore reported a testcase that was able to trigger a race condition where JavaScript garbage collection deleted a temporary variable still being used in the creation of a new Function object.\n * A malicious page can hijack native DOM methods on a document object in another domain, which will run the attacker's script when called by the victim page.\n * Secunia Research has discovered a vulnerability which is caused due to an memory corruption error within the handling of simultaneously happening XPCOM events. This leads to use of a deleted timer object.\n\n### Impact\n\nA user can be enticed to open specially crafted URLs, visit webpages containing malicious JavaScript or execute a specially crafted script. These events could lead to the execution of arbitrary code, or the installation of malware on the user's computer. \n\n### Workaround\n\nThere is no known workaround at this time. \n\n### Resolution\n\nAll Mozilla Thunderbird users should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=mail-client/mozilla-thunderbird-1.5.0.5\"\n\nAll Mozilla Thunderbird binary users should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=mail-client/mozilla-thunderbird-bin-1.5.0.5\"", "cvss3": {}, "published": "2006-08-03T00:00:00", "type": "gentoo", "title": "Mozilla Thunderbird: Multiple vulnerabilities", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": true}, "cvelist": ["CVE-2006-3113", "CVE-2006-3802", "CVE-2006-3803", "CVE-2006-3804", "CVE-2006-3805", "CVE-2006-3806", "CVE-2006-3807", "CVE-2006-3809", "CVE-2006-3810", "CVE-2006-3811", "CVE-2006-3812"], "modified": "2006-08-03T00:00:00", "id": "GLSA-200608-04", "href": "https://security.gentoo.org/glsa/200608-04", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-01-17T19:17:38", "description": "### Background\n\nMozilla Firefox is a redesign of the Mozilla Navigator component. The goal is to produce a cross-platform stand-alone browser application. \n\n### Description\n\nThe following vulnerabilities have been reported: \n\n * Benjamin Smedberg discovered that chrome URL's could be made to reference remote files.\n * Developers in the Mozilla community looked for and fixed several crash bugs to improve the stability of Mozilla clients.\n * \"shutdown\" reports that cross-site scripting (XSS) attacks could be performed using the construct XPCNativeWrapper(window).Function(...), which created a function that appeared to belong to the window in question even after it had been navigated to the target site.\n * \"shutdown\" reports that scripts granting the UniversalBrowserRead privilege can leverage that into the equivalent of the far more powerful UniversalXPConnect since they are allowed to \"read\" into a privileged context.\n * \"moz_bug_r_a4\" reports that A malicious Proxy AutoConfig (PAC) server could serve a PAC script that can execute code with elevated privileges by setting the required FindProxyForURL function to the eval method on a privileged object that leaked into the PAC sandbox.\n * \"moz_bug_r_a4\" discovered that Named JavaScript functions have a parent object created using the standard Object() constructor (ECMA-specified behavior) and that this constructor can be redefined by script (also ECMA-specified behavior).\n * Igor Bukanov and shutdown found additional places where an untimely garbage collection could delete a temporary object that was in active use.\n * Georgi Guninski found potential integer overflow issues with long strings in the toSource() methods of the Object, Array and String objects as well as string function arguments.\n * H. D. Moore reported a testcase that was able to trigger a race condition where JavaScript garbage collection deleted a temporary variable still being used in the creation of a new Function object.\n * A malicious page can hijack native DOM methods on a document object in another domain, which will run the attacker's script when called by the victim page.\n * Secunia Research has discovered a vulnerability which is caused due to an memory corruption error within the handling of simultaneously happening XPCOM events. This leads to use of a deleted timer object.\n * An anonymous researcher for TippingPoint and the Zero Day Initiative showed that when used in a web page Java would reference properties of the window.navigator object as it started up.\n * Thilo Girmann discovered that in certain circumstances a JavaScript reference to a frame or window was not properly cleared when the referenced content went away.\n\n### Impact\n\nA user can be enticed to open specially crafted URLs, visit webpages containing malicious JavaScript or execute a specially crafted script. These events could lead to the execution of arbitrary code, or the installation of malware on the user's computer. \n\n### Workaround\n\nThere is no known workaround at this time. \n\n### Resolution\n\nAll Mozilla Firefox users should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=www-client/mozilla-firefox-1.5.0.5\"\n\nUsers of the binary package should upgrade as well: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=www-client/mozilla-firefox-bin-1.5.0.5\"", "cvss3": {}, "published": "2006-08-03T00:00:00", "type": "gentoo", "title": "Mozilla Firefox: Multiple vulnerabilities", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": true}, "cvelist": ["CVE-2006-3113", "CVE-2006-3677", "CVE-2006-3801", "CVE-2006-3802", "CVE-2006-3803", "CVE-2006-3805", "CVE-2006-3806", "CVE-2006-3807", "CVE-2006-3808", "CVE-2006-3809", "CVE-2006-3810", "CVE-2006-3811", "CVE-2006-3812"], "modified": "2006-08-03T00:00:00", "id": "GLSA-200608-03", "href": "https://security.gentoo.org/glsa/200608-03", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-01-17T19:17:37", "description": "### Background\n\nThe Mozilla SeaMonkey project is a community effort to deliver production-quality releases of code derived from the application formerly known as \"Mozilla Application Suite\". \n\n### Description\n\nThe following vulnerabilities have been reported: \n\n * Benjamin Smedberg discovered that chrome URL's could be made to reference remote files.\n * Developers in the Mozilla community looked for and fixed several crash bugs to improve the stability of Mozilla clients, which could lead to the execution of arbitrary code by a remote attacker.\n * \"shutdown\" reports that cross-site scripting (XSS) attacks could be performed using the construct XPCNativeWrapper(window).Function(...), which created a function that appeared to belong to the window in question even after it had been navigated to the target site.\n * \"shutdown\" reports that scripts granting the UniversalBrowserRead privilege can leverage that into the equivalent of the far more powerful UniversalXPConnect since they are allowed to \"read\" into a privileged context.\n * \"moz_bug_r_a4\" reports that A malicious Proxy AutoConfig (PAC) server could serve a PAC script that can execute code with elevated privileges by setting the required FindProxyForURL function to the eval method on a privileged object that leaked into the PAC sandbox.\n * \"moz_bug_r_a4\" discovered that Named JavaScript functions have a parent object created using the standard Object() constructor (ECMA-specified behavior) and that this constructor can be redefined by script (also ECMA-specified behavior).\n * Igor Bukanov and shutdown found additional places where an untimely garbage collection could delete a temporary object that was in active use.\n * Georgi Guninski found potential integer overflow issues with long strings in the toSource() methods of the Object, Array and String objects as well as string function arguments.\n * H. D. Moore reported a testcase that was able to trigger a race condition where JavaScript garbage collection deleted a temporary variable still being used in the creation of a new Function object.