ID CVE-2013-1704 Type cve Reporter cve@mitre.org Modified 2017-09-19T01:36:00
Description
Use-after-free vulnerability in the nsINode::GetParentNode function in Mozilla Firefox before 23.0 and SeaMonkey before 2.20 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption and application crash) via vectors involving a DOM modification at the time of a SetBody mutation event.
{"mozilla": [{"lastseen": "2016-09-05T13:37:37", "bulletinFamily": "software", "description": "Security researcher Nils used the Address Sanitizer to\ndiscover a use-after-free problem when the Document Object Model is modified\nduring a SetBody mutation event. This causes a potentially exploitable\ncrash.\nIn general these flaws cannot be exploited through email in the\nThunderbird and SeaMonkey products because scripting is disabled, but are\npotentially a risk in browser or browser-like contexts in those products.", "modified": "2013-08-06T00:00:00", "published": "2013-08-06T00:00:00", "id": "MFSA2013-64", "href": "http://www.mozilla.org/en-US/security/advisories/mfsa2013-64/", "type": "mozilla", "title": "Use after free mutating DOM during SetBody", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "suse": [{"lastseen": "2016-09-04T12:13:39", "bulletinFamily": "unix", "description": "Changes in seamonkey:\n - update to SeaMonkey 2.20 (bnc#833389)\n * MFSA 2013-63/CVE-2013-1701/CVE-2013-1702 Miscellaneous\n memory safety hazards\n * MFSA 2013-64/CVE-2013-1704 (bmo#883313) Use after free\n mutating DOM during SetBody\n * MFSA 2013-65/CVE-2013-1705 (bmo#882865) Buffer\n underflow when generating CRMF requests\n * MFSA 2013-67/CVE-2013-1708 (bmo#879924) Crash during\n WAV audio file decoding\n * MFSA 2013-68/CVE-2013-1709 (bmo#838253) Document URI\n misrepresentation and masquerading\n * MFSA 2013-69/CVE-2013-1710 (bmo#871368) CRMF requests\n allow for code execution and XSS attacks\n * MFSA 2013-70/CVE-2013-1711 (bmo#843829) Bypass of\n XrayWrappers using XBL Scopes\n * MFSA 2013-72/CVE-2013-1713 (bmo#887098) Wrong principal\n used for validating URI for some Javascript components\n * MFSA 2013-73/CVE-2013-1714 (bmo#879787) Same-origin\n bypass with web workers and XMLHttpRequest\n * MFSA 2013-75/CVE-2013-1717 (bmo#406541, bmo#738397)\n Local Java applets may read contents of local file\n system\n - requires NSPR 4.10 and NSS 3.15\n - removed obsolete seamonkey-shared-nss-db.patch\n\n Changes in seamonkey:\n - update to SeaMonkey 2.20 (bnc#833389)\n * MFSA 2013-63/CVE-2013-1701/CVE-2013-1702 Miscellaneous\n memory safety hazards\n * MFSA 2013-64/CVE-2013-1704 (bmo#883313) Use after free\n mutating DOM during SetBody\n * MFSA 2013-65/CVE-2013-1705 (bmo#882865) Buffer\n underflow when generating CRMF requests\n * MFSA 2013-67/CVE-2013-1708 (bmo#879924) Crash during\n WAV audio file decoding\n * MFSA 2013-68/CVE-2013-1709 (bmo#838253) Document URI\n misrepresentation and masquerading\n * MFSA 2013-69/CVE-2013-1710 (bmo#871368) CRMF requests\n allow for code execution and XSS attacks\n * MFSA 2013-70/CVE-2013-1711 (bmo#843829) Bypass of\n XrayWrappers using XBL Scopes\n * MFSA 2013-72/CVE-2013-1713 (bmo#887098) Wrong principal\n used for validating URI for some Javascript components\n * MFSA 2013-73/CVE-2013-1714 (bmo#879787) Same-origin\n bypass with web workers and XMLHttpRequest\n * MFSA 2013-75/CVE-2013-1717 (bmo#406541, bmo#738397)\n Local Java applets may read contents of local file\n system\n - requires NSPR 4.10 and NSS 3.15\n - removed obsolete seamonkey-shared-nss-db.patch\n\n Changes in xulrunner:\n - update to 17.0.8esr (bnc#833389)\n * MFSA 2013-63/CVE-2013-1701 Miscellaneous memory safety\n hazards\n * MFSA 2013-68/CVE-2013-1709 (bmo#838253) Document URI\n misrepresentation and masquerading\n * MFSA 2013-69/CVE-2013-1710 (bmo#871368) CRMF requests\n allow for code execution and XSS attacks\n * MFSA 2013-72/CVE-2013-1713 (bmo#887098) Wrong principal\n used for validating URI for some Javascript components\n * MFSA 2013-73/CVE-2013-1714 (bmo#879787) Same-origin\n bypass with web workers and XMLHttpRequest\n * MFSA 2013-75/CVE-2013-1717 (bmo#406541, bmo#738397)\n Local Java applets may read contents of local file\n system\n\n Changes in xulrunner:\n - update to 17.0.8esr (bnc#833389)\n * MFSA 2013-63/CVE-2013-1701 Miscellaneous memory safety\n hazards\n * MFSA 2013-68/CVE-2013-1709 (bmo#838253) Document URI\n misrepresentation and masquerading\n * MFSA 2013-69/CVE-2013-1710 (bmo#871368) CRMF requests\n allow for code execution and XSS attacks\n * MFSA 2013-72/CVE-2013-1713 (bmo#887098) Wrong principal\n used for validating URI for some Javascript components\n * MFSA 2013-73/CVE-2013-1714 (bmo#879787) Same-origin\n bypass with web workers and XMLHttpRequest\n * MFSA 2013-75/CVE-2013-1717 (bmo#406541, bmo#738397)\n Local Java applets may read contents of local file\n system\n\n Changes in MozillaThunderbird:\n - update to Thunderbird 17.0.8 (bnc#833389)\n * MFSA 2013-63/CVE-2013-1701 Miscellaneous memory safety\n hazards\n * MFSA 2013-68/CVE-2013-1709 (bmo#838253) Document URI\n misrepresentation and masquerading\n * MFSA 2013-69/CVE-2013-1710 (bmo#871368) CRMF requests\n allow for code execution and XSS attacks\n * MFSA 2013-72/CVE-2013-1713 (bmo#887098) Wrong principal\n used for validating URI for some Javascript components\n * MFSA 2013-73/CVE-2013-1714 (bmo#879787) Same-origin\n bypass with web workers and XMLHttpRequest\n * MFSA 2013-75/CVE-2013-1717 (bmo#406541, bmo#738397)\n Local Java applets may read contents of local file\n system\n\n - update Enigmail to 1.5.2\n * bugfix release\n\n Changes in MozillaThunderbird:\n - update to Thunderbird 17.0.8 (bnc#833389)\n * MFSA 2013-63/CVE-2013-1701 Miscellaneous memory safety\n hazards\n * MFSA 2013-68/CVE-2013-1709 (bmo#838253) Document URI\n misrepresentation and masquerading\n * MFSA 2013-69/CVE-2013-1710 (bmo#871368) CRMF requests\n allow for code execution and XSS attacks\n * MFSA 2013-72/CVE-2013-1713 (bmo#887098) Wrong principal\n used for validating URI for some Javascript components\n * MFSA 2013-73/CVE-2013-1714 (bmo#879787) Same-origin\n bypass with web workers and XMLHttpRequest\n * MFSA 2013-75/CVE-2013-1717 (bmo#406541, bmo#738397)\n Local Java applets may read contents of local file\n system\n\n - update Enigmail to 1.5.2\n * bugfix release\n\n Changes in mozilla-nss:\n - fix 32bit requirement, it's without () actually\n\n - update to 3.15.1\n * TLS 1.2 (RFC 5246) is supported. HMAC-SHA256 cipher\n suites (RFC 5246 and RFC 5289) are supported, allowing\n TLS to be used without MD5 and SHA-1. Note the\n following limitations: The hash function used in the\n signature for TLS 1.2 client authentication must be the\n hash function of the TLS 1.2 PRF, which is always\n SHA-256 in NSS 3.15.1. AES GCM cipher suites are not\n yet supported.\n * some bugfixes and improvements\n\n - require libnssckbi instead of mozilla-nss-certs so\n p11-kit can conflict with the latter (fate#314991)\n\n - update to 3.15\n * Packaging\n + removed obsolete patches\n * nss-disable-expired-testcerts.patch\n * bug-834091.patch\n * New Functionality\n + Support for OCSP Stapling (RFC 6066, Certificate\n Status Request) has been added for both client and server\n sockets. TLS client applications may enable this via a call\n to SSL_OptionSetDefault(SSL_ENABLE_OCSP_STAPLING, PR_TRUE);\n + Added function SECITEM_ReallocItemV2. It replaces\n function SECITEM_ReallocItem, which is now declared as\n obsolete.\n + Support for single-operation (eg: not multi-part)\n symmetric key encryption and decryption, via PK11_Encrypt\n and PK11_Decrypt.\n + certutil has been updated to support creating name\n constraints extensions.\n * New Functions in ssl.h SSL_PeerStapledOCSPResponse -\n Returns the server's stapled OCSP response, when used\n with a TLS client socket that negotiated the\n status_request extension. SSL_SetStapledOCSPResponses -\n Set's a stapled OCSP response for a TLS server socket\n to return when clients send the status_request\n extension. in ocsp.h CERT_PostOCSPRequest - Primarily\n intended for testing, permits the sending and receiving\n of raw OCSP request/responses. in secpkcs7.h\n SEC_PKCS7VerifyDetachedSignatureAtTime - Verifies a\n PKCS#7 signature at a specific time other than the\n present time. in xconst.h\n CERT_EncodeNameConstraintsExtension - Matching function\n for CERT_DecodeNameConstraintsExtension, added in NSS\n 3.10. in secitem.h SECITEM_AllocArray SECITEM_DupArray\n SECITEM_FreeArray SECITEM_ZfreeArray - Utility\n functions to handle the allocation and deallocation of\n SECItemArrays SECITEM_ReallocItemV2 - Replaces\n SECITEM_ReallocItem, which is now obsolete.\n SECITEM_ReallocItemV2 better matches caller\n expectations, in that it updates item->len on\n allocation. For more details of the issues with\n SECITEM_ReallocItem, see Bug 298649 and Bug 298938. in\n pk11pub.h PK11_Decrypt - Performs decryption as a\n single PKCS#11 operation (eg: not multi-part). This is\n necessary for AES-GCM. PK11_Encrypt - Performs\n encryption as a single PKCS#11 operation (eg: not\n multi-part). This is necessary for AES-GCM.\n * New Types in secitem.h SECItemArray - Represents a\n variable-length array of SECItems.\n * New Macros in ssl.h SSL_ENABLE_OCSP_STAPLING - Used\n with SSL_OptionSet to configure TLS client sockets to\n request the certificate_status extension (eg: OCSP\n stapling) when set to PR_TRUE\n * Notable changes\n + SECITEM_ReallocItem is now deprecated. Please\n consider using SECITEM_ReallocItemV2 in all future code.\n + The list of root CA certificates in the nssckbi\n module has been updated.\n + The default implementation of SSL_AuthCertificate has\n been updated to add certificate status responses stapled by\n the TLS server to the OCSP cache.\n * a lot of bugfixes\n\n - Add Source URL, see <a rel=\"nofollow\" href=\"https://en.opensuse.org/SourceUrls\">https://en.opensuse.org/SourceUrls</a>\n\n Changes in mozilla-nss:\n - fix 32bit requirement, it's without () actually\n\n - update to 3.15.1\n * TLS 1.2 (RFC 5246) is supported. HMAC-SHA256 cipher\n suites (RFC 5246 and RFC 5289) are supported, allowing\n TLS to be used without MD5 and SHA-1. Note the\n following limitations: The hash function used in the\n signature for TLS 1.2 client authentication must be the\n hash function of the TLS 1.2 PRF, which is always\n SHA-256 in NSS 3.15.1. AES GCM cipher suites are not\n yet supported.\n * some bugfixes and improvements\n\n - require libnssckbi instead of mozilla-nss-certs so\n p11-kit can conflict with the latter (fate#314991)\n\n - update to 3.15\n * Packaging\n + removed obsolete patches\n * nss-disable-expired-testcerts.patch\n * bug-834091.patch\n * New Functionality\n + Support for OCSP Stapling (RFC 6066, Certificate\n Status Request) has been added for both client and server\n sockets. TLS client applications may enable this via a call\n to SSL_OptionSetDefault(SSL_ENABLE_OCSP_STAPLING, PR_TRUE);\n + Added function SECITEM_ReallocItemV2. It replaces\n function SECITEM_ReallocItem, which is now declared as\n obsolete.\n + Support for single-operation (eg: not multi-part)\n symmetric key encryption and decryption, via PK11_Encrypt\n and PK11_Decrypt.\n + certutil has been updated to support creating name\n constraints extensions.\n * New Functions in ssl.h SSL_PeerStapledOCSPResponse -\n Returns the server's stapled OCSP response, when used\n with a TLS client socket that negotiated the\n status_request extension. SSL_SetStapledOCSPResponses -\n Set's a stapled OCSP response for a TLS server socket\n to return when clients send the status_request\n extension. in ocsp.h CERT_PostOCSPRequest - Primarily\n intended for testing, permits the sending and receiving\n of raw OCSP request/responses. in secpkcs7.h\n SEC_PKCS7VerifyDetachedSignatureAtTime - Verifies a\n PKCS#7 signature at a specific time other than the\n present time. in xconst.h\n CERT_EncodeNameConstraintsExtension - Matching function\n for CERT_DecodeNameConstraintsExtension, added in NSS\n 3.10. in secitem.h SECITEM_AllocArray SECITEM_DupArray\n SECITEM_FreeArray SECITEM_ZfreeArray - Utility\n functions to handle the allocation and deallocation of\n SECItemArrays SECITEM_ReallocItemV2 - Replaces\n SECITEM_ReallocItem, which is now obsolete.\n SECITEM_ReallocItemV2 better matches caller\n expectations, in that it updates item->len on\n allocation. For more details of the issues with\n SECITEM_ReallocItem, see Bug 298649 and Bug 298938. in\n pk11pub.h PK11_Decrypt - Performs decryption as a\n single PKCS#11 operation (eg: not multi-part). This is\n necessary for AES-GCM. PK11_Encrypt - Performs\n encryption as a single PKCS#11 operation (eg: not\n multi-part). This is necessary for AES-GCM.\n * New Types in secitem.h SECItemArray - Represents a\n variable-length array of SECItems.\n * New Macros in ssl.h SSL_ENABLE_OCSP_STAPLING - Used\n with SSL_OptionSet to configure TLS client sockets to\n request the certificate_status extension (eg: OCSP\n stapling) when set to PR_TRUE\n * Notable changes\n + SECITEM_ReallocItem is now deprecated. Please\n consider using SECITEM_ReallocItemV2 in all future code.\n + The list of root CA certificates in the nssckbi\n module has been updated.\n + The default implementation of SSL_AuthCertificate has\n been updated to add certificate status responses stapled by\n the TLS server to the OCSP cache.\n * a lot of bugfixes\n\n - Add Source URL, see <a rel=\"nofollow\" href=\"https://en.opensuse.org/SourceUrls\">https://en.opensuse.org/SourceUrls</a>\n\n Changes in mozilla-nspr:\n - update to version 4.10\n * bmo#844513: Add AddressSanitizer (ASan) memory check\n annotations to PLArena.\n * bmo#849089: Simple changes to make NSPR's configure.in\n work with the current version of autoconf.\n * bmo#856196: Fix compiler warnings and clean up code in\n NSPR 4.10.\n * bmo#859066: Fix warning in\n nsprpub/pr/src/misc/prnetdb.c.\n * bmo#859830: Deprecate ANDROID_VERSION in favor of\n android/api-level.h.\n * bmo#861434: Make PR_SetThreadPriority() change\n priorities relatively to the main process instead of\n using absolute values on Linux.\n * bmo#871064L: _PR_InitThreads() should not call\n PR_SetThreadPriority.\n\n Changes in mozilla-nspr:\n - update to version 4.10\n * bmo#844513: Add AddressSanitizer (ASan) memory check\n annotations to PLArena.\n * bmo#849089: Simple changes to make NSPR's configure.in\n work with the current version of autoconf.\n * bmo#856196: Fix compiler warnings and clean up code in\n NSPR 4.10.\n * bmo#859066: Fix warning in\n nsprpub/pr/src/misc/prnetdb.c.\n * bmo#859830: Deprecate ANDROID_VERSION in favor of\n android/api-level.h.\n * bmo#861434: Make PR_SetThreadPriority() change\n priorities relatively to the main process instead of\n using absolute values on Linux.\n * bmo#871064L: _PR_InitThreads() should not call\n PR_SetThreadPriority.\n\n Changes in MozillaFirefox:\n - update to Firefox 23.0 (bnc#833389)\n * MFSA 2013-63/CVE-2013-1701/CVE-2013-1702 Miscellaneous\n memory safety hazards\n * MFSA 2013-64/CVE-2013-1704 (bmo#883313) Use after free\n mutating DOM during SetBody\n * MFSA 2013-65/CVE-2013-1705 (bmo#882865) Buffer\n underflow when generating CRMF requests\n * MFSA 2013-67/CVE-2013-1708 (bmo#879924) Crash during\n WAV audio file decoding\n * MFSA 2013-68/CVE-2013-1709 (bmo#838253) Document URI\n misrepresentation and masquerading\n * MFSA 2013-69/CVE-2013-1710 (bmo#871368) CRMF requests\n allow for code execution and XSS attacks\n * MFSA 2013-70/CVE-2013-1711 (bmo#843829) Bypass of\n XrayWrappers using XBL Scopes\n * MFSA 2013-72/CVE-2013-1713 (bmo#887098) Wrong principal\n used for validating URI for some Javascript components\n * MFSA 2013-73/CVE-2013-1714 (bmo#879787) Same-origin\n bypass with web workers and XMLHttpRequest\n * MFSA 2013-75/CVE-2013-1717 (bmo#406541, bmo#738397)\n Local Java applets may read contents of local file\n system\n - requires NSPR 4.10 and NSS 3.15\n\n - fix build on ARM (/-g/ matches /-grecord-switches/)\n\n Changes in MozillaFirefox:\n - update to Firefox 23.0 (bnc#833389)\n * MFSA 2013-63/CVE-2013-1701/CVE-2013-1702 Miscellaneous\n memory safety hazards\n * MFSA 2013-64/CVE-2013-1704 (bmo#883313) Use after free\n mutating DOM during SetBody\n * MFSA 2013-65/CVE-2013-1705 (bmo#882865) Buffer\n underflow when generating CRMF requests\n * MFSA 2013-67/CVE-2013-1708 (bmo#879924) Crash during\n WAV audio file decoding\n * MFSA 2013-68/CVE-2013-1709 (bmo#838253) Document URI\n misrepresentation and masquerading\n * MFSA 2013-69/CVE-2013-1710 (bmo#871368) CRMF requests\n allow for code execution and XSS attacks\n * MFSA 2013-70/CVE-2013-1711 (bmo#843829) Bypass of\n XrayWrappers using XBL Scopes\n * MFSA 2013-72/CVE-2013-1713 (bmo#887098) Wrong principal\n used for validating URI for some Javascript components\n * MFSA 2013-73/CVE-2013-1714 (bmo#879787) Same-origin\n bypass with web workers and XMLHttpRequest\n * MFSA 2013-75/CVE-2013-1717 (bmo#406541, bmo#738397)\n Local Java applets may read contents of local file\n system\n - requires NSPR 4.10 and NSS 3.15\n\n - fix build on ARM (/-g/ matches /-grecord-switches/)\n\n", "modified": "2013-08-16T15:04:27", "published": "2013-08-16T15:04:27", "id": "OPENSUSE-SU-2013:1348-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00014.html", "type": "suse", "title": "update for MozillaFirefox, MozillaThunderbird, mozilla-nspr, mozilla-nss, seamonkey, xulrunner (important)", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2016-09-04T12:42:10", "bulletinFamily": "unix", "description": "This patch contains updates for\n - Firefox to 23.0\n - xulrunner to 17.0.8esr\n - Thunderbird to 17.0.8\n - mozilla-nspr to 4.10\n - mozilla-nss to 3.15,1\n\n * MFSA 2013-63/CVE-2013-1701/CVE-2013-1702 Miscellaneous\n memory safety hazards\n * MFSA 2013-64/CVE-2013-1704 (bmo#883313) Use after free\n mutating DOM during SetBody\n * MFSA 2013-65/CVE-2013-1705 (bmo#882865) Buffer\n underflow when generating CRMF requests\n * MFSA 2013-67/CVE-2013-1708 (bmo#879924) Crash during\n WAV audio file decoding\n * MFSA 2013-68/CVE-2013-1709 (bmo#838253) Document URI\n misrepresentation and masquerading\n * MFSA 2013-69/CVE-2013-1710 (bmo#871368) CRMF requests\n allow for code execution and XSS attacks\n * MFSA 2013-70/CVE-2013-1711 (bmo#843829) Bypass of\n XrayWrappers using XBL Scopes\n * MFSA 2013-72/CVE-2013-1713 (bmo#887098) Wrong principal\n used for validating URI for some Javascript components\n * MFSA 2013-73/CVE-2013-1714 (bmo#879787) Same-origin\n bypass with web workers and XMLHttpRequest\n * MFSA 2013-75/CVE-2013-1717 (bmo#406541, bmo#738397)\n Local Java applets may read contents of local file\n system\n\n", "modified": "2013-08-14T03:05:38", "published": "2013-08-14T03:05:38", "id": "OPENSUSE-SU-2013:1334-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00011.html", "type": "suse", "title": "Mozilla updates August 2013 (important)", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "openvas": [{"lastseen": "2017-12-04T11:22:17", "bulletinFamily": "scanner", "description": "Check for the Version of firefox", "modified": "2017-12-01T00:00:00", "published": "2013-08-08T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=841513", "id": "OPENVAS:841513", "title": "Ubuntu Update for firefox USN-1924-1", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_1924_1.nasl 7958 2017-12-01 06:47:47Z santu $\n#\n# Ubuntu Update for firefox USN-1924-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\n\nif(description)\n{\n script_id(841513);\n script_version(\"$Revision: 7958 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-01 07:47:47 +0100 (Fri, 01 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2013-08-08 11:42:05 +0530 (Thu, 08 Aug 2013)\");\n script_cve_id(\"CVE-2013-1701\", \"CVE-2013-1702\", \"CVE-2013-1704\", \"CVE-2013-1705\",\n \"CVE-2013-1708\", \"CVE-2013-1709\", \"CVE-2013-1710\", \"CVE-2013-1711\",\n \"CVE-2013-1713\", \"CVE-2013-1714\", \"CVE-2013-1717\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"Ubuntu Update for firefox USN-1924-1\");\n\n tag_insight = \"Jeff Gilbert, Henrik Skupin, Ben Turner, Christian Holler,\nAndrew McCreight, Gary Kwong, Jan Varga and Jesse Ruderman discovered\nmultiple memory safety issues in Firefox. If the user were tricked in to\nopening a specially crafted page, an attacker could possibly exploit these\nto cause a denial of service via application crash, or potentially execute\narbitrary code with the privileges of the user invoking Firefox.\n(CVE-2013-1701, CVE-2013-1702)\n\nA use-after-free bug was discovered when the DOM is modified during a\nSetBody mutation event. If the user were tricked in to opening a specially\ncrafted page, an attacker could potentially exploit this to execute\narbitrary code with the privileges of the user invoking Firefox.\n(CVE-2013-1704)\n\nA use-after-free bug was discovered when generating a CRMF request with\ncertain parameters. If the user were tricked in to opening a specially\ncrafted page, an attacker could potentially exploit this to execute\narbitrary code with the privileges of the user invoking Firefox.\n(CVE-2013-1705)\n\nAki Helin discovered a crash when decoding a WAV file in some\ncircumstances. An attacker could potentially exploit this to cause a\ndenial of service. (CVE-2013-1708)\n\nIt was discovered that a document's URI could be set to the URI of\na different document. An attacker could potentially exploit this to\nconduct cross-site scripting (XSS) attacks. (CVE-2013-1709)\n\nA flaw was discovered when generating a CRMF request in certain\ncircumstances. An attacker could potentially exploit this to conduct\ncross-site scripting (XSS) attacks, or execute arbitrary code with the\nprivileges of the user invoking Firefox. (CVE-2013-1710)\n\nBobby Holley discovered that XBL scopes could be used to circumvent\nXrayWrappers in certain circumstances. An attacked could potentially\nexploit this to conduct cross-site scripting (XSS) attacks or cause\nundefined behaviour. (CVE-2013-1711)\n\nCody Crews discovered that some Javascript components performed security\nchecks against the wrong URI, potentially bypassing same-origin policy\nrestrictions. An attacker could exploit this to conduct cross-site\nscripting (XSS) attacks or install addons from a malicious site.