ID CVE-2017-7762 Type cve Reporter cve@mitre.org Modified 2018-07-30T15:23:00
Description
When entered directly, Reader Mode did not strip the username and password section of URLs displayed in the addressbar. This can be used for spoofing the domain of the current page. This vulnerability affects Firefox < 54.
{"openvas": [{"lastseen": "2019-05-29T18:33:27", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-12360", "CVE-2018-12362", "CVE-2018-12359", "CVE-2018-5156", "CVE-2018-5188", "CVE-2018-12366", "CVE-2017-7762", "CVE-2018-12365", "CVE-2018-12363", "CVE-2018-12364", "CVE-2018-6126"], "description": "Check the version of firefox", "modified": "2019-03-08T00:00:00", "published": "2018-07-14T00:00:00", "id": "OPENVAS:1361412562310882920", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310882920", "type": "openvas", "title": "CentOS Update for firefox CESA-2018:2112 centos6", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_CESA-2018_2112_firefox_centos6.nasl 14058 2019-03-08 13:25:52Z cfischer $\n#\n# CentOS Update for firefox CESA-2018:2112 centos6\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.882920\");\n script_version(\"$Revision: 14058 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-08 14:25:52 +0100 (Fri, 08 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2018-07-14 05:51:22 +0200 (Sat, 14 Jul 2018)\");\n script_cve_id(\"CVE-2017-7762\", \"CVE-2018-5156\", \"CVE-2018-5188\", \"CVE-2018-6126\",\n \"CVE-2018-12359\", \"CVE-2018-12360\", \"CVE-2018-12362\", \"CVE-2018-12363\",\n \"CVE-2018-12364\", \"CVE-2018-12365\", \"CVE-2018-12366\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"CentOS Update for firefox CESA-2018:2112 centos6\");\n script_tag(name:\"summary\", value:\"Check the version of firefox\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"Mozilla Firefox is an open-source web browser,\n designed for standards compliance, performance, and portability.\n\nThis update upgrades Firefox to version 60.1.0 ESR.\n\nSecurity Fix(es):\n\n * Mozilla: Memory safety bugs fixed in Firefox 61, Firefox ESR 60.1, and\nFirefox ESR 52.9 (CVE-2018-5188)\n\n * Mozilla: Buffer overflow using computed size of canvas element\n(CVE-2018-12359)\n\n * Mozilla: Use-after-free using focus() (CVE-2018-12360)\n\n * Mozilla: Media recorder segmentation fault when track type is changed\nduring capture (CVE-2018-5156)\n\n * Skia: Heap buffer overflow rasterizing paths in SVG (CVE-2018-6126)\n\n * Mozilla: Integer overflow in SSSE3 scaler (CVE-2018-12362)\n\n * Mozilla: Use-after-free when appending DOM nodes (CVE-2018-12363)\n\n * Mozilla: CSRF attacks through 307 redirects and NPAPI plugins\n(CVE-2018-12364)\n\n * Mozilla: address bar username and password spoofing in reader mode\n(CVE-2017-7762)\n\n * Mozilla: Compromised IPC child process can list local filenames\n(CVE-2018-12365)\n\n * Mozilla: Invalid data handling during QCMS transformations\n(CVE-2018-12366)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, and other related information, refer to the CVE page(s) listed in\nthe References section.\n\nRed Hat would like to thank the Mozilla project for reporting these issues.\nUpstream acknowledges Alex Gaynor, Christoph Diehl, Christian Holler, Jason\nKratzer, David Major, Jon Coppeard, Nicolas B. Pierron, Marcia Knous,\nRonald Crane, Nils, F. Alonso (revskills), David Black, and OSS-Fuzz as the\noriginal reporters.\");\n script_tag(name:\"affected\", value:\"firefox on CentOS 6\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n\n script_xref(name:\"CESA\", value:\"2018:2112\");\n script_xref(name:\"URL\", value:\"http://lists.centos.org/pipermail/centos-announce/2018-July/022962.html\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\", re:\"ssh/login/release=CentOS6\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"CentOS6\")\n{\n\n if ((res = isrpmvuln(pkg:\"firefox\", rpm:\"firefox~60.1.0~5.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:33:26", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-12360", "CVE-2018-12362", "CVE-2018-12359", "CVE-2018-5156", "CVE-2018-5188", "CVE-2018-12366", "CVE-2017-7762", "CVE-2018-12365", "CVE-2018-12363", "CVE-2018-12364", "CVE-2018-6126"], "description": "Check the version of firefox", "modified": "2019-03-08T00:00:00", "published": "2018-07-12T00:00:00", "id": "OPENVAS:1361412562310882918", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310882918", "type": "openvas", "title": "CentOS Update for firefox CESA-2018:2113 centos7", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_CESA-2018_2113_firefox_centos7.nasl 14058 2019-03-08 13:25:52Z cfischer $\n#\n# CentOS Update for firefox CESA-2018:2113 centos7\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.882918\");\n script_version(\"$Revision: 14058 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-08 14:25:52 +0100 (Fri, 08 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2018-07-12 05:56:51 +0200 (Thu, 12 Jul 2018)\");\n script_cve_id(\"CVE-2017-7762\", \"CVE-2018-5156\", \"CVE-2018-5188\", \"CVE-2018-6126\",\n \"CVE-2018-12359\", \"CVE-2018-12360\", \"CVE-2018-12362\", \"CVE-2018-12363\",\n \"CVE-2018-12364\", \"CVE-2018-12365\", \"CVE-2018-12366\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"CentOS Update for firefox CESA-2018:2113 centos7\");\n script_tag(name:\"summary\", value:\"Check the version of firefox\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"Mozilla Firefox is an open-source web browser, designed for standards\n compliance, performance, and portability.\n\nThis update upgrades Firefox to version 60.1.0 ESR.\n\nSecurity Fix(es):\n\n * Mozilla: Memory safety bugs fixed in Firefox 61, Firefox ESR 60.1, and\nFirefox ESR 52.9 (CVE-2018-5188)\n\n * Mozilla: Buffer overflow using computed size of canvas element\n(CVE-2018-12359)\n\n * Mozilla: Use-after-free using focus() (CVE-2018-12360)\n\n * Mozilla: Media recorder segmentation fault when track type is changed\nduring capture (CVE-2018-5156)\n\n * Skia: Heap buffer overflow rasterizing paths in SVG (CVE-2018-6126)\n\n * Mozilla: Integer overflow in SSSE3 scaler (CVE-2018-12362)\n\n * Mozilla: Use-after-free when appending DOM nodes (CVE-2018-12363)\n\n * Mozilla: CSRF attacks through 307 redirects and NPAPI plugins\n(CVE-2018-12364)\n\n * Mozilla: address bar username and password spoofing in reader mode\n(CVE-2017-7762)\n\n * Mozilla: Compromised IPC child process can list local filenames\n(CVE-2018-12365)\n\n * Mozilla: Invalid data handling during QCMS transformations\n(CVE-2018-12366)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, and other related information, refer to the CVE page(s) listed in\nthe References section.\n\nRed Hat would like to thank the Mozilla project for reporting these issues.\nUpstream acknowledges Alex Gaynor, Christoph Diehl, Christian Holler, Jason\nKratzer, David Major, Jon Coppeard, Nicolas B. Pierron, Marcia Knous,\nRonald Crane, Nils, F. Alonso (revskills), David Black, and OSS-Fuzz as the\noriginal reporters.\");\n script_tag(name:\"affected\", value:\"firefox on CentOS 7\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n\n script_xref(name:\"CESA\", value:\"2018:2113\");\n script_xref(name:\"URL\", value:\"http://lists.centos.org/pipermail/centos-announce/2018-July/022960.html\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\", re:\"ssh/login/release=CentOS7\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"CentOS7\")\n{\n\n if ((res = isrpmvuln(pkg:\"firefox\", rpm:\"firefox~60.1.0~4.el7.centos\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:34:22", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-7772", "CVE-2017-7757", "CVE-2017-7754", "CVE-2017-7758", "CVE-2017-7773", "CVE-2017-7752", "CVE-2017-7778", "CVE-2017-5472", "CVE-2017-7756", "CVE-2017-7764", "CVE-2017-7771", "CVE-2017-7749", "CVE-2017-5470", "CVE-2017-5471", "CVE-2017-7751", "CVE-2017-7750", "CVE-2017-7777", "CVE-2017-7762", "CVE-2017-7775", "CVE-2017-7774", "CVE-2017-7776"], "description": "The remote host is missing an update for the ", "modified": "2019-03-13T00:00:00", "published": "2017-06-16T00:00:00", "id": "OPENVAS:1361412562310843206", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310843206", "type": "openvas", "title": "Ubuntu Update for firefox USN-3315-1", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Ubuntu Update for firefox USN-3315-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2017 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.843206\");\n script_version(\"$Revision: 14140 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-13 13:26:09 +0100 (Wed, 13 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2017-06-16 06:59:33 +0200 (Fri, 16 Jun 2017)\");\n script_cve_id(\"CVE-2017-5470\", \"CVE-2017-5471\", \"CVE-2017-5472\", \"CVE-2017-7749\",\n \"CVE-2017-7750\", \"CVE-2017-7751\", \"CVE-2017-7752\", \"CVE-2017-7754\",\n \"CVE-2017-7757\", \"CVE-2017-7758\", \"CVE-2017-7762\", \"CVE-2017-7764\",\n \"CVE-2017-7772\", \"CVE-2017-7773\", \"CVE-2017-7774\", \"CVE-2017-7775\",\n \"CVE-2017-7777\", \"CVE-2017-7778\", \"CVE-2017-7756\", \"CVE-2017-7771\",\n \"CVE-2017-7776\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Ubuntu Update for firefox USN-3315-1\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'firefox'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"Multiple security issues were discovered in\n Firefox. If a user were tricked in to opening a specially crafted website, an\n attacker could potentially exploit these to cause a denial of service, read\n uninitialized memory, obtain sensitive information, spoof the addressbar\n contents, or execute arbitrary code. (CVE-2017-5470, CVE-2017-5471,\n CVE-2017-5472, CVE-2017-7749, CVE-2017-7750, CVE-2017-7751, CVE-2017-7752,\n CVE-2017-7754, CVE-2017-7756, CVE-2017-7757, CVE-2017-7758, CVE-2017-7762,\n CVE-2017-7764) Multiple security issues were discovered in the Graphite 2\n library used by Firefox. If a user were tricked in to opening a specially\n crafted website, an attacker could potentially exploit these to cause a denial\n of service, read uninitialized memory, or execute arbitrary code.\n (CVE-2017-7771, CVE-2017-7772, CVE-2017-7773, CVE-2017-7774, CVE-2017-7775,\n CVE-2017-7776, CVE-2017-7777, CVE-2017-7778)\");\n script_tag(name:\"affected\", value:\"firefox on Ubuntu 17.04,\n Ubuntu 16.10,\n Ubuntu 16.04 LTS,\n Ubuntu 14.04 LTS\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n\n script_xref(name:\"USN\", value:\"3315-1\");\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-3315-1/\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU(14\\.04 LTS|17\\.04|16\\.10|16\\.04 LTS)\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU14.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"firefox\", ver:\"54.0+build3-0ubuntu0.14.04.