\n * A malicious page can hijack native DOM methods on a document object in another domain, which will run the attacker's script when called by the victim page.\n * Secunia Research has discovered a vulnerability which is caused due to an memory corruption error within the handling of simultaneously happening XPCOM events. This leads to use of a deleted timer object.\n * An anonymous researcher for TippingPoint and the Zero Day Initiative showed that when used in a web page Java would reference properties of the window.navigator object as it started up.\n * Thilo Girmann discovered that in certain circumstances a JavaScript reference to a frame or window was not properly cleared when the referenced content went away.\n\n### Impact\n\nA user can be enticed to open specially crafted URLs, visit webpages containing malicious JavaScript or execute a specially crafted script. These events could lead to the execution of arbitrary code, or the installation of malware on the user's computer. \n\n### Workaround\n\nThere is no known workaround at this time. \n\n### Resolution\n\nAll Thunderbird users should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=www-client/seamonkey-1.0.3\"", "cvss3": {}, "published": "2006-08-03T00:00:00", "type": "gentoo", "title": "Mozilla SeaMonkey: Multiple vulnerabilities", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": true}, "cvelist": ["CVE-2006-3113", "CVE-2006-3677", "CVE-2006-3801", "CVE-2006-3802", "CVE-2006-3803", "CVE-2006-3804", "CVE-2006-3805", "CVE-2006-3806", "CVE-2006-3807", "CVE-2006-3808", "CVE-2006-3809", "CVE-2006-3810", "CVE-2006-3811", "CVE-2006-3812"], "modified": "2006-08-03T00:00:00", "id": "GLSA-200608-02", "href": "https://security.gentoo.org/glsa/200608-02", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "ubuntu": [{"lastseen": "2022-01-04T13:35:59", "description": "Various flaws have been reported that allow an attacker to execute \narbitrary code with user privileges by tricking the user into opening \na malicious email containing JavaScript. Please note that JavaScript \nis disabled by default for emails, and it is not recommended to enable \nit. (CVE-2006-3113, CVE-2006-3802, CVE-2006-3803, CVE-2006-3805, \nCVE-2006-3806, CVE-2006-3807, CVE-2006-3809, CVE-2006-3810, \nCVE-2006-3811, CVE-2006-3812)\n\nA buffer overflow has been discovered in the handling of .vcard files. \nBy tricking a user into importing a malicious vcard into his contacts, \nthis could be exploited to execute arbitrary code with the user's \nprivileges. (CVE-2006-3084)\n\nThe \"enigmail\" plugin has been updated to work with the new \nThunderbird version.\n", "cvss3": {}, "published": "2006-07-29T00:00:00", "type": "ubuntu", "title": "Thunderbird vulnerabilities", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": true}, "cvelist": ["CVE-2006-3807", "CVE-2006-3803", "CVE-2006-3812", "CVE-2006-3113", "CVE-2006-3804", "CVE-2006-3084", "CVE-2006-3806", "CVE-2006-3810", "CVE-2006-3811", "CVE-2006-3802", "CVE-2006-3809", "CVE-2006-3805"], "modified": "2006-07-29T00:00:00", "id": "USN-329-1", "href": "https://ubuntu.com/security/notices/USN-329-1", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-01-04T13:35:57", "description": "Various flaws have been reported that allow an attacker to execute \narbitrary code with user privileges by tricking the user into opening \na malicious URL. (CVE-2006-3113, CVE-2006-3677, CVE-2006-3801, \nCVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3807, \nCVE-2006-3809, CVE-2006-3811, CVE-2006-3812)\n\ncross-site scripting vulnerabilities were found in the \nXPCNativeWrapper() function and native DOM method handlers. A \nmalicious web site could exploit these to modify the contents or steal \nconfidential data (such as passwords) from other opened web pages. \n(CVE-2006-3802, CVE-2006-3810)\n\nA bug was found in the script handler for automatic proxy \nconfiguration. A malicious proxy could send scripts which could \nexecute arbitrary code with the user's privileges. (CVE-2006-3808)\n\nPlease see\n\n<http://www.mozilla.org/projects/security/known-vulnerabilities.html#Firefox>\n\nfor technical details of these vulnerabilities.\n", "cvss3": {}, "published": "2006-07-28T00:00:00", "type": "ubuntu", "title": "firefox vulnerabilities", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": true}, "cvelist": ["CVE-2006-3807", "CVE-2006-3803", "CVE-2006-3812", "CVE-2006-3113", "CVE-2006-3806", "CVE-2006-3810", "CVE-2006-3805", "CVE-2006-3801", "CVE-2006-3811", "CVE-2006-3802", "CVE-2006-3809", "CVE-2006-3677", "CVE-2006-3808"], "modified": "2006-07-28T00:00:00", "id": "USN-327-1", "href": "https://ubuntu.com/security/notices/USN-327-1", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-01-04T13:35:55", "description": "This update upgrades Thunderbird from 1.0.8 to 1.5.0.7. This step was \nnecessary since the 1.0.x series is not supported by upstream any \nmore.\n\nVarious flaws have been reported that allow an attacker to execute \narbitrary code with user privileges by tricking the user into opening \na malicious email containing JavaScript. Please note that JavaScript \nis disabled by default for emails, and it is not recommended to enable \nit. (CVE-2006-3113, CVE-2006-3802, CVE-2006-3803, CVE-2006-3805, \nCVE-2006-3806, CVE-2006-3807, CVE-2006-3809, CVE-2006-3810, \nCVE-2006-3811, CVE-2006-3812, CVE-2006-4253, CVE-2006-4565, \nCVE-2006-4566, CVE-2006-4571)\n\nA buffer overflow has been discovered in the handling of .vcard files. \nBy tricking a user into importing a malicious vcard into his contacts, \nthis could be exploited to execute arbitrary code with the user's \nprivileges. (CVE-2006-3804)\n\nThe NSS library did not sufficiently check the padding of PKCS #1 v1.5 \nsignatures if the exponent of the public key is 3 (which is widely \nused for CAs). This could be exploited to forge valid signatures \nwithout the need of the secret key. (CVE-2006-4340)\n\nJon Oberheide reported a way how a remote attacker could trick users \ninto downloading arbitrary extensions with circumventing the normal \nSSL certificate check. The attacker would have to be in a position to \nspoof the victim's DNS, causing them to connect to sites of the \nattacker's choosing rather than the sites intended by the victim. If \nthey gained that control and the victim accepted the attacker's cert \nfor the Mozilla update site, then the next update check could be \nhijacked and redirected to the attacker's site without detection. \n(CVE-2006-4567)\n\nGeorgi Guninski discovered that even with JavaScript disabled, a \nmalicous email could still execute JavaScript when the message is \nviewed, replied to, or forwarded by putting the script in a remote XBL \nfile loaded by the message. (CVE-2006-4570)\n\nThe \"enigmail\" plugin and the translation packages have been updated \nto work with the new Thunderbird version.\n", "cvss3": {}, "published": "2006-09-22T00:00:00", "type": "ubuntu", "title": "Thunderbird vulnerabilities", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": true, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2006-3807", "CVE-2006-3803", "CVE-2006-3812", "CVE-2006-3113", "CVE-2006-3804", "CVE-2006-4566", "CVE-2006-4571", "CVE-2006-4340", "CVE-2006-3806", "CVE-2006-3810", "CVE-2006-4253", "CVE-2006-3811", "CVE-2006-4565", "CVE-2006-3802", "CVE-2006-3809", "CVE-2006-4567", "CVE-2006-3805", "CVE-2006-4570"], "modified": "2006-09-22T00:00:00", "id": "USN-350-1", "href": "https://ubuntu.com/security/notices/USN-350-1", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "redhat": [{"lastseen": "2021-10-21T04:45:05", "description": "SeaMonkey is an open source Web browser, advanced email and newsgroup\r\nclient, IRC chat client, and HTML editor.