\n(CVE-2013-1713)\n\nFederico Lanusse discovered that web workers could bypass cross-origin\nchecks when using XMLHttpRequest. An attacker could potentially exploit\nthis to conduct cross-site scripting (XSS) attacks. (CVE-2013-1714)\n\nGeorgi Guninski and John Schoenick discovered that Java applets could\naccess local files under certain circumstances. An attacker could\npotentially exploit this to steal confidential data. (CVE-2013-1717)\";\n\n tag_affected = \"firefox on Ubuntu 13.04 ,\n Ubuntu 12.10 ,\n Ubuntu 12.04 LTS\";\n\n tag_solution = \"Please Install the Updated Packages.\";\n\n\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name: \"USN\", value: \"1924-1\");\n script_xref(name: \"URL\" , value: \"http://www.ubuntu.com/usn/usn-1924-1/\");\n script_summary(\"Check for the Version of firefox\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2013 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"UBUNTU12.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"firefox\", ver:\"23.0+build2-0ubuntu0.12.04.1\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU12.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"firefox\", ver:\"23.0+build2-0ubuntu0.12.10.1\", rls:\"UBUNTU12.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU13.04\")\n{\n\n if ((res = isdpkgvuln(pkg:\"firefox\", ver:\"23.0+build2-0ubuntu0.13.04.1\", rls:\"UBUNTU13.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-05-29T18:38:06", "bulletinFamily": "scanner", "description": "The host is installed with Mozilla SeaMonkey and is prone to multiple\nvulnerabilities.", "modified": "2018-10-12T00:00:00", "published": "2013-08-08T00:00:00", "id": "OPENVAS:1361412562310803861", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310803861", "title": "Mozilla SeaMonkey Multiple Vulnerabilities - August 13 (Mac OS X)", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_mozilla_seamonkey_mult_vuln_aug13_macosx.nasl 11865 2018-10-12 10:03:43Z cfischer $\n#\n# Mozilla SeaMonkey Multiple Vulnerabilities - August 13 (Mac OS X)\n#\n# Authors:\n# Thanga Prakash S <tprakash@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif (description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.803861\");\n script_version(\"$Revision: 11865 $\");\n script_cve_id(\"CVE-2013-1701\", \"CVE-2013-1702\", \"CVE-2013-1704\", \"CVE-2013-1705\",\n \"CVE-2013-1708\", \"CVE-2013-1709\", \"CVE-2013-1710\", \"CVE-2013-1711\",\n \"CVE-2013-1713\", \"CVE-2013-1714\", \"CVE-2013-1717\");\n script_bugtraq_id(61641);\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-12 12:03:43 +0200 (Fri, 12 Oct 2018) $\");\n script_tag(name:\"creation_date\", value:\"2013-08-08 17:35:59 +0530 (Thu, 08 Aug 2013)\");\n script_name(\"Mozilla SeaMonkey Multiple Vulnerabilities - August 13 (Mac OS X)\");\n script_tag(name:\"summary\", value:\"The host is installed with Mozilla SeaMonkey and is prone to multiple\nvulnerabilities.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"solution\", value:\"Upgrade to version 2.20 or later.\");\n script_tag(name:\"insight\", value:\"Multiple flaws due to,\n\n - Error in crypto.generateCRMFRequest function.\n\n - Does not properly restrict local-filesystem access by Java applets.\n\n - Multiple Unspecified vulnerabilities in the browser engine.\n\n - Web Workers implementation is not properly restrict XMLHttpRequest calls.\n\n - Usage of incorrect URI within unspecified comparisons during enforcement\n of the Same Origin Policy.\n\n - The XrayWrapper implementation does not properly address the possibility\n of an XBL scope bypass resulting from non-native arguments in XBL\n function calls.\n\n - Improper handling of interaction between FRAME elements and history.\n\n - Improper handling of WAV file by the nsCString::CharAt function.\n\n - Heap-based buffer underflow in the cryptojs_interpret_key_gen_type function.\n\n - Use-after-free vulnerability in the nsINode::GetParentNode function.\");\n script_tag(name:\"affected\", value:\"Mozilla SeaMonkey before 2.20 on Mac OS X\");\n script_tag(name:\"impact\", value:\"Successful exploitation will allow attackers to execute arbitrary code, obtain potentially sensitive information, gain escalated privileges, bypass\nsecurity restrictions, perform unauthorized actions and other attacks may\nalso be possible.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_xref(name:\"URL\", value:\"http://secunia.com/advisories/54413\");\n script_xref(name:\"URL\", value:\"https://bugzilla.mozilla.org/show_bug.cgi?id=406541\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2013/mfsa2013-75.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2013 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_mozilla_prdts_detect_macosx.nasl\");\n script_mandatory_keys(\"SeaMonkey/MacOSX/Version\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/projects/seamonkey\");\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\nsmVer = get_kb_item(\"SeaMonkey/MacOSX/Version\");\n\nif(smVer)\n{\n if(version_is_less(version:smVer, test_version:\"2.20\"))\n {\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n exit(0);\n }\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2018-01-24T11:09:50", "bulletinFamily": "scanner", "description": "Check for the Version of Mozilla", "modified": "2018-01-24T00:00:00", "published": "2013-11-19T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=850526", "id": "OPENVAS:850526", "title": "SuSE Update for Mozilla openSUSE-SU-2013:1334-1 (Mozilla)", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_suse_2013_1334_1.nasl 8509 2018-01-24 06:57:46Z teissa $\n#\n# SuSE Update for Mozilla openSUSE-SU-2013:1334-1 (Mozilla)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\n\nif(description)\n{\n script_id(850526);\n script_version(\"$Revision: 8509 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-24 07:57:46 +0100 (Wed, 24 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2013-11-19 14:05:49 +0530 (Tue, 19 Nov 2013)\");\n script_cve_id(\"CVE-2013-1701\", \"CVE-2013-1702\", \"CVE-2013-1704\", \"CVE-2013-1705\",\n \"CVE-2013-1708\", \"CVE-2013-1709\", \"CVE-2013-1710\", \"CVE-2013-1711\",\n \"CVE-2013-1713\", \"CVE-2013-1714\", \"CVE-2013-1717\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"SuSE Update for Mozilla openSUSE-SU-2013:1334-1 (Mozilla)\");\n\n tag_insight = \"\n This patch contains updates for\n - Firefox to 23.0\n - xulrunner to 17.0.8esr\n - Thunderbird to 17.0.8\n - mozilla-nspr to 4.10\n - mozilla-nss to 3.15,1\n\n * MFSA 2013-63/CVE-2013-1701/CVE-2013-1702 Miscellaneous\n memory safety hazards\n * MFSA 2013-64/CVE-2013-1704 (bmo#883313) Use after free\n mutating DOM during SetBody\n * MFSA 2013-65/CVE-2013-1705 (bmo#882865) Buffer\n underflow when generating CRMF requests\n * MFSA 2013-67/CVE-2013-1708 (bmo#879924) Crash during\n WAV audio file decoding\n * MFSA 2013-68/CVE-2013-1709 (bmo#838253) Document URI\n misrepresentation and masquerading\n * MFSA 2013-69/CVE-2013-1710 (bmo#871368) CRMF requests\n allow for code execution and XSS attacks\n * MFSA 2013-70/CVE-2013-1711 (bmo#843829) Bypass of\n XrayWrappers using XBL Scopes\n * MFSA 2013-72/CVE-2013-1713 (bmo#887098) Wrong principal\n used for validating URI for some Javascript components\n * MFSA 2013-73/CVE-2013-1714 (bmo#879787) Same-origin\n bypass with web workers and XMLHttpRequest\n * MFSA 2013-75/CVE-2013-1717 (bmo#406541, bmo#738397)\n Local Java applets may read contents of local file\n system\";\n\n tag_affected = \"Mozilla on openSUSE 11.4\";\n\n tag_solution = \"Please Install the Updated Packages.\";\n\n\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name: \"openSUSE-SU\", value: \"2013:1334_1\");\n script_tag(name: \"summary\" , value: \"Check for the Version of Mozilla\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2013 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse\", \"ssh/login/rpms\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"openSUSE11.4\")\n{\n\n if ((res = isrpmvuln(pkg:\"MozillaFirefox\", rpm:\"MozillaFirefox~23.0~83.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaFirefox-branding-upstream\", rpm:\"MozillaFirefox-branding-upstream~23.0~83.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaFirefox-buildsymbols\", rpm:\"MozillaFirefox-buildsymbols~23.0~83.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaFirefox-debuginfo\", rpm:\"MozillaFirefox-debuginfo~23.0~83.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaFirefox-debugsource\", rpm:\"MozillaFirefox-debugsource~23.0~83.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaFirefox-devel\", rpm:\"MozillaFirefox-devel~23.0~83.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaFirefox-translations-common\", rpm:\"MozillaFirefox-translations-common~23.0~83.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaFirefox-translations-other\", rpm:\"MozillaFirefox-translations-other~23.0~83.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaThunderbird\", rpm:\"MozillaThunderbird~17.0.8~69.2\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaThunderbird-buildsymbols\", rpm:\"MozillaThunderbird-buildsymbols~17.0.8~69.2\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaThunderbird-debuginfo\", rpm:\"MozillaThunderbird-debuginfo~17.0.8~69.2\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaThunderbird-debugsource\", rpm:\"MozillaThunderbird-debugsource~17.0.8~69.2\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaThunderbird-devel\", rpm:\"MozillaThunderbird-devel~17.0.8~69.2\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaThunderbird-devel-debuginfo\", rpm:\"MozillaThunderbird-devel-debuginfo~17.0.8~69.2\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaThunderbird-translations-common\", rpm:\"MozillaThunderbird-translations-common~17.0.8~69.2\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaThunderbird-translations-other\", rpm:\"MozillaThunderbird-translations-other~17.0.8~69.2\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"enigmail\", rpm:\"enigmail~1.5.2+17.0.8~69.2\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"enigmail-debuginfo\", rpm:\"enigmail-debuginfo~1.5.2+17.0.8~69.2\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libfreebl3\", rpm:\"libfreebl3~3.15.1~62.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libfreebl3-debuginfo\", rpm:\"libfreebl3-debuginfo~3.15.1~62.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libsoftokn3\", rpm:\"libsoftokn3~3.15.1~62.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libsoftokn3-debuginfo\", rpm:\"libsoftokn3-debuginfo~3.15.1~62.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nspr\", rpm:\"mozilla-nspr~4.10~28.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nspr-debuginfo\", rpm:\"mozilla-nspr-debuginfo~4.10~28.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nspr-debugsource\", rpm:\"mozilla-nspr-debugsource~4.10~28.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nspr-devel\", rpm:\"mozilla-nspr-devel~4.10~28.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss\", rpm:\"mozilla-nss~3.15.1~62.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-certs\", rpm:\"mozilla-nss-certs~3.15.1~62.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-certs-debuginfo\", rpm:\"mozilla-nss-certs-debuginfo~3.15.1~62.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-debuginfo\", rpm:\"mozilla-nss-debuginfo~3.15.1~62.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-debugsource\", rpm:\"mozilla-nss-debugsource~3.15.1~62.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-devel\", rpm:\"mozilla-nss-devel~3.15.1~62.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-sysinit\", rpm:\"mozilla-nss-sysinit~3.15.1~62.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-sysinit-debuginfo\", rpm:\"mozilla-nss-sysinit-debuginfo~3.15.1~62.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-tools\", rpm:\"mozilla-nss-tools~3.15.1~62.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-tools-debuginfo\", rpm:\"mozilla-nss-tools-debuginfo~3.15.1~62.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"seamonkey\", rpm:\"seamonkey~2.20~73.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"seamonkey-debuginfo\", rpm:\"seamonkey-debuginfo~2.20~73.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"seamonkey-debugsource\", rpm:\"seamonkey-debugsource~2.20~73.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"seamonkey-dom-inspector\", rpm:\"seamonkey-dom-inspector~2.20~73.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"seamonkey-irc\", rpm:\"seamonkey-irc~2.20~73.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"seamonkey-translations-common\", rpm:\"seamonkey-translations-common~2.20~73.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"seamonkey-translations-other\", rpm:\"seamonkey-translations-other~2.20~73.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"seamonkey-venkman\", rpm:\"seamonkey-venkman~2.20~73.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libfreebl3-32bit\", rpm:\"libfreebl3-32bit~3.15.1~62.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libfreebl3-debuginfo-32bit\", rpm:\"libfreebl3-debuginfo-32bit~3.15.1~62.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libsoftokn3-32bit\", rpm:\"libsoftokn3-32bit~3.15.1~62.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libsoftokn3-debuginfo-32bit\", rpm:\"libsoftokn3-debuginfo-32bit~3.15.1~62.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nspr-32bit\", rpm:\"mozilla-nspr-32bit~4.10~28.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nspr-debuginfo-32bit\", rpm:\"mozilla-nspr-debuginfo-32bit~4.10~28.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-32bit\", rpm:\"mozilla-nss-32bit~3.15.1~62.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-certs-32bit\", rpm:\"mozilla-nss-certs-32bit~3.15.1~62.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-certs-debuginfo-32bit\", rpm:\"mozilla-nss-certs-debuginfo-32bit~3.15.1~62.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-debuginfo-32bit\", rpm:\"mozilla-nss-debuginfo-32bit~3.15.1~62.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-sysinit-32bit\", rpm:\"mozilla-nss-sysinit-32bit~3.15.1~62.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-sysinit-debuginfo-32bit\", rpm:\"mozilla-nss-sysinit-debuginfo-32bit~3.15.1~62.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libfreebl3-debuginfo-x86\", rpm:\"libfreebl3-debuginfo-x86~3.15.1~62.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libfreebl3-x86\", rpm:\"libfreebl3-x86~3.15.1~62.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libsoftokn3-debuginfo-x86\", rpm:\"libsoftokn3-debuginfo-x86~3.15.1~62.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libsoftokn3-x86\", rpm:\"libsoftokn3-x86~3.15.1~62.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nspr-debuginfo-x86\", rpm:\"mozilla-nspr-debuginfo-x86~4.10~28.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nspr-x86\", rpm:\"mozilla-nspr-x86~4.10~28.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-certs-debuginfo-x86\", rpm:\"mozilla-nss-certs-debuginfo-x86~3.15.1~62.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-certs-x86\", rpm:\"mozilla-nss-certs-x86~3.15.1~62.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-debuginfo-x86\", rpm:\"mozilla-nss-debuginfo-x86~3.15.1~62.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-sysinit-debuginfo-x86\", rpm:\"mozilla-nss-sysinit-debuginfo-x86~3.15.1~62.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-sysinit-x86\", rpm:\"mozilla-nss-sysinit-x86~3.15.1~62.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-x86\", rpm:\"mozilla-nss-x86~3.15.1~62.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-05-29T18:37:51", "bulletinFamily": "scanner", "description": "The remote host is missing an update for the ", "modified": "2019-03-13T00:00:00", "published": "2013-08-08T00:00:00", "id": "OPENVAS:1361412562310841513", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310841513", "title": "Ubuntu Update for firefox USN-1924-1", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_1924_1.nasl 14132 2019-03-13 09:25:59Z cfischer $\n#\n# Ubuntu Update for firefox USN-1924-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.841513\");\n script_version(\"$Revision: 14132 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-13 10:25:59 +0100 (Wed, 13 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2013-08-08 11:42:05 +0530 (Thu, 08 Aug 2013)\");\n script_cve_id(\"CVE-2013-1701\", \"CVE-2013-1702\", \"CVE-2013-1704\", \"CVE-2013-1705\",\n \"CVE-2013-1708\", \"CVE-2013-1709\", \"CVE-2013-1710\", \"CVE-2013-1711\",\n \"CVE-2013-1713\", \"CVE-2013-1714\", \"CVE-2013-1717\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"Ubuntu Update for firefox USN-1924-1\");\n\n script_tag(name:\"affected\", value:\"firefox on Ubuntu 13.04,\n Ubuntu 12.10,\n Ubuntu 12.04 LTS\");\n script_tag(name:\"insight\", value:\"Jeff Gilbert, Henrik Skupin, Ben Turner, Christian Holler,\nAndrew McCreight, Gary Kwong, Jan Varga and Jesse Ruderman discovered\nmultiple memory safety issues in Firefox. If the user were tricked in to\nopening a specially crafted page, an attacker could possibly exploit these\nto cause a denial of service via application crash, or potentially execute\narbitrary code with the privileges of the user invoking Firefox.\n(CVE-2013-1701, CVE-2013-1702)\n\nA use-after-free bug was discovered when the DOM is modified during a\nSetBody mutation event. If the user were tricked in to opening a specially\ncrafted page, an attacker could potentially exploit this to execute\narbitrary code with the privileges of the user invoking Firefox.\n(CVE-2013-1704)\n\nA use-after-free bug was discovered when generating a CRMF request with\ncertain parameters. If the user were tricked in to opening a specially\ncrafted page, an attacker could potentially exploit this to execute\narbitrary code with the privileges of the user invoking Firefox.\n(CVE-2013-1705)\n\nAki Helin discovered a crash when decoding a WAV file in some\ncircumstances. An attacker could potentially exploit this to cause a\ndenial of service. (CVE-2013-1708)\n\nIt was discovered that a document's URI could be set to the URI of\na different document. An attacker could potentially exploit this to\nconduct cross-site scripting (XSS) attacks. (CVE-2013-1709)\n\nA flaw was discovered when generating a CRMF request in certain\ncircumstances. An attacker could potentially exploit this to conduct\ncross-site scripting (XSS) attacks, or execute arbitrary code with the\nprivileges of the user invoking Firefox. (CVE-2013-1710)\n\nBobby Holley discovered that XBL scopes could be used to circumvent\nXrayWrappers in certain circumstances. An attacked could potentially\nexploit this to conduct cross-site scripting (XSS) attacks or cause\nundefined behaviour. (CVE-2013-1711)\n\nCody Crews discovered that some Javascript components performed security\nchecks against the wrong URI, potentially bypassing same-origin policy\nrestrictions. An attacker could exploit this to conduct cross-site\nscripting (XSS) attacks or install addons from a malicious site.\n(CVE-2013-1713)\n\nFederico Lanusse discovered that web workers could bypass cross-origin\nchecks when using XMLHttpRequest. An attacker could potentially exploit\nthis to conduct cross-site scripting (XSS) attacks. (CVE-2013-1714)\n\nGeorgi Guninski and John Schoenick discovered that Java applets could\naccess local files under certain circumstances. An attacker could\npotentially exploit this to steal confidential data. (CVE-2013-1717)\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"USN\", value:\"1924-1\");\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-1924-1/\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'firefox'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2013 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU(12\\.04 LTS|12\\.10|13\\.04)\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU12.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"firefox\", ver:\"23.0+build2-0ubuntu0.12.04.1\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU12.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"firefox\", ver:\"23.0+build2-0ubuntu0.12.10.1\", rls:\"UBUNTU12.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU13.04\")\n{\n\n if ((res = isdpkgvuln(pkg:\"firefox\", ver:\"23.0+build2-0ubuntu0.13.04.1\", rls:\"UBUNTU13.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2017-07-02T21:11:09", "bulletinFamily": "scanner", "description": "The host is installed with Mozilla SeaMonkey and is prone to multiple\nvulnerabilities.", "modified": "2017-05-11T00:00:00", "published": "2013-08-08T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=803860", "id": "OPENVAS:803860", "title": "Mozilla SeaMonkey Multiple Vulnerabilities - August 13 (Windows)", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_mozilla_seamonkey_mult_vuln_aug13_win.nasl 6104 2017-05-11 09:03:48Z teissa $\n#\n# Mozilla SeaMonkey Multiple Vulnerabilities - August 13 (Windows)\n#\n# Authors:\n# Thanga Prakash S <tprakash@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_impact = \"\n Impact Level: System/Application\";\n\nif (description)\n{\n script_id(803860);\n script_version(\"$Revision: 6104 $\");\n script_cve_id(\"CVE-2013-1701\", \"CVE-2013-1702\", \"CVE-2013-1704\", \"CVE-2013-1705\",\n \"CVE-2013-1708\", \"CVE-2013-1709\", \"CVE-2013-1710\", \"CVE-2013-1711\",\n \"CVE-2013-1713\", \"CVE-2013-1714\", \"CVE-2013-1717\");\n script_bugtraq_id(61641);\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-05-11 11:03:48 +0200 (Thu, 11 May 2017) $\");\n script_tag(name:\"creation_date\", value:\"2013-08-08 17:26:59 +0530 (Thu, 08 Aug 2013)\");\n script_name(\"Mozilla SeaMonkey Multiple Vulnerabilities - August 13 (Windows)\");\n\n tag_summary =\n\"The host is installed with Mozilla SeaMonkey and is prone to multiple\nvulnerabilities.