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU17.04\")\n{\n\n if ((res = isdpkgvuln(pkg:\"firefox\", ver:\"54.0+build3-0ubuntu0.17.04.1\", rls:\"UBUNTU17.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU16.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"firefox\", ver:\"54.0+build3-0ubuntu0.16.10.1\", rls:\"UBUNTU16.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU16.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"firefox\", ver:\"54.0+build3-0ubuntu0.16.04.1\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-07-19T22:08:22", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-7772", "CVE-2017-7757", "CVE-2017-7754", "CVE-2017-7758", "CVE-2017-7773", "CVE-2017-7752", "CVE-2017-7778", "CVE-2017-5472", "CVE-2017-7756", "CVE-2017-7764", "CVE-2017-7771", "CVE-2017-7749", "CVE-2017-5470", "CVE-2017-5471", "CVE-2017-7751", "CVE-2017-7750", "CVE-2017-7777", "CVE-2017-7762", "CVE-2017-7775", "CVE-2017-7774", "CVE-2017-7776"], "description": "This host is installed with Mozilla Firefox\n and is prone to multiple vulnerabilities.", "modified": "2019-07-17T00:00:00", "published": "2017-06-15T00:00:00", "id": "OPENVAS:1361412562310811198", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310811198", "type": "openvas", "title": "Mozilla Firefox Security Updates( mfsa_2017-15_2017-16 )-MAC OS X", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mozilla Firefox Security Updates( mfsa_2017-15_2017-16 )-MAC OS X\n#\n# Authors:\n# Kashinath T <tkashinath@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2017 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:mozilla:firefox\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.811198\");\n script_version(\"2019-07-17T11:14:11+0000\");\n script_cve_id(\"CVE-2017-5472\", \"CVE-2017-7749\", \"CVE-2017-7750\", \"CVE-2017-7751\",\n\t\t\"CVE-2017-7752\", \"CVE-2017-7754\", \"CVE-2017-5470\", \"CVE-2017-7756\",\n\t\t\"CVE-2017-7757\", \"CVE-2017-7778\", \"CVE-2017-7771\", \"CVE-2017-7772\",\n\t\t\"CVE-2017-7773\", \"CVE-2017-7774\", \"CVE-2017-7775\", \"CVE-2017-7776\",\n\t\t\"CVE-2017-7777\", \"CVE-2017-7758\", \"CVE-2017-5471\", \"CVE-2017-7764\",\n\t\t\"CVE-2017-7762\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-07-17 11:14:11 +0000 (Wed, 17 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2017-06-15 17:23:17 +0530 (Thu, 15 Jun 2017)\");\n script_name(\"Mozilla Firefox Security Updates( mfsa_2017-15_2017-16 )-MAC OS X\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Mozilla Firefox\n and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The multiple flaws exists due to,\n\n - Use-after-free using destroyed node when regenerating trees.\n\n - Use-after-free during docshell reloading.\n\n - Use-after-free with track elements.\n\n - Use-after-free with content viewer listeners.\n\n - Use-after-free with IME input.\n\n - Out-of-bounds read in WebGL with ImageInfo object.\n\n - Privilege escalation through Firefox Installer with same directory DLL files.\n\n - Use-after-free and use-after-scope logging XHR header errors.\n\n - Use-after-free in IndexedDB.\n\n - Vulnerabilities in the Graphite 2 library.\n\n - Out-of-bounds read in Opus encoder.\n\n - Android intent URLs can cause navigation to local file system.\n\n - File manipulation and privilege escalation via callback parameter in Mozilla\n Windows Updater and Maintenance Service.\n\n - File deletion and privilege escalation through Mozilla Maintenance Service\n helper.exe application.\n\n - Addressbar spoofing in Reader mode.\n\n - Mac fonts render some unicode characters as spaces.\n\n - Domain spoofing with combination of Canadian Syllabics and other unicode blocks.\n\n - Mark of the Web bypass when saving executable files.\n\n - File execution and privilege escalation through updater.ini, Mozilla Windows\n Updater, and Mozilla Maintenance Service.\n\n - Privilege escalation and arbitrary file overwrites through Mozilla Windows\n Updater and Mozilla Maintenance Service.\n\n - 32 byte arbitrary file read through Mozilla Maintenance Service.\n\n - Addressbar spoofing with JavaScript events and fullscreen mode.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote\n attackers to execute arbitrary code, to delete arbitrary files by leveraging\n certain local file execution, to obtain sensitive information, and to cause\n a denial of service.\");\n\n script_tag(name:\"affected\", value:\"Mozilla Firefox version before 54.0 on MAC OS X.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Mozilla Firefox version 54.0\n or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2017-15/\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_mozilla_prdts_detect_macosx.nasl\");\n script_mandatory_keys(\"Mozilla/Firefox/MacOSX/Version\");\n\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!ffVer = get_app_version(cpe:CPE)){\n exit(0);\n}\n\nif(version_is_less(version:ffVer, test_version:\"54.0\"))\n{\n report = report_fixed_ver(installed_version:ffVer, fixed_version:\"54.0\");\n security_message(data:report);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-07-19T22:08:24", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-7772", "CVE-2017-7757", "CVE-2017-7754", "CVE-2017-7758", "CVE-2017-7755", "CVE-2017-7773", "CVE-2017-7752", "CVE-2017-7765", "CVE-2017-7763", "CVE-2017-7766", "CVE-2017-7778", "CVE-2017-5472", "CVE-2017-7756", "CVE-2017-7761", "CVE-2017-7767", "CVE-2017-7764", "CVE-2017-7771", "CVE-2017-7749", "CVE-2017-5470", "CVE-2017-5471", "CVE-2017-7751", "CVE-2017-7750", "CVE-2017-7777", "CVE-2017-7762", "CVE-2017-7775", "CVE-2017-7760", "CVE-2017-7774", "CVE-2017-7776", "CVE-2017-7768"], "description": "This host is installed with Mozilla Firefox\n and is prone to multiple vulnerabilities.", "modified": "2019-07-17T00:00:00", "published": "2017-06-15T00:00:00", "id": "OPENVAS:1361412562310811197", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310811197", "type": "openvas", "title": "Mozilla Firefox Security Updates( mfsa_2017-15_2017-16 )-Windows", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mozilla Firefox Security Updates( mfsa_2017-15_2017-16 )-Windows\n#\n# Authors:\n# Kashinath T <tkashinath@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2017 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:mozilla:firefox\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.811197\");\n script_version(\"2019-07-17T11:14:11+0000\");\n script_cve_id(\"CVE-2017-5472\", \"CVE-2017-7749\", \"CVE-2017-7750\", \"CVE-2017-7751\",\n\t\t\"CVE-2017-7752\", \"CVE-2017-7754\", \"CVE-2017-7755\", \"CVE-2017-7756\",\n\t\t\"CVE-2017-7757\", \"CVE-2017-7778\", \"CVE-2017-7771\", \"CVE-2017-7772\",\n\t\t\"CVE-2017-7773\", \"CVE-2017-7774\", \"CVE-2017-7775\", \"CVE-2017-7776\",\n\t\t\"CVE-2017-7777\", \"CVE-2017-7758\", \"CVE-2017-5470\", \"CVE-2017-7760\",\n\t\t\"CVE-2017-7761\", \"CVE-2017-7762\", \"CVE-2017-7763\", \"CVE-2017-7764\",\n\t\t\"CVE-2017-7765\", \"CVE-2017-7766\", \"CVE-2017-7767\", \"CVE-2017-7768\",\n\t\t\"CVE-2017-5471\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-07-17 11:14:11 +0000 (Wed, 17 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2017-06-15 17:23:01 +0530 (Thu, 15 Jun 2017)\");\n script_name(\"Mozilla Firefox Security Updates( mfsa_2017-15_2017-16 )-Windows\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Mozilla Firefox\n and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The multiple flaws exists due to,\n\n - Use-after-free using destroyed node when regenerating trees.\n\n - Use-after-free during docshell reloading.\n\n - Use-after-free with track elements.\n\n - Use-after-free with content viewer listeners.\n\n - Use-after-free with IME input.\n\n - Out-of-bounds read in WebGL with ImageInfo object.\n\n - Privilege escalation through Firefox Installer with same directory DLL files.\n\n - Use-after-free and use-after-scope logging XHR header errors.\n\n - Use-after-free in IndexedDB.\n\n - Vulnerabilities in the Graphite 2 library.\n\n - Out-of-bounds read in Opus encoder.\n\n - Android intent URLs can cause navigation to local file system.\n\n - File manipulation and privilege escalation via callback parameter in Mozilla\n Windows Updater and Maintenance Service.\n\n - File deletion and privilege escalation through Mozilla Maintenance Service\n helper.exe application.\n\n - Addressbar spoofing in Reader mode.\n\n - Mac fonts render some unicode characters as spaces.\n\n - Domain spoofing with combination of Canadian Syllabics and other unicode blocks.\n\n - Mark of the Web bypass when saving executable files.\n\n - File execution and privilege escalation through updater.ini, Mozilla Windows\n Updater, and Mozilla Maintenance Service.\n\n - Privilege escalation and arbitrary file overwrites through Mozilla Windows\n Updater and Mozilla Maintenance Service.\n\n - 32 byte arbitrary file read through Mozilla Maintenance Service.\n\n - Addressbar spoofing with JavaScript events and fullscreen mode.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote\n attackers to execute arbitrary code, to delete arbitrary files by leveraging\n certain local file execution, to obtain sensitive information, and to cause\n a denial of service.\");\n\n script_tag(name:\"affected\", value:\"Mozilla Firefox version before 54.0 on Windows.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Mozilla Firefox version 54\n or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"registry\");\n script_xref(name:\"URL\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2017-15\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_firefox_detect_portable_win.nasl\");\n script_mandatory_keys(\"Firefox/Win/Ver\");\n\n exit(0);\n}\n\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!ffVer = get_app_version(cpe:CPE)){\n exit(0);\n}\n\nif(version_is_less(version:ffVer, test_version:\"54.0\"))\n{\n report = report_fixed_ver(installed_version:ffVer, fixed_version:\"54.0\");\n security_message(data:report);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "redhat": [{"lastseen": "2019-08-13T18:44:52", "bulletinFamily": "unix", "cvelist": ["CVE-2017-7762", "CVE-2018-12359", "CVE-2018-12360", "CVE-2018-12362", "CVE-2018-12363", "CVE-2018-12364", "CVE-2018-12365", "CVE-2018-12366", "CVE-2018-5156", "CVE-2018-5188", "CVE-2018-6126"], "description": "Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.\n\nThis update upgrades Firefox to version 60.1.0 ESR.