\r\n\r\nSeveral flaws were found in the way SeaMonkey processed certain javascript\r\nactions. A malicious web page could execute arbitrary javascript\r\ninstructions with the permissions of \"chrome\", allowing the page to steal\r\nsensitive information or install browser malware. (CVE-2006-3807,\r\nCVE-2006-3809, CVE-2006-3812)\r\n\r\nSeveral denial of service flaws were found in the way SeaMonkey processed\r\ncertain web content. A malicious web page could crash the browser or\r\npossibly execute arbitrary code as the user running SeaMonkey.\r\n(CVE-2006-3801, CVE-2006-3677, CVE-2006-3113, CVE-2006-3803, CVE-2006-3805,\r\nCVE-2006-3806, CVE-2006-3811)\r\n\r\nA buffer overflow flaw was found in the way SeaMonkey Messenger displayed\r\nmalformed inline vcard attachments. If a victim viewed an email message\r\ncontaining a carefully crafted vcard, it was possible to execute arbitrary\r\ncode as the user running SeaMonkey Messenger. (CVE-2006-3804)\r\n\r\nSeveral flaws were found in the way SeaMonkey processed certain javascript\r\nactions. A malicious web page could conduct a cross-site scripting attack\r\nor steal sensitive information (such as cookies owned by other domains).\r\n(CVE-2006-3802, CVE-2006-3810)\r\n\r\nA flaw was found in the way SeaMonkey processed Proxy AutoConfig scripts. A\r\nmalicious Proxy AutoConfig server could execute arbitrary javascript\r\ninstructions with the permissions of \"chrome\", allowing the page to steal\r\nsensitive information or install browser malware. (CVE-2006-3808)\r\n\r\nUsers of SeaMonkey are advised to upgrade to this update, which contains\r\nSeaMonkey version 1.0.3 that corrects these issues.", "cvss3": {}, "published": "2006-07-27T00:00:00", "type": "redhat", "title": "(RHSA-2006:0608) seamonkey security update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": true}, "cvelist": ["CVE-2006-3113", "CVE-2006-3677", "CVE-2006-3801", "CVE-2006-3802", "CVE-2006-3803", "CVE-2006-3804", "CVE-2006-3805", "CVE-2006-3806", "CVE-2006-3807", "CVE-2006-3808", "CVE-2006-3809", "CVE-2006-3810", "CVE-2006-3811", "CVE-2006-3812"], "modified": "2017-07-29T16:33:39", "id": "RHSA-2006:0608", "href": "https://access.redhat.com/errata/RHSA-2006:0608", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-10-21T04:43:51", "description": "Mozilla Thunderbird is a standalone mail and newsgroup client.\r\n\r\nThe Mozilla Foundation has discontinued support for the Mozilla Thunderbird\r\n1.0 branch. This update deprecates the Mozilla Thunderbird 1.0 branch in\r\nRed Hat Enterprise Linux 4 in favor of the supported Mozilla Thunderbird\r\n1.5 branch.\r\n\r\nThis update also resolves a number of outstanding Thunderbird security issues:\r\n\r\nSeveral flaws were found in the way Thunderbird processed certain\r\njavascript actions. A malicious mail message could execute arbitrary\r\njavascript instructions with the permissions of \"chrome\", allowing the page\r\nto steal sensitive information or install browser malware. (CVE-2006-2776,\r\nCVE-2006-2784, CVE-2006-2785, CVE-2006-2787, CVE-2006-3807, CVE-2006-3809)\r\n\r\nSeveral denial of service flaws were found in the way Thunderbird processed\r\ncertain mail messages. A malicious web page could crash the browser or\r\npossibly execute arbitrary code as the user running Thunderbird.\r\n(CVE-2006-2779, CVE-2006-2780, CVE-2006-3801, CVE-2006-3677,\r\nCVE-2006-3113, CVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3811)\r\n\r\nSeveral flaws were found in the way Thunderbird processed certain\r\njavascript actions. A malicious mail message could conduct a cross-site\r\nscripting attack or steal sensitive information (such as cookies owned by\r\nother domains). (CVE-2006-3802, CVE-2006-3810)\r\n\r\nA form file upload flaw was found in the way Thunderbird handled javascript\r\ninput object mutation. A malicious mail message could upload an arbitrary\r\nlocal file at form submission time without user interaction. (CVE-2006-2782)\r\n\r\nA denial of service flaw was found in the way Thunderbird called the\r\ncrypto.signText() javascript function. A malicious mail message could crash\r\nthe browser if the victim had a client certificate loaded. (CVE-2006-2778)\r\n\r\nA flaw was found in the way Thunderbird processed Proxy AutoConfig scripts.\r\nA malicious Proxy AutoConfig server could execute arbitrary javascript\r\ninstructions with the permissions of \"chrome\", allowing the page to steal\r\nsensitive information or install client malware. (CVE-2006-3808)\r\n\r\nNote: Please note that JavaScript support is disabled by default in\r\nThunderbird. The above issues are not exploitable with JavaScript disabled. \r\n\r\nTwo flaws were found in the way Thunderbird displayed malformed inline\r\nvcard attachments. If a victim viewed an email message containing a\r\ncarefully crafted vcard it was possible to execute arbitrary code as the\r\nuser running Thunderbird. (CVE-2006-2781, CVE-2006-3804)\r\n\r\nA cross site scripting flaw was found in the way Thunderbird processed\r\nUnicode Byte-order-Mark (BOM) markers in UTF-8 mail messages. A malicious\r\nweb page could execute a script within the browser that a web input\r\nsanitizer could miss due to a malformed \"script\" tag. (CVE-2006-2783)\r\n\r\nTwo HTTP response smuggling flaws were found in the way Thunderbird\r\nprocessed certain invalid HTTP response headers. A malicious web site could\r\nreturn specially crafted HTTP response headers which may bypass HTTP proxy\r\nrestrictions. (CVE-2006-2786)\r\n\r\nA double free flaw was found in the way the nsIX509::getRawDER method was\r\ncalled. If a victim visited a carefully crafted web page, it was possible\r\nto crash Thunderbird. (CVE-2006-2788)\r\n\r\nUsers of Thunderbird are advised to upgrade to this update, which contains\r\nThunderbird version 1.5.0.5 that corrects these issues.", "cvss3": {}, "published": "2006-07-28T00:00:00", "type": "redhat", "title": "(RHSA-2006:0611) thunderbird security update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": true, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2006-2776", "CVE-2006-2778", "CVE-2006-2779", "CVE-2006-2780", "CVE-2006-2781", "CVE-2006-2782", "CVE-2006-2783", "CVE-2006-2784", "CVE-2006-2785", "CVE-2006-2786", "CVE-2006-2787", "CVE-2006-2788", "CVE-2006-3113", "CVE-2006-3677", "CVE-2006-3801", "CVE-2006-3802", "CVE-2006-3803", "CVE-2006-3804", "CVE-2006-3805", "CVE-2006-3806", "CVE-2006-3807", "CVE-2006-3808", "CVE-2006-3809", "CVE-2006-3810", "CVE-2006-3811"], "modified": "2017-09-08T08:12:04", "id": "RHSA-2006:0611", "href": "https://access.redhat.com/errata/RHSA-2006:0611", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-10-21T04:45:54", "description": "Mozilla Firefox is an open source Web browser.\r\n\r\nThe Mozilla Foundation has discontinued support for the Mozilla Firefox\r\n1.0 branch. This update deprecates the Mozilla Firefox 1.0 branch in\r\nRed Hat Enterprise Linux 4 in favor of the supported Mozilla Firefox\r\n1.5 branch.\r\n\r\nThis update also resolves a number of outstanding Firefox security issues:\r\n\r\nSeveral flaws were found in the way Firefox processed certain javascript\r\nactions. A malicious web page could execute arbitrary javascript\r\ninstructions with the permissions of \"chrome\", allowing the page to steal\r\nsensitive information or install browser malware. (CVE-2006-2776,\r\nCVE-2006-2784, CVE-2006-2785, CVE-2006-2787, CVE-2006-3807, CVE-2006-3809,\r\nCVE-2006-3812)\r\n\r\nSeveral denial of service flaws were found in the way Firefox processed\r\ncertain web content. A malicious web page could crash the browser or\r\npossibly execute arbitrary code as the user running Firefox.