\";\n\n tag_vuldetect =\n\"Get the installed version with the help of detect NVT and check the version\nis vulnerable or not.\";\n\n tag_insight =\n\"Multiple flaws due to,\n- Error in crypto.generateCRMFRequest function.\n- Does not properly restrict local-filesystem access by Java applets.\n- Multiple Unspecified vulnerabilities in the browser engine.\n- Web Workers implementation is not properly restrict XMLHttpRequest calls.\n- Usage of incorrect URI within unspecified comparisons during enforcement\n of the Same Origin Policy.\n- The XrayWrapper implementation does not properly address the possibility\n of an XBL scope bypass resulting from non-native arguments in XBL\n function calls.\n- Improper handling of interaction between FRAME elements and history.\n- Improper handling of WAV file by the nsCString::CharAt function.\n- Heap-based buffer underflow in the cryptojs_interpret_key_gen_type function.\n- Use-after-free vulnerability in the nsINode::GetParentNode function.\";\n\n tag_impact =\n\"Successful exploitation will allow attackers to execute arbitrary code,\nobtain potentially sensitive information, gain escalated privileges, bypass\nsecurity restrictions, perform unauthorized actions and other attacks may\nalso be possible.\";\n\n tag_affected =\n\"Mozilla SeaMonkey before 2.20 on Windows\";\n\n tag_solution =\n\"Upgrade to version 2.20 or later,\nFor updates refer to http://www.mozilla.org/projects/seamonkey\";\n\n\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name : \"vuldetect\" , value : tag_vuldetect);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name:\"qod_type\", value:\"registry\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_xref(name : \"URL\" , value : \"http://secunia.com/advisories/54413\");\n script_xref(name : \"URL\" , value : \"https://bugzilla.mozilla.org/show_bug.cgi?id=406541\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2013/mfsa2013-75.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2013 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_seamonkey_detect_win.nasl\");\n script_mandatory_keys(\"Seamonkey/Win/Ver\");\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\n# Variable initialization\nsmVer = \"\";\n\n# Get the version from the kb\nsmVer = get_kb_item(\"Seamonkey/Win/Ver\");\n\nif(smVer)\n{\n # Check for vulnerable version\n if(version_is_less(version:smVer, test_version:\"2.20\"))\n {\n security_message(0);\n exit(0);\n }\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-05-29T18:37:59", "bulletinFamily": "scanner", "description": "The remote host is missing an update for the ", "modified": "2019-03-13T00:00:00", "published": "2013-08-08T00:00:00", "id": "OPENVAS:1361412562310841517", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310841517", "title": "Ubuntu Update for ubufox USN-1924-2", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_1924_2.nasl 14132 2019-03-13 09:25:59Z cfischer $\n#\n# Ubuntu Update for ubufox USN-1924-2\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.841517\");\n script_version(\"$Revision: 14132 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-13 10:25:59 +0100 (Wed, 13 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2013-08-08 11:44:26 +0530 (Thu, 08 Aug 2013)\");\n script_cve_id(\"CVE-2013-1701\", \"CVE-2013-1702\", \"CVE-2013-1704\", \"CVE-2013-1705\",\n \"CVE-2013-1708\", \"CVE-2013-1709\", \"CVE-2013-1710\", \"CVE-2013-1711\",\n \"CVE-2013-1713\", \"CVE-2013-1714\", \"CVE-2013-1717\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"Ubuntu Update for ubufox USN-1924-2\");\n\n script_tag(name:\"affected\", value:\"ubufox on Ubuntu 13.04,\n Ubuntu 12.10,\n Ubuntu 12.04 LTS\");\n script_tag(name:\"insight\", value:\"USN-1924-1 fixed vulnerabilities in Firefox. This update provides the\ncorresponding updates for Ubufox and Unity Firefox Extension.\n\nOriginal advisory details:\n\nJeff Gilbert, Henrik Skupin, Ben Turner, Christian Holler,\nAndrew McCreight, Gary Kwong, Jan Varga and Jesse Ruderman discovered\nmultiple memory safety issues in Firefox. If the user were tricked in to\nopening a specially crafted page, an attacker could possibly exploit these\nto cause a denial of service via application crash, or potentially execute\narbitrary code with the privileges of the user invoking Firefox.\n(CVE-2013-1701, CVE-2013-1702)\n\nA use-after-free bug was discovered when the DOM is modified during a\nSetBody mutation event. If the user were tricked in to opening a specially\ncrafted page, an attacker could potentially exploit this to execute\narbitrary code with the privileges of the user invoking Firefox.\n(CVE-2013-1704)\n\nA use-after-free bug was discovered when generating a CRMF request with\ncertain parameters. If the user were tricked in to opening a specially\ncrafted page, an attacker could potentially exploit this to execute\narbitrary code with the privileges of the user invoking Firefox.\n(CVE-2013-1705)\n\nAki Helin discovered a crash when decoding a WAV file in some\ncircumstances. An attacker could potentially exploit this to cause a\ndenial of service. (CVE-2013-1708)\n\nIt was discovered that a document's URI could be set to the URI of\na different document. An attacker could potentially exploit this to\nconduct cross-site scripting (XSS) attacks. (CVE-2013-1709)\n\nA flaw was discovered when generating a CRMF request in certain\ncircumstances. An attacker could potentially exploit this to conduct\ncross-site scripting (XSS) attacks, or execute arbitrary code with the\nprivileges of the user invoking Firefox. (CVE-2013-1710)\n\nBobby Holley discovered that XBL scopes could be used to circumvent\nXrayWrappers in certain circumstances. An attacked could potentially\nexploit this to conduct cross-site scripting (XSS) attacks or cause\nundefined behaviour. (CVE-2013-1711)\n\nCody Crews discovered that some Javascript components performed security\nchecks against the wrong URI, potentially bypassing same-origin policy\nrestrictions. An attacker could exploit this to conduct cross-site\nscripting (XSS) attacks or install addons from a malicious site.\n(CVE-2013-1713)\n\nFederico Lanusse discovered that web workers could bypass cross-origin\nchecks when using XMLHttpRequest. An attacker could potentially exploit\nthis to conduct cross-site scripting (XSS) attacks. (CVE-2013-1714)\n\nGeorgi Guninski and John Schoenick discovered that Java applets could\naccess local files under certain circumstances. An attacker could\npotentially exploit this to steal confidential data. (CVE-2013-1717)\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"USN\", value:\"1924-2\");\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-1924-2/\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'ubufox'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2013 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU(12\\.04 LTS|12\\.10|13\\.04)\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU12.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"xul-ext-ubufox\", ver:\"2.7-0ubuntu0.12.04.1\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU12.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"xul-ext-ubufox\", ver:\"2.7-0ubuntu0.12.10.1\", rls:\"UBUNTU12.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"xul-ext-unity\", ver:\"2.4.7-0ubuntu0.2\", rls:\"UBUNTU12.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU13.04\")\n{\n\n if ((res = isdpkgvuln(pkg:\"xul-ext-ubufox\", ver:\"2.7-0ubuntu0.13.04.1\", rls:\"UBUNTU13.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:37:59", "bulletinFamily": "scanner", "description": "The host is installed with Mozilla SeaMonkey and is prone to multiple\nvulnerabilities.", "modified": "2018-10-12T00:00:00", "published": "2013-08-08T00:00:00", "id": "OPENVAS:1361412562310803860", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310803860", "title": "Mozilla SeaMonkey Multiple Vulnerabilities - August 13 (Windows)", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_mozilla_seamonkey_mult_vuln_aug13_win.nasl 11865 2018-10-12 10:03:43Z cfischer $\n#\n# Mozilla SeaMonkey Multiple Vulnerabilities - August 13 (Windows)\n#\n# Authors:\n# Thanga Prakash S <tprakash@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif (description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.803860\");\n script_version(\"$Revision: 11865 $\");\n script_cve_id(\"CVE-2013-1701\", \"CVE-2013-1702\", \"CVE-2013-1704\", \"CVE-2013-1705\",\n \"CVE-2013-1708\", \"CVE-2013-1709\", \"CVE-2013-1710\", \"CVE-2013-1711\",\n \"CVE-2013-1713\", \"CVE-2013-1714\", \"CVE-2013-1717\");\n script_bugtraq_id(61641);\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-12 12:03:43 +0200 (Fri, 12 Oct 2018) $\");\n script_tag(name:\"creation_date\", value:\"2013-08-08 17:26:59 +0530 (Thu, 08 Aug 2013)\");\n script_name(\"Mozilla SeaMonkey Multiple Vulnerabilities - August 13 (Windows)\");\n script_tag(name:\"summary\", value:\"The host is installed with Mozilla SeaMonkey and is prone to multiple\nvulnerabilities.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"solution\", value:\"Upgrade to version 2.20 or later.\");\n script_tag(name:\"insight\", value:\"Multiple flaws due to,\n\n - Error in crypto.generateCRMFRequest function.\n\n - Does not properly restrict local-filesystem access by Java applets.\n\n - Multiple Unspecified vulnerabilities in the browser engine.\n\n - Web Workers implementation is not properly restrict XMLHttpRequest calls.\n\n - Usage of incorrect URI within unspecified comparisons during enforcement\n of the Same Origin Policy.\n\n - The XrayWrapper implementation does not properly address the possibility\n of an XBL scope bypass resulting from non-native arguments in XBL\n function calls.\n\n - Improper handling of interaction between FRAME elements and history.\n\n - Improper handling of WAV file by the nsCString::CharAt function.\n\n - Heap-based buffer underflow in the cryptojs_interpret_key_gen_type function.\n\n - Use-after-free vulnerability in the nsINode::GetParentNode function.\");\n script_tag(name:\"affected\", value:\"Mozilla SeaMonkey before 2.20 on Windows\");\n script_tag(name:\"impact\", value:\"Successful exploitation will allow attackers to execute arbitrary code,\nobtain potentially sensitive information, gain escalated privileges, bypass\nsecurity restrictions, perform unauthorized actions and other attacks may\nalso be possible.\");\n script_tag(name:\"qod_type\", value:\"registry\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_xref(name:\"URL\", value:\"http://secunia.com/advisories/54413\");\n script_xref(name:\"URL\", value:\"https://bugzilla.mozilla.org/show_bug.cgi?id=406541\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2013/mfsa2013-75.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2013 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_seamonkey_detect_win.nasl\");\n script_mandatory_keys(\"Seamonkey/Win/Ver\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/projects/seamonkey\");\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\nsmVer = get_kb_item(\"Seamonkey/Win/Ver\");\n\nif(smVer)\n{\n if(version_is_less(version:smVer, test_version:\"2.20\"))\n {\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n exit(0);\n }\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:38:12", "bulletinFamily": "scanner", "description": "The remote host is missing an update for the ", "modified": "2018-11-16T00:00:00", "published": "2013-11-19T00:00:00", "id": "OPENVAS:1361412562310850526", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310850526", "title": "SuSE Update for Mozilla openSUSE-SU-2013:1334-1 (Mozilla)", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_suse_2013_1334_1.nasl 12381 2018-11-16 11:16:30Z cfischer $\n#\n# SuSE Update for Mozilla openSUSE-SU-2013:1334-1 (Mozilla)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.850526\");\n script_version(\"$Revision: 12381 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-11-16 12:16:30 +0100 (Fri, 16 Nov 2018) $\");\n script_tag(name:\"creation_date\", value:\"2013-11-19 14:05:49 +0530 (Tue, 19 Nov 2013)\");\n script_cve_id(\"CVE-2013-1701\", \"CVE-2013-1702\", \"CVE-2013-1704\", \"CVE-2013-1705\",\n \"CVE-2013-1708\", \"CVE-2013-1709\", \"CVE-2013-1710\", \"CVE-2013-1711\",\n \"CVE-2013-1713\", \"CVE-2013-1714\", \"CVE-2013-1717\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"SuSE Update for Mozilla openSUSE-SU-2013:1334-1 (Mozilla)\");\n script_tag(name:\"affected\", value:\"Mozilla on openSUSE 11.4\");\n script_tag(name:\"insight\", value:\"This patch contains updates for\n\n - Firefox to 23.0\n\n - xulrunner to 17.0.8esr\n\n - Thunderbird to 17.0.8\n\n - mozilla-nspr to 4.10\n\n - mozilla-nss to 3.15, 1\n\n * MFSA 2013-63/CVE-2013-1701/CVE-2013-1702 Miscellaneous\n memory safety hazards\n\n * MFSA 2013-64/CVE-2013-1704 (bmo#883313) Use after free\n mutating DOM during SetBody\n\n * MFSA 2013-65/CVE-2013-1705 (bmo#882865) Buffer\n underflow when generating CRMF requests\n\n * MFSA 2013-67/CVE-2013-1708 (bmo#879924) Crash during\n WAV audio file decoding\n\n * MFSA 2013-68/CVE-2013-1709 (bmo#838253) Document URI\n misrepresentation and masquerading\n\n * MFSA 2013-69/CVE-2013-1710 (bmo#871368) CRMF requests\n allow for code execution and XSS attacks\n\n * MFSA 2013-70/CVE-2013-1711 (bmo#843829) Bypass of\n XrayWrappers using XBL Scopes\n\n * MFSA 2013-72/CVE-2013-1713 (bmo#887098) Wrong principal\n used for validating URI for some Javascript components\n\n * MFSA 2013-73/CVE-2013-1714 (bmo#879787) Same-origin\n bypass with web workers and XMLHttpRequest\n\n * MFSA 2013-75/CVE-2013-1717 (bmo#406541, bmo#738397)\n Local Java applets may read contents of local file\n system\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"openSUSE-SU\", value:\"2013:1334_1\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'Mozilla'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2013 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse\", \"ssh/login/rpms\", re:\"ssh/login/release=openSUSE11\\.4\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\nres = \"\";\n\nif(release == \"openSUSE11.4\")\n{\n\n if ((res = isrpmvuln(pkg:\"MozillaFirefox\", rpm:\"MozillaFirefox~23.0~83.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaFirefox-branding-upstream\", rpm:\"MozillaFirefox-branding-upstream~23.0~83.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaFirefox-buildsymbols\", rpm:\"MozillaFirefox-buildsymbols~23.0~83.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaFirefox-debuginfo\", rpm:\"MozillaFirefox-debuginfo~23.0~83.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaFirefox-debugsource\", rpm:\"MozillaFirefox-debugsource~23.0~83.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaFirefox-devel\", rpm:\"MozillaFirefox-devel~23.0~83.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaFirefox-translations-common\", rpm:\"MozillaFirefox-translations-common~23.0~83.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaFirefox-translations-other\", rpm:\"MozillaFirefox-translations-other~23.0~83.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaThunderbird\", rpm:\"MozillaThunderbird~17.0.8~69.2\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaThunderbird-buildsymbols\", rpm:\"MozillaThunderbird-buildsymbols~17.0.8~69.2\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaThunderbird-debuginfo\", rpm:\"MozillaThunderbird-debuginfo~17.0.8~69.2\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaThunderbird-debugsource\", rpm:\"MozillaThunderbird-debugsource~17.0.8~69.2\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaThunderbird-devel\", rpm:\"MozillaThunderbird-devel~17.0.8~69.2\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaThunderbird-devel-debuginfo\", rpm:\"MozillaThunderbird-devel-debuginfo~17.0.8~69.2\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaThunderbird-translations-common\", rpm:\"MozillaThunderbird-translations-common~17.0.8~69.2\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaThunderbird-translations-other\", rpm:\"MozillaThunderbird-translations-other~17.0.8~69.2\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"enigmail\", rpm:\"enigmail~1.5.2+17.0.8~69.2\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"enigmail-debuginfo\", rpm:\"enigmail-debuginfo~1.5.2+17.0.8~69.2\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libfreebl3\", rpm:\"libfreebl3~3.15.1~62.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libfreebl3-debuginfo\", rpm:\"libfreebl3-debuginfo~3.15.1~62.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libsoftokn3\", rpm:\"libsoftokn3~3.15.1~62.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libsoftokn3-debuginfo\", rpm:\"libsoftokn3-debuginfo~3.15.1~62.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nspr\", rpm:\"mozilla-nspr~4.10~28.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nspr-debuginfo\", rpm:\"mozilla-nspr-debuginfo~4.10~28.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nspr-debugsource\", rpm:\"mozilla-nspr-debugsource~4.10~28.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nspr-devel\", rpm:\"mozilla-nspr-devel~4.10~28.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss\", rpm:\"mozilla-nss~3.15.1~62.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-certs\", rpm:\"mozilla-nss-certs~3.15.1~62.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-certs-debuginfo\", rpm:\"mozilla-nss-certs-debuginfo~3.15.1~62.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-debuginfo\", rpm:\"mozilla-nss-debuginfo~3.15.1~62.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-debugsource\", rpm:\"mozilla-nss-debugsource~3.15.1~62.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-devel\", rpm:\"mozilla-nss-devel~3.15.1~62.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-sysinit\", rpm:\"mozilla-nss-sysinit~3.15.1~62.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-sysinit-debuginfo\", rpm:\"mozilla-nss-sysinit-debuginfo~3.15.1~62.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-tools\", rpm:\"mozilla-nss-tools~3.15.1~62.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-tools-debuginfo\", rpm:\"mozilla-nss-tools-debuginfo~3.15.1~62.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"seamonkey\", rpm:\"seamonkey~2.20~73.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"seamonkey-debuginfo\", rpm:\"seamonkey-debuginfo~2.20~73.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"seamonkey-debugsource\", rpm:\"seamonkey-debugsource~2.20~73.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"seamonkey-dom-inspector\", rpm:\"seamonkey-dom-inspector~2.20~73.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"seamonkey-irc\", rpm:\"seamonkey-irc~2.20~73.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"seamonkey-translations-common\", rpm:\"seamonkey-translations-common~2.20~73.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"seamonkey-translations-other\", rpm:\"seamonkey-translations-other~2.20~73.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"seamonkey-venkman\", rpm:\"seamonkey-venkman~2.20~73.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libfreebl3-32bit\", rpm:\"libfreebl3-32bit~3.15.1~62.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libfreebl3-debuginfo-32bit\", rpm:\"libfreebl3-debuginfo-32bit~3.15.1~62.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libsoftokn3-32bit\", rpm:\"libsoftokn3-32bit~3.15.1~62.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libsoftokn3-debuginfo-32bit\", rpm:\"libsoftokn3-debuginfo-32bit~3.15.1~62.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nspr-32bit\", rpm:\"mozilla-nspr-32bit~4.10~28.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nspr-debuginfo-32bit\", rpm:\"mozilla-nspr-debuginfo-32bit~4.10~28.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-32bit\", rpm:\"mozilla-nss-32bit~3.15.1~62.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-certs-32bit\", rpm:\"mozilla-nss-certs-32bit~3.15.1~62.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-certs-debuginfo-32bit\", rpm:\"mozilla-nss-certs-debuginfo-32bit~3.15.1~62.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-debuginfo-32bit\", rpm:\"mozilla-nss-debuginfo-32bit~3.15.1~62.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-sysinit-32bit\", rpm:\"mozilla-nss-sysinit-32bit~3.15.1~62.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-sysinit-debuginfo-32bit\", rpm:\"mozilla-nss-sysinit-debuginfo-32bit~3.15.1~62.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libfreebl3-debuginfo-x86\", rpm:\"libfreebl3-debuginfo-x86~3.15.1~62.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libfreebl3-x86\", rpm:\"libfreebl3-x86~3.15.1~62.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libsoftokn3-debuginfo-x86\", rpm:\"libsoftokn3-debuginfo-x86~3.15.1~62.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libsoftokn3-x86\", rpm:\"libsoftokn3-x86~3.15.1~62.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nspr-debuginfo-x86\", rpm:\"mozilla-nspr-debuginfo-x86~4.10~28.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nspr-x86\", rpm:\"mozilla-nspr-x86~4.10~28.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-certs-debuginfo-x86\", rpm:\"mozilla-nss-certs-debuginfo-x86~3.15.1~62.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-certs-x86\", rpm:\"mozilla-nss-certs-x86~3.15.1~62.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-debuginfo-x86\", rpm:\"mozilla-nss-debuginfo-x86~3.15.1~62.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-sysinit-debuginfo-x86\", rpm:\"mozilla-nss-sysinit-debuginfo-x86~3.15.1~62.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-sysinit-x86\", rpm:\"mozilla-nss-sysinit-x86~3.15.1~62.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-x86\", rpm:\"mozilla-nss-x86~3.15.1~62.