\n\nSecurity Fix(es):\n\n* Mozilla: Memory safety bugs fixed in Firefox 61, Firefox ESR 60.1, and Firefox ESR 52.9 (CVE-2018-5188)\n\n* Mozilla: Buffer overflow using computed size of canvas element (CVE-2018-12359)\n\n* Mozilla: Use-after-free using focus() (CVE-2018-12360)\n\n* Mozilla: Media recorder segmentation fault when track type is changed during capture (CVE-2018-5156)\n\n* Skia: Heap buffer overflow rasterizing paths in SVG (CVE-2018-6126)\n\n* Mozilla: Integer overflow in SSSE3 scaler (CVE-2018-12362)\n\n* Mozilla: Use-after-free when appending DOM nodes (CVE-2018-12363)\n\n* Mozilla: CSRF attacks through 307 redirects and NPAPI plugins (CVE-2018-12364)\n\n* Mozilla: address bar username and password spoofing in reader mode (CVE-2017-7762)\n\n* Mozilla: Compromised IPC child process can list local filenames (CVE-2018-12365)\n\n* Mozilla: Invalid data handling during QCMS transformations (CVE-2018-12366)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank the Mozilla project for reporting these issues. Upstream acknowledges Alex Gaynor, Christoph Diehl, Christian Holler, Jason Kratzer, David Major, Jon Coppeard, Nicolas B. Pierron, Marcia Knous, Ronald Crane, Nils, F. Alonso (revskills), David Black, and OSS-Fuzz as the original reporters.", "modified": "2018-06-28T18:59:53", "published": "2018-06-28T18:55:24", "id": "RHSA-2018:2113", "href": "https://access.redhat.com/errata/RHSA-2018:2113", "type": "redhat", "title": "(RHSA-2018:2113) Critical: firefox security update", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-08-13T18:46:40", "bulletinFamily": "unix", "cvelist": ["CVE-2017-7762", "CVE-2018-12359", "CVE-2018-12360", "CVE-2018-12362", "CVE-2018-12363", "CVE-2018-12364", "CVE-2018-12365", "CVE-2018-12366", "CVE-2018-5156", "CVE-2018-5188", "CVE-2018-6126"], "description": "Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.\n\nThis update upgrades Firefox to version 60.1.0 ESR.\n\nSecurity Fix(es):\n\n* Mozilla: Memory safety bugs fixed in Firefox 61, Firefox ESR 60.1, and Firefox ESR 52.9 (CVE-2018-5188)\n\n* Mozilla: Buffer overflow using computed size of canvas element (CVE-2018-12359)\n\n* Mozilla: Use-after-free using focus() (CVE-2018-12360)\n\n* Mozilla: Media recorder segmentation fault when track type is changed during capture (CVE-2018-5156)\n\n* Skia: Heap buffer overflow rasterizing paths in SVG (CVE-2018-6126)\n\n* Mozilla: Integer overflow in SSSE3 scaler (CVE-2018-12362)\n\n* Mozilla: Use-after-free when appending DOM nodes (CVE-2018-12363)\n\n* Mozilla: CSRF attacks through 307 redirects and NPAPI plugins (CVE-2018-12364)\n\n* Mozilla: address bar username and password spoofing in reader mode (CVE-2017-7762)\n\n* Mozilla: Compromised IPC child process can list local filenames (CVE-2018-12365)\n\n* Mozilla: Invalid data handling during QCMS transformations (CVE-2018-12366)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank the Mozilla project for reporting these issues. Upstream acknowledges Alex Gaynor, Christoph Diehl, Christian Holler, Jason Kratzer, David Major, Jon Coppeard, Nicolas B. Pierron, Marcia Knous, Ronald Crane, Nils, F. Alonso (revskills), David Black, and OSS-Fuzz as the original reporters.", "modified": "2018-08-17T00:53:56", "published": "2018-06-28T18:54:49", "id": "RHSA-2018:2112", "href": "https://access.redhat.com/errata/RHSA-2018:2112", "type": "redhat", "title": "(RHSA-2018:2112) Critical: firefox security update", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "centos": [{"lastseen": "2020-12-08T03:39:07", "bulletinFamily": "unix", "cvelist": ["CVE-2018-12360", "CVE-2018-12362", "CVE-2018-12359", "CVE-2018-5156", "CVE-2018-5188", "CVE-2018-12366", "CVE-2017-7762", "CVE-2018-12365", "CVE-2018-12363", "CVE-2018-12364", "CVE-2018-6126"], "description": "**CentOS Errata and Security Advisory** CESA-2018:2113\n\n\nMozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.\n\nThis update upgrades Firefox to version 60.1.0 ESR.\n\nSecurity Fix(es):\n\n* Mozilla: Memory safety bugs fixed in Firefox 61, Firefox ESR 60.1, and Firefox ESR 52.9 (CVE-2018-5188)\n\n* Mozilla: Buffer overflow using computed size of canvas element (CVE-2018-12359)\n\n* Mozilla: Use-after-free using focus() (CVE-2018-12360)\n\n* Mozilla: Media recorder segmentation fault when track type is changed during capture (CVE-2018-5156)\n\n* Skia: Heap buffer overflow rasterizing paths in SVG (CVE-2018-6126)\n\n* Mozilla: Integer overflow in SSSE3 scaler (CVE-2018-12362)\n\n* Mozilla: Use-after-free when appending DOM nodes (CVE-2018-12363)\n\n* Mozilla: CSRF attacks through 307 redirects and NPAPI plugins (CVE-2018-12364)\n\n* Mozilla: address bar username and password spoofing in reader mode (CVE-2017-7762)\n\n* Mozilla: Compromised IPC child process can list local filenames (CVE-2018-12365)\n\n* Mozilla: Invalid data handling during QCMS transformations (CVE-2018-12366)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank the Mozilla project for reporting these issues. Upstream acknowledges Alex Gaynor, Christoph Diehl, Christian Holler, Jason Kratzer, David Major, Jon Coppeard, Nicolas B. Pierron, Marcia Knous, Ronald Crane, Nils, F. Alonso (revskills), David Black, and OSS-Fuzz as the original reporters.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2018-July/034998.html\n\n**Affected packages:**\nfirefox\n\n**Upstream details at:**\n", "edition": 7, "modified": "2018-07-11T23:01:41", "published": "2018-07-11T23:01:41", "id": "CESA-2018:2113", "href": "http://lists.centos.org/pipermail/centos-announce/2018-July/034998.html", "title": "firefox security update", "type": "centos", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-12-08T03:33:24", "bulletinFamily": "unix", "cvelist": ["CVE-2018-12360", "CVE-2018-12362", "CVE-2018-12359", "CVE-2018-5156", "CVE-2018-5188", "CVE-2018-12366", "CVE-2017-7762", "CVE-2018-12365", "CVE-2018-12363", "CVE-2018-12364", "CVE-2018-6126"], "description": "**CentOS Errata and Security Advisory** CESA-2018:2112\n\n\nMozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.\n\nThis update upgrades Firefox to version 60.1.0 ESR.\n\nSecurity Fix(es):\n\n* Mozilla: Memory safety bugs fixed in Firefox 61, Firefox ESR 60.1, and Firefox ESR 52.9 (CVE-2018-5188)\n\n* Mozilla: Buffer overflow using computed size of canvas element (CVE-2018-12359)\n\n* Mozilla: Use-after-free using focus() (CVE-2018-12360)\n\n* Mozilla: Media recorder segmentation fault when track type is changed during capture (CVE-2018-5156)\n\n* Skia: Heap buffer overflow rasterizing paths in SVG (CVE-2018-6126)\n\n* Mozilla: Integer overflow in SSSE3 scaler (CVE-2018-12362)\n\n* Mozilla: Use-after-free when appending DOM nodes (CVE-2018-12363)\n\n* Mozilla: CSRF attacks through 307 redirects and NPAPI plugins (CVE-2018-12364)\n\n* Mozilla: address bar username and password spoofing in reader mode (CVE-2017-7762)\n\n* Mozilla: Compromised IPC child process can list local filenames (CVE-2018-12365)\n\n* Mozilla: Invalid data handling during QCMS transformations (CVE-2018-12366)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank the Mozilla project for reporting these issues. Upstream acknowledges Alex Gaynor, Christoph Diehl, Christian Holler, Jason Kratzer, David Major, Jon Coppeard, Nicolas B. Pierron, Marcia Knous, Ronald Crane, Nils, F. Alonso (revskills), David Black, and OSS-Fuzz as the original reporters.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2018-July/034999.html\nhttp://lists.centos.org/pipermail/centos-announce/2018-July/047333.html\n\n**Affected packages:**\nfirefox\n\n**Upstream details at:**\n", "edition": 7, "modified": "2018-07-13T16:55:34", "published": "2018-07-12T20:46:19", "id": "CESA-2018:2112", "href": "http://lists.centos.org/pipermail/centos-announce/2018-July/034999.html", "title": "firefox security update", "type": "centos", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "nessus": [{"lastseen": "2020-05-31T20:39:09", "description": "This update upgrades Firefox to version 60.1.0 ESR.\n\nMany older firefox extensions must be updated to work with this new\nrelease.\n\nSecurity Fix(es) :\n\n - Mozilla: Memory safety bugs fixed in Firefox 61, Firefox\n ESR 60.1, and Firefox ESR 52.9 (CVE-2018-5188)\n\n - Mozilla: Buffer overflow using computed size of canvas\n element (CVE-2018-12359)\n\n - Mozilla: Use-after-free using focus() (CVE-2018-12360)\n\n - Mozilla: Media recorder segmentation fault when track\n type is changed during capture (CVE-2018-5156)\n\n - Skia: Heap buffer overflow rasterizing paths in SVG\n (CVE-2018-6126)\n\n - Mozilla: Integer overflow in SSSE3 scaler\n (CVE-2018-12362)\n\n - Mozilla: Use-after-free when appending DOM nodes\n (CVE-2018-12363)\n\n - Mozilla: CSRF attacks through 307 redirects and NPAPI\n plugins (CVE-2018-12364)\n\n - Mozilla: address bar username and password spoofing in\n reader mode (CVE-2017-7762)\n\n - Mozilla: Compromised IPC child process can list local\n filenames (CVE-2018-12365)\n\n - Mozilla: Invalid data handling during QCMS\n transformations (CVE-2018-12366)", "edition": 22, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2018-07-10T00:00:00", "title": "Scientific Linux Security Update : firefox on SL6.x i386/x86_64 (20180628)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-12360", "CVE-2018-12362", "CVE-2018-12359", "CVE-2018-5156", "CVE-2018-5188", "CVE-2018-12366", "CVE-2017-7762", "CVE-2018-12365", "CVE-2018-12363", "CVE-2018-12364", "CVE-2018-6126"], "modified": "2018-07-10T00:00:00", "cpe": ["p-cpe:/a:fermilab:scientific_linux:firefox", "p-cpe:/a:fermilab:scientific_linux:firefox-debuginfo", "x-cpe:/o:fermilab:scientific_linux"], "id": "SL_20180628_FIREFOX_ON_SL6_X.NASL", "href": "https://www.tenable.com/plugins/nessus/110971", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text is (C) Scientific Linux.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(110971);\n script_version(\"1.12\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/05/29\");\n\n script_cve_id(\"CVE-2017-7762\", \"CVE-2018-12359\", \"CVE-2018-12360\", \"CVE-2018-12362\", \"CVE-2018-12363\", \"CVE-2018-12364\", \"CVE-2018-12365\", \"CVE-2018-12366\", \"CVE-2018-5156\", \"CVE-2018-5188\", \"CVE-2018-6126\");\n\n script_name(english:\"Scientific Linux Security Update : firefox on SL6.x i386/x86_64 (20180628)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\n\"The remote Scientific Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"This update upgrades Firefox to version 60.1.0 ESR.\n\nMany older firefox extensions must be updated to work with this new\nrelease.