\r\n(CVE-2006-2779, CVE-2006-2780, CVE-2006-3801, CVE-2006-3677, CVE-2006-3113,\r\nCVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3811)\r\n\r\nA cross-site scripting flaw was found in the way Firefox processed\r\nUnicode Byte-Order-Mark (BOM) markers in UTF-8 web pages. A malicious web\r\npage could execute a script within the browser that a web input sanitizer\r\ncould miss due to a malformed \"script\" tag. (CVE-2006-2783)\r\n\r\nSeveral flaws were found in the way Firefox processed certain javascript\r\nactions. A malicious web page could conduct a cross-site scripting attack\r\nor steal sensitive information (such as cookies owned by other domains).\r\n(CVE-2006-3802, CVE-2006-3810)\r\n\r\nA form file upload flaw was found in the way Firefox handled javascript\r\ninput object mutation. A malicious web page could upload an arbitrary local\r\nfile at form submission time without user interaction. (CVE-2006-2782)\r\n\r\nA denial of service flaw was found in the way Firefox called the\r\ncrypto.signText() javascript function. A malicious web page could crash the\r\nbrowser if the victim had a client certificate loaded. (CVE-2006-2778)\r\n\r\nTwo HTTP response smuggling flaws were found in the way Firefox processed\r\ncertain invalid HTTP response headers. A malicious web site could return\r\nspecially crafted HTTP response headers which may bypass HTTP proxy\r\nrestrictions. (CVE-2006-2786)\r\n\r\nA flaw was found in the way Firefox processed Proxy AutoConfig scripts. A\r\nmalicious Proxy AutoConfig server could execute arbitrary javascript\r\ninstructions with the permissions of \"chrome\", allowing the page to steal\r\nsensitive information or install browser malware. (CVE-2006-3808)\r\n\r\nA double free flaw was found in the way the nsIX509::getRawDER method was\r\ncalled. If a victim visited a carefully crafted web page, it was possible\r\nto execute arbitrary code as the user running Firefox. (CVE-2006-2788)\r\n\r\nUsers of Firefox are advised to upgrade to this update, which contains\r\nFirefox version 1.5.0.5 that corrects these issues.", "cvss3": {}, "published": "2006-07-28T00:00:00", "type": "redhat", "title": "(RHSA-2006:0610) firefox security update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": true, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2006-2776", "CVE-2006-2778", "CVE-2006-2779", "CVE-2006-2780", "CVE-2006-2782", "CVE-2006-2783", "CVE-2006-2784", "CVE-2006-2785", "CVE-2006-2786", "CVE-2006-2787", "CVE-2006-2788", "CVE-2006-3113", "CVE-2006-3677", "CVE-2006-3801", "CVE-2006-3802", "CVE-2006-3803", "CVE-2006-3805", "CVE-2006-3806", "CVE-2006-3807", "CVE-2006-3808", "CVE-2006-3809", "CVE-2006-3810", "CVE-2006-3811", "CVE-2006-3812"], "modified": "2017-09-08T07:54:53", "id": "RHSA-2006:0610", "href": "https://access.redhat.com/errata/RHSA-2006:0610", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-10-21T04:44:44", "description": "Seamonkey is an open source Web browser, advanced email and newsgroup\r\nclient, IRC chat client, and HTML editor.\r\n\r\nThe Mozilla Foundation has discontinued support for the Mozilla Suite. This\r\nupdate deprecates the Mozilla Suite in Red Hat Enterprise Linux 4 in\r\nfavor of the supported Seamonkey Suite.\r\n\r\nThis update also resolves a number of outstanding Mozilla security issues:\r\n\r\nSeveral flaws were found in the way Seamonkey processed certain javascript\r\nactions. A malicious web page could execute arbitrary javascript\r\ninstructions with the permissions of \"chrome\", allowing the page to steal\r\nsensitive information or install browser malware. (CVE-2006-2776,\r\nCVE-2006-2784, CVE-2006-2785, CVE-2006-2787, CVE-2006-3807, CVE-2006-3809,\r\nCVE-2006-3812)\r\n\r\nSeveral denial of service flaws were found in the way Seamonkey processed\r\ncertain web content. A malicious web page could crash the browser or\r\npossibly execute arbitrary code as the user running Seamonkey.\r\n(CVE-2006-2779, CVE-2006-2780, CVE-2006-3801, CVE-2006-3677, CVE-2006-3113,\r\nCVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3811)\r\n\r\nTwo flaws were found in the way Seamonkey-mail displayed malformed\r\ninline vcard attachments. If a victim viewed an email message containing\r\na carefully crafted vcard it was possible to execute arbitrary code as the\r\nuser running Mozilla-mail. (CVE-2006-2781, CVE-2006-3804)\r\n\r\nA cross-site scripting flaw was found in the way Seamonkey processed\r\nUnicode Byte-Order-Mark (BOM) markers in UTF-8 web pages. A malicious web\r\npage could execute a script within the browser that a web input sanitizer\r\ncould miss due to a malformed \"script\" tag. (CVE-2006-2783)\r\n\r\nSeveral flaws were found in the way Seamonkey processed certain javascript\r\nactions. A malicious web page could conduct a cross-site scripting attack\r\nor steal sensitive information (such as cookies owned by other domains).\r\n(CVE-2006-3802, CVE-2006-3810)\r\n\r\nA form file upload flaw was found in the way Seamonkey handled javascript\r\ninput object mutation. A malicious web page could upload an arbitrary local\r\nfile at form submission time without user interaction. (CVE-2006-2782)\r\n\r\nA denial of service flaw was found in the way Seamonkey called the\r\ncrypto.signText() javascript function. A malicious web page could crash the\r\nbrowser if the victim had a client certificate loaded. (CVE-2006-2778)\r\n\r\nTwo HTTP response smuggling flaws were found in the way Seamonkey processed\r\ncertain invalid HTTP response headers. A malicious web site could return\r\nspecially crafted HTTP response headers which may bypass HTTP proxy\r\nrestrictions. (CVE-2006-2786)\r\n\r\nA flaw was found in the way Seamonkey processed Proxy AutoConfig scripts. A\r\nmalicious Proxy AutoConfig server could execute arbitrary javascript\r\ninstructions with the permissions of \"chrome\", allowing the page to steal\r\nsensitive information or install browser malware. (CVE-2006-3808)\r\n\r\nA double free flaw was found in the way the nsIX509::getRawDER method was\r\ncalled. If a victim visited a carefully crafted web page, it was possible\r\nto execute arbitrary code as the user running Mozilla. (CVE-2006-2788)\r\n\r\nUsers of Mozilla are advised to upgrade to this update, which contains\r\nSeamonkey version 1.0.3 that corrects these issues.", "cvss3": {}, "published": "2006-08-02T00:00:00", "type": "redhat", "title": "(RHSA-2006:0609) seamonkey security update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": true, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2006-2776", "CVE-2006-2778", "CVE-2006-2779", "CVE-2006-2780", "CVE-2006-2781", "CVE-2006-2782", "CVE-2006-2783", "CVE-2006-2784", "CVE-2006-2785", "CVE-2006-2786", "CVE-2006-2787", "CVE-2006-2788", "CVE-2006-3113", "CVE-2006-3677", "CVE-2006-3801", "CVE-2006-3802", "CVE-2006-3803", "CVE-2006-3804", "CVE-2006-3805", "CVE-2006-3806", "CVE-2006-3807", "CVE-2006-3808", "CVE-2006-3809", "CVE-2006-3810", "CVE-2006-3811", "CVE-2006-3812"], "modified": "2017-09-08T07:49:07", "id": "RHSA-2006:0609", "href": "https://access.redhat.com/errata/RHSA-2006:0609", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-10-21T04:44:37", "description": "SeaMonkey is an open source Web browser, advanced email and newsgroup\r\nclient, IRC chat client, and HTML editor.\r\n\r\nThe Mozilla Foundation has discontinued support for the Mozilla Suite. This\r\nupdate deprecates the Mozilla Suite in Red Hat Enterprise Linux 2.1 in\r\nfavor of the supported SeaMonkey Suite.