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2017-07-02T21:11:17", "bulletinFamily": "scanner", "description": "The host is installed with Mozilla SeaMonkey and is prone to multiple\nvulnerabilities.", "modified": "2017-05-10T00:00:00", "published": "2013-08-08T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=803861", "id": "OPENVAS:803861", "title": "Mozilla SeaMonkey Multiple Vulnerabilities - August 13 (Mac OS X)", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_mozilla_seamonkey_mult_vuln_aug13_macosx.nasl 6093 2017-05-10 09:03:18Z teissa $\n#\n# Mozilla SeaMonkey Multiple Vulnerabilities - August 13 (Mac OS X)\n#\n# Authors:\n# Thanga Prakash S <tprakash@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_impact = \"\n Impact Level: System/Application\";\n\nif (description)\n{\n script_id(803861);\n script_version(\"$Revision: 6093 $\");\n script_cve_id(\"CVE-2013-1701\", \"CVE-2013-1702\", \"CVE-2013-1704\", \"CVE-2013-1705\",\n \"CVE-2013-1708\", \"CVE-2013-1709\", \"CVE-2013-1710\", \"CVE-2013-1711\",\n \"CVE-2013-1713\", \"CVE-2013-1714\", \"CVE-2013-1717\");\n script_bugtraq_id(61641);\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-05-10 11:03:18 +0200 (Wed, 10 May 2017) $\");\n script_tag(name:\"creation_date\", value:\"2013-08-08 17:35:59 +0530 (Thu, 08 Aug 2013)\");\n script_name(\"Mozilla SeaMonkey Multiple Vulnerabilities - August 13 (Mac OS X)\");\n\n tag_summary =\n\"The host is installed with Mozilla SeaMonkey and is prone to multiple\nvulnerabilities.\";\n\n tag_vuldetect =\n\"Get the installed version with the help of detect NVT and check the version\nis vulnerable or not.\";\n\n tag_insight =\n\"Multiple flaws due to,\n- Error in crypto.generateCRMFRequest function.\n- Does not properly restrict local-filesystem access by Java applets.\n- Multiple Unspecified vulnerabilities in the browser engine.\n- Web Workers implementation is not properly restrict XMLHttpRequest calls.\n- Usage of incorrect URI within unspecified comparisons during enforcement\n of the Same Origin Policy.\n- The XrayWrapper implementation does not properly address the possibility\n of an XBL scope bypass resulting from non-native arguments in XBL\n function calls.\n- Improper handling of interaction between FRAME elements and history.\n- Improper handling of WAV file by the nsCString::CharAt function.\n- Heap-based buffer underflow in the cryptojs_interpret_key_gen_type function.\n- Use-after-free vulnerability in the nsINode::GetParentNode function.\";\n\n tag_impact =\n\"Successful exploitation will allow attackers to execute arbitrary code,\nobtain potentially sensitive information, gain escalated privileges, bypass\nsecurity restrictions, perform unauthorized actions and other attacks may\nalso be possible.\";\n\n tag_affected =\n\"Mozilla SeaMonkey before 2.20 on Mac OS X\";\n\n tag_solution =\n\"Upgrade to version 2.20 or later,\nFor updates refer to http://www.mozilla.org/projects/seamonkey\";\n\n\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name : \"vuldetect\" , value : tag_vuldetect);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_xref(name : \"URL\" , value : \"http://secunia.com/advisories/54413\");\n script_xref(name : \"URL\" , value : \"https://bugzilla.mozilla.org/show_bug.cgi?id=406541\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2013/mfsa2013-75.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2013 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_mozilla_prdts_detect_macosx.nasl\");\n script_mandatory_keys(\"SeaMonkey/MacOSX/Version\");\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\n# Variable initialization\nsmVer = \"\";\n\n# Get the version from the kb\nsmVer = get_kb_item(\"SeaMonkey/MacOSX/Version\");\n\nif(smVer)\n{\n # Check for vulnerable version\n if(version_is_less(version:smVer, test_version:\"2.20\"))\n {\n security_message(0);\n exit(0);\n }\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-12-04T11:21:42", "bulletinFamily": "scanner", "description": "Check for the Version of ubufox", "modified": "2017-12-01T00:00:00", "published": "2013-08-08T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=841517", "id": "OPENVAS:841517", "title": "Ubuntu Update for ubufox USN-1924-2", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_1924_2.nasl 7958 2017-12-01 06:47:47Z santu $\n#\n# Ubuntu Update for ubufox USN-1924-2\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\n\nif(description)\n{\n script_id(841517);\n script_version(\"$Revision: 7958 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-01 07:47:47 +0100 (Fri, 01 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2013-08-08 11:44:26 +0530 (Thu, 08 Aug 2013)\");\n script_cve_id(\"CVE-2013-1701\", \"CVE-2013-1702\", \"CVE-2013-1704\", \"CVE-2013-1705\",\n \"CVE-2013-1708\", \"CVE-2013-1709\", \"CVE-2013-1710\", \"CVE-2013-1711\",\n \"CVE-2013-1713\", \"CVE-2013-1714\", \"CVE-2013-1717\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"Ubuntu Update for ubufox USN-1924-2\");\n\n tag_insight = \"USN-1924-1 fixed vulnerabilities in Firefox. This update provides the\ncorresponding updates for Ubufox and Unity Firefox Extension.\n\nOriginal advisory details:\n\nJeff Gilbert, Henrik Skupin, Ben Turner, Christian Holler,\nAndrew McCreight, Gary Kwong, Jan Varga and Jesse Ruderman discovered\nmultiple memory safety issues in Firefox. If the user were tricked in to\nopening a specially crafted page, an attacker could possibly exploit these\nto cause a denial of service via application crash, or potentially execute\narbitrary code with the privileges of the user invoking Firefox.\n(CVE-2013-1701, CVE-2013-1702)\n\nA use-after-free bug was discovered when the DOM is modified during a\nSetBody mutation event. If the user were tricked in to opening a specially\ncrafted page, an attacker could potentially exploit this to execute\narbitrary code with the privileges of the user invoking Firefox.\n(CVE-2013-1704)\n\nA use-after-free bug was discovered when generating a CRMF request with\ncertain parameters. If the user were tricked in to opening a specially\ncrafted page, an attacker could potentially exploit this to execute\narbitrary code with the privileges of the user invoking Firefox.\n(CVE-2013-1705)\n\nAki Helin discovered a crash when decoding a WAV file in some\ncircumstances. An attacker could potentially exploit this to cause a\ndenial of service. (CVE-2013-1708)\n\nIt was discovered that a document's URI could be set to the URI of\na different document. An attacker could potentially exploit this to\nconduct cross-site scripting (XSS) attacks. (CVE-2013-1709)\n\nA flaw was discovered when generating a CRMF request in certain\ncircumstances. An attacker could potentially exploit this to conduct\ncross-site scripting (XSS) attacks, or execute arbitrary code with the\nprivileges of the user invoking Firefox. (CVE-2013-1710)\n\nBobby Holley discovered that XBL scopes could be used to circumvent\nXrayWrappers in certain circumstances. An attacked could potentially\nexploit this to conduct cross-site scripting (XSS) attacks or cause\nundefined behaviour. (CVE-2013-1711)\n\nCody Crews discovered that some Javascript components performed security\nchecks against the wrong URI, potentially bypassing same-origin policy\nrestrictions. An attacker could exploit this to conduct cross-site\nscripting (XSS) attacks or install addons from a malicious site.\n(CVE-2013-1713)\n\nFederico Lanusse discovered that web workers could bypass cross-origin\nchecks when using XMLHttpRequest. An attacker could potentially exploit\nthis to conduct cross-site scripting (XSS) attacks. (CVE-2013-1714)\n\nGeorgi Guninski and John Schoenick discovered that Java applets could\naccess local files under certain circumstances. An attacker could\npotentially exploit this to steal confidential data. (CVE-2013-1717)\";\n\n tag_affected = \"ubufox on Ubuntu 13.04 ,\n Ubuntu 12.10 ,\n Ubuntu 12.04 LTS\";\n\n tag_solution = \"Please Install the Updated Packages.\";\n\n\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name: \"USN\", value: \"1924-2\");\n script_xref(name: \"URL\" , value: \"http://www.ubuntu.com/usn/usn-1924-2/\");\n script_summary(\"Check for the Version of ubufox\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2013 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"UBUNTU12.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"xul-ext-ubufox\", ver:\"2.7-0ubuntu0.12.04.1\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU12.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"xul-ext-ubufox\", ver:\"2.7-0ubuntu0.12.10.1\", rls:\"UBUNTU12.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"xul-ext-unity\", ver:\"2.4.7-0ubuntu0.2\", rls:\"UBUNTU12.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU13.04\")\n{\n\n if ((res = isdpkgvuln(pkg:\"xul-ext-ubufox\", ver:\"2.7-0ubuntu0.13.04.1\", rls:\"UBUNTU13.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "nessus": [{"lastseen": "2019-12-13T09:12:49", "bulletinFamily": "scanner", "description": "The installed version of SeaMonkey is a version prior to 2.20. It is,\ntherefore, potentially affected by the following vulnerabilities :\n\n - Various errors exist that could allow memory corruption\n conditions. (CVE-2013-1701, CVE-2013-1702)\n\n - Use-after-free errors exist related to DOM modification\n when using ", "modified": "2019-12-02T00:00:00", "id": "SEAMONKEY_220.NASL", "href": "https://www.tenable.com/plugins/nessus/69272", "published": "2013-08-08T00:00:00", "title": "SeaMonkey < 2.20 Multiple Vulnerabilities", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(69272);\n script_version(\"1.24\");\n script_cvs_date(\"Date: 2019/11/27\");\n\n script_cve_id(\n \"CVE-2013-1701\",\n \"CVE-2013-1702\",\n \"CVE-2013-1704\",\n \"CVE-2013-1705\",\n \"CVE-2013-1708\",\n \"CVE-2013-1709\",\n \"CVE-2013-1710\",\n \"CVE-2013-1711\",\n \"CVE-2013-1713\",\n \"CVE-2013-1714\",\n \"CVE-2013-1717\",\n \"CVE-2013-6674\",\n \"CVE-2014-2018\"\n );\n script_bugtraq_id(\n 61864,\n 61867,\n 61871,\n 61872,\n 61874,\n 61875,\n 61876,\n 61877,\n 61882,\n 61896,\n 61900,\n 65158,\n 65620\n );\n script_xref(name:\"CERT\", value:\"863369\");\n script_xref(name:\"EDB-ID\", value:\"31223\");\n\n script_name(english:\"SeaMonkey < 2.20 Multiple Vulnerabilities\");\n script_summary(english:\"Checks version of SeaMonkey\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host contains a web browser that is potentially\naffected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The installed version of SeaMonkey is a version prior to 2.20. It is,\ntherefore, potentially affected by the following vulnerabilities :\n\n - Various errors exist that could allow memory corruption\n conditions. (CVE-2013-1701, CVE-2013-1702)\n\n - Use-after-free errors exist related to DOM modification\n when using 'SetBody' and generating a 'Certificate\n Request Message'. (CVE-2013-1704, CVE-2013-1705)\n\n - An error exists in the function 'nsCString::CharAt'\n that could allow application crashes when decoding\n specially crafted WAV audio files. (CVE-2013-1708)\n\n - Unspecified errors exist related to HTML frames and\n history handling, 'XrayWrappers', JavaScript URI\n handling and web workers using 'XMLHttpRequest' that\n could allow cross-site scripting attacks.\n (CVE-2013-1709, CVE-2013-1711, CVE-2013-1713,\n CVE-2013-1714)\n\n - An unspecified error exists related to generating\n 'Certificate Request Message Format' (CRMF) requests\n that could allow cross-site scripting attacks.\n (CVE-2013-1710)\n\n - An error exists related to Java applets and 'file:///'\n URIs that could allow read-only access to arbitrary\n files. (CVE-2013-1717)\n\n - An input validation error exists related to email\n messages containing HTML and iframes and the action of\n replying to or forwarding such messages that could\n allow cross-site scripting attacks. (CVE-2013-6674)\n\n - An input validation error exists related to email\n messages containing HTML and object or embed elements\n that could allow cross-site scripting attacks.\n (CVE-2014-2018)\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-63/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-64/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-65/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-67/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-68/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-69/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-70/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-72/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-73/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-75/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2014-14/\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to SeaMonkey 2.20 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2013-1710\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Firefox 5.0 - 15.0.1 __exposedProps__ XCS Code Execution');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2013/08/06\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/08/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/08/08\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:mozilla:seamonkey\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"mozilla_org_installed.nasl\");\n script_require_keys(\"SeaMonkey/Version\");\n\n exit(0);\n}\n\ninclude(\"mozilla_version.inc\");\nport = get_kb_item(\"SMB/transport\");\nif (!port) port = 445;\n\ninstalls = get_kb_list(\"SMB/SeaMonkey/*\");\nif (isnull(installs)) audit(AUDIT_NOT_INST, \"SeaMonkey\");\n\nmozilla_check_version(installs:installs, product:'seamonkey', fix:'2.20', severity:SECURITY_HOLE, xss:TRUE);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-12-13T07:55:48", "bulletinFamily": "scanner", "description": "The installed version of Firefox is earlier than 23.0 and is,\ntherefore, potentially affected by multiple vulnerabilities :\n\n - Various errors exist that could allow memory corruption\n conditions. (CVE-2013-1701, CVE-2013-1702)\n\n - Use-after-free errors exist related to DOM modification\n when using ", "modified": "2019-12-02T00:00:00", "id": "MACOSX_FIREFOX_23.NASL", "href": "https://www.tenable.com/plugins/nessus/69265", "published": "2013-08-08T00:00:00", "title": "Firefox < 23.0 Multiple Vulnerabilities (Mac OS X)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(69265);\n script_version(\"1.17\");\n script_cvs_date(\"Date: 2019/11/27\");\n\n script_cve_id(\n \"CVE-2013-1701\",\n \"CVE-2013-1702\",\n \"CVE-2013-1704\",\n \"CVE-2013-1705\",\n \"CVE-2013-1708\",\n \"CVE-2013-1709\",\n \"CVE-2013-1710\",\n \"CVE-2013-1711\",\n \"CVE-2013-1713\",\n \"CVE-2013-1714\",\n \"CVE-2013-1717\"\n );\n script_bugtraq_id(\n 61864,\n 61867,\n 61871,\n 61872,\n 61874,\n 61875,\n 61876,\n 61877,\n 61882,\n 61896,\n 61900\n );\n\n script_name(english:\"Firefox < 23.0 Multiple Vulnerabilities (Mac OS X)\");\n script_summary(english:\"Checks version of Firefox\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Mac OS X host contains a web browser that is potentially\naffected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The installed version of Firefox is earlier than 23.0 and is,\ntherefore, potentially affected by multiple vulnerabilities :\n\n - Various errors exist that could allow memory corruption\n conditions. (CVE-2013-1701, CVE-2013-1702)\n\n - Use-after-free errors exist related to DOM modification\n when using 'SetBody' and generating a 'Certificate\n Request Message'. (CVE-2013-1704, CVE-2013-1705)\n\n - An error exists in the function 'nsCString::CharAt'\n that could allow application crashes when decoding\n specially crafted WAV audio files. (CVE-2013-1708)\n\n - Unspecified errors exist related to HTML frames and\n history handling, 'XrayWrappers', JavaScript URI\n handling and web workers using 'XMLHttpRequest' that\n could allow cross-site scripting attacks.\n (CVE-2013-1709, CVE-2013-1711, CVE-2013-1713,\n CVE-2013-1714)\n\n - An unspecified error exists related to generating\n 'Certificate Request Message Format' (CRMF) requests\n that could allow cross-site scripting attacks.\n (CVE-2013-1710)\n\n - An error exists related to Java applets and 'file:///'\n URIs that could allow read-only access to arbitrary\n files. (CVE-2013-1717)\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-63/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-64/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-65/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-67/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-68/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-69/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-70/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-72/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-73/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-75/\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Firefox 23.0 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2013-1710\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Firefox 5.0 - 15.0.1 __exposedProps__ XCS Code Execution');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2013/08/06\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/08/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/08/08\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:mozilla:firefox\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"MacOS X Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"macosx_firefox_installed.nasl\");\n script_require_keys(\"MacOSX/Firefox/Installed\");\n\n exit(0);\n}\n\ninclude(\"mozilla_version.inc\");\n\nkb_base = \"MacOSX/Firefox\";\nget_kb_item_or_exit(kb_base+\"/Installed\");\n\nversion = get_kb_item_or_exit(kb_base+\"/Version\", exit_code:1);\npath = get_kb_item_or_exit(kb_base+\"/Path\", exit_code:1);\n\nif (get_kb_item(kb_base + '/is_esr')) exit(0, 'The Mozilla Firefox installation is in the ESR branch.');\n\nmozilla_check_version(product:'firefox', version:version, path:path, esr:FALSE, fix:'23.0', severity:SECURITY_HOLE, xss:TRUE);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-12-13T09:44:54", "bulletinFamily": "scanner", "description": "USN-1924-1 fixed vulnerabilities in Firefox. This update provides the\ncorresponding updates for Ubufox and Unity Firefox Extension.\n\nJeff Gilbert, Henrik Skupin, Ben Turner, Christian Holler, Andrew\nMcCreight, Gary Kwong, Jan Varga and Jesse Ruderman discovered\nmultiple memory safety issues in Firefox. If the user were tricked in\nto opening a specially crafted page, an attacker could possibly\nexploit these to cause a denial of service via application crash, or\npotentially execute arbitrary code with the privileges of the user\ninvoking Firefox. (CVE-2013-1701, CVE-2013-1702)\n\nA use-after-free bug was discovered when the DOM is modified\nduring a SetBody mutation event. If the user were tricked in\nto opening a specially crafted page, an attacker could\npotentially exploit this to execute arbitrary code with the\nprivileges of the user invoking Firefox. (CVE-2013-1704)\n\nA use-after-free bug was discovered when generating a CRMF\nrequest with certain parameters. If the user were tricked in\nto opening a specially crafted page, an attacker could\npotentially exploit this to execute arbitrary code with the\nprivileges of the user invoking Firefox. (CVE-2013-1705)\n\nAki Helin discovered a crash when decoding a WAV file in\nsome circumstances. An attacker could potentially exploit\nthis to cause a denial of service. (CVE-2013-1708)\n\nIt was discovered that a document", "modified": "2019-12-02T00:00:00", "id": "UBUNTU_USN-1924-2.NASL", "href": "https://www.tenable.com/plugins/nessus/69235", "published": "2013-08-07T00:00:00", "title": "Ubuntu 12.04 LTS / 12.10 / 13.04 : ubufox, unity-firefox-extension update (USN-1924-2)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-1924-2. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(69235);\n script_version(\"1.19\");\n script_cvs_date(\"Date: 2019/09/19 12:54:29\");\n\n script_cve_id(\"CVE-2013-1701\", \"CVE-2013-1702\", \"CVE-2013-1704\", \"CVE-2013-1705\", \"CVE-2013-1708\", \"CVE-2013-1709\", \"CVE-2013-1710\", \"CVE-2013-1711\", \"CVE-2013-1713\", \"CVE-2013-1714\", \"CVE-2013-1717\");\n script_bugtraq_id(61641);\n script_xref(name:\"USN\", value:\"1924-2\");\n\n script_name(english:\"Ubuntu 12.04 LTS / 12.10 / 13.04 : ubufox, unity-firefox-extension update (USN-1924-2)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"USN-1924-1 fixed vulnerabilities in Firefox. This update provides the\ncorresponding updates for Ubufox and Unity Firefox Extension.\n\nJeff Gilbert, Henrik Skupin, Ben Turner, Christian Holler, Andrew\nMcCreight, Gary Kwong, Jan Varga and Jesse Ruderman discovered\nmultiple memory safety issues in Firefox. If the user were tricked in\nto opening a specially crafted page, an attacker could possibly\nexploit these to cause a denial of service via application crash, or\npotentially execute arbitrary code with the privileges of the user\ninvoking Firefox. (CVE-2013-1701, CVE-2013-1702)\n\nA use-after-free bug was discovered when the DOM is modified\nduring a SetBody mutation event. If the user were tricked in\nto opening a specially crafted page, an attacker could\npotentially exploit this to execute arbitrary code with the\nprivileges of the user invoking Firefox. (CVE-2013-1704)\n\nA use-after-free bug was discovered when generating a CRMF\nrequest with certain parameters. If the user were tricked in\nto opening a specially crafted page, an attacker could\npotentially exploit this to execute arbitrary code with the\nprivileges of the user invoking Firefox. (CVE-2013-1705)\n\nAki Helin discovered a crash when decoding a WAV file in\nsome circumstances. An attacker could potentially exploit\nthis to cause a denial of service. (CVE-2013-1708)\n\nIt was discovered that a document's URI could be set to the\nURI of a different document. An attacker could potentially\nexploit this to conduct cross-site scripting (XSS) attacks.