\n\nSecurity Fix(es) :\n\n - Mozilla: Memory safety bugs fixed in Firefox 61, Firefox\n ESR 60.1, and Firefox ESR 52.9 (CVE-2018-5188)\n\n - Mozilla: Buffer overflow using computed size of canvas\n element (CVE-2018-12359)\n\n - Mozilla: Use-after-free using focus() (CVE-2018-12360)\n\n - Mozilla: Media recorder segmentation fault when track\n type is changed during capture (CVE-2018-5156)\n\n - Skia: Heap buffer overflow rasterizing paths in SVG\n (CVE-2018-6126)\n\n - Mozilla: Integer overflow in SSSE3 scaler\n (CVE-2018-12362)\n\n - Mozilla: Use-after-free when appending DOM nodes\n (CVE-2018-12363)\n\n - Mozilla: CSRF attacks through 307 redirects and NPAPI\n plugins (CVE-2018-12364)\n\n - Mozilla: address bar username and password spoofing in\n reader mode (CVE-2017-7762)\n\n - Mozilla: Compromised IPC child process can list local\n filenames (CVE-2018-12365)\n\n - Mozilla: Invalid data handling during QCMS\n transformations (CVE-2018-12366)\"\n );\n # https://listserv.fnal.gov/scripts/wa.exe?A2=ind1807&L=scientific-linux-errata&F=&S=&P=3912\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?c5eea8cd\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\"Update the affected firefox and / or firefox-debuginfo packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:firefox\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:firefox-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"x-cpe:/o:fermilab:scientific_linux\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/06/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/06/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/07/10\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Scientific Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Scientific Linux \" >!< release) audit(AUDIT_HOST_NOT, \"running Scientific Linux\");\nos_ver = pregmatch(pattern: \"Scientific Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Scientific Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Scientific Linux 6.x\", \"Scientific Linux \" + os_ver);\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Scientific Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"SL6\", reference:\"firefox-60.1.0-5.el6\", allowmaj:TRUE)) flag++;\nif (rpm_check(release:\"SL6\", reference:\"firefox-debuginfo-60.1.0-5.el6\", allowmaj:TRUE)) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"firefox / firefox-debuginfo\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-03-01T01:36:00", "description": "An update for firefox is now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Critical. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nMozilla Firefox is an open source web browser, designed for standards\ncompliance, performance, and portability.\n\nThis update upgrades Firefox to version 60.1.0 ESR.\n\nSecurity Fix(es) :\n\n* Mozilla: Memory safety bugs fixed in Firefox 61, Firefox ESR 60.1,\nand Firefox ESR 52.9 (CVE-2018-5188)\n\n* Mozilla: Buffer overflow using computed size of canvas element\n(CVE-2018-12359)\n\n* Mozilla: Use-after-free using focus() (CVE-2018-12360)\n\n* Mozilla: Media recorder segmentation fault when track type is\nchanged during capture (CVE-2018-5156)\n\n* Skia: Heap buffer overflow rasterizing paths in SVG (CVE-2018-6126)\n\n* Mozilla: Integer overflow in SSSE3 scaler (CVE-2018-12362)\n\n* Mozilla: Use-after-free when appending DOM nodes (CVE-2018-12363)\n\n* Mozilla: CSRF attacks through 307 redirects and NPAPI plugins\n(CVE-2018-12364)\n\n* Mozilla: address bar username and password spoofing in reader mode\n(CVE-2017-7762)\n\n* Mozilla: Compromised IPC child process can list local filenames\n(CVE-2018-12365)\n\n* Mozilla: Invalid data handling during QCMS transformations\n(CVE-2018-12366)\n\nFor more details about the security issue(s), including the impact, a\nCVSS score, and other related information, refer to the CVE page(s)\nlisted in the References section.\n\nRed Hat would like to thank the Mozilla project for reporting these\nissues. Upstream acknowledges Alex Gaynor, Christoph Diehl, Christian\nHoller, Jason Kratzer, David Major, Jon Coppeard, Nicolas B. Pierron,\nMarcia Knous, Ronald Crane, Nils, F. Alonso (revskills), David Black,\nand OSS-Fuzz as the original reporters.", "edition": 32, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2018-07-16T00:00:00", "title": "CentOS 6 : firefox (CESA-2018:2112)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-12360", "CVE-2018-12362", "CVE-2018-12359", "CVE-2018-5156", "CVE-2018-5188", "CVE-2018-12366", "CVE-2017-7762", "CVE-2018-12365", "CVE-2018-12363", "CVE-2018-12364", "CVE-2018-6126"], "modified": "2021-03-02T00:00:00", "cpe": ["cpe:/o:centos:centos:6", "p-cpe:/a:centos:centos:firefox"], "id": "CENTOS_RHSA-2018-2112.NASL", "href": "https://www.tenable.com/plugins/nessus/111074", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2018:2112 and \n# CentOS Errata and Security Advisory 2018:2112 respectively.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(111074);\n script_version(\"1.11\");\n script_cvs_date(\"Date: 2020/02/18\");\n\n script_cve_id(\"CVE-2017-7762\", \"CVE-2018-12359\", \"CVE-2018-12360\", \"CVE-2018-12362\", \"CVE-2018-12363\", \"CVE-2018-12364\", \"CVE-2018-12365\", \"CVE-2018-12366\", \"CVE-2018-5156\", \"CVE-2018-5188\", \"CVE-2018-6126\");\n script_xref(name:\"RHSA\", value:\"2018:2112\");\n\n script_name(english:\"CentOS 6 : firefox (CESA-2018:2112)\");\n script_summary(english:\"Checks rpm output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An update for firefox is now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Critical. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nMozilla Firefox is an open source web browser, designed for standards\ncompliance, performance, and portability.\n\nThis update upgrades Firefox to version 60.1.0 ESR.\n\nSecurity Fix(es) :\n\n* Mozilla: Memory safety bugs fixed in Firefox 61, Firefox ESR 60.1,\nand Firefox ESR 52.9 (CVE-2018-5188)\n\n* Mozilla: Buffer overflow using computed size of canvas element\n(CVE-2018-12359)\n\n* Mozilla: Use-after-free using focus() (CVE-2018-12360)\n\n* Mozilla: Media recorder segmentation fault when track type is\nchanged during capture (CVE-2018-5156)\n\n* Skia: Heap buffer overflow rasterizing paths in SVG (CVE-2018-6126)\n\n* Mozilla: Integer overflow in SSSE3 scaler (CVE-2018-12362)\n\n* Mozilla: Use-after-free when appending DOM nodes (CVE-2018-12363)\n\n* Mozilla: CSRF attacks through 307 redirects and NPAPI plugins\n(CVE-2018-12364)\n\n* Mozilla: address bar username and password spoofing in reader mode\n(CVE-2017-7762)\n\n* Mozilla: Compromised IPC child process can list local filenames\n(CVE-2018-12365)\n\n* Mozilla: Invalid data handling during QCMS transformations\n(CVE-2018-12366)\n\nFor more details about the security issue(s), including the impact, a\nCVSS score, and other related information, refer to the CVE page(s)\nlisted in the References section.\n\nRed Hat would like to thank the Mozilla project for reporting these\nissues. Upstream acknowledges Alex Gaynor, Christoph Diehl, Christian\nHoller, Jason Kratzer, David Major, Jon Coppeard, Nicolas B. Pierron,\nMarcia Knous, Ronald Crane, Nils, F. Alonso (revskills), David Black,\nand OSS-Fuzz as the original reporters.\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2018-July/022962.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?a7cfc2e5\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected firefox package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2018-5156\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:firefox\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:6\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/06/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/07/13\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/07/16\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 6.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-6\", reference:\"firefox-60.1.0-5.el6.centos\", allowmaj:TRUE)) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"firefox\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-03-01T01:36:02", "description": "An update for firefox is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Critical. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nMozilla Firefox is an open source web browser, designed for standards\ncompliance, performance, and portability.\n\nThis update upgrades Firefox to version 60.1.0 ESR.\n\nSecurity Fix(es) :\n\n* Mozilla: Memory safety bugs fixed in Firefox 61, Firefox ESR 60.1,\nand Firefox ESR 52.9 (CVE-2018-5188)\n\n* Mozilla: Buffer overflow using computed size of canvas element\n(CVE-2018-12359)\n\n* Mozilla: Use-after-free using focus() (CVE-2018-12360)\n\n* Mozilla: Media recorder segmentation fault when track type is\nchanged during capture (CVE-2018-5156)\n\n* Skia: Heap buffer overflow rasterizing paths in SVG (CVE-2018-6126)\n\n* Mozilla: Integer overflow in SSSE3 scaler (CVE-2018-12362)\n\n* Mozilla: Use-after-free when appending DOM nodes (CVE-2018-12363)\n\n* Mozilla: CSRF attacks through 307 redirects and NPAPI plugins\n(CVE-2018-12364)\n\n* Mozilla: address bar username and password spoofing in reader mode\n(CVE-2017-7762)\n\n* Mozilla: Compromised IPC child process can list local filenames\n(CVE-2018-12365)\n\n* Mozilla: Invalid data handling during QCMS transformations\n(CVE-2018-12366)\n\nFor more details about the security issue(s), including the impact, a\nCVSS score, and other related information, refer to the CVE page(s)\nlisted in the References section.\n\nRed Hat would like to thank the Mozilla project for reporting these\nissues. Upstream acknowledges Alex Gaynor, Christoph Diehl, Christian\nHoller, Jason Kratzer, David Major, Jon Coppeard, Nicolas B. Pierron,\nMarcia Knous, Ronald Crane, Nils, F. Alonso (revskills), David Black,\nand OSS-Fuzz as the original reporters.", "edition": 32, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2018-07-12T00:00:00", "title": "CentOS 7 : firefox (CESA-2018:2113)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-12360", "CVE-2018-12362", "CVE-2018-12359", "CVE-2018-5156", "CVE-2018-5188", "CVE-2018-12366", "CVE-2017-7762", "CVE-2018-12365", "CVE-2018-12363", "CVE-2018-12364", "CVE-2018-6126"], "modified": "2021-03-02T00:00:00", "cpe": ["cpe:/o:centos:centos:7", "p-cpe:/a:centos:centos:firefox"], "id": "CENTOS_RHSA-2018-2113.NASL", "href": "https://www.tenable.com/plugins/nessus/111013", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2018:2113 and \n# CentOS Errata and Security Advisory 2018:2113 respectively.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(111013);\n script_version(\"1.11\");\n script_cvs_date(\"Date: 2020/02/18\");\n\n script_cve_id(\"CVE-2017-7762\", \"CVE-2018-12359\", \"CVE-2018-12360\", \"CVE-2018-12362\", \"CVE-2018-12363\", \"CVE-2018-12364\", \"CVE-2018-12365\", \"CVE-2018-12366\", \"CVE-2018-5156\", \"CVE-2018-5188\", \"CVE-2018-6126\");\n script_xref(name:\"RHSA\", value:\"2018:2113\");\n\n script_name(english:\"CentOS 7 : firefox (CESA-2018:2113)\");\n script_summary(english:\"Checks rpm output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An update for firefox is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Critical. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nMozilla Firefox is an open source web browser, designed for standards\ncompliance, performance, and portability.\n\nThis update upgrades Firefox to version 60.1.0 ESR.\n\nSecurity Fix(es) :\n\n* Mozilla: Memory safety bugs fixed in Firefox 61, Firefox ESR 60.1,\nand Firefox ESR 52.9 (CVE-2018-5188)\n\n* Mozilla: Buffer overflow using computed size of canvas element\n(CVE-2018-12359)\n\n* Mozilla: Use-after-free using focus() (CVE-2018-12360)\n\n* Mozilla: Media recorder segmentation fault when track type is\nchanged during capture (CVE-2018-5156)\n\n* Skia: Heap buffer overflow rasterizing paths in SVG (CVE-2018-6126)\n\n* Mozilla: Integer overflow in SSSE3 scaler (CVE-2018-12362)\n\n* Mozilla: Use-after-free when appending DOM nodes (CVE-2018-12363)\n\n* Mozilla: CSRF attacks through 307 redirects and NPAPI plugins\n(CVE-2018-12364)\n\n* Mozilla: address bar username and password spoofing in reader mode\n(CVE-2017-7762)\n\n* Mozilla: Compromised IPC child process can list local filenames\n(CVE-2018-12365)\n\n* Mozilla: Invalid data handling during QCMS transformations\n(CVE-2018-12366)\n\nFor more details about the security issue(s), including the impact, a\nCVSS score, and other related information, refer to the CVE page(s)\nlisted in the References section.\n\nRed Hat would like to thank the Mozilla project for reporting these\nissues. Upstream acknowledges Alex Gaynor, Christoph Diehl, Christian\nHoller, Jason Kratzer, David Major, Jon Coppeard, Nicolas B. Pierron,\nMarcia Knous, Ronald Crane, Nils, F. Alonso (revskills), David Black,\nand OSS-Fuzz as the original reporters.\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2018-July/022960.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?b2ff5e77\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected firefox package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2018-5156\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:firefox\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:7\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/06/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/07/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/07/12\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^7([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 7.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"firefox-60.1.0-4.el7.centos\", allowmaj:TRUE)) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"firefox\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-05-31T20:16:32", "description": "An update for firefox is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Critical. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nMozilla Firefox is an open source web browser, designed for standards\ncompliance, performance, and portability.\n\nThis update upgrades Firefox to version 60.1.0 ESR.\n\nSecurity Fix(es) :\n\n* Mozilla: Memory safety bugs fixed in Firefox 61, Firefox ESR 60.1,\nand Firefox ESR 52.9 (CVE-2018-5188)\n\n* Mozilla: Buffer overflow using computed size of canvas element\n(CVE-2018-12359)\n\n* Mozilla: Use-after-free using focus() (CVE-2018-12360)\n\n* Mozilla: Media recorder segmentation fault when track type is\nchanged during capture (CVE-2018-5156)\n\n* Skia: Heap buffer overflow rasterizing paths in SVG (CVE-2018-6126)\n\n* Mozilla: Integer overflow in SSSE3 scaler (CVE-2018-12362)\n\n* Mozilla: Use-after-free when appending DOM nodes (CVE-2018-12363)\n\n* Mozilla: CSRF attacks through 307 redirects and NPAPI plugins\n(CVE-2018-12364)\n\n* Mozilla: address bar username and password spoofing in reader mode\n(CVE-2017-7762)\n\n* Mozilla: Compromised IPC child process can list local filenames\n(CVE-2018-12365)\n\n* Mozilla: Invalid data handling during QCMS transformations\n(CVE-2018-12366)\n\nFor more details about the security issue(s), including the impact, a\nCVSS score, and other related information, refer to the CVE page(s)\nlisted in the References section.\n\nRed Hat would like to thank the Mozilla project for reporting these\nissues. Upstream acknowledges Alex Gaynor, Christoph Diehl, Christian\nHoller, Jason Kratzer, David Major, Jon Coppeard, Nicolas B. Pierron,\nMarcia Knous, Ronald Crane, Nils, F. Alonso (revskills), David Black,\nand OSS-Fuzz as the original reporters.", "edition": 24, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2018-06-29T00:00:00", "title": "RHEL 7 : firefox (RHSA-2018:2113)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-12360", "CVE-2018-12362", "CVE-2018-12359", "CVE-2018-5156", "CVE-2018-5188", "CVE-2018-12366", "CVE-2017-7762", "CVE-2018-12365", "CVE-2018-12363", "CVE-2018-12364", "CVE-2018-6126"], "modified": "2018-06-29T00:00:00", "cpe": ["cpe:/o:redhat:enterprise_linux:7.7", "cpe:/o:redhat:enterprise_linux:7.5", "cpe:/o:redhat:enterprise_linux:7", "p-cpe:/a:redhat:enterprise_linux:firefox", "p-cpe:/a:redhat:enterprise_linux:firefox-debuginfo", "cpe:/o:redhat:enterprise_linux:7.6"], "id": "REDHAT-RHSA-2018-2113.NASL", "href": "https://www.tenable.com/plugins/nessus/110800", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2018:2113. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(110800);\n script_version(\"1.15\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/05/29\");\n\n script_cve_id(\"CVE-2017-7762\", \"CVE-2018-12359\", \"CVE-2018-12360\", \"CVE-2018-12362\", \"CVE-2018-12363\", \"CVE-2018-12364\", \"CVE-2018-12365\", \"CVE-2018-12366\", \"CVE-2018-5156\", \"CVE-2018-5188\", \"CVE-2018-6126\");\n script_xref(name:\"RHSA\", value:\"2018:2113\");\n\n script_name(english:\"RHEL 7 : firefox (RHSA-2018:2113)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"An update for firefox is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Critical. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nMozilla Firefox is an open source web browser, designed for standards\ncompliance, performance, and portability.\n\nThis update upgrades Firefox to version 60.1.0 ESR.\n\nSecurity Fix(es) :\n\n* Mozilla: Memory safety bugs fixed in Firefox 61, Firefox ESR 60.1,\nand Firefox ESR 52.9 (CVE-2018-5188)\n\n* Mozilla: Buffer overflow using computed size of canvas element\n(CVE-2018-12359)\n\n* Mozilla: Use-after-free using focus() (CVE-2018-12360)\n\n* Mozilla: Media recorder segmentation fault when track type is\nchanged during capture (CVE-2018-5156)\n\n* Skia: Heap buffer overflow rasterizing paths in SVG (CVE-2018-6126)\n\n* Mozilla: Integer overflow in SSSE3 scaler (CVE-2018-12362)\n\n* Mozilla: Use-after-free when appending DOM nodes (CVE-2018-12363)\n\n* Mozilla: CSRF attacks through 307 redirects and NPAPI plugins\n(CVE-2018-12364)\n\n* Mozilla: address bar username and password spoofing in reader mode\n(CVE-2017-7762)\n\n* Mozilla: Compromised IPC child process can list local filenames\n(CVE-2018-12365)\n\n* Mozilla: Invalid data handling during QCMS transformations\n(CVE-2018-12366)\n\nFor more details about the security issue(s), including the impact, a\nCVSS score, and other related information, refer to the CVE page(s)\nlisted in the References section.\n\nRed Hat would like to thank the Mozilla project for reporting these\nissues. Upstream acknowledges Alex Gaynor, Christoph Diehl, Christian\nHoller, Jason Kratzer, David Major, Jon Coppeard, Nicolas B. Pierron,\nMarcia Knous, Ronald Crane, Nils, F. Alonso (revskills), David Black,\nand OSS-Fuzz as the original reporters.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2018-16/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2018:2113\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-7762\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-5156\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-5188\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-6126\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-12359\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-12360\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-12362\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-12363\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-12364\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-12365\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-12366\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\"Update the affected firefox and / or firefox-debuginfo packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:firefox\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:firefox-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7.5\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7.6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7.7\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/06/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/06/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/06/29\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^7([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 7.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2018:2113\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL7\", cpu:\"i686\", reference:\"firefox-60.1.0-4.el7_5\", allowmaj:TRUE)) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"firefox-60.1.0-4.el7_5\", allowmaj:TRUE)) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"firefox-60.1.0-4.el7_5\", allowmaj:TRUE)) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"i686\", reference:\"firefox-debuginfo-60.1.0-4.el7_5\", allowmaj:TRUE)) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"firefox-debuginfo-60.1.0-4.el7_5\", allowmaj:TRUE)) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"firefox-debuginfo-60.1.0-4.el7_5\", allowmaj:TRUE)) flag++;\n\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"firefox / firefox-debuginfo\");\n }\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-05-31T20:16:32", "description": "An update for firefox is now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Critical. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nMozilla Firefox is an open source web browser, designed for standards\ncompliance, performance, and portability.\n\nThis update upgrades Firefox to version 60.1.0 ESR.\n\nSecurity Fix(es) :\n\n* Mozilla: Memory safety bugs fixed in Firefox 61, Firefox ESR 60.1,\nand Firefox ESR 52.9 (CVE-2018-5188)\n\n* Mozilla: Buffer overflow using computed size of canvas element\n(CVE-2018-12359)\n\n* Mozilla: Use-after-free using focus() (CVE-2018-12360)\n\n* Mozilla: Media recorder segmentation fault when track type is\nchanged during capture (CVE-2018-5156)\n\n* Skia: Heap buffer overflow rasterizing paths in SVG (CVE-2018-6126)\n\n* Mozilla: Integer overflow in SSSE3 scaler (CVE-2018-12362)\n\n* Mozilla: Use-after-free when appending DOM nodes (CVE-2018-12363)\n\n* Mozilla: CSRF attacks through 307 redirects and NPAPI plugins\n(CVE-2018-12364)\n\n* Mozilla: address bar username and password spoofing in reader mode\n(CVE-2017-7762)\n\n* Mozilla: Compromised IPC child process can list local filenames\n(CVE-2018-12365)\n\n* Mozilla: Invalid data handling during QCMS transformations\n(CVE-2018-12366)\n\nFor more details about the security issue(s), including the impact, a\nCVSS score, and other related information, refer to the CVE page(s)\nlisted in the References section.