\r\n\r\nThis update also resolves a number of outstanding Mozilla security issues:\r\n\r\nSeveral flaws were found in the way SeaMonkey processed certain javascript\r\nactions. A malicious web page could execute arbitrary javascript\r\ninstructions with the permissions of \"chrome\", allowing the page to steal\r\nsensitive information or install browser malware. (CVE-2006-2776,\r\nCVE-2006-2784, CVE-2006-2785, CVE-2006-2787, CVE-2006-3807, CVE-2006-3809,\r\nCVE-2006-3812)\r\n\r\nSeveral denial of service flaws were found in the way SeaMonkey processed\r\ncertain web content. A malicious web page could crash the browser or\r\npossibly execute arbitrary code as the user running SeaMonkey.\r\n(CVE-2006-2779, CVE-2006-2780, CVE-2006-3801, CVE-2006-3677, CVE-2006-3113,\r\nCVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3811)\r\n\r\nTwo flaws were found in the way SeaMonkey Messenger displayed malformed\r\ninline vcard attachments. If a victim viewed an email message containing\r\na carefully crafted vcard it was possible to execute arbitrary code as the\r\nuser running SeaMonkey Messenger. (CVE-2006-2781, CVE-2006-3804)\r\n\r\nA cross-site scripting flaw was found in the way SeaMonkey processed\r\nUnicode Byte-Order-Mark (BOM) markers in UTF-8 web pages. A malicious web\r\npage could execute a script within the browser that a web input sanitizer\r\ncould miss due to a malformed \"script\" tag. (CVE-2006-2783)\r\n\r\nSeveral flaws were found in the way SeaMonkey processed certain javascript\r\nactions. A malicious web page could conduct a cross-site scripting attack\r\nor steal sensitive information (such as cookies owned by other domains).\r\n(CVE-2006-3802, CVE-2006-3810)\r\n\r\nA form file upload flaw was found in the way SeaMonkey handled javascript\r\ninput object mutation. A malicious web page could upload an arbitrary local\r\nfile at form submission time without user interaction. (CVE-2006-2782)\r\n\r\nA denial of service flaw was found in the way SeaMonkey called the\r\ncrypto.signText() javascript function. A malicious web page could crash the\r\nbrowser if the victim had a client certificate loaded. (CVE-2006-2778)\r\n\r\nTwo HTTP response smuggling flaws were found in the way SeaMonkey processed\r\ncertain invalid HTTP response headers. A malicious web site could return\r\nspecially crafted HTTP response headers which may bypass HTTP proxy\r\nrestrictions. (CVE-2006-2786)\r\n\r\nA flaw was found in the way SeaMonkey processed Proxy AutoConfig scripts. A\r\nmalicious Proxy AutoConfig server could execute arbitrary javascript\r\ninstructions with the permissions of \"chrome\", allowing the page to steal\r\nsensitive information or install browser malware. (CVE-2006-3808)\r\n\r\nA double free flaw was found in the way the nsIX509::getRawDER method was\r\ncalled. If a victim visited a carefully crafted web page it was possible to\r\nexecute arbitrary code as the user running SeaMonkey. (CVE-2006-2788)\r\n\r\nUsers of Mozilla are advised to upgrade to this update, which contains\r\nSeaMonkey version 1.0.3 that corrects these issues.", "cvss3": {}, "published": "2006-08-28T00:00:00", "type": "redhat", "title": "(RHSA-2006:0594) seamonkey security update (was mozilla)", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": true, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2006-2776", "CVE-2006-2778", "CVE-2006-2779", "CVE-2006-2780", "CVE-2006-2781", "CVE-2006-2782", "CVE-2006-2783", "CVE-2006-2784", "CVE-2006-2785", "CVE-2006-2786", "CVE-2006-2787", "CVE-2006-2788", "CVE-2006-3113", "CVE-2006-3677", "CVE-2006-3801", "CVE-2006-3802", "CVE-2006-3803", "CVE-2006-3804", "CVE-2006-3805", "CVE-2006-3806", "CVE-2006-3807", "CVE-2006-3808", "CVE-2006-3809", "CVE-2006-3810", "CVE-2006-3811", "CVE-2006-3812"], "modified": "2018-03-14T15:28:05", "id": "RHSA-2006:0594", "href": "https://access.redhat.com/errata/RHSA-2006:0594", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "freebsd": [{"lastseen": "2022-01-19T16:03:50", "description": "\n\nA Mozilla Foundation Security Advisory reports of multiple\n\t issues. Several of which can be used to run arbitrary code\n\t with the privilege of the user running the program.\n\n\nMFSA 2006-56 chrome: scheme loading remote content\nMFSA 2006-55 Crashes with evidence of memory corruption\n\t (rv:1.8.0.5)\nMFSA 2006-54 XSS with\n\t XPCNativeWrapper(window).Function(...)\nMFSA 2006-53 UniversalBrowserRead privilege escalation\nMFSA 2006-52 PAC privilege escalation using\n\t Function.prototype.call\nMFSA 2006-51 Privilege escalation using named-functions\n\t and redefined \"new Object()\"\nMFSA 2006-50 JavaScript engine vulnerabilities\nMFSA 2006-49 Heap buffer overwrite on malformed VCard\nMFSA 2006-48 JavaScript new Function race condition\nMFSA 2006-47 Native DOM methods can be hijacked across\n\t domains\nMFSA 2006-46 Memory corruption with simultaneous events\nMFSA 2006-45 Javascript navigator Object Vulnerability\nMFSA 2006-44 Code execution through deleted frame\n\t reference\n\n\n\n", "cvss3": {}, "published": "2006-07-25T00:00:00", "type": "freebsd", "title": "mozilla -- multiple vulnerabilities", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": true}, "cvelist": ["CVE-2006-3113", "CVE-2006-3677", "CVE-2006-3801", "CVE-2006-3802", "CVE-2006-3803", "CVE-2006-3804", "CVE-2006-3805", "CVE-2006-3806", "CVE-2006-3807", "CVE-2006-3808", "CVE-2006-3809", "CVE-2006-3810", "CVE-2006-3811", "CVE-2006-3812"], "modified": "2006-11-02T00:00:00", "id": "E2A92664-1D60-11DB-88CF-000C6EC775D9", "href": "https://vuxml.freebsd.org/freebsd/e2a92664-1d60-11db-88cf-000c6ec775d9.html", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "suse": [{"lastseen": "2021-06-08T18:39:21", "description": "To fix various security problems we released update packages that bring Mozilla Firefox to version 1.5.0.6, MozillaThunderdbird to version 1.5.0.5 and the Seamonkey Suite to version 1.0.3.\n#### Solution\nThere is no known workaround, please install the update packages. If you are using the old Mozilla Suite browser we recommend no longer using it, but switching to Mozilla Firefox, konqueror or Opera.", "cvss3": {}, "published": "2006-08-16T15:11:18", "type": "suse", "title": "remote code execution in MozillaFirefox,MozillaThunderbird,Seamonkey", "bulletinFamily": "unix", "cvss2": {}, "cvelist": ["CVE-2006-3806", "CVE-2006-3809", "CVE-2006-3803", "CVE-2006-3807", "CVE-2006-3811", "CVE-2006-3677", "CVE-2006-3804", "CVE-2006-3810", "CVE-2006-3801", "CVE-2006-3812", "CVE-2006-3113", "CVE-2006-3805", "CVE-2006-3808", "CVE-2006-3802"], "modified": "2006-08-16T15:11:18", "id": "SUSE-SA:2006:048", "href": "http://lists.opensuse.org/opensuse-security-announce/2006-08/msg00014.html", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "centos": [{"lastseen": "2022-02-27T15:58:25", "description": "**CentOS Errata and Security Advisory** CESA-2006:0608\n\n\nSeaMonkey is an open source Web browser, advanced email and newsgroup\r\nclient, IRC chat client, and HTML editor.\r\n\r\nSeveral flaws were found in the way SeaMonkey processed certain javascript\r\nactions. A malicious web page could execute arbitrary javascript\r\ninstructions with the permissions of \"chrome\", allowing the page to steal\r\nsensitive information or install browser malware. (CVE-2006-3807,\r\nCVE-2006-3809, CVE-2006-3812)\r\n\r\nSeveral denial of service flaws were found in the way SeaMonkey processed\r\ncertain web content. A malicious web page could crash the browser or\r\npossibly execute arbitrary code as the user running SeaMonkey.\r\n(CVE-2006-3801, CVE-2006-3677, CVE-2006-3113, CVE-2006-3803, CVE-2006-3805,\r\nCVE-2006-3806, CVE-2006-3811)\r\n\r\nA buffer overflow flaw was found in the way SeaMonkey Messenger displayed\r\nmalformed inline vcard attachments. If a victim viewed an email message\r\ncontaining a carefully crafted vcard, it was possible to execute arbitrary\r\ncode as the user running SeaMonkey Messenger. (CVE-2006-3804)\r\n\r\nSeveral flaws were found in the way SeaMonkey processed certain javascript\r\nactions. A malicious web page could conduct a cross-site scripting attack\r\nor steal sensitive information (such as cookies owned by other domains).