\n(CVE-2013-1709)\n\nA flaw was discovered when generating a CRMF request in\ncertain circumstances. An attacker could potentially exploit\nthis to conduct cross-site scripting (XSS) attacks, or\nexecute arbitrary code with the privileges of the user\ninvoking Firefox. (CVE-2013-1710)\n\nBobby Holley discovered that XBL scopes could be used to\ncircumvent XrayWrappers in certain circumstances. An\nattacked could potentially exploit this to conduct\ncross-site scripting (XSS) attacks or cause undefined\nbehaviour. (CVE-2013-1711)\n\nCody Crews discovered that some JavaScript components\nperformed security checks against the wrong URI, potentially\nbypassing same-origin policy restrictions. An attacker could\nexploit this to conduct cross-site scripting (XSS) attacks\nor install addons from a malicious site. (CVE-2013-1713)\n\nFederico Lanusse discovered that web workers could bypass\ncross-origin checks when using XMLHttpRequest. An attacker\ncould potentially exploit this to conduct cross-site\nscripting (XSS) attacks. (CVE-2013-1714)\n\nGeorgi Guninski and John Schoenick discovered that Java\napplets could access local files under certain\ncircumstances. An attacker could potentially exploit this to\nsteal confidential data. (CVE-2013-1717).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/1924-2/\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected xul-ext-ubufox and / or xul-ext-unity packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Firefox toString console.time Privileged Javascript Injection');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:xul-ext-ubufox\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:xul-ext-unity\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:12.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:12.10\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:13.04\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2013/08/06\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/08/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/08/07\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2013-2019 Canonical, Inc. / NASL script (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(12\\.04|12\\.10|13\\.04)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 12.04 / 12.10 / 13.04\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"12.04\", pkgname:\"xul-ext-ubufox\", pkgver:\"2.7-0ubuntu0.12.04.1\")) flag++;\nif (ubuntu_check(osver:\"12.10\", pkgname:\"xul-ext-ubufox\", pkgver:\"2.7-0ubuntu0.12.10.1\")) flag++;\nif (ubuntu_check(osver:\"12.10\", pkgname:\"xul-ext-unity\", pkgver:\"2.4.7-0ubuntu0.2\")) flag++;\nif (ubuntu_check(osver:\"13.04\", pkgname:\"xul-ext-ubufox\", pkgver:\"2.7-0ubuntu0.13.04.1\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"xul-ext-ubufox / xul-ext-unity\");\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-12-13T09:44:54", "bulletinFamily": "scanner", "description": "Jeff Gilbert, Henrik Skupin, Ben Turner, Christian Holler, Andrew\nMcCreight, Gary Kwong, Jan Varga and Jesse Ruderman discovered\nmultiple memory safety issues in Firefox. If the user were tricked in\nto opening a specially crafted page, an attacker could possibly\nexploit these to cause a denial of service via application crash, or\npotentially execute arbitrary code with the privileges of the user\ninvoking Firefox. (CVE-2013-1701, CVE-2013-1702)\n\nA use-after-free bug was discovered when the DOM is modified during a\nSetBody mutation event. If the user were tricked in to opening a\nspecially crafted page, an attacker could potentially exploit this to\nexecute arbitrary code with the privileges of the user invoking\nFirefox. (CVE-2013-1704)\n\nA use-after-free bug was discovered when generating a CRMF request\nwith certain parameters. If the user were tricked in to opening a\nspecially crafted page, an attacker could potentially exploit this to\nexecute arbitrary code with the privileges of the user invoking\nFirefox. (CVE-2013-1705)\n\nAki Helin discovered a crash when decoding a WAV file in some\ncircumstances. An attacker could potentially exploit this to cause a\ndenial of service. (CVE-2013-1708)\n\nIt was discovered that a document", "modified": "2019-12-02T00:00:00", "id": "UBUNTU_USN-1924-1.NASL", "href": "https://www.tenable.com/plugins/nessus/69234", "published": "2013-08-07T00:00:00", "title": "Ubuntu 12.04 LTS / 12.10 / 13.04 : firefox vulnerabilities (USN-1924-1)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-1924-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(69234);\n script_version(\"1.17\");\n script_cvs_date(\"Date: 2019/09/19 12:54:29\");\n\n script_cve_id(\"CVE-2013-1701\", \"CVE-2013-1702\", \"CVE-2013-1704\", \"CVE-2013-1705\", \"CVE-2013-1708\", \"CVE-2013-1709\", \"CVE-2013-1710\", \"CVE-2013-1711\", \"CVE-2013-1713\", \"CVE-2013-1714\", \"CVE-2013-1717\");\n script_bugtraq_id(61641);\n script_xref(name:\"USN\", value:\"1924-1\");\n\n script_name(english:\"Ubuntu 12.04 LTS / 12.10 / 13.04 : firefox vulnerabilities (USN-1924-1)\");\n script_summary(english:\"Checks dpkg output for updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Ubuntu host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Jeff Gilbert, Henrik Skupin, Ben Turner, Christian Holler, Andrew\nMcCreight, Gary Kwong, Jan Varga and Jesse Ruderman discovered\nmultiple memory safety issues in Firefox. If the user were tricked in\nto opening a specially crafted page, an attacker could possibly\nexploit these to cause a denial of service via application crash, or\npotentially execute arbitrary code with the privileges of the user\ninvoking Firefox. (CVE-2013-1701, CVE-2013-1702)\n\nA use-after-free bug was discovered when the DOM is modified during a\nSetBody mutation event. If the user were tricked in to opening a\nspecially crafted page, an attacker could potentially exploit this to\nexecute arbitrary code with the privileges of the user invoking\nFirefox. (CVE-2013-1704)\n\nA use-after-free bug was discovered when generating a CRMF request\nwith certain parameters. If the user were tricked in to opening a\nspecially crafted page, an attacker could potentially exploit this to\nexecute arbitrary code with the privileges of the user invoking\nFirefox. (CVE-2013-1705)\n\nAki Helin discovered a crash when decoding a WAV file in some\ncircumstances. An attacker could potentially exploit this to cause a\ndenial of service. (CVE-2013-1708)\n\nIt was discovered that a document's URI could be set to the URI of a\ndifferent document. An attacker could potentially exploit this to\nconduct cross-site scripting (XSS) attacks. (CVE-2013-1709)\n\nA flaw was discovered when generating a CRMF request in certain\ncircumstances. An attacker could potentially exploit this to conduct\ncross-site scripting (XSS) attacks, or execute arbitrary code with the\nprivileges of the user invoking Firefox. (CVE-2013-1710)\n\nBobby Holley discovered that XBL scopes could be used to circumvent\nXrayWrappers in certain circumstances. An attacked could potentially\nexploit this to conduct cross-site scripting (XSS) attacks or cause\nundefined behaviour. (CVE-2013-1711)\n\nCody Crews discovered that some JavaScript components performed\nsecurity checks against the wrong URI, potentially bypassing\nsame-origin policy restrictions. An attacker could exploit this to\nconduct cross-site scripting (XSS) attacks or install addons from a\nmalicious site. (CVE-2013-1713)\n\nFederico Lanusse discovered that web workers could bypass cross-origin\nchecks when using XMLHttpRequest. An attacker could potentially\nexploit this to conduct cross-site scripting (XSS) attacks.\n(CVE-2013-1714)\n\nGeorgi Guninski and John Schoenick discovered that Java applets could\naccess local files under certain circumstances. An attacker could\npotentially exploit this to steal confidential data. (CVE-2013-1717).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/1924-1/\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected firefox package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Firefox toString console.time Privileged Javascript Injection');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:12.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:12.10\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:13.04\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2013/08/06\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/08/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/08/07\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2013-2019 Canonical, Inc. / NASL script (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(12\\.04|12\\.10|13\\.04)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 12.04 / 12.10 / 13.04\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"12.04\", pkgname:\"firefox\", pkgver:\"23.0+build2-0ubuntu0.12.04.1\")) flag++;\nif (ubuntu_check(osver:\"12.10\", pkgname:\"firefox\", pkgver:\"23.0+build2-0ubuntu0.12.10.1\")) flag++;\nif (ubuntu_check(osver:\"13.04\", pkgname:\"firefox\", pkgver:\"23.0+build2-0ubuntu0.13.04.1\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"firefox\");\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-12-13T08:15:48", "bulletinFamily": "scanner", "description": "Changes in seamonkey :\n\n - update to SeaMonkey 2.20 (bnc#833389)\n\n - MFSA 2013-63/CVE-2013-1701/CVE-2013-1702 Miscellaneous\n memory safety hazards\n\n - MFSA 2013-64/CVE-2013-1704 (bmo#883313) Use after free\n mutating DOM during SetBody\n\n - MFSA 2013-65/CVE-2013-1705 (bmo#882865) Buffer underflow\n when generating CRMF requests\n\n - MFSA 2013-67/CVE-2013-1708 (bmo#879924) Crash during WAV\n audio file decoding\n\n - MFSA 2013-68/CVE-2013-1709 (bmo#838253) Document URI\n misrepresentation and masquerading\n\n - MFSA 2013-69/CVE-2013-1710 (bmo#871368) CRMF requests\n allow for code execution and XSS attacks\n\n - MFSA 2013-70/CVE-2013-1711 (bmo#843829) Bypass of\n XrayWrappers using XBL Scopes\n\n - MFSA 2013-72/CVE-2013-1713 (bmo#887098) Wrong principal\n used for validating URI for some JavaScript components\n\n - MFSA 2013-73/CVE-2013-1714 (bmo#879787) Same-origin\n bypass with web workers and XMLHttpRequest\n\n - MFSA 2013-75/CVE-2013-1717 (bmo#406541, bmo#738397)\n Local Java applets may read contents of local file\n system\n\n - requires NSPR 4.10 and NSS 3.15\n\n - removed obsolete seamonkey-shared-nss-db.patch\n\nChanges in seamonkey :\n\n - update to SeaMonkey 2.20 (bnc#833389)\n\n - MFSA 2013-63/CVE-2013-1701/CVE-2013-1702 Miscellaneous\n memory safety hazards\n\n - MFSA 2013-64/CVE-2013-1704 (bmo#883313) Use after free\n mutating DOM during SetBody\n\n - MFSA 2013-65/CVE-2013-1705 (bmo#882865) Buffer underflow\n when generating CRMF requests\n\n - MFSA 2013-67/CVE-2013-1708 (bmo#879924) Crash during WAV\n audio file decoding\n\n - MFSA 2013-68/CVE-2013-1709 (bmo#838253) Document URI\n misrepresentation and masquerading\n\n - MFSA 2013-69/CVE-2013-1710 (bmo#871368) CRMF requests\n allow for code execution and XSS attacks\n\n - MFSA 2013-70/CVE-2013-1711 (bmo#843829) Bypass of\n XrayWrappers using XBL Scopes\n\n - MFSA 2013-72/CVE-2013-1713 (bmo#887098) Wrong principal\n used for validating URI for some JavaScript components\n\n - MFSA 2013-73/CVE-2013-1714 (bmo#879787) Same-origin\n bypass with web workers and XMLHttpRequest\n\n - MFSA 2013-75/CVE-2013-1717 (bmo#406541, bmo#738397)\n Local Java applets may read contents of local file\n system\n\n - requires NSPR 4.10 and NSS 3.15\n\n - removed obsolete seamonkey-shared-nss-db.patch\n\nChanges in xulrunner :\n\n - update to 17.0.8esr (bnc#833389)\n\n - MFSA 2013-63/CVE-2013-1701 Miscellaneous memory safety\n hazards\n\n - MFSA 2013-68/CVE-2013-1709 (bmo#838253) Document URI\n misrepresentation and masquerading\n\n - MFSA 2013-69/CVE-2013-1710 (bmo#871368) CRMF requests\n allow for code execution and XSS attacks\n\n - MFSA 2013-72/CVE-2013-1713 (bmo#887098) Wrong principal\n used for validating URI for some JavaScript components\n\n - MFSA 2013-73/CVE-2013-1714 (bmo#879787) Same-origin\n bypass with web workers and XMLHttpRequest\n\n - MFSA 2013-75/CVE-2013-1717 (bmo#406541, bmo#738397)\n Local Java applets may read contents of local file\n system\n\nChanges in xulrunner :\n\n - update to 17.0.8esr (bnc#833389)\n\n - MFSA 2013-63/CVE-2013-1701 Miscellaneous memory safety\n hazards\n\n - MFSA 2013-68/CVE-2013-1709 (bmo#838253) Document URI\n misrepresentation and masquerading\n\n - MFSA 2013-69/CVE-2013-1710 (bmo#871368) CRMF requests\n allow for code execution and XSS attacks\n\n - MFSA 2013-72/CVE-2013-1713 (bmo#887098) Wrong principal\n used for validating URI for some JavaScript components\n\n - MFSA 2013-73/CVE-2013-1714 (bmo#879787) Same-origin\n bypass with web workers and XMLHttpRequest\n\n - MFSA 2013-75/CVE-2013-1717 (bmo#406541, bmo#738397)\n Local Java applets may read contents of local file\n system\n\nChanges in MozillaThunderbird :\n\n - update to Thunderbird 17.0.8 (bnc#833389)\n\n - MFSA 2013-63/CVE-2013-1701 Miscellaneous memory safety\n hazards\n\n - MFSA 2013-68/CVE-2013-1709 (bmo#838253) Document URI\n misrepresentation and masquerading\n\n - MFSA 2013-69/CVE-2013-1710 (bmo#871368) CRMF requests\n allow for code execution and XSS attacks\n\n - MFSA 2013-72/CVE-2013-1713 (bmo#887098) Wrong principal\n used for validating URI for some JavaScript components\n\n - MFSA 2013-73/CVE-2013-1714 (bmo#879787) Same-origin\n bypass with web workers and XMLHttpRequest\n\n - MFSA 2013-75/CVE-2013-1717 (bmo#406541, bmo#738397)\n Local Java applets may read contents of local file\n system\n\n - update Enigmail to 1.5.2\n\n - bugfix release\n\nChanges in MozillaThunderbird :\n\n - update to Thunderbird 17.0.8 (bnc#833389)\n\n - MFSA 2013-63/CVE-2013-1701 Miscellaneous memory safety\n hazards\n\n - MFSA 2013-68/CVE-2013-1709 (bmo#838253) Document URI\n misrepresentation and masquerading\n\n - MFSA 2013-69/CVE-2013-1710 (bmo#871368) CRMF requests\n allow for code execution and XSS attacks\n\n - MFSA 2013-72/CVE-2013-1713 (bmo#887098) Wrong principal\n used for validating URI for some JavaScript components\n\n - MFSA 2013-73/CVE-2013-1714 (bmo#879787) Same-origin\n bypass with web workers and XMLHttpRequest\n\n - MFSA 2013-75/CVE-2013-1717 (bmo#406541, bmo#738397)\n Local Java applets may read contents of local file\n system\n\n - update Enigmail to 1.5.2\n\n - bugfix release\n\nChanges in mozilla-nss :\n\n - fix 32bit requirement, it", "modified": "2019-12-02T00:00:00", "id": "OPENSUSE-2013-652.NASL", "href": "https://www.tenable.com/plugins/nessus/75122", "published": "2014-06-13T00:00:00", "title": "openSUSE Security Update : MozillaFirefox / MozillaThunderbird / mozilla-nspr / etc (openSUSE-SU-2013:1348-1)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2013-652.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(75122);\n script_version(\"1.4\");\n script_cvs_date(\"Date: 2018/11/10 11:50:01\");\n\n script_cve_id(\"CVE-2013-1701\", \"CVE-2013-1702\", \"CVE-2013-1704\", \"CVE-2013-1705\", \"CVE-2013-1708\", \"CVE-2013-1709\", \"CVE-2013-1710\", \"CVE-2013-1711\", \"CVE-2013-1713\", \"CVE-2013-1714\", \"CVE-2013-1717\");\n\n script_name(english:\"openSUSE Security Update : MozillaFirefox / MozillaThunderbird / mozilla-nspr / etc (openSUSE-SU-2013:1348-1)\");\n script_summary(english:\"Check for the openSUSE-2013-652 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Changes in seamonkey :\n\n - update to SeaMonkey 2.20 (bnc#833389)\n\n - MFSA 2013-63/CVE-2013-1701/CVE-2013-1702 Miscellaneous\n memory safety hazards\n\n - MFSA 2013-64/CVE-2013-1704 (bmo#883313) Use after free\n mutating DOM during SetBody\n\n - MFSA 2013-65/CVE-2013-1705 (bmo#882865) Buffer underflow\n when generating CRMF requests\n\n - MFSA 2013-67/CVE-2013-1708 (bmo#879924) Crash during WAV\n audio file decoding\n\n - MFSA 2013-68/CVE-2013-1709 (bmo#838253) Document URI\n misrepresentation and masquerading\n\n - MFSA 2013-69/CVE-2013-1710 (bmo#871368) CRMF requests\n allow for code execution and XSS attacks\n\n - MFSA 2013-70/CVE-2013-1711 (bmo#843829) Bypass of\n XrayWrappers using XBL Scopes\n\n - MFSA 2013-72/CVE-2013-1713 (bmo#887098) Wrong principal\n used for validating URI for some JavaScript components\n\n - MFSA 2013-73/CVE-2013-1714 (bmo#879787) Same-origin\n bypass with web workers and XMLHttpRequest\n\n - MFSA 2013-75/CVE-2013-1717 (bmo#406541, bmo#738397)\n Local Java applets may read contents of local file\n system\n\n - requires NSPR 4.10 and NSS 3.15\n\n - removed obsolete seamonkey-shared-nss-db.patch\n\nChanges in seamonkey :\n\n - update to SeaMonkey 2.20 (bnc#833389)\n\n - MFSA 2013-63/CVE-2013-1701/CVE-2013-1702 Miscellaneous\n memory safety hazards\n\n - MFSA 2013-64/CVE-2013-1704 (bmo#883313) Use after free\n mutating DOM during SetBody\n\n - MFSA 2013-65/CVE-2013-1705 (bmo#882865) Buffer underflow\n when generating CRMF requests\n\n - MFSA 2013-67/CVE-2013-1708 (bmo#879924) Crash during WAV\n audio file decoding\n\n - MFSA 2013-68/CVE-2013-1709 (bmo#838253) Document URI\n misrepresentation and masquerading\n\n - MFSA 2013-69/CVE-2013-1710 (bmo#871368) CRMF requests\n allow for code execution and XSS attacks\n\n - MFSA 2013-70/CVE-2013-1711 (bmo#843829) Bypass of\n XrayWrappers using XBL Scopes\n\n - MFSA 2013-72/CVE-2013-1713 (bmo#887098) Wrong principal\n used for validating URI for some JavaScript components\n\n - MFSA 2013-73/CVE-2013-1714 (bmo#879787) Same-origin\n bypass with web workers and XMLHttpRequest\n\n - MFSA 2013-75/CVE-2013-1717 (bmo#406541, bmo#738397)\n Local Java applets may read contents of local file\n system\n\n - requires NSPR 4.10 and NSS 3.15\n\n - removed obsolete seamonkey-shared-nss-db.patch\n\nChanges in xulrunner :\n\n - update to 17.0.8esr (bnc#833389)\n\n - MFSA 2013-63/CVE-2013-1701 Miscellaneous memory safety\n hazards\n\n - MFSA 2013-68/CVE-2013-1709 (bmo#838253) Document URI\n misrepresentation and masquerading\n\n - MFSA 2013-69/CVE-2013-1710 (bmo#871368) CRMF requests\n allow for code execution and XSS attacks\n\n - MFSA 2013-72/CVE-2013-1713 (bmo#887098) Wrong principal\n used for validating URI for some JavaScript components\n\n - MFSA 2013-73/CVE-2013-1714 (bmo#879787) Same-origin\n bypass with web workers and XMLHttpRequest\n\n - MFSA 2013-75/CVE-2013-1717 (bmo#406541, bmo#738397)\n Local Java applets may read contents of local file\n system\n\nChanges in xulrunner :\n\n - update to 17.0.8esr (bnc#833389)\n\n - MFSA 2013-63/CVE-2013-1701 Miscellaneous memory safety\n hazards\n\n - MFSA 2013-68/CVE-2013-1709 (bmo#838253) Document URI\n misrepresentation and masquerading\n\n - MFSA 2013-69/CVE-2013-1710 (bmo#871368) CRMF requests\n allow for code execution and XSS attacks\n\n - MFSA 2013-72/CVE-2013-1713 (bmo#887098) Wrong principal\n used for validating URI for some JavaScript components\n\n - MFSA 2013-73/CVE-2013-1714 (bmo#879787) Same-origin\n bypass with web workers and XMLHttpRequest\n\n - MFSA 2013-75/CVE-2013-1717 (bmo#406541, bmo#738397)\n Local Java applets may read contents of local file\n system\n\nChanges in MozillaThunderbird :\n\n - update to Thunderbird 17.0.8 (bnc#833389)\n\n - MFSA 2013-63/CVE-2013-1701 Miscellaneous memory safety\n hazards\n\n - MFSA 2013-68/CVE-2013-1709 (bmo#838253) Document URI\n misrepresentation and masquerading\n\n - MFSA 2013-69/CVE-2013-1710 (bmo#871368) CRMF requests\n allow for code execution and XSS attacks\n\n - MFSA 2013-72/CVE-2013-1713 (bmo#887098) Wrong principal\n used for validating URI for some JavaScript components\n\n - MFSA 2013-73/CVE-2013-1714 (bmo#879787) Same-origin\n bypass with web workers and XMLHttpRequest\n\n - MFSA 2013-75/CVE-2013-1717 (bmo#406541, bmo#738397)\n Local Java applets may read contents of local file\n system\n\n - update Enigmail to 1.5.2\n\n - bugfix release\n\nChanges in MozillaThunderbird :\n\n - update to Thunderbird 17.0.8 (bnc#833389)\n\n - MFSA 2013-63/CVE-2013-1701 Miscellaneous memory safety\n hazards\n\n - MFSA 2013-68/CVE-2013-1709 (bmo#838253) Document URI\n misrepresentation and masquerading\n\n - MFSA 2013-69/CVE-2013-1710 (bmo#871368) CRMF requests\n allow for code execution and XSS attacks\n\n - MFSA 2013-72/CVE-2013-1713 (bmo#887098) Wrong principal\n used for validating URI for some JavaScript components\n\n - MFSA 2013-73/CVE-2013-1714 (bmo#879787) Same-origin\n bypass with web workers and XMLHttpRequest\n\n - MFSA 2013-75/CVE-2013-1717 (bmo#406541, bmo#738397)\n Local Java applets may read contents of local file\n system\n\n - update Enigmail to 1.5.2\n\n - bugfix release\n\nChanges in mozilla-nss :\n\n - fix 32bit requirement, it's without () actually\n\n - update to 3.15.1\n\n - TLS 1.2 (RFC 5246) is supported. HMAC-SHA256 cipher\n suites (RFC 5246 and RFC 5289) are supported, allowing\n TLS to be used without MD5 and SHA-1. Note the following\n limitations: The hash function used in the signature for\n TLS 1.2 client authentication must be the hash function\n of the TLS 1.2 PRF, which is always SHA-256 in NSS\n 3.15.1. AES GCM cipher suites are not yet supported.\n\n - some bugfixes and improvements\n\n - require libnssckbi instead of mozilla-nss-certs so\n p11-kit can conflict with the latter (fate#314991)\n\n - update to 3.15\n\n - Packaging\n\n + removed obsolete patches\n\n - nss-disable-expired-testcerts.patch\n\n - bug-834091.patch\n\n - New Functionality\n\n + Support for OCSP Stapling (RFC 6066, Certificate Status\n Request) has been added for both client and server\n sockets. TLS client applications may enable this via a\n call to SSL_OptionSetDefault(SSL_ENABLE_OCSP_STAPLING,\n PR_TRUE);\n\n + Added function SECITEM_ReallocItemV2. It replaces\n function SECITEM_ReallocItem, which is now declared as\n obsolete.\n\n + Support for single-operation (eg: not multi-part)\n symmetric key encryption and decryption, via\n PK11_Encrypt and PK11_Decrypt.\n\n + certutil has been updated to support creating name\n constraints extensions.\n\n - New Functions in ssl.h SSL_PeerStapledOCSPResponse -\n Returns the server's stapled OCSP response, when used\n with a TLS client socket that negotiated the\n status_request extension. SSL_SetStapledOCSPResponses -\n Set's a stapled OCSP response for a TLS server socket to\n return when clients send the status_request extension.