\n\nRed Hat would like to thank the Mozilla project for reporting these\nissues. Upstream acknowledges Alex Gaynor, Christoph Diehl, Christian\nHoller, Jason Kratzer, David Major, Jon Coppeard, Nicolas B. Pierron,\nMarcia Knous, Ronald Crane, Nils, F. Alonso (revskills), David Black,\nand OSS-Fuzz as the original reporters.", "edition": 23, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2018-06-29T00:00:00", "title": "RHEL 6 : firefox (RHSA-2018:2112)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-12360", "CVE-2018-12362", "CVE-2018-12359", "CVE-2018-5156", "CVE-2018-5188", "CVE-2018-12366", "CVE-2017-7762", "CVE-2018-12365", "CVE-2018-12363", "CVE-2018-12364", "CVE-2018-6126"], "modified": "2018-06-29T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:firefox", "p-cpe:/a:redhat:enterprise_linux:firefox-debuginfo", "cpe:/o:redhat:enterprise_linux:6"], "id": "REDHAT-RHSA-2018-2112.NASL", "href": "https://www.tenable.com/plugins/nessus/110799", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2018:2112. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(110799);\n script_version(\"1.13\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/05/29\");\n\n script_cve_id(\"CVE-2017-7762\", \"CVE-2018-12359\", \"CVE-2018-12360\", \"CVE-2018-12362\", \"CVE-2018-12363\", \"CVE-2018-12364\", \"CVE-2018-12365\", \"CVE-2018-12366\", \"CVE-2018-5156\", \"CVE-2018-5188\", \"CVE-2018-6126\");\n script_xref(name:\"RHSA\", value:\"2018:2112\");\n\n script_name(english:\"RHEL 6 : firefox (RHSA-2018:2112)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"An update for firefox is now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Critical. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nMozilla Firefox is an open source web browser, designed for standards\ncompliance, performance, and portability.\n\nThis update upgrades Firefox to version 60.1.0 ESR.\n\nSecurity Fix(es) :\n\n* Mozilla: Memory safety bugs fixed in Firefox 61, Firefox ESR 60.1,\nand Firefox ESR 52.9 (CVE-2018-5188)\n\n* Mozilla: Buffer overflow using computed size of canvas element\n(CVE-2018-12359)\n\n* Mozilla: Use-after-free using focus() (CVE-2018-12360)\n\n* Mozilla: Media recorder segmentation fault when track type is\nchanged during capture (CVE-2018-5156)\n\n* Skia: Heap buffer overflow rasterizing paths in SVG (CVE-2018-6126)\n\n* Mozilla: Integer overflow in SSSE3 scaler (CVE-2018-12362)\n\n* Mozilla: Use-after-free when appending DOM nodes (CVE-2018-12363)\n\n* Mozilla: CSRF attacks through 307 redirects and NPAPI plugins\n(CVE-2018-12364)\n\n* Mozilla: address bar username and password spoofing in reader mode\n(CVE-2017-7762)\n\n* Mozilla: Compromised IPC child process can list local filenames\n(CVE-2018-12365)\n\n* Mozilla: Invalid data handling during QCMS transformations\n(CVE-2018-12366)\n\nFor more details about the security issue(s), including the impact, a\nCVSS score, and other related information, refer to the CVE page(s)\nlisted in the References section.\n\nRed Hat would like to thank the Mozilla project for reporting these\nissues. Upstream acknowledges Alex Gaynor, Christoph Diehl, Christian\nHoller, Jason Kratzer, David Major, Jon Coppeard, Nicolas B. Pierron,\nMarcia Knous, Ronald Crane, Nils, F. Alonso (revskills), David Black,\nand OSS-Fuzz as the original reporters.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2018-16/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2018:2112\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-7762\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-5156\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-5188\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-6126\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-12359\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-12360\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-12362\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-12363\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-12364\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-12365\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-12366\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\"Update the affected firefox and / or firefox-debuginfo packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:firefox\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:firefox-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/06/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/06/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/06/29\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 6.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2018:2112\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"firefox-60.1.0-5.el6\", allowmaj:TRUE)) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"firefox-60.1.0-5.el6\", allowmaj:TRUE)) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"firefox-60.1.0-5.el6\", allowmaj:TRUE)) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"firefox-debuginfo-60.1.0-5.el6\", allowmaj:TRUE)) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"firefox-debuginfo-60.1.0-5.el6\", allowmaj:TRUE)) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"firefox-debuginfo-60.1.0-5.el6\", allowmaj:TRUE)) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"firefox / firefox-debuginfo\");\n }\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-05-31T20:39:10", "description": "This update upgrades Firefox to version 60.1.0 ESR.\n\nMany older firefox extensions must be updated to work with this new\nrelease.\n\nSecurity Fix(es) :\n\n - Mozilla: Memory safety bugs fixed in Firefox 61, Firefox\n ESR 60.1, and Firefox ESR 52.9 (CVE-2018-5188)\n\n - Mozilla: Buffer overflow using computed size of canvas\n element (CVE-2018-12359)\n\n - Mozilla: Use-after-free using focus() (CVE-2018-12360)\n\n - Mozilla: Media recorder segmentation fault when track\n type is changed during capture (CVE-2018-5156)\n\n - Skia: Heap buffer overflow rasterizing paths in SVG\n (CVE-2018-6126)\n\n - Mozilla: Integer overflow in SSSE3 scaler\n (CVE-2018-12362)\n\n - Mozilla: Use-after-free when appending DOM nodes\n (CVE-2018-12363)\n\n - Mozilla: CSRF attacks through 307 redirects and NPAPI\n plugins (CVE-2018-12364)\n\n - Mozilla: address bar username and password spoofing in\n reader mode (CVE-2017-7762)\n\n - Mozilla: Compromised IPC child process can list local\n filenames (CVE-2018-12365)\n\n - Mozilla: Invalid data handling during QCMS\n transformations (CVE-2018-12366)", "edition": 22, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2018-07-06T00:00:00", "title": "Scientific Linux Security Update : firefox on SL7.x x86_64 (20180628)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-12360", "CVE-2018-12362", "CVE-2018-12359", "CVE-2018-5156", "CVE-2018-5188", "CVE-2018-12366", "CVE-2017-7762", "CVE-2018-12365", "CVE-2018-12363", "CVE-2018-12364", "CVE-2018-6126"], "modified": "2018-07-06T00:00:00", "cpe": ["p-cpe:/a:fermilab:scientific_linux:firefox", "p-cpe:/a:fermilab:scientific_linux:firefox-debuginfo", "x-cpe:/o:fermilab:scientific_linux"], "id": "SL_20180628_FIREFOX_ON_SL7_X.NASL", "href": "https://www.tenable.com/plugins/nessus/110935", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text is (C) Scientific Linux.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(110935);\n script_version(\"1.12\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/05/29\");\n\n script_cve_id(\"CVE-2017-7762\", \"CVE-2018-12359\", \"CVE-2018-12360\", \"CVE-2018-12362\", \"CVE-2018-12363\", \"CVE-2018-12364\", \"CVE-2018-12365\", \"CVE-2018-12366\", \"CVE-2018-5156\", \"CVE-2018-5188\", \"CVE-2018-6126\");\n\n script_name(english:\"Scientific Linux Security Update : firefox on SL7.x x86_64 (20180628)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\n\"The remote Scientific Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"This update upgrades Firefox to version 60.1.0 ESR.\n\nMany older firefox extensions must be updated to work with this new\nrelease.\n\nSecurity Fix(es) :\n\n - Mozilla: Memory safety bugs fixed in Firefox 61, Firefox\n ESR 60.1, and Firefox ESR 52.9 (CVE-2018-5188)\n\n - Mozilla: Buffer overflow using computed size of canvas\n element (CVE-2018-12359)\n\n - Mozilla: Use-after-free using focus() (CVE-2018-12360)\n\n - Mozilla: Media recorder segmentation fault when track\n type is changed during capture (CVE-2018-5156)\n\n - Skia: Heap buffer overflow rasterizing paths in SVG\n (CVE-2018-6126)\n\n - Mozilla: Integer overflow in SSSE3 scaler\n (CVE-2018-12362)\n\n - Mozilla: Use-after-free when appending DOM nodes\n (CVE-2018-12363)\n\n - Mozilla: CSRF attacks through 307 redirects and NPAPI\n plugins (CVE-2018-12364)\n\n - Mozilla: address bar username and password spoofing in\n reader mode (CVE-2017-7762)\n\n - Mozilla: Compromised IPC child process can list local\n filenames (CVE-2018-12365)\n\n - Mozilla: Invalid data handling during QCMS\n transformations (CVE-2018-12366)\"\n );\n # https://listserv.fnal.gov/scripts/wa.exe?A2=ind1807&L=scientific-linux-errata&F=&S=&P=3415\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?d089fa84\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\"Update the affected firefox and / or firefox-debuginfo packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:firefox\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:firefox-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"x-cpe:/o:fermilab:scientific_linux\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/06/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/06/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/07/06\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Scientific Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Scientific Linux \" >!< release) audit(AUDIT_HOST_NOT, \"running Scientific Linux\");\nos_ver = pregmatch(pattern: \"Scientific Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Scientific Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^7([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Scientific Linux 7.x\", \"Scientific Linux \" + os_ver);\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Scientific Linux\", cpu);\nif (\"x86_64\" >!