\r\n(CVE-2006-3802, CVE-2006-3810)\r\n\r\nA flaw was found in the way SeaMonkey processed Proxy AutoConfig scripts. A\r\nmalicious Proxy AutoConfig server could execute arbitrary javascript\r\ninstructions with the permissions of \"chrome\", allowing the page to steal\r\nsensitive information or install browser malware. (CVE-2006-3808)\r\n\r\nUsers of SeaMonkey are advised to upgrade to this update, which contains\r\nSeaMonkey version 1.0.3 that corrects these issues.\n\n**Merged security bulletin from advisories:**\nhttps://lists.centos.org/pipermail/centos-announce/2006-August/050034.html\nhttps://lists.centos.org/pipermail/centos-announce/2006-August/050041.html\nhttps://lists.centos.org/pipermail/centos-announce/2006-August/050042.html\nhttps://lists.centos.org/pipermail/centos-announce/2006-August/050043.html\n\n**Affected packages:**\nseamonkey\nseamonkey-chat\nseamonkey-devel\nseamonkey-dom-inspector\nseamonkey-js-debugger\nseamonkey-mail\nseamonkey-nspr\nseamonkey-nspr-devel\nseamonkey-nss\nseamonkey-nss-devel\n\n**Upstream details at:**\nhttps://access.redhat.com/errata/RHSA-2006:0608", "cvss3": {}, "published": "2006-08-04T20:56:41", "type": "centos", "title": "seamonkey security update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": true}, "cvelist": ["CVE-2006-3113", "CVE-2006-3677", "CVE-2006-3801", "CVE-2006-3802", "CVE-2006-3803", "CVE-2006-3804", "CVE-2006-3805", "CVE-2006-3806", "CVE-2006-3807", "CVE-2006-3808", "CVE-2006-3809", "CVE-2006-3810", "CVE-2006-3811", "CVE-2006-3812"], "modified": "2006-08-05T21:06:29", "id": "CESA-2006:0608", "href": "https://lists.centos.org/pipermail/centos-announce/2006-August/050034.html", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-02-27T15:58:12", "description": "**CentOS Errata and Security Advisory** CESA-2006:0611\n\n\nMozilla Thunderbird is a standalone mail and newsgroup client.\r\n\r\nThe Mozilla Foundation has discontinued support for the Mozilla Thunderbird\r\n1.0 branch. This update deprecates the Mozilla Thunderbird 1.0 branch in\r\nRed Hat Enterprise Linux 4 in favor of the supported Mozilla Thunderbird\r\n1.5 branch.\r\n\r\nThis update also resolves a number of outstanding Thunderbird security issues:\r\n\r\nSeveral flaws were found in the way Thunderbird processed certain\r\njavascript actions. A malicious mail message could execute arbitrary\r\njavascript instructions with the permissions of \"chrome\", allowing the page\r\nto steal sensitive information or install browser malware. (CVE-2006-2776,\r\nCVE-2006-2784, CVE-2006-2785, CVE-2006-2787, CVE-2006-3807, CVE-2006-3809)\r\n\r\nSeveral denial of service flaws were found in the way Thunderbird processed\r\ncertain mail messages. A malicious web page could crash the browser or\r\npossibly execute arbitrary code as the user running Thunderbird.\r\n(CVE-2006-2779, CVE-2006-2780, CVE-2006-3801, CVE-2006-3677,\r\nCVE-2006-3113, CVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3811)\r\n\r\nSeveral flaws were found in the way Thunderbird processed certain\r\njavascript actions. A malicious mail message could conduct a cross-site\r\nscripting attack or steal sensitive information (such as cookies owned by\r\nother domains). (CVE-2006-3802, CVE-2006-3810)\r\n\r\nA form file upload flaw was found in the way Thunderbird handled javascript\r\ninput object mutation. A malicious mail message could upload an arbitrary\r\nlocal file at form submission time without user interaction. (CVE-2006-2782)\r\n\r\nA denial of service flaw was found in the way Thunderbird called the\r\ncrypto.signText() javascript function. A malicious mail message could crash\r\nthe browser if the victim had a client certificate loaded. (CVE-2006-2778)\r\n\r\nA flaw was found in the way Thunderbird processed Proxy AutoConfig scripts.\r\nA malicious Proxy AutoConfig server could execute arbitrary javascript\r\ninstructions with the permissions of \"chrome\", allowing the page to steal\r\nsensitive information or install client malware. (CVE-2006-3808)\r\n\r\nNote: Please note that JavaScript support is disabled by default in\r\nThunderbird. The above issues are not exploitable with JavaScript disabled. \r\n\r\nTwo flaws were found in the way Thunderbird displayed malformed inline\r\nvcard attachments. If a victim viewed an email message containing a\r\ncarefully crafted vcard it was possible to execute arbitrary code as the\r\nuser running Thunderbird. (CVE-2006-2781, CVE-2006-3804)\r\n\r\nA cross site scripting flaw was found in the way Thunderbird processed\r\nUnicode Byte-order-Mark (BOM) markers in UTF-8 mail messages. A malicious\r\nweb page could execute a script within the browser that a web input\r\nsanitizer could miss due to a malformed \"script\" tag. (CVE-2006-2783)\r\n\r\nTwo HTTP response smuggling flaws were found in the way Thunderbird\r\nprocessed certain invalid HTTP response headers. A malicious web site could\r\nreturn specially crafted HTTP response headers which may bypass HTTP proxy\r\nrestrictions. (CVE-2006-2786)\r\n\r\nA double free flaw was found in the way the nsIX509::getRawDER method was\r\ncalled. If a victim visited a carefully crafted web page, it was possible\r\nto crash Thunderbird. (CVE-2006-2788)\r\n\r\nUsers of Thunderbird are advised to upgrade to this update, which contains\r\nThunderbird version 1.5.0.5 that corrects these issues.\n\n**Merged security bulletin from advisories:**\nhttps://lists.centos.org/pipermail/centos-announce/2006-August/050009.html\nhttps://lists.centos.org/pipermail/centos-announce/2006-July/049992.html\nhttps://lists.centos.org/pipermail/centos-announce/2006-July/049993.html\nhttps://lists.centos.org/pipermail/centos-announce/2006-July/050004.html\nhttps://lists.centos.org/pipermail/centos-announce/2006-July/050005.html\n\n**Affected packages:**\nthunderbird\n\n**Upstream details at:**\nhttps://access.redhat.com/errata/RHSA-2006:0611", "cvss3": {}, "published": "2006-07-29T11:51:27", "type": "centos", "title": "thunderbird security update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": true, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2006-2776", "CVE-2006-2778", "CVE-2006-2779", "CVE-2006-2780", "CVE-2006-2781", "CVE-2006-2782", "CVE-2006-2783", "CVE-2006-2784", "CVE-2006-2785", "CVE-2006-2786", "CVE-2006-2787", "CVE-2006-2788", "CVE-2006-3113", "CVE-2006-3677", "CVE-2006-3801", "CVE-2006-3802", "CVE-2006-3803", "CVE-2006-3804", "CVE-2006-3805", "CVE-2006-3806", "CVE-2006-3807", "CVE-2006-3808", "CVE-2006-3809", "CVE-2006-3810", "CVE-2006-3811"], "modified": "2006-08-01T12:35:08", "id": "CESA-2006:0611", "href": "https://lists.centos.org/pipermail/centos-announce/2006-July/049992.html", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-02-27T15:58:08", "description": "**CentOS Errata and Security Advisory** CESA-2006:0610\n\n\nMozilla Firefox is an open source Web browser.\r\n\r\nThe Mozilla Foundation has discontinued support for the Mozilla Firefox\r\n1.0 branch. This update deprecates the Mozilla Firefox 1.0 branch in\r\nRed Hat Enterprise Linux 4 in favor of the supported Mozilla Firefox\r\n1.5 branch.\r\n\r\nThis update also resolves a number of outstanding Firefox security issues:\r\n\r\nSeveral flaws were found in the way Firefox processed certain javascript\r\nactions. A malicious web page could execute arbitrary javascript\r\ninstructions with the permissions of \"chrome\", allowing the page to steal\r\nsensitive information or install browser malware. (CVE-2006-2776,\r\nCVE-2006-2784, CVE-2006-2785, CVE-2006-2787, CVE-2006-3807, CVE-2006-3809,\r\nCVE-2006-3812)\r\n\r\nSeveral denial of service flaws were found in the way Firefox processed\r\ncertain web content. A malicious web page could crash the browser or\r\npossibly execute arbitrary code as the user running Firefox.