\n in ocsp.h CERT_PostOCSPRequest - Primarily intended for\n testing, permits the sending and receiving of raw OCSP\n request/responses. in secpkcs7.h\n SEC_PKCS7VerifyDetachedSignatureAtTime - Verifies a\n PKCS#7 signature at a specific time other than the\n present time. in xconst.h\n CERT_EncodeNameConstraintsExtension - Matching function\n for CERT_DecodeNameConstraintsExtension, added in NSS\n 3.10. in secitem.h SECITEM_AllocArray SECITEM_DupArray\n SECITEM_FreeArray SECITEM_ZfreeArray - Utility functions\n to handle the allocation and deallocation of\n SECItemArrays SECITEM_ReallocItemV2 - Replaces\n SECITEM_ReallocItem, which is now obsolete.\n SECITEM_ReallocItemV2 better matches caller\n expectations, in that it updates item->len on\n allocation. For more details of the issues with\n SECITEM_ReallocItem, see Bug 298649 and Bug 298938. in\n pk11pub.h PK11_Decrypt - Performs decryption as a single\n PKCS#11 operation (eg: not multi-part). This is\n necessary for AES-GCM. PK11_Encrypt - Performs\n encryption as a single PKCS#11 operation (eg: not\n multi-part). This is necessary for AES-GCM.\n\n - New Types in secitem.h SECItemArray - Represents a\n variable-length array of SECItems.\n\n - New Macros in ssl.h SSL_ENABLE_OCSP_STAPLING - Used with\n SSL_OptionSet to configure TLS client sockets to request\n the certificate_status extension (eg: OCSP stapling)\n when set to PR_TRUE\n\n - Notable changes\n\n + SECITEM_ReallocItem is now deprecated. Please consider\n using SECITEM_ReallocItemV2 in all future code.\n\n + The list of root CA certificates in the nssckbi module\n has been updated.\n\n + The default implementation of SSL_AuthCertificate has\n been updated to add certificate status responses stapled\n by the TLS server to the OCSP cache.\n\n - a lot of bugfixes\n\n - Add Source URL, see https://en.opensuse.org/SourceUrls\n\nChanges in mozilla-nss :\n\n - fix 32bit requirement, it's without () actually\n\n - update to 3.15.1\n\n - TLS 1.2 (RFC 5246) is supported. HMAC-SHA256 cipher\n suites (RFC 5246 and RFC 5289) are supported, allowing\n TLS to be used without MD5 and SHA-1. Note the following\n limitations: The hash function used in the signature for\n TLS 1.2 client authentication must be the hash function\n of the TLS 1.2 PRF, which is always SHA-256 in NSS\n 3.15.1. AES GCM cipher suites are not yet supported.\n\n - some bugfixes and improvements\n\n - require libnssckbi instead of mozilla-nss-certs so\n p11-kit can conflict with the latter (fate#314991)\n\n - update to 3.15\n\n - Packaging\n\n + removed obsolete patches\n\n - nss-disable-expired-testcerts.patch\n\n - bug-834091.patch\n\n - New Functionality\n\n + Support for OCSP Stapling (RFC 6066, Certificate Status\n Request) has been added for both client and server\n sockets. TLS client applications may enable this via a\n call to SSL_OptionSetDefault(SSL_ENABLE_OCSP_STAPLING,\n PR_TRUE);\n\n + Added function SECITEM_ReallocItemV2. It replaces\n function SECITEM_ReallocItem, which is now declared as\n obsolete.\n\n + Support for single-operation (eg: not multi-part)\n symmetric key encryption and decryption, via\n PK11_Encrypt and PK11_Decrypt.\n\n + certutil has been updated to support creating name\n constraints extensions.\n\n - New Functions in ssl.h SSL_PeerStapledOCSPResponse -\n Returns the server's stapled OCSP response, when used\n with a TLS client socket that negotiated the\n status_request extension. SSL_SetStapledOCSPResponses -\n Set's a stapled OCSP response for a TLS server socket to\n return when clients send the status_request extension.\n in ocsp.h CERT_PostOCSPRequest - Primarily intended for\n testing, permits the sending and receiving of raw OCSP\n request/responses. in secpkcs7.h\n SEC_PKCS7VerifyDetachedSignatureAtTime - Verifies a\n PKCS#7 signature at a specific time other than the\n present time. in xconst.h\n CERT_EncodeNameConstraintsExtension - Matching function\n for CERT_DecodeNameConstraintsExtension, added in NSS\n 3.10. in secitem.h SECITEM_AllocArray SECITEM_DupArray\n SECITEM_FreeArray SECITEM_ZfreeArray - Utility functions\n to handle the allocation and deallocation of\n SECItemArrays SECITEM_ReallocItemV2 - Replaces\n SECITEM_ReallocItem, which is now obsolete.\n SECITEM_ReallocItemV2 better matches caller\n expectations, in that it updates item->len on\n allocation. For more details of the issues with\n SECITEM_ReallocItem, see Bug 298649 and Bug 298938. in\n pk11pub.h PK11_Decrypt - Performs decryption as a single\n PKCS#11 operation (eg: not multi-part). This is\n necessary for AES-GCM. PK11_Encrypt - Performs\n encryption as a single PKCS#11 operation (eg: not\n multi-part). This is necessary for AES-GCM.\n\n - New Types in secitem.h SECItemArray - Represents a\n variable-length array of SECItems.\n\n - New Macros in ssl.h SSL_ENABLE_OCSP_STAPLING - Used with\n SSL_OptionSet to configure TLS client sockets to request\n the certificate_status extension (eg: OCSP stapling)\n when set to PR_TRUE\n\n - Notable changes\n\n + SECITEM_ReallocItem is now deprecated. Please consider\n using SECITEM_ReallocItemV2 in all future code.\n\n + The list of root CA certificates in the nssckbi module\n has been updated.\n\n + The default implementation of SSL_AuthCertificate has\n been updated to add certificate status responses stapled\n by the TLS server to the OCSP cache.\n\n - a lot of bugfixes\n\n - Add Source URL, see https://en.opensuse.org/SourceUrls\n\nChanges in mozilla-nspr :\n\n - update to version 4.10\n\n - bmo#844513: Add AddressSanitizer (ASan) memory check\n annotations to PLArena.\n\n - bmo#849089: Simple changes to make NSPR's configure.in\n work with the current version of autoconf.\n\n - bmo#856196: Fix compiler warnings and clean up code in\n NSPR 4.10.\n\n - bmo#859066: Fix warning in\n nsprpub/pr/src/misc/prnetdb.c.\n\n - bmo#859830: Deprecate ANDROID_VERSION in favor of\n android/api-level.h.\n\n - bmo#861434: Make PR_SetThreadPriority() change\n priorities relatively to the main process instead of\n using absolute values on Linux.\n\n - bmo#871064L: _PR_InitThreads() should not call\n PR_SetThreadPriority.\n\nChanges in mozilla-nspr :\n\n - update to version 4.10\n\n - bmo#844513: Add AddressSanitizer (ASan) memory check\n annotations to PLArena.\n\n - bmo#849089: Simple changes to make NSPR's configure.in\n work with the current version of autoconf.\n\n - bmo#856196: Fix compiler warnings and clean up code in\n NSPR 4.10.\n\n - bmo#859066: Fix warning in\n nsprpub/pr/src/misc/prnetdb.c.\n\n - bmo#859830: Deprecate ANDROID_VERSION in favor of\n android/api-level.h.\n\n - bmo#861434: Make PR_SetThreadPriority() change\n priorities relatively to the main process instead of\n using absolute values on Linux.\n\n - bmo#871064L: _PR_InitThreads() should not call\n PR_SetThreadPriority.\n\nChanges in MozillaFirefox :\n\n - update to Firefox 23.0 (bnc#833389)\n\n - MFSA 2013-63/CVE-2013-1701/CVE-2013-1702 Miscellaneous\n memory safety hazards\n\n - MFSA 2013-64/CVE-2013-1704 (bmo#883313) Use after free\n mutating DOM during SetBody\n\n - MFSA 2013-65/CVE-2013-1705 (bmo#882865) Buffer underflow\n when generating CRMF requests\n\n - MFSA 2013-67/CVE-2013-1708 (bmo#879924) Crash during WAV\n audio file decoding\n\n - MFSA 2013-68/CVE-2013-1709 (bmo#838253) Document URI\n misrepresentation and masquerading\n\n - MFSA 2013-69/CVE-2013-1710 (bmo#871368) CRMF requests\n allow for code execution and XSS attacks\n\n - MFSA 2013-70/CVE-2013-1711 (bmo#843829) Bypass of\n XrayWrappers using XBL Scopes\n\n - MFSA 2013-72/CVE-2013-1713 (bmo#887098) Wrong principal\n used for validating URI for some JavaScript components\n\n - MFSA 2013-73/CVE-2013-1714 (bmo#879787) Same-origin\n bypass with web workers and XMLHttpRequest\n\n - MFSA 2013-75/CVE-2013-1717 (bmo#406541, bmo#738397)\n Local Java applets may read contents of local file\n system\n\n - requires NSPR 4.10 and NSS 3.15\n\n - fix build on ARM (/-g/ matches /-grecord-switches/)\n\nChanges in MozillaFirefox :\n\n - update to Firefox 23.0 (bnc#833389)\n\n - MFSA 2013-63/CVE-2013-1701/CVE-2013-1702 Miscellaneous\n memory safety hazards\n\n - MFSA 2013-64/CVE-2013-1704 (bmo#883313) Use after free\n mutating DOM during SetBody\n\n - MFSA 2013-65/CVE-2013-1705 (bmo#882865) Buffer underflow\n when generating CRMF requests\n\n - MFSA 2013-67/CVE-2013-1708 (bmo#879924) Crash during WAV\n audio file decoding\n\n - MFSA 2013-68/CVE-2013-1709 (bmo#838253) Document URI\n misrepresentation and masquerading\n\n - MFSA 2013-69/CVE-2013-1710 (bmo#871368) CRMF requests\n allow for code execution and XSS attacks\n\n - MFSA 2013-70/CVE-2013-1711 (bmo#843829) Bypass of\n XrayWrappers using XBL Scopes\n\n - MFSA 2013-72/CVE-2013-1713 (bmo#887098) Wrong principal\n used for validating URI for some JavaScript components\n\n - MFSA 2013-73/CVE-2013-1714 (bmo#879787) Same-origin\n bypass with web workers and XMLHttpRequest\n\n - MFSA 2013-75/CVE-2013-1717 (bmo#406541, bmo#738397)\n Local Java applets may read contents of local file\n system\n\n - requires NSPR 4.10 and NSS 3.15\n\n - fix build on ARM (/-g/ matches /-grecord-switches/)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=833389\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://en.opensuse.org/SourceUrls\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://lists.opensuse.org/opensuse-updates/2013-08/msg00036.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected MozillaFirefox / MozillaThunderbird / mozilla-nspr / etc packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Firefox toString console.time Privileged Javascript Injection');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:MozillaFirefox\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:MozillaFirefox-branding-upstream\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:MozillaFirefox-buildsymbols\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:MozillaFirefox-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:MozillaFirefox-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:MozillaFirefox-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:MozillaFirefox-translations-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:MozillaFirefox-translations-other\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:MozillaThunderbird\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:MozillaThunderbird-buildsymbols\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:MozillaThunderbird-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:MozillaThunderbird-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:MozillaThunderbird-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:MozillaThunderbird-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:MozillaThunderbird-translations-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:MozillaThunderbird-translations-other\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:enigmail\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:enigmail-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libfreebl3\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libfreebl3-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libfreebl3-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libfreebl3-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libsoftokn3\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libsoftokn3-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libsoftokn3-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libsoftokn3-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-js\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-js-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-js-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-js-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-nspr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-nspr-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-nspr-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-nspr-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-nspr-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-nspr-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-nss\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-nss-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-nss-certs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-nss-certs-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-nss-certs-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-nss-certs-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-nss-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-nss-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-nss-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-nss-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-nss-sysinit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-nss-sysinit-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-nss-sysinit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-nss-sysinit-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-nss-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-nss-tools-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:seamonkey\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:seamonkey-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:seamonkey-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:seamonkey-dom-inspector\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:seamonkey-irc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:seamonkey-translations-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:seamonkey-translations-other\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:seamonkey-venkman\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xulrunner\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xulrunner-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xulrunner-buildsymbols\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xulrunner-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xulrunner-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xulrunner-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xulrunner-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xulrunner-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:12.2\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:12.3\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/08/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/06/13\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE12\\.2|SUSE12\\.3)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"12.2 / 12.3\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE12.2\", reference:\"MozillaFirefox-23.0-2.55.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"MozillaFirefox-branding-upstream-23.0-2.55.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"MozillaFirefox-buildsymbols-23.0-2.55.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"MozillaFirefox-debuginfo-23.0-2.55.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"MozillaFirefox-debugsource-23.0-2.55.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"MozillaFirefox-devel-23.0-2.55.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"MozillaFirefox-translations-common-23.0-2.55.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"MozillaFirefox-translations-other-23.0-2.55.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"MozillaThunderbird-17.0.8-49.51.2\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"MozillaThunderbird-buildsymbols-17.0.8-49.51.2\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"MozillaThunderbird-debuginfo-17.0.8-49.51.2\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"MozillaThunderbird-debugsource-17.0.8-49.51.2\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"MozillaThunderbird-devel-17.0.8-49.51.2\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"MozillaThunderbird-devel-debuginfo-17.0.8-49.51.2\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"MozillaThunderbird-translations-common-17.0.8-49.51.2\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"MozillaThunderbird-translations-other-17.0.8-49.51.2\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"enigmail-1.5.2+17.0.8-49.51.2\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"enigmail-debuginfo-1.5.2+17.0.8-49.51.2\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"libfreebl3-3.15.1-2.23.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"libfreebl3-debuginfo-3.15.1-2.23.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"libsoftokn3-3.15.1-2.23.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"libsoftokn3-debuginfo-3.15.1-2.23.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"mozilla-js-17.0.8-2.50.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"mozilla-js-debuginfo-17.0.8-2.50.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"mozilla-nspr-4.10-1.16.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"mozilla-nspr-debuginfo-4.10-1.16.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"mozilla-nspr-debugsource-4.10-1.16.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"mozilla-nspr-devel-4.10-1.16.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"mozilla-nss-3.15.1-2.23.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"mozilla-nss-certs-3.15.1-2.23.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"mozilla-nss-certs-debuginfo-3.15.1-2.23.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"mozilla-nss-debuginfo-3.15.1-2.23.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"mozilla-nss-debugsource-3.15.1-2.23.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"mozilla-nss-devel-3.15.1-2.23.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"mozilla-nss-sysinit-3.15.1-2.23.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"mozilla-nss-sysinit-debuginfo-3.15.1-2.23.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"mozilla-nss-tools-3.15.1-2.23.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"mozilla-nss-tools-debuginfo-3.15.1-2.23.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"seamonkey-2.20-2.46.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"seamonkey-debuginfo-2.20-2.46.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"seamonkey-debugsource-2.20-2.46.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"seamonkey-dom-inspector-2.20-2.46.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"seamonkey-irc-2.20-2.46.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"seamonkey-translations-common-2.20-2.46.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"seamonkey-translations-other-2.20-2.46.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"seamonkey-venkman-2.20-2.46.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"xulrunner-17.0.8-2.50.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"xulrunner-buildsymbols-17.0.8-2.50.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"xulrunner-debuginfo-17.0.8-2.50.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"xulrunner-debugsource-17.0.8-2.50.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"xulrunner-devel-17.0.8-2.50.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"xulrunner-devel-debuginfo-17.0.8-2.50.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", cpu:\"x86_64\", reference:\"libfreebl3-32bit-3.15.1-2.23.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", cpu:\"x86_64\", reference:\"libfreebl3-debuginfo-32bit-3.15.1-2.23.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", cpu:\"x86_64\", reference:\"libsoftokn3-32bit-3.15.1-2.23.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", cpu:\"x86_64\", reference:\"libsoftokn3-debuginfo-32bit-3.15.1-2.23.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", cpu:\"x86_64\", reference:\"mozilla-js-32bit-17.0.8-2.50.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", cpu:\"x86_64\", reference:\"mozilla-js-debuginfo-32bit-17.0.8-2.50.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", cpu:\"x86_64\", reference:\"mozilla-nspr-32bit-4.10-1.16.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", cpu:\"x86_64\", reference:\"mozilla-nspr-debuginfo-32bit-4.10-1.16.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", cpu:\"x86_64\", reference:\"mozilla-nss-32bit-3.15.1-2.23.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", cpu:\"x86_64\", reference:\"mozilla-nss-certs-32bit-3.15.1-2.23.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", cpu:\"x86_64\", reference:\"mozilla-nss-certs-debuginfo-32bit-3.15.1-2.23.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", cpu:\"x86_64\", reference:\"mozilla-nss-debuginfo-32bit-3.15.1-2.23.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", cpu:\"x86_64\", reference:\"mozilla-nss-sysinit-32bit-3.15.1-2.23.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", cpu:\"x86_64\", reference:\"mozilla-nss-sysinit-debuginfo-32bit-3.15.1-2.23.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", cpu:\"x86_64\", reference:\"xulrunner-32bit-17.0.8-2.50.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", cpu:\"x86_64\", reference:\"xulrunner-debuginfo-32bit-17.0.8-2.50.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"MozillaFirefox-23.0-1.29.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"MozillaFirefox-branding-upstream-23.0-1.29.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"MozillaFirefox-buildsymbols-23.0-1.29.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"MozillaFirefox-debuginfo-23.0-1.29.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"MozillaFirefox-debugsource-23.0-1.29.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"MozillaFirefox-devel-23.0-1.29.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"MozillaFirefox-translations-common-23.0-1.29.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"MozillaFirefox-translations-other-23.0-1.29.