< cpu) audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"SL7\", cpu:\"x86_64\", reference:\"firefox-60.1.0-4.el7_5\", allowmaj:TRUE)) flag++;\nif (rpm_check(release:\"SL7\", cpu:\"x86_64\", reference:\"firefox-debuginfo-60.1.0-4.el7_5\", allowmaj:TRUE)) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"firefox / firefox-debuginfo\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-05-31T19:59:49", "description": "From Red Hat Security Advisory 2018:2113 :\n\nAn update for firefox is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Critical. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nMozilla Firefox is an open source web browser, designed for standards\ncompliance, performance, and portability.\n\nThis update upgrades Firefox to version 60.1.0 ESR.\n\nSecurity Fix(es) :\n\n* Mozilla: Memory safety bugs fixed in Firefox 61, Firefox ESR 60.1,\nand Firefox ESR 52.9 (CVE-2018-5188)\n\n* Mozilla: Buffer overflow using computed size of canvas element\n(CVE-2018-12359)\n\n* Mozilla: Use-after-free using focus() (CVE-2018-12360)\n\n* Mozilla: Media recorder segmentation fault when track type is\nchanged during capture (CVE-2018-5156)\n\n* Skia: Heap buffer overflow rasterizing paths in SVG (CVE-2018-6126)\n\n* Mozilla: Integer overflow in SSSE3 scaler (CVE-2018-12362)\n\n* Mozilla: Use-after-free when appending DOM nodes (CVE-2018-12363)\n\n* Mozilla: CSRF attacks through 307 redirects and NPAPI plugins\n(CVE-2018-12364)\n\n* Mozilla: address bar username and password spoofing in reader mode\n(CVE-2017-7762)\n\n* Mozilla: Compromised IPC child process can list local filenames\n(CVE-2018-12365)\n\n* Mozilla: Invalid data handling during QCMS transformations\n(CVE-2018-12366)\n\nFor more details about the security issue(s), including the impact, a\nCVSS score, and other related information, refer to the CVE page(s)\nlisted in the References section.\n\nRed Hat would like to thank the Mozilla project for reporting these\nissues. Upstream acknowledges Alex Gaynor, Christoph Diehl, Christian\nHoller, Jason Kratzer, David Major, Jon Coppeard, Nicolas B. Pierron,\nMarcia Knous, Ronald Crane, Nils, F. Alonso (revskills), David Black,\nand OSS-Fuzz as the original reporters.", "edition": 21, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2018-07-05T00:00:00", "title": "Oracle Linux 7 : firefox (ELSA-2018-2113)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-12360", "CVE-2018-12362", "CVE-2018-12359", "CVE-2018-5156", "CVE-2018-5188", "CVE-2018-12366", "CVE-2017-7762", "CVE-2018-12365", "CVE-2018-12363", "CVE-2018-12364", "CVE-2018-6126"], "modified": "2018-07-05T00:00:00", "cpe": ["p-cpe:/a:oracle:linux:firefox", "cpe:/o:oracle:linux:7"], "id": "ORACLELINUX_ELSA-2018-2113.NASL", "href": "https://www.tenable.com/plugins/nessus/110917", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2018:2113 and \n# Oracle Linux Security Advisory ELSA-2018-2113 respectively.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(110917);\n script_version(\"1.9\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/05/29\");\n\n script_cve_id(\"CVE-2017-7762\", \"CVE-2018-12359\", \"CVE-2018-12360\", \"CVE-2018-12362\", \"CVE-2018-12363\", \"CVE-2018-12364\", \"CVE-2018-12365\", \"CVE-2018-12366\", \"CVE-2018-5156\", \"CVE-2018-5188\", \"CVE-2018-6126\");\n script_xref(name:\"RHSA\", value:\"2018:2113\");\n\n script_name(english:\"Oracle Linux 7 : firefox (ELSA-2018-2113)\");\n script_summary(english:\"Checks rpm output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote Oracle Linux host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"From Red Hat Security Advisory 2018:2113 :\n\nAn update for firefox is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Critical. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nMozilla Firefox is an open source web browser, designed for standards\ncompliance, performance, and portability.\n\nThis update upgrades Firefox to version 60.1.0 ESR.\n\nSecurity Fix(es) :\n\n* Mozilla: Memory safety bugs fixed in Firefox 61, Firefox ESR 60.1,\nand Firefox ESR 52.9 (CVE-2018-5188)\n\n* Mozilla: Buffer overflow using computed size of canvas element\n(CVE-2018-12359)\n\n* Mozilla: Use-after-free using focus() (CVE-2018-12360)\n\n* Mozilla: Media recorder segmentation fault when track type is\nchanged during capture (CVE-2018-5156)\n\n* Skia: Heap buffer overflow rasterizing paths in SVG (CVE-2018-6126)\n\n* Mozilla: Integer overflow in SSSE3 scaler (CVE-2018-12362)\n\n* Mozilla: Use-after-free when appending DOM nodes (CVE-2018-12363)\n\n* Mozilla: CSRF attacks through 307 redirects and NPAPI plugins\n(CVE-2018-12364)\n\n* Mozilla: address bar username and password spoofing in reader mode\n(CVE-2017-7762)\n\n* Mozilla: Compromised IPC child process can list local filenames\n(CVE-2018-12365)\n\n* Mozilla: Invalid data handling during QCMS transformations\n(CVE-2018-12366)\n\nFor more details about the security issue(s), including the impact, a\nCVSS score, and other related information, refer to the CVE page(s)\nlisted in the References section.\n\nRed Hat would like to thank the Mozilla project for reporting these\nissues. Upstream acknowledges Alex Gaynor, Christoph Diehl, Christian\nHoller, Jason Kratzer, David Major, Jon Coppeard, Nicolas B. Pierron,\nMarcia Knous, Ronald Crane, Nils, F. Alonso (revskills), David Black,\nand OSS-Fuzz as the original reporters.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2018-July/007864.html\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\"Update the affected firefox package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:firefox\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:7\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/06/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/07/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/07/05\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/OracleLinux\")) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nos_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Oracle Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^7([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Oracle Linux 7\", \"Oracle Linux \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Oracle Linux\", cpu);\nif (\"x86_64\" >!< cpu) audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"firefox-60.1.0-4.0.1.el7_5\", allowmaj:TRUE)) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"firefox\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-03-01T07:32:33", "description": "Multiple security issues were discovered in Firefox. If a user were\ntricked in to opening a specially crafted website, an attacker could\npotentially exploit these to cause a denial of service, read\nuninitialized memory, obtain sensitive information, spoof the\naddressbar contents, or execute arbitrary code. (CVE-2017-5470,\nCVE-2017-5471, CVE-2017-5472, CVE-2017-7749, CVE-2017-7750,\nCVE-2017-7751, CVE-2017-7752, CVE-2017-7754, CVE-2017-7756,\nCVE-2017-7757, CVE-2017-7758, CVE-2017-7762, CVE-2017-7764)\n\nMultiple security issues were discovered in the Graphite 2 library\nused by Firefox. If a user were tricked in to opening a specially\ncrafted website, an attacker could potentially exploit these to cause\na denial of service, read uninitialized memory, or execute arbitrary\ncode. (CVE-2017-7771, CVE-2017-7772, CVE-2017-7773, CVE-2017-7774,\nCVE-2017-7775, CVE-2017-7776, CVE-2017-7777, CVE-2017-7778).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 33, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2017-06-16T00:00:00", "title": "Ubuntu 14.04 LTS / 16.04 LTS / 16.10 / 17.04 : firefox vulnerabilities (USN-3315-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-7772", "CVE-2017-7757", "CVE-2017-7754", "CVE-2017-7758", "CVE-2017-7773", "CVE-2017-7752", "CVE-2017-7778", "CVE-2017-5472", "CVE-2017-7756", "CVE-2017-7764", "CVE-2017-7771", "CVE-2017-7749", "CVE-2017-5470", "CVE-2017-5471", "CVE-2017-7751", "CVE-2017-7750", "CVE-2017-7777", "CVE-2017-7762", "CVE-2017-7775", "CVE-2017-7774", "CVE-2017-7776"], "modified": "2021-03-02T00:00:00", "cpe": ["cpe:/o:canonical:ubuntu_linux:17.04", "p-cpe:/a:canonical:ubuntu_linux:firefox", "cpe:/o:canonical:ubuntu_linux:16.04", "cpe:/o:canonical:ubuntu_linux:16.10", "cpe:/o:canonical:ubuntu_linux:14.04"], "id": "UBUNTU_USN-3315-1.NASL", "href": "https://www.tenable.com/plugins/nessus/100835", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-3315-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(100835);\n script_version(\"3.11\");\n script_cvs_date(\"Date: 2019/09/18 12:31:47\");\n\n script_cve_id(\"CVE-2017-5470\", \"CVE-2017-5471\", \"CVE-2017-5472\", \"CVE-2017-7749\", \"CVE-2017-7750\", \"CVE-2017-7751\", \"CVE-2017-7752\", \"CVE-2017-7754\", \"CVE-2017-7756\", \"CVE-2017-7757\", \"CVE-2017-7758\", \"CVE-2017-7762\", \"CVE-2017-7764\", \"CVE-2017-7771\", \"CVE-2017-7772\", \"CVE-2017-7773\", \"CVE-2017-7774\", \"CVE-2017-7775\", \"CVE-2017-7776\", \"CVE-2017-7777\", \"CVE-2017-7778\");\n script_xref(name:\"USN\", value:\"3315-1\");\n\n script_name(english:\"Ubuntu 14.04 LTS / 16.04 LTS / 16.10 / 17.04 : firefox vulnerabilities (USN-3315-1)\");\n script_summary(english:\"Checks dpkg output for updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Ubuntu host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Multiple security issues were discovered in Firefox. If a user were\ntricked in to opening a specially crafted website, an attacker could\npotentially exploit these to cause a denial of service, read\nuninitialized memory, obtain sensitive information, spoof the\naddressbar contents, or execute arbitrary code. (CVE-2017-5470,\nCVE-2017-5471, CVE-2017-5472, CVE-2017-7749, CVE-2017-7750,\nCVE-2017-7751, CVE-2017-7752, CVE-2017-7754, CVE-2017-7756,\nCVE-2017-7757, CVE-2017-7758, CVE-2017-7762, CVE-2017-7764)\n\nMultiple security issues were discovered in the Graphite 2 library\nused by Firefox. If a user were tricked in to opening a specially\ncrafted website, an attacker could potentially exploit these to cause\na denial of service, read uninitialized memory, or execute arbitrary\ncode. (CVE-2017-7771, CVE-2017-7772, CVE-2017-7773, CVE-2017-7774,\nCVE-2017-7775, CVE-2017-7776, CVE-2017-7777, CVE-2017-7778).