\r\n(CVE-2006-2779, CVE-2006-2780, CVE-2006-3801, CVE-2006-3677, CVE-2006-3113,\r\nCVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3811)\r\n\r\nA cross-site scripting flaw was found in the way Firefox processed\r\nUnicode Byte-Order-Mark (BOM) markers in UTF-8 web pages. A malicious web\r\npage could execute a script within the browser that a web input sanitizer\r\ncould miss due to a malformed \"script\" tag. (CVE-2006-2783)\r\n\r\nSeveral flaws were found in the way Firefox processed certain javascript\r\nactions. A malicious web page could conduct a cross-site scripting attack\r\nor steal sensitive information (such as cookies owned by other domains).\r\n(CVE-2006-3802, CVE-2006-3810)\r\n\r\nA form file upload flaw was found in the way Firefox handled javascript\r\ninput object mutation. A malicious web page could upload an arbitrary local\r\nfile at form submission time without user interaction. (CVE-2006-2782)\r\n\r\nA denial of service flaw was found in the way Firefox called the\r\ncrypto.signText() javascript function. A malicious web page could crash the\r\nbrowser if the victim had a client certificate loaded. (CVE-2006-2778)\r\n\r\nTwo HTTP response smuggling flaws were found in the way Firefox processed\r\ncertain invalid HTTP response headers. A malicious web site could return\r\nspecially crafted HTTP response headers which may bypass HTTP proxy\r\nrestrictions. (CVE-2006-2786)\r\n\r\nA flaw was found in the way Firefox processed Proxy AutoConfig scripts. A\r\nmalicious Proxy AutoConfig server could execute arbitrary javascript\r\ninstructions with the permissions of \"chrome\", allowing the page to steal\r\nsensitive information or install browser malware. (CVE-2006-3808)\r\n\r\nA double free flaw was found in the way the nsIX509::getRawDER method was\r\ncalled. If a victim visited a carefully crafted web page, it was possible\r\nto execute arbitrary code as the user running Firefox. (CVE-2006-2788)\r\n\r\nUsers of Firefox are advised to upgrade to this update, which contains\r\nFirefox version 1.5.0.5 that corrects these issues.\n\n**Merged security bulletin from advisories:**\nhttps://lists.centos.org/pipermail/centos-announce/2006-August/050006.html\nhttps://lists.centos.org/pipermail/centos-announce/2006-July/049990.html\nhttps://lists.centos.org/pipermail/centos-announce/2006-July/049991.html\nhttps://lists.centos.org/pipermail/centos-announce/2006-July/050002.html\nhttps://lists.centos.org/pipermail/centos-announce/2006-July/050003.html\n\n**Affected packages:**\nfirefox\n\n**Upstream details at:**\nhttps://access.redhat.com/errata/RHSA-2006:0610", "cvss3": {}, "published": "2006-07-29T11:51:13", "type": "centos", "title": "firefox security update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": true, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2006-2776", "CVE-2006-2778", "CVE-2006-2779", "CVE-2006-2780", "CVE-2006-2782", "CVE-2006-2783", "CVE-2006-2784", "CVE-2006-2785", "CVE-2006-2786", "CVE-2006-2787", "CVE-2006-2788", "CVE-2006-3113", "CVE-2006-3677", "CVE-2006-3801", "CVE-2006-3802", "CVE-2006-3803", "CVE-2006-3805", "CVE-2006-3806", "CVE-2006-3807", "CVE-2006-3808", "CVE-2006-3809", "CVE-2006-3810", "CVE-2006-3811", "CVE-2006-3812"], "modified": "2006-08-01T01:49:26", "id": "CESA-2006:0610", "href": "https://lists.centos.org/pipermail/centos-announce/2006-July/049990.html", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-02-27T15:58:31", "description": "**CentOS Errata and Security Advisory** CESA-2006:0609\n\n\nSeamonkey is an open source Web browser, advanced email and newsgroup\r\nclient, IRC chat client, and HTML editor.\r\n\r\nThe Mozilla Foundation has discontinued support for the Mozilla Suite. This\r\nupdate deprecates the Mozilla Suite in Red Hat Enterprise Linux 4 in\r\nfavor of the supported Seamonkey Suite.\r\n\r\nThis update also resolves a number of outstanding Mozilla security issues:\r\n\r\nSeveral flaws were found in the way Seamonkey processed certain javascript\r\nactions. A malicious web page could execute arbitrary javascript\r\ninstructions with the permissions of \"chrome\", allowing the page to steal\r\nsensitive information or install browser malware. (CVE-2006-2776,\r\nCVE-2006-2784, CVE-2006-2785, CVE-2006-2787, CVE-2006-3807, CVE-2006-3809,\r\nCVE-2006-3812)\r\n\r\nSeveral denial of service flaws were found in the way Seamonkey processed\r\ncertain web content. A malicious web page could crash the browser or\r\npossibly execute arbitrary code as the user running Seamonkey.\r\n(CVE-2006-2779, CVE-2006-2780, CVE-2006-3801, CVE-2006-3677, CVE-2006-3113,\r\nCVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3811)\r\n\r\nTwo flaws were found in the way Seamonkey-mail displayed malformed\r\ninline vcard attachments. If a victim viewed an email message containing\r\na carefully crafted vcard it was possible to execute arbitrary code as the\r\nuser running Mozilla-mail. (CVE-2006-2781, CVE-2006-3804)\r\n\r\nA cross-site scripting flaw was found in the way Seamonkey processed\r\nUnicode Byte-Order-Mark (BOM) markers in UTF-8 web pages. A malicious web\r\npage could execute a script within the browser that a web input sanitizer\r\ncould miss due to a malformed \"script\" tag. (CVE-2006-2783)\r\n\r\nSeveral flaws were found in the way Seamonkey processed certain javascript\r\nactions. A malicious web page could conduct a cross-site scripting attack\r\nor steal sensitive information (such as cookies owned by other domains).\r\n(CVE-2006-3802, CVE-2006-3810)\r\n\r\nA form file upload flaw was found in the way Seamonkey handled javascript\r\ninput object mutation. A malicious web page could upload an arbitrary local\r\nfile at form submission time without user interaction. (CVE-2006-2782)\r\n\r\nA denial of service flaw was found in the way Seamonkey called the\r\ncrypto.signText() javascript function. A malicious web page could crash the\r\nbrowser if the victim had a client certificate loaded. (CVE-2006-2778)\r\n\r\nTwo HTTP response smuggling flaws were found in the way Seamonkey processed\r\ncertain invalid HTTP response headers. A malicious web site could return\r\nspecially crafted HTTP response headers which may bypass HTTP proxy\r\nrestrictions. (CVE-2006-2786)\r\n\r\nA flaw was found in the way Seamonkey processed Proxy AutoConfig scripts. A\r\nmalicious Proxy AutoConfig server could execute arbitrary javascript\r\ninstructions with the permissions of \"chrome\", allowing the page to steal\r\nsensitive information or install browser malware. (CVE-2006-3808)\r\n\r\nA double free flaw was found in the way the nsIX509::getRawDER method was\r\ncalled. If a victim visited a carefully crafted web page, it was possible\r\nto execute arbitrary code as the user running Mozilla. (CVE-2006-2788)\r\n\r\nUsers of Mozilla are advised to upgrade to this update, which contains\r\nSeamonkey version 1.0.3 that corrects these issues.