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"MozillaThunderbird-17.0.8-61.21.2\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"MozillaThunderbird-buildsymbols-17.0.8-61.21.2\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"MozillaThunderbird-debuginfo-17.0.8-61.21.2\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"MozillaThunderbird-debugsource-17.0.8-61.21.2\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"MozillaThunderbird-devel-17.0.8-61.21.2\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"MozillaThunderbird-devel-debuginfo-17.0.8-61.21.2\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"MozillaThunderbird-translations-common-17.0.8-61.21.2\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"MozillaThunderbird-translations-other-17.0.8-61.21.2\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"enigmail-1.5.2+17.0.8-61.21.2\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"enigmail-debuginfo-1.5.2+17.0.8-61.21.2\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"libfreebl3-3.15.1-1.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"libfreebl3-debuginfo-3.15.1-1.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"libsoftokn3-3.15.1-1.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"libsoftokn3-debuginfo-3.15.1-1.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"mozilla-js-17.0.8-1.24.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"mozilla-js-debuginfo-17.0.8-1.24.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"mozilla-nspr-4.10-1.14.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"mozilla-nspr-debuginfo-4.10-1.14.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"mozilla-nspr-debugsource-4.10-1.14.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"mozilla-nspr-devel-4.10-1.14.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"mozilla-nss-3.15.1-1.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"mozilla-nss-certs-3.15.1-1.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"mozilla-nss-certs-debuginfo-3.15.1-1.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"mozilla-nss-debuginfo-3.15.1-1.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"mozilla-nss-debugsource-3.15.1-1.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"mozilla-nss-devel-3.15.1-1.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"mozilla-nss-sysinit-3.15.1-1.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"mozilla-nss-sysinit-debuginfo-3.15.1-1.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"mozilla-nss-tools-3.15.1-1.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"mozilla-nss-tools-debuginfo-3.15.1-1.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"seamonkey-2.20-1.16.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"seamonkey-debuginfo-2.20-1.16.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"seamonkey-debugsource-2.20-1.16.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"seamonkey-dom-inspector-2.20-1.16.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"seamonkey-irc-2.20-1.16.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"seamonkey-translations-common-2.20-1.16.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"seamonkey-translations-other-2.20-1.16.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"seamonkey-venkman-2.20-1.16.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"xulrunner-17.0.8-1.24.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"xulrunner-buildsymbols-17.0.8-1.24.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"xulrunner-debuginfo-17.0.8-1.24.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"xulrunner-debugsource-17.0.8-1.24.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"xulrunner-devel-17.0.8-1.24.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"xulrunner-devel-debuginfo-17.0.8-1.24.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", cpu:\"x86_64\", reference:\"libfreebl3-32bit-3.15.1-1.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", cpu:\"x86_64\", reference:\"libfreebl3-debuginfo-32bit-3.15.1-1.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", cpu:\"x86_64\", reference:\"libsoftokn3-32bit-3.15.1-1.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", cpu:\"x86_64\", reference:\"libsoftokn3-debuginfo-32bit-3.15.1-1.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", cpu:\"x86_64\", reference:\"mozilla-js-32bit-17.0.8-1.24.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", cpu:\"x86_64\", reference:\"mozilla-js-debuginfo-32bit-17.0.8-1.24.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", cpu:\"x86_64\", reference:\"mozilla-nspr-32bit-4.10-1.14.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", cpu:\"x86_64\", reference:\"mozilla-nspr-debuginfo-32bit-4.10-1.14.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", cpu:\"x86_64\", reference:\"mozilla-nss-32bit-3.15.1-1.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", cpu:\"x86_64\", reference:\"mozilla-nss-certs-32bit-3.15.1-1.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", cpu:\"x86_64\", reference:\"mozilla-nss-certs-debuginfo-32bit-3.15.1-1.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", cpu:\"x86_64\", reference:\"mozilla-nss-debuginfo-32bit-3.15.1-1.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", cpu:\"x86_64\", reference:\"mozilla-nss-sysinit-32bit-3.15.1-1.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", cpu:\"x86_64\", reference:\"mozilla-nss-sysinit-debuginfo-32bit-3.15.1-1.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", cpu:\"x86_64\", reference:\"xulrunner-32bit-17.0.8-1.24.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", cpu:\"x86_64\", reference:\"xulrunner-debuginfo-32bit-17.0.8-1.24.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"MozillaFirefox / MozillaFirefox-branding-upstream / etc\");\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-12-13T08:04:53", "bulletinFamily": "scanner", "description": "The installed version of Thunderbird is earlier than 17.0.8 and is,\ntherefore, potentially affected by the following vulnerabilities :\n\n - Various errors exist that could allow memory corruption\n conditions. (CVE-2013-1701, CVE-2013-1702)\n\n - Use-after-free errors exist related to DOM modification\n when using ", "modified": "2019-12-02T00:00:00", "id": "MACOSX_THUNDERBIRD_17_0_8.NASL", "href": "https://www.tenable.com/plugins/nessus/69266", "published": "2013-08-08T00:00:00", "title": "Thunderbird < 17.0.8 Multiple Vulnerabilities (Mac OS X)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(69266);\n script_version(\"1.16\");\n script_cvs_date(\"Date: 2019/11/27\");\n\n script_cve_id(\n \"CVE-2013-1701\",\n \"CVE-2013-1702\",\n \"CVE-2013-1704\",\n \"CVE-2013-1705\",\n \"CVE-2013-1708\",\n \"CVE-2013-1709\",\n \"CVE-2013-1710\",\n \"CVE-2013-1711\",\n \"CVE-2013-1713\",\n \"CVE-2013-1714\",\n \"CVE-2013-1717\"\n );\n script_bugtraq_id(\n 61864,\n 61867,\n 61871,\n 61872,\n 61874,\n 61875,\n 61876,\n 61877,\n 61882,\n 61896,\n 61900\n );\n\n script_name(english:\"Thunderbird < 17.0.8 Multiple Vulnerabilities (Mac OS X)\");\n script_summary(english:\"Checks version of Thunderbird\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Mac OS X host contains a mail client that is potentially\naffected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The installed version of Thunderbird is earlier than 17.0.8 and is,\ntherefore, potentially affected by the following vulnerabilities :\n\n - Various errors exist that could allow memory corruption\n conditions. (CVE-2013-1701, CVE-2013-1702)\n\n - Use-after-free errors exist related to DOM modification\n when using 'SetBody' and generating a 'Certificate\n Request Message'. (CVE-2013-1704, CVE-2013-1705)\n\n - An error exists in the function 'nsCString::CharAt'\n that could allow application crashes when decoding\n specially crafted WAV audio files. (CVE-2013-1708)\n\n - Unspecified errors exist related to HTML frames and\n history handling, 'XrayWrappers', JavaScript URI\n handling and web workers using 'XMLHttpRequest' that\n could allow cross-site scripting attacks.\n (CVE-2013-1709, CVE-2013-1711, CVE-2013-1713,\n CVE-2013-1714)\n\n - An unspecified error exists related to generating\n 'Certificate Request Message Format' (CRMF) requests\n that could allow cross-site scripting attacks.\n (CVE-2013-1710)\n\n - An error exists related to Java applets and 'file:///'\n URIs that could allow read-only access to arbitrary\n files. (CVE-2013-1717)\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-63/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-64/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-65/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-67/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-68/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-69/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-70/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-72/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-73/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-75/\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Thunderbird 17.0.8 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2013-1710\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Firefox 5.0 - 15.0.1 __exposedProps__ XCS Code Execution');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2013/08/06\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/08/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/08/08\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:mozilla:thunderbird\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"MacOS X Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"macosx_thunderbird_installed.nasl\");\n script_require_keys(\"MacOSX/Thunderbird/Installed\");\n\n exit(0);\n}\n\n\ninclude(\"mozilla_version.inc\");\n\nkb_base = \"MacOSX/Thunderbird\";\nget_kb_item_or_exit(kb_base+\"/Installed\");\n\nversion = get_kb_item_or_exit(kb_base+\"/Version\", exit_code:1);\npath = get_kb_item_or_exit(kb_base+\"/Path\", exit_code:1);\n\nif (get_kb_item(kb_base + '/is_esr')) exit(0, 'The Mozilla Thunderbird install is in the ESR branch.');\n\nmozilla_check_version(product:'thunderbird', version:version, path:path, esr:FALSE, fix:'17.0.8', severity:SECURITY_HOLE, xss:TRUE);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-12-13T08:06:15", "bulletinFamily": "scanner", "description": "The installed version of Firefox is earlier than 23.0 and is,\ntherefore, potentially affected by the following vulnerabilities :\n\n - Various errors exist that could allow memory corruption\n conditions. (CVE-2013-1701, CVE-2013-1702)\n\n - Use-after-free errors exist related to DOM modification\n when using ", "modified": "2019-12-02T00:00:00", "id": "MOZILLA_FIREFOX_23.NASL", "href": "https://www.tenable.com/plugins/nessus/69269", "published": "2013-08-08T00:00:00", "title": "Firefox < 23.0 Multiple Vulnerabilities", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(69269);\n script_version(\"1.16\");\n script_cvs_date(\"Date: 2019/11/27\");\n\n script_cve_id(\n \"CVE-2013-1701\",\n \"CVE-2013-1702\",\n \"CVE-2013-1704\",\n \"CVE-2013-1705\",\n \"CVE-2013-1706\",\n \"CVE-2013-1707\",\n \"CVE-2013-1708\",\n \"CVE-2013-1709\",\n \"CVE-2013-1710\",\n \"CVE-2013-1711\",\n \"CVE-2013-1712\",\n \"CVE-2013-1713\",\n \"CVE-2013-1714\",\n \"CVE-2013-1715\",\n \"CVE-2013-1717\"\n );\n script_bugtraq_id(\n 61864,\n 61867,\n 61869,\n 61871,\n 61872,\n 61873,\n 61874,\n 61875,\n 61876,\n 61877,\n 61878,\n 61882,\n 61883,\n 61896,\n 61900\n );\n\n script_name(english:\"Firefox < 23.0 Multiple Vulnerabilities\");\n script_summary(english:\"Checks version of Firefox\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host contains a web browser that is potentially\naffected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The installed version of Firefox is earlier than 23.0 and is,\ntherefore, potentially affected by the following vulnerabilities :\n\n - Various errors exist that could allow memory corruption\n conditions. (CVE-2013-1701, CVE-2013-1702)\n\n - Use-after-free errors exist related to DOM modification\n when using 'SetBody' and generating a 'Certificate\n Request Message'. (CVE-2013-1704, CVE-2013-1705)\n\n - Errors exist related to the update service and\n 'maintenanceservice.exe' that could allow buffer\n overflows when handling unexpectedly long path values.\n (CVE-2013-1706, CVE-2013-1707)\n\n - An error exists in the function 'nsCString::CharAt'\n that could allow application crashes when decoding\n specially crafted WAV audio files. (CVE-2013-1708)\n\n - Unspecified errors exist related to HTML frames and\n history handling, 'XrayWrappers', JavaScript URI\n handling and web workers using 'XMLHttpRequest' that\n could allow cross-site scripting attacks.\n (CVE-2013-1709, CVE-2013-1711, CVE-2013-1713,\n CVE-2013-1714)\n\n - An unspecified error exists related to generating\n 'Certificate Request Message Format' (CRMF) requests\n that could allow cross-site scripting attacks.\n (CVE-2013-1710)\n\n - DLL path loading errors exist related to the update\n service, full installer and the stub installer that\n could allow execution of arbitrary code.\n (CVE-2013-1712, CVE-2013-1715)\n\n - An error exists related to Java applets and 'file:///'\n URIs that could allow read-only access to arbitrary\n files. (CVE-2013-1717)\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-63/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-64/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-65/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-66/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-67/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-68/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-69/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-70/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-71/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-72/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-73/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-74/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-75/\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Firefox 23.0 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2013-1710\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Firefox 5.0 - 15.0.1 __exposedProps__ XCS Code Execution');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2013/08/06\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/08/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/08/08\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:mozilla:firefox\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"mozilla_org_installed.nasl\");\n script_require_keys(\"Mozilla/Firefox/Version\");\n\n exit(0);\n}\n\ninclude(\"mozilla_version.inc\");\n\nport = get_kb_item_or_exit(\"SMB/transport\");\n\ninstalls = get_kb_list(\"SMB/Mozilla/Firefox/*\");\nif (isnull(installs)) audit(AUDIT_NOT_INST, \"Firefox\");\n\nmozilla_check_version(installs:installs, product:'firefox', esr:FALSE, fix:'23.0', severity:SECURITY_HOLE, xss:TRUE);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-12-13T07:26:54", "bulletinFamily": "scanner", "description": "The Mozilla Project reports :\n\nMFSA 2013-63 Miscellaneous memory safety hazards (rv:23.0 / rv:17.0.8)\n\nMFSA 2013-64 Use after free mutating DOM during SetBody\n\nMFSA 2013-65 Buffer underflow when generating CRMF requests\n\nMFSA 2013-66 Buffer overflow in Mozilla Maintenance Service and\nMozilla Updater\n\nMFSA 2013-67 Crash during WAV audio file decoding\n\nMFSA 2013-68 Document URI misrepresentation and masquerading\n\nMFSA 2013-69 CRMF requests allow for code execution and XSS attacks\n\nMFSA 2013-70 Bypass of XrayWrappers using XBL Scopes\n\nMFSA 2013-71 Further Privilege escalation through Mozilla Updater\n\nMFSA 2013-72 Wrong principal used for validating URI for some\nJavaScript components\n\nMFSA 2013-73 Same-origin bypass with web workers and XMLHttpRequest\n\nMFSA 2013-74 Firefox full and stub installer DLL hijacking\n\nMFSA 2013-75 Local Java applets may read contents of local file system", "modified": "2019-12-02T00:00:00", "id": "FREEBSD_PKG_0998E79D005511E3905B0025905A4771.NASL", "href": "https://www.tenable.com/plugins/nessus/69278", "published": "2013-08-09T00:00:00", "title": "FreeBSD : mozilla -- multiple vulnerabilities (0998e79d-0055-11e3-905b-0025905a4771)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2018 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(69278);\n script_version(\"1.10\");\n script_cvs_date(\"Date: 2018/11/21 10:46:30\");\n\n script_cve_id(\"CVE-2013-1701\", \"CVE-2013-1702\", \"CVE-2013-1704\", \"CVE-2013-1705\", \"CVE-2013-1706\", \"CVE-2013-1707\", \"CVE-2013-1708\", \"CVE-2013-1709\", \"CVE-2013-1710\", \"CVE-2013-1711\", \"CVE-2013-1712\", \"CVE-2013-1713\", \"CVE-2013-1714\", \"CVE-2013-1715\", \"CVE-2013-1717\");\n\n script_name(english:\"FreeBSD : mozilla -- multiple vulnerabilities (0998e79d-0055-11e3-905b-0025905a4771)\");\n script_summary(english:\"Checks for updated packages in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote FreeBSD host is missing one or more security-related\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The Mozilla Project reports :\n\nMFSA 2013-63 Miscellaneous memory safety hazards (rv:23.0 / rv:17.0.8)\n\nMFSA 2013-64 Use after free mutating DOM during SetBody\n\nMFSA 2013-65 Buffer underflow when generating CRMF requests\n\nMFSA 2013-66 Buffer overflow in Mozilla Maintenance Service and\nMozilla Updater\n\nMFSA 2013-67 Crash during WAV audio file decoding\n\nMFSA 2013-68 Document URI misrepresentation and masquerading\n\nMFSA 2013-69 CRMF requests allow for code execution and XSS attacks\n\nMFSA 2013-70 Bypass of XrayWrappers using XBL Scopes\n\nMFSA 2013-71 Further Privilege escalation through Mozilla Updater\n\nMFSA 2013-72 Wrong principal used for validating URI for some\nJavaScript components\n\nMFSA 2013-73 Same-origin bypass with web workers and XMLHttpRequest\n\nMFSA 2013-74 Firefox full and stub installer DLL hijacking\n\nMFSA 2013-75 Local Java applets may read contents of local file system\"\n );\n # https://www.mozilla.org/security/announce/2013/mfsa2013-63.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-63/\"\n );\n # https://www.mozilla.org/security/announce/2013/mfsa2013-64.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-64/\"\n );\n # https://www.mozilla.org/security/announce/2013/mfsa2013-65.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-65/\"\n );\n # https://www.mozilla.org/security/announce/2013/mfsa2013-66.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-66/\"\n );\n # https://www.mozilla.org/security/announce/2013/mfsa2013-67.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-67/\"\n );\n # https://www.mozilla.org/security/announce/2013/mfsa2013-68.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-68/\"\n );\n # https://www.mozilla.org/security/announce/2013/mfsa2013-69.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-69/\"\n );\n # https://www.mozilla.org/security/announce/2013/mfsa2013-70.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-70/\"\n );\n # https://www.mozilla.org/security/announce/2013/mfsa2013-71.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-71/\"\n );\n # https://www.mozilla.org/security/announce/2013/mfsa2013-72.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-72/\"\n );\n # http://www.mozilla.org/security/known-vulnerabilities/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/known-vulnerabilities/\"\n );\n # https://vuxml.freebsd.org/freebsd/0998e79d-0055-11e3-905b-0025905a4771.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?5ed72e18\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Firefox toString console.time Privileged Javascript Injection');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:firefox\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:linux-firefox\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:linux-seamonkey\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:linux-thunderbird\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:seamonkey\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:thunderbird\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2013/08/06\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/08/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/08/09\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"firefox>18.0,1<23.0,1\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"firefox<17.0.8,1\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"linux-firefox<17.0.8,1\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"linux-seamonkey<2.20\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"linux-thunderbird<17.0.8\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"seamonkey<2.20\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"thunderbird>11.0<17.0.8\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:pkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-12-13T08:08:46", "bulletinFamily": "scanner", "description": "The installed version of Thunderbird is a version prior to 17.0.8 and\nis, therefore, potentially affected by the following vulnerabilities :\n\n - Various errors exist that could allow memory corruption\n conditions. (CVE-2013-1701, CVE-2013-1702)\n\n - Use-after-free errors exist related to DOM modification\n when using ", "modified": "2019-12-02T00:00:00", "id": "MOZILLA_THUNDERBIRD_1708.NASL", "href": "https://www.tenable.com/plugins/nessus/69270", "published": "2013-08-08T00:00:00", "title": "Mozilla Thunderbird < 17.0.8 Multiple Vulnerabilities", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(69270);\n script_version(\"1.16\");\n script_cvs_date(\"Date: 2019/11/27\");\n\n script_cve_id(\n \"CVE-2013-1701\",\n \"CVE-2013-1702\",\n \"CVE-2013-1704\",\n \"CVE-2013-1705\",\n \"CVE-2013-1706\",\n \"CVE-2013-1707\",\n \"CVE-2013-1708\",\n \"CVE-2013-1709\",\n \"CVE-2013-1710\",\n \"CVE-2013-1711\",\n \"CVE-2013-1712\",\n \"CVE-2013-1713\",\n \"CVE-2013-1714\",\n \"CVE-2013-1715\",\n \"CVE-2013-1717\"\n );\n script_bugtraq_id(\n 61864,\n 61867,\n 61869,\n 61871,\n 61872,\n 61873,\n 61874,\n 61875,\n 61876,\n 61877,\n 61878,\n 61882,\n 61883,\n 61896,\n 61900\n );\n\n script_name(english:\"Mozilla Thunderbird < 17.0.8 Multiple Vulnerabilities\");\n script_summary(english:\"Checks version of Thunderbird\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host contains a mail client that is potentially\naffected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The installed version of Thunderbird is a version prior to 17.0.8 and\nis, therefore, potentially affected by the following vulnerabilities :\n\n - Various errors exist that could allow memory corruption\n conditions. (CVE-2013-1701, CVE-2013-1702)\n\n - Use-after-free errors exist related to DOM modification\n when using 'SetBody' and generating a 'Certificate\n Request Message'. (CVE-2013-1704, CVE-2013-1705)\n\n - Errors exist related to the update service and\n 'maintenanceservice.exe' that could allow buffer\n overflows when handling unexpectedly long path values.\n (CVE-2013-1706, CVE-2013-1707)\n\n - An error exists in the function 'nsCString::CharAt'\n that could allow application crashes when decoding\n specially crafted WAV audio files. (CVE-2013-1708)\n\n - Unspecified errors exist related to HTML frames and\n history handling, 'XrayWrappers', JavaScript URI\n handling and web workers using 'XMLHttpRequest' that\n could allow cross-site scripting attacks.\n (CVE-2013-1709, CVE-2013-1711, CVE-2013-1713,\n CVE-2013-1714)\n\n - An unspecified error exists related to generating\n 'Certificate Request Message Format' (CRMF) requests\n that could allow cross-site scripting attacks.\n (CVE-2013-1710)\n\n - DLL path loading errors exist related to the update\n service, full installer and the stub installer that\n could allow execution of arbitrary code.\n (CVE-2013-1712, CVE-2013-1715)\n\n - An error exists related to Java applets and 'file:///'\n URIs that could allow read-only access to arbitrary\n files. (CVE-2013-1717)\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-63/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-64/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-65/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-66/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-67/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-68/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-69/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-70/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-71/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-72/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-73/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-74/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-75/\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Thunderbird 17.0.8 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2013-1710\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Firefox 5.0 - 15.0.1 __exposedProps__ XCS Code Execution');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2013/08/06\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/08/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/08/08\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:mozilla:thunderbird\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"mozilla_org_installed.nasl\");\n script_require_keys(\"Mozilla/Thunderbird/Version\");\n\n exit(0);\n}\n\ninclude(\"mozilla_version.inc\");\n\nport = get_kb_item_or_exit(\"SMB/transport\");\n\ninstalls = get_kb_list(\"SMB/Mozilla/Thunderbird/*\");\nif (isnull(installs)) audit(AUDIT_NOT_INST, \"Thunderbird\");\n\nmozilla_check_version(installs:installs, product:'thunderbird', esr:FALSE, fix:'17.0.8', severity:SECURITY_HOLE, xss:TRUE);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-12-13T07:33:37", "bulletinFamily": "scanner", "description": "The remote host is affected by the vulnerability described in GLSA-201309-23\n(Mozilla Products: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in Mozilla Firefox,\n Thunderbird, and SeaMonkey. Please review the CVE identifiers referenced\n below for details.\n \nImpact :\n\n A remote attacker could entice a user to view a specially crafted web\n page or email, possibly resulting in execution of arbitrary code or a\n Denial of Service condition. Further, a remote attacker could conduct XSS\n attacks, spoof URLs, bypass address space layout randomization, conduct\n clickjacking attacks, obtain potentially sensitive information, bypass\n access restrictions, modify the local filesystem, or conduct other\n unspecified attacks.\n \nWorkaround :\n\n There is no known workaround at this time.", "modified": "2019-12-02T00:00:00", "id": "GENTOO_GLSA-201309-23.NASL", "href": "https://www.tenable.com/plugins/nessus/70183", "published": "2013-09-28T00:00:00", "title": "GLSA-201309-23 : Mozilla Products: Multiple vulnerabilities", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Gentoo Linux Security Advisory GLSA 201309-23.\n#\n# The advisory text is Copyright (C) 2001-2019 Gentoo Foundation, Inc.\n# and licensed under the Creative Commons - Attribution / Share Alike \n# license. See http://creativecommons.org/licenses/by-sa/3.0/\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(70183);\n script_version(\"1.16\");\n script_cvs_date(\"Date: 2019/08/12 17:35:38\");\n\n script_cve_id(\"CVE-2013-0744\", \"CVE-2013-0745\", \"CVE-2013-0746\", \"CVE-2013-0747\", \"CVE-2013-0748\", \"CVE-2013-0749\", \"CVE-2013-0750\", \"CVE-2013-0751\", \"CVE-2013-0752\", \"CVE-2013-0753\", \"CVE-2013-0754\", \"CVE-2013-0755\", \"CVE-2013-0756\", \"CVE-2013-0757\", \"CVE-2013-0758\", \"CVE-2013-0759\", \"CVE-2013-0760\", \"CVE-2013-0761\", \"CVE-2013-0762\", \"CVE-2013-0763\", \"CVE-2013-0764\", \"CVE-2013-0765\", \"CVE-2013-0766\", \"CVE-2013-0767\", \"CVE-2013-0768\", \"CVE-2013-0769\", \"CVE-2013-0770\", \"CVE-2013-0771\", \"CVE-2013-0772\", \"CVE-2013-0773\", \"CVE-2013-0774\", \"CVE-2013-0775\", \"CVE-2013-0776\", \"CVE-2013-0777\", \"CVE-2013-0778\", \"CVE-2013-0779\", \"CVE-2013-0780\", \"CVE-2013-0781\", \"CVE-2013-0782\", \"CVE-2013-0783\", \"CVE-2013-0784\", \"CVE-2013-0787\", \"CVE-2013-0788\", \"CVE-2013-0789\", \"CVE-2013-0791\", \"CVE-2013-0792\", \"CVE-2013-0793\", \"CVE-2013-0794\", \"CVE-2013-0795\", \"CVE-2013-0796\", \"CVE-2013-0797\", \"CVE-2013-0799\", \"CVE-2013-0800\", \"CVE-2013-0801\", \"CVE-2013-1670\", \"CVE-2013-1671\", \"CVE-2013-1674\", \"CVE-2013-1675\", \"CVE-2013-1676\", \"CVE-2013-1677\", \"CVE-2013-1678\", \"CVE-2013-1679\", \"CVE-2013-1680\", \"CVE-2013-1681\", \"CVE-2013-1682\", \"CVE-2013-1684\", \"CVE-2013-1687\", \"CVE-2013-1690\", \"CVE-2013-1692\", \"CVE-2013-1693\", \"CVE-2013-1694\", \"CVE-2013-1697\", \"CVE-2013-1701\", \"CVE-2013-1702\", \"CVE-2013-1704\", \"CVE-2013-1705\", \"CVE-2013-1707\", \"CVE-2013-1708\", \"CVE-2013-1709\", \"CVE-2013-1710\", \"CVE-2013-1711\", \"CVE-2013-1712\", \"CVE-2013-1713\", \"CVE-2013-1714\", \"CVE-2013-1717\", \"CVE-2013-1718\", \"CVE-2013-1719\", \"CVE-2013-1720\", \"CVE-2013-1722\", \"CVE-2013-1723\", \"CVE-2013-1724\", \"CVE-2013-1725\", \"CVE-2013-1726\", \"CVE-2013-1728\", \"CVE-2013-1730\", \"CVE-2013-1732\", \"CVE-2013-1735\", \"CVE-2013-1736\", \"CVE-2013-1737\", \"CVE-2013-1738\");\n script_bugtraq_id(57193, 57194, 57195, 57196, 57197, 57198, 57199, 57203, 57204, 57205, 57207, 57209, 57211, 57213, 57215, 57217, 57218, 57228, 57232, 57234, 57235, 57236, 57238, 57240, 57241, 57244, 57260, 58034, 58036, 58037, 58038, 58040, 58041, 58042, 58043, 58044, 58047, 58048, 58049, 58050, 58051, 58391, 58819, 58821, 58824, 58825, 58826, 58827, 58828, 58831, 58835, 58836, 58837, 59855, 59858, 59859, 59860, 59861, 59862, 59863, 59864, 59865, 59868, 59869, 60765, 60766, 60776, 60777, 60778, 60783, 60784, 60787, 61864, 61867, 61871, 61872, 61873, 61874, 61875, 61876, 61877, 61878, 61882, 61896, 61900, 62460, 62462, 62463, 62464, 62465, 62466, 62467, 62468, 62469, 62472, 62473, 62475, 62478, 62479, 62482);\n script_xref(name:\"GLSA\", value:\"201309-23\");\n\n script_name(english:\"GLSA-201309-23 : Mozilla Products: Multiple vulnerabilities\");\n script_summary(english:\"Checks for updated package(s) in /var/db/pkg\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Gentoo host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote host is affected by the vulnerability described in GLSA-201309-23\n(Mozilla Products: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in Mozilla Firefox,\n Thunderbird, and SeaMonkey. Please review the CVE identifiers referenced\n below for details.\n \nImpact :\n\n A remote attacker could entice a user to view a specially crafted web\n page or email, possibly resulting in execution of arbitrary code or a\n Denial of Service condition. Further, a remote attacker could conduct XSS\n attacks, spoof URLs, bypass address space layout randomization, conduct\n clickjacking attacks, obtain potentially sensitive information, bypass\n access restrictions, modify the local filesystem, or conduct other\n unspecified attacks.\n \nWorkaround :\n\n There is no known workaround at this time.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.gentoo.org/glsa/201309-23\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"All Mozilla Firefox users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=www-client/firefox-17.0.9'\n All users of the Mozilla Firefox binary package should upgrade to the\n latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=www-client/firefox-bin-17.0.9'\n All Mozilla Thunderbird users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=mail-client/thunderbird-17.0.9'\n All users of the Mozilla Thunderbird binary package should upgrade to\n the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose\n '>=mail-client/thunderbird-bin-17.0.9'\n All SeaMonkey users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=www-client/seamonkey-2.21'\n All users of the Mozilla SeaMonkey binary package should upgrade to the\n latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=www-client/seamonkey-bin-2.21'\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Firefox toString console.time Privileged Javascript Injection');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:firefox\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:firefox-bin\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:seamonkey\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:seamonkey-bin\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:thunderbird\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:thunderbird-bin\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:gentoo:linux\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2013/01/13\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/09/27\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/09/28\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Gentoo Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Gentoo/release\", \"Host/Gentoo/qpkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"qpkg.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Gentoo/release\")) audit(AUDIT_OS_NOT, \"Gentoo\");\nif (!get_kb_item(\"Host/Gentoo/qpkg-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (qpkg_check(package:\"mail-client/thunderbird-bin\", unaffected:make_list(\"ge 17.0.9\"), vulnerable:make_list(\"lt 17.0.9\"))) flag++;\nif (qpkg_check(package:\"www-client/firefox\", unaffected:make_list(\"ge 17.0.9\"), vulnerable:make_list(\"lt 17.0.9\"))) flag++;\nif (qpkg_check(package:\"mail-client/thunderbird\", unaffected:make_list(\"ge 17.0.9\"), vulnerable:make_list(\"lt 17.0.9\"))) flag++;\nif (qpkg_check(package:\"www-client/firefox-bin\", unaffected:make_list(\"ge 17.0.9\"), vulnerable:make_list(\"lt 17.0.9\"))) flag++;\nif (qpkg_check(package:\"www-client/seamonkey\", unaffected:make_list(\"ge 2.21\"), vulnerable:make_list(\"lt 2.21\"))) flag++;\nif (qpkg_check(package:\"www-client/seamonkey-bin\", unaffected:make_list(\"ge 2.21\"), vulnerable:make_list(\"lt 2.21\"))) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = qpkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"Mozilla Products\");\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "ubuntu": [{"lastseen": "2019-05-29T19:20:52", "bulletinFamily": "unix", "description": "Jeff Gilbert, Henrik Skupin, Ben Turner, Christian Holler, Andrew McCreight, Gary Kwong, Jan Varga and Jesse Ruderman discovered multiple memory safety issues in Firefox. If the user were tricked in to opening a specially crafted page, an attacker could possibly exploit these to cause a denial of service via application crash, or potentially execute arbitrary code with the privileges of the user invoking Firefox. (CVE-2013-1701, CVE-2013-1702)\n\nA use-after-free bug was discovered when the DOM is modified during a SetBody mutation event. If the user were tricked in to opening a specially crafted page, an attacker could potentially exploit this to execute arbitrary code with the privileges of the user invoking Firefox. (CVE-2013-1704)\n\nA use-after-free bug was discovered when generating a CRMF request with certain parameters. If the user were tricked in to opening a specially crafted page, an attacker could potentially exploit this to execute arbitrary code with the privileges of the user invoking Firefox. (CVE-2013-1705)\n\nAki Helin discovered a crash when decoding a WAV file in some circumstances. An attacker could potentially exploit this to cause a denial of service. (CVE-2013-1708)\n\nIt was discovered that a document\u2019s URI could be set to the URI of a different document. An attacker could potentially exploit this to conduct cross-site scripting (XSS) attacks. (CVE-2013-1709)\n\nA flaw was discovered when generating a CRMF request in certain circumstances. An attacker could potentially exploit this to conduct cross-site scripting (XSS) attacks, or execute arbitrary code with the privileges of the user invoking Firefox. (CVE-2013-1710)\n\nBobby Holley discovered that XBL scopes could be used to circumvent XrayWrappers in certain circumstances. An attacked could potentially exploit this to conduct cross-site scripting (XSS) attacks or cause undefined behaviour. (CVE-2013-1711)\n\nCody Crews discovered that some Javascript components performed security checks against the wrong URI, potentially bypassing same-origin policy restrictions. An attacker could exploit this to conduct cross-site scripting (XSS) attacks or install addons from a malicious site. (CVE-2013-1713)\n\nFederico Lanusse discovered that web workers could bypass cross-origin checks when using XMLHttpRequest. An attacker could potentially exploit this to conduct cross-site scripting (XSS) attacks. (CVE-2013-1714)\n\nGeorgi Guninski and John Schoenick discovered that Java applets could access local files under certain circumstances. An attacker could potentially exploit this to steal confidential data. (CVE-2013-1717)", "modified": "2013-08-06T00:00:00", "published": "2013-08-06T00:00:00", "id": "USN-1924-1", "href": "https://usn.ubuntu.com/1924-1/", "title": "Firefox vulnerabilities", "type": "ubuntu", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T17:22:22", "bulletinFamily": "unix", "description": "USN-1924-1 fixed vulnerabilities in Firefox. This update provides the corresponding updates for Ubufox and Unity Firefox Extension.\n\nOriginal advisory details:\n\nJeff Gilbert, Henrik Skupin, Ben Turner, Christian Holler, Andrew McCreight, Gary Kwong, Jan Varga and Jesse Ruderman discovered multiple memory safety issues in Firefox. If the user were tricked in to opening a specially crafted page, an attacker could possibly exploit these to cause a denial of service via application crash, or potentially execute arbitrary code with the privileges of the user invoking Firefox. (CVE-2013-1701, CVE-2013-1702)\n\nA use-after-free bug was discovered when the DOM is modified during a SetBody mutation event. If the user were tricked in to opening a specially crafted page, an attacker could potentially exploit this to execute arbitrary code with the privileges of the user invoking Firefox. (CVE-2013-1704)\n\nA use-after-free bug was discovered when generating a CRMF request with certain parameters. If the user were tricked in to opening a specially crafted page, an attacker could potentially exploit this to execute arbitrary code with the privileges of the user invoking Firefox. (CVE-2013-1705)\n\nAki Helin discovered a crash when decoding a WAV file in some circumstances. An attacker could potentially exploit this to cause a denial of service. (CVE-2013-1708)\n\nIt was discovered that a document\u2019s URI could be set to the URI of a different document. An attacker could potentially exploit this to conduct cross-site scripting (XSS) attacks. (CVE-2013-1709)\n\nA flaw was discovered when generating a CRMF request in certain circumstances. An attacker could potentially exploit this to conduct cross-site scripting (XSS) attacks, or execute arbitrary code with the privileges of the user invoking Firefox. (CVE-2013-1710)\n\nBobby Holley discovered that XBL scopes could be used to circumvent XrayWrappers in certain circumstances. An attacked could potentially exploit this to conduct cross-site scripting (XSS) attacks or cause undefined behaviour. (CVE-2013-1711)\n\nCody Crews discovered that some Javascript components performed security checks against the wrong URI, potentially bypassing same-origin policy restrictions. An attacker could exploit this to conduct cross-site scripting (XSS) attacks or install addons from a malicious site. (CVE-2013-1713)\n\nFederico Lanusse discovered that web workers could bypass cross-origin checks when using XMLHttpRequest. An attacker could potentially exploit this to conduct cross-site scripting (XSS) attacks. (CVE-2013-1714)\n\nGeorgi Guninski and John Schoenick discovered that Java applets could access local files under certain circumstances. An attacker could potentially exploit this to steal confidential data. (CVE-2013-1717)", "modified": "2013-08-06T00:00:00", "published": "2013-08-06T00:00:00", "id": "USN-1924-2", "href": "https://usn.ubuntu.com/1924-2/", "title": "Ubufox and Unity Firefox Extension update", "type": "ubuntu", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "securityvulns": [{"lastseen": "2018-08-31T11:09:52", "bulletinFamily": "software", "description": "Memory corruptions, buffer overflows, crossite data access, crossite scripting, information spoofing, privilege escalation, protection bypass, code execution, information leakage.", "modified": "2013-08-12T00:00:00", "published": "2013-08-12T00:00:00", "id": "SECURITYVULNS:VULN:13235", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:13235", "title": "Mozilla Firefox / Thunderbird / Seamonkey multiple security vulnerabilities", "type": "securityvulns", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "freebsd": [{"lastseen": "2019-05-29T18:33:34", "bulletinFamily": "unix", "description": "\nThe Mozilla Project reports:\n\nMFSA 2013-63 Miscellaneous memory safety hazards (rv:23.0 /\n\t rv:17.0.8)\nMFSA 2013-64 Use after free mutating DOM during SetBody\nMFSA 2013-65 Buffer underflow when generating CRMF requests\nMFSA 2013-66 Buffer overflow in Mozilla Maintenance Service and\n\t Mozilla Updater\nMFSA 2013-67 Crash during WAV audio file decoding\nMFSA 2013-68 Document URI misrepresentation and masquerading\nMFSA 2013-69 CRMF requests allow for code execution and XSS\n\t attacks\nMFSA 2013-70 Bypass of XrayWrappers using XBL Scopes\nMFSA 2013-71 Further Privilege escalation through Mozilla Updater\nMFSA 2013-72 Wrong principal used for validating URI for some\n\t Javascript components\nMFSA 2013-73 Same-origin bypass with web workers and\n\t XMLHttpRequest\nMFSA 2013-74 Firefox full and stub installer DLL hijacking\nMFSA 2013-75 Local Java applets may read contents of local file\n\t system\n\n", "modified": "2013-08-06T00:00:00", "published": "2013-08-06T00:00:00", "id": "0998E79D-0055-11E3-905B-0025905A4771", "href": "https://vuxml.freebsd.org/freebsd/0998e79d-0055-11e3-905b-0025905a4771.html", "title": "mozilla -- multiple vulnerabilities", "type": "freebsd", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "gentoo": [{"lastseen": "2016-09-06T19:47:05", "bulletinFamily": "unix", "description": "### Background\n\nMozilla Firefox is an open-source web browser and Mozilla Thunderbird an open-source email client, both from the Mozilla Project. The SeaMonkey project is a community effort to deliver production-quality releases of code derived from the application formerly known as the \u2018Mozilla Application Suite\u2019. \n\n### Description\n\nMultiple vulnerabilities have been discovered in Mozilla Firefox, Thunderbird, and SeaMonkey. Please review the CVE identifiers referenced below for details. \n\n### Impact\n\nA remote attacker could entice a user to view a specially crafted web page or email, possibly resulting in execution of arbitrary code or a Denial of Service condition. Further, a remote attacker could conduct XSS attacks, spoof URLs, bypass address space layout randomization, conduct clickjacking attacks, obtain potentially sensitive information, bypass access restrictions, modify the local filesystem, or conduct other unspecified attacks. \n\n### Workaround\n\nThere is no known workaround at this time.\n\n### Resolution\n\nAll Mozilla Firefox users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=www-client/firefox-17.0.9\"\n \n\nAll users of the Mozilla Firefox binary package should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=www-client/firefox-bin-17.0.9\"\n \n\nAll Mozilla Thunderbird users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=mail-client/thunderbird-17.0.9\"\n \n\nAll users of the Mozilla Thunderbird binary package should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose\n \">=mail-client/thunderbird-bin-17.0.9\"\n \n\nAll SeaMonkey users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=www-client/seamonkey-2.21\"\n \n\nAll users of the Mozilla SeaMonkey binary package should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=www-client/seamonkey-bin-2.21\"", "modified": "2013-09-27T00:00:00", "published": "2013-09-27T00:00:00", "id": "GLSA-201309-23", "href": "https://security.gentoo.org/glsa/201309-23", "type": "gentoo", "title": "Mozilla Products: Multiple vulnerabilities", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}]}