\n\n**Merged security bulletin from advisories:**\nhttps://lists.centos.org/pipermail/centos-announce/2006-August/050035.html\nhttps://lists.centos.org/pipermail/centos-announce/2006-August/050036.html\nhttps://lists.centos.org/pipermail/centos-announce/2006-August/050044.html\nhttps://lists.centos.org/pipermail/centos-announce/2006-August/050045.html\nhttps://lists.centos.org/pipermail/centos-announce/2006-August/050046.html\n\n**Affected packages:**\ndevhelp\ndevhelp-devel\nseamonkey\nseamonkey-chat\nseamonkey-devel\nseamonkey-dom-inspector\nseamonkey-js-debugger\nseamonkey-mail\nseamonkey-nspr\nseamonkey-nspr-devel\nseamonkey-nss\nseamonkey-nss-devel\n\n**Upstream details at:**\nhttps://access.redhat.com/errata/RHSA-2006:0609", "cvss3": {}, "published": "2006-08-05T15:16:05", "type": "centos", "title": "devhelp, seamonkey security update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": true, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2006-2776", "CVE-2006-2778", "CVE-2006-2779", "CVE-2006-2780", "CVE-2006-2781", "CVE-2006-2782", "CVE-2006-2783", "CVE-2006-2784", "CVE-2006-2785", "CVE-2006-2786", "CVE-2006-2787", "CVE-2006-2788", "CVE-2006-3113", "CVE-2006-3677", "CVE-2006-3801", "CVE-2006-3802", "CVE-2006-3803", "CVE-2006-3804", "CVE-2006-3805", "CVE-2006-3806", "CVE-2006-3807", "CVE-2006-3808", "CVE-2006-3809", "CVE-2006-3810", "CVE-2006-3811", "CVE-2006-3812"], "modified": "2006-08-06T16:11:30", "id": "CESA-2006:0609", "href": "https://lists.centos.org/pipermail/centos-announce/2006-August/050035.html", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-02-27T15:57:40", "description": "**CentOS Errata and Security Advisory** CESA-2006:0594-02\n\n\nSeaMonkey is an open source Web browser, advanced email and newsgroup\r\nclient, IRC chat client, and HTML editor.\r\n\r\nThe Mozilla Foundation has discontinued support for the Mozilla Suite. This\r\nupdate deprecates the Mozilla Suite in Red Hat Enterprise Linux 2.1 in\r\nfavor of the supported SeaMonkey Suite.\r\n\r\nThis update also resolves a number of outstanding Mozilla security issues:\r\n\r\nSeveral flaws were found in the way SeaMonkey processed certain javascript\r\nactions. A malicious web page could execute arbitrary javascript\r\ninstructions with the permissions of \"chrome\", allowing the page to steal\r\nsensitive information or install browser malware. (CVE-2006-2776,\r\nCVE-2006-2784, CVE-2006-2785, CVE-2006-2787, CVE-2006-3807, CVE-2006-3809,\r\nCVE-2006-3812)\r\n\r\nSeveral denial of service flaws were found in the way SeaMonkey processed\r\ncertain web content. A malicious web page could crash the browser or\r\npossibly execute arbitrary code as the user running SeaMonkey.\r\n(CVE-2006-2779, CVE-2006-2780, CVE-2006-3801, CVE-2006-3677, CVE-2006-3113,\r\nCVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3811)\r\n\r\nTwo flaws were found in the way SeaMonkey Messenger displayed malformed\r\ninline vcard attachments. If a victim viewed an email message containing\r\na carefully crafted vcard it was possible to execute arbitrary code as the\r\nuser running SeaMonkey Messenger. (CVE-2006-2781, CVE-2006-3804)\r\n\r\nA cross-site scripting flaw was found in the way SeaMonkey processed\r\nUnicode Byte-Order-Mark (BOM) markers in UTF-8 web pages. A malicious web\r\npage could execute a script within the browser that a web input sanitizer\r\ncould miss due to a malformed \"script\" tag. (CVE-2006-2783)\r\n\r\nSeveral flaws were found in the way SeaMonkey processed certain javascript\r\nactions. A malicious web page could conduct a cross-site scripting attack\r\nor steal sensitive information (such as cookies owned by other domains).\r\n(CVE-2006-3802, CVE-2006-3810)\r\n\r\nA form file upload flaw was found in the way SeaMonkey handled javascript\r\ninput object mutation. A malicious web page could upload an arbitrary local\r\nfile at form submission time without user interaction. (CVE-2006-2782)\r\n\r\nA denial of service flaw was found in the way SeaMonkey called the\r\ncrypto.signText() javascript function. A malicious web page could crash the\r\nbrowser if the victim had a client certificate loaded. (CVE-2006-2778)\r\n\r\nTwo HTTP response smuggling flaws were found in the way SeaMonkey processed\r\ncertain invalid HTTP response headers. A malicious web site could return\r\nspecially crafted HTTP response headers which may bypass HTTP proxy\r\nrestrictions. (CVE-2006-2786)\r\n\r\nA flaw was found in the way SeaMonkey processed Proxy AutoConfig scripts. A\r\nmalicious Proxy AutoConfig server could execute arbitrary javascript\r\ninstructions with the permissions of \"chrome\", allowing the page to steal\r\nsensitive information or install browser malware. (CVE-2006-3808)\r\n\r\nA double free flaw was found in the way the nsIX509::getRawDER method was\r\ncalled. If a victim visited a carefully crafted web page it was possible to\r\nexecute arbitrary code as the user running SeaMonkey. (CVE-2006-2788)\r\n\r\nUsers of Mozilla are advised to upgrade to this update, which contains\r\nSeaMonkey version 1.0.3 that corrects these issues.\n\n**Merged security bulletin from advisories:**\nhttps://lists.centos.org/pipermail/centos-announce/2006-September/050107.html\n\n**Affected packages:**\nseamonkey\nseamonkey-chat\nseamonkey-devel\nseamonkey-dom-inspector\nseamonkey-js-debugger\nseamonkey-mail\nseamonkey-nspr\nseamonkey-nspr-devel\nseamonkey-nss\nseamonkey-nss-devel\n\n", "cvss3": {}, "published": "2006-09-05T00:01:38", "type": "centos", "title": "seamonkey security update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": true, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2006-2776", "CVE-2006-2778", "CVE-2006-2779", "CVE-2006-2780", "CVE-2006-2781", "CVE-2006-2782", "CVE-2006-2783", "CVE-2006-2784", "CVE-2006-2785", "CVE-2006-2786", "CVE-2006-2787", "CVE-2006-2788", "CVE-2006-3113", "CVE-2006-3677", "CVE-2006-3801", "CVE-2006-3802", "CVE-2006-3803", "CVE-2006-3804", "CVE-2006-3805", "CVE-2006-3806", "CVE-2006-3807", "CVE-2006-3808", "CVE-2006-3809", "CVE-2006-3810", "CVE-2006-3811", "CVE-2006-3812"], "modified": "2006-09-05T00:01:38", "id": "CESA-2006:0594-02", "href": "https://lists.centos.org/pipermail/centos-announce/2006-September/050107.html", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "oraclelinux": [{"lastseen": "2019-05-29T18:39:33", "description": " [1.5.0.8-0.1.1.el4]\n - Replace default-bookmarks.html and default-prefs.js\n \n [1.5.0.8-0.1.el4]\n - Update to 1.5.0.8 (RC)\n \n [1.5.0.7-0.1.el4]\n - Update to 1.5.0.7\n \n [1.5.0.5-0.el4.1]\n - Update to 1.5.0.5 ", "cvss3": {}, "published": "2006-12-07T00:00:00", "type": "oraclelinux", "title": "Critical firefox security update ", "bulletinFamily": "unix", "cvss2": {}, "cvelist": ["CVE-2006-3806", "CVE-2006-3809", "CVE-2006-3803", "CVE-2006-2780", "CVE-2006-3807", "CVE-2006-3811", "CVE-2006-2784", "CVE-2006-3677", "CVE-2006-2785", "CVE-2006-2776", "CVE-2006-2778", "CVE-2006-3810", "CVE-2006-2779", "CVE-2006-3801", "CVE-2006-3812", "CVE-2006-2786", "CVE-2006-3113", "CVE-2006-2783", "CVE-2006-3805", "CVE-2006-2788", "CVE-2006-2787", "CVE-2006-3808", "CVE-2006-2782", "CVE-2006-3802"], "modified": "2006-12-07T00:00:00", "id": "ELSA-2006-0610", "href": "http://linux.oracle.com/errata/ELSA-2006-0610.html", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:35:02", "description": " [1.5.0.8-0.1.1.el4]\n - defaults changed to oracle...\n \n [1.5.0.8-0.1.el4]\n - Update to 1.5.0.8 (RC)\n \n [1.5.0.7-0.1.el4]\n - Update to 1.5.0.7\n \n [1.5.0.5-0.el4.2]\n - Fix the launcher and icons\n \n [1.5.0.5-0.el4.1]\n - Update to 1.5.0.5 ", "cvss3": {}, "published": "2006-12-07T00:00:00", "type": "oraclelinux", "title": "Critical thunderbird security update ", "bulletinFamily": "unix", "cvss2": {}, "cvelist": ["CVE-2006-3806", "CVE-2006-3809", "CVE-2006-3803", "CVE-2006-2780", "CVE-2006-3807", "CVE-2006-3811", "CVE-2006-2784", "CVE-2006-3677", "CVE-2006-2785", "CVE-2006-2776", "CVE-2006-3804", "CVE-2006-2778", "CVE-2006-3810", "CVE-2006-2779", "CVE-2006-2781", "CVE-2006-3801", "CVE-2006-2786", "CVE-2006-3113", "CVE-2006-2783", "CVE-2006-3805", "CVE-2006-2788", "CVE-2006-2787", "CVE-2006-3808", "CVE-2006-2782", "CVE-2006-3802"], "modified": "2006-12-07T00:00:00", "id": "ELSA-2006-0611", "href": "http://linux.oracle.com/errata/ELSA-2006-0611.html", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}]}