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/3315-1/\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected firefox package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:14.04\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:16.04\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:16.10\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:17.04\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/06/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/06/15\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/06/16\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2017-2019 Canonical, Inc. / NASL script (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(14\\.04|16\\.04|16\\.10|17\\.04)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 14.04 / 16.04 / 16.10 / 17.04\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"14.04\", pkgname:\"firefox\", pkgver:\"54.0+build3-0ubuntu0.14.04.1\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"firefox\", pkgver:\"54.0+build3-0ubuntu0.16.04.1\")) flag++;\nif (ubuntu_check(osver:\"16.10\", pkgname:\"firefox\", pkgver:\"54.0+build3-0ubuntu0.16.10.1\")) flag++;\nif (ubuntu_check(osver:\"17.04\", pkgname:\"firefox\", pkgver:\"54.0+build3-0ubuntu0.17.04.1\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"firefox\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-03-01T03:47:05", "description": "The version of Mozilla Firefox installed on the remote macOS or Mac\nOS X host is prior to 54. It is, therefore, affected by multiple\nvulnerabilities :\n\n - Multiple memory corruption issues exist that allow an\n unauthenticated, remote attacker to execute arbitrary\n code by convincing a user to visit a specially crafted\n website. (CVE-2017-5470, CVE-2017-5471)\n\n - A use-after-free error exists in the EndUpdate()\n function in nsCSSFrameConstructor.cpp that is triggered\n when reconstructing trees during regeneration of CSS\n layouts. An unauthenticated, remote attacker can exploit\n this, by convincing a user to visit a specially crafted\n website, to cause a denial of service condition or the\n execution of arbitrary code. (CVE-2017-5472)\n\n - A use-after-free error exists in the Reload() function\n in nsDocShell.cpp that is triggered when using an\n incorrect URL during the reload of a docshell. An\n unauthenticated, remote attacker can exploit this to\n cause a denial of service condition or the execution of\n arbitrary code. (CVE-2017-7749)\n\n - A use-after-free error exists in the Hide() function in\n nsDocumentViewer.cpp that is triggered when handling\n track elements. An unauthenticated, remote attacker can\n exploit this to cause a denial of service condition or\n the execution of arbitrary code. (CVE-2017-7750)\n\n - A use-after-free error exists in the nsDocumentViewer\n class in nsDocumentViewer.cpp that is triggered when\n handling content viewer listeners. An unauthenticated,\n remote attacker can exploit this to cause a denial of\n service condition or the execution of arbitrary code.\n (CVE-2017-7751)\n\n - A use-after-free error exists that is triggered when\n handling events while specific user interaction occurs\n with the input method editor (IME). An unauthenticated,\n remote attacker can exploit this to cause a denial of\n service condition or the execution of arbitrary code.\n (CVE-2017-7752)\n\n - An out-of-bounds read error exists in the IsComplete()\n function in WebGLTexture.cpp that is triggered when\n handling textures. An unauthenticated, remote attacker\n can exploit this to disclose memory contents.\n (CVE-2017-7754)\n\n - A privilege escalation vulnerability exists due to\n improper loading of dynamic-link library (DLL) files. A\n local attacker can exploit this, via a specially crafted\n DLL file in the installation path, to inject and execute\n arbitrary code. (CVE-2017-7755)\n\n - A use-after-free error exists in the SetRequestHead()\n function in XMLHttpRequestMainThread.cpp that is\n triggered when logging XML HTTP Requests (XHR). An\n unauthenticated, remote attacker can exploit this to\n cause a denial of service condition or the execution of\n arbitrary code. (CVE-2017-7756)\n\n - A use-after-free error exists in ActorsParent.cpp due to\n improper handling of objects in memory. An\n unauthenticated, remote attacker can exploit this to\n cause a denial of service condition or the execution of\n arbitrary code. (CVE-2017-7757)\n\n - An out-of-bounds read error exists in the\n AppendAudioSegment() function in TrackEncoder.cpp that\n is triggered when the number of channels in an audio\n stream changes while the Opus encoder is in use. An\n unauthenticated, remote attacker can exploit this to\n disclose sensitive information. (CVE-2017-7758)\n\n - A flaw exists in the NS_main() function in updater.cpp\n due to improper validation of input when handling\n callback file path parameters. A local attacker can\n exploit this to manipulate files in the installation\n directory. (CVE-2017-7760)\n\n - A flaw exists in the Maintenance Service helper.exe\n application that is triggered as permissions for a\n temporary directory are set to writable by\n non-privileged users. A local attacker can exploit this\n to delete arbitrary files on the system. (CVE-2017-7761)\n\n - A flaw exists that is triggered when displaying URLs\n including authentication sections in reader mode. An\n unauthenticated, remote attacker can exploit this, via a\n specially crafted URL, to spoof domains in the address\n bar. (CVE-2017-7762)\n\n - A flaw exists in the ReadCMAP() function in\n gfxMacPlatformFontList.mm that is triggered when\n handling tibetan characters in combination with macOS\n fonts. An unauthenticated, remote attacker can exploit\n this, via a specially crafted IDN domain, to spoof a\n valid URL. (CVE-2017-7763)\n\n - A flaw exists in the isLabelSafe() function in\n nsIDNService.cpp that is triggered when handling\n characters from different unicode blocks. An\n unauthenticated, remote attacker can exploit this, via a\n specially crafted IDN domain, to spoof a valid URL and\n conduct phishing attacks. (CVE-2017-7764)\n\n - Multiple integer overflow conditions exist in the\n Graphite component in the decompress() function in\n Decompressor.cpp due to improper validation of\n user-supplied input. An unauthenticated, remote attacker\n can exploit this to cause a denial of service condition\n or the execution of arbitrary code. (CVE-2017-7772,\n CVE-2017-7778)\n\n - An out-of-bounds read error exists in the Graphite\n component in the readGraphite() function in Silf.cpp. An\n unauthenticated, remote attacker can exploit this to\n cause a denial of service condition or disclose memory\n contents. (CVE-2017-7774)\n\n - An assertion flaw exists in the Graphite component when\n handling zero value sizes. An unauthenticated, remote\n attacker can exploit this to cause a denial of service\n condition. (CVE-2017-7775)\n\n - An out-of-bounds read error exists in the Graphite\n component in getClassGlyph() function in Silf.cpp due to\n improper validation of user-supplied input. An\n unauthenticated, remote attacker can exploit this to\n cause a denial of service condition. (CVE-2017-7776)\n\n - A flaw exists in the Graphite component in the\n read_glyph() function in GlyphCache.cpp related to use\n of uninitialized memory. An unauthenticated, remote\n attacker can exploit this to have an unspecified impact.\n (CVE-2017-7777)", "edition": 30, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2017-06-15T00:00:00", "title": "Mozilla Firefox < 54 Multiple Vulnerabilities (macOS)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-7772", "CVE-2017-7757", "CVE-2017-7754", "CVE-2017-7758", "CVE-2017-7755", "CVE-2017-7752", "CVE-2017-7763", "CVE-2017-7778", "CVE-2017-5472", "CVE-2017-7756", "CVE-2017-7761", "CVE-2017-7764", "CVE-2017-7749", "CVE-2017-5470", "CVE-2017-5471", "CVE-2017-7751", "CVE-2017-7750", "CVE-2017-7777", "CVE-2017-7762", "CVE-2017-7775", "CVE-2017-7760", "CVE-2017-7774", "CVE-2017-7776"], "modified": "2021-03-02T00:00:00", "cpe": ["cpe:/a:mozilla:firefox"], "id": "MACOSX_FIREFOX_54_0.NASL", "href": "https://www.tenable.com/plugins/nessus/100808", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(100808);\n script_version(\"1.5\");\n script_cvs_date(\"Date: 2019/11/13\");\n\n script_cve_id(\n \"CVE-2017-5470\",\n \"CVE-2017-5471\",\n \"CVE-2017-5472\",\n \"CVE-2017-7749\",\n \"CVE-2017-7750\",\n \"CVE-2017-7751\",\n \"CVE-2017-7752\",\n \"CVE-2017-7754\",\n \"CVE-2017-7755\",\n \"CVE-2017-7756\",\n \"CVE-2017-7757\",\n \"CVE-2017-7758\",\n \"CVE-2017-7760\",\n \"CVE-2017-7761\",\n \"CVE-2017-7762\",\n \"CVE-2017-7763\",\n \"CVE-2017-7764\",\n \"CVE-2017-7772\",\n \"CVE-2017-7774\",\n \"CVE-2017-7775\",\n \"CVE-2017-7776\",\n \"CVE-2017-7777\",\n \"CVE-2017-7778\"\n );\n script_bugtraq_id(\n 99040,\n 99041,\n 99042,\n 99047,\n 99057\n );\n script_xref(name:\"MFSA\", value:\"2017-15\");\n\n script_name(english:\"Mozilla Firefox < 54 Multiple Vulnerabilities (macOS)\");\n script_summary(english:\"Checks the version of Firefox.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"A web browser installed on the remote macOS or Mac OS X host is\naffected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Mozilla Firefox installed on the remote macOS or Mac\nOS X host is prior to 54. It is, therefore, affected by multiple\nvulnerabilities :\n\n - Multiple memory corruption issues exist that allow an\n unauthenticated, remote attacker to execute arbitrary\n code by convincing a user to visit a specially crafted\n website. (CVE-2017-5470, CVE-2017-5471)\n\n - A use-after-free error exists in the EndUpdate()\n function in nsCSSFrameConstructor.cpp that is triggered\n when reconstructing trees during regeneration of CSS\n layouts. An unauthenticated, remote attacker can exploit\n this, by convincing a user to visit a specially crafted\n website, to cause a denial of service condition or the\n execution of arbitrary code. (CVE-2017-5472)\n\n - A use-after-free error exists in the Reload() function\n in nsDocShell.cpp that is triggered when using an\n incorrect URL during the reload of a docshell. An\n unauthenticated, remote attacker can exploit this to\n cause a denial of service condition or the execution of\n arbitrary code. (CVE-2017-7749)\n\n - A use-after-free error exists in the Hide() function in\n nsDocumentViewer.cpp that is triggered when handling\n track elements. An unauthenticated, remote attacker can\n exploit this to cause a denial of service condition or\n the execution of arbitrary code. (CVE-2017-7750)\n\n - A use-after-free error exists in the nsDocumentViewer\n class in nsDocumentViewer.cpp that is triggered when\n handling content viewer listeners. An unauthenticated,\n remote attacker can exploit this to cause a denial of\n service condition or the execution of arbitrary code.\n (CVE-2017-7751)\n\n - A use-after-free error exists that is triggered when\n handling events while specific user interaction occurs\n with the input method editor (IME). An unauthenticated,\n remote attacker can exploit this to cause a denial of\n service condition or the execution of arbitrary code.\n (CVE-2017-7752)\n\n - An out-of-bounds read error exists in the IsComplete()\n function in WebGLTexture.cpp that is triggered when\n handling textures. An unauthenticated, remote attacker\n can exploit this to disclose memory contents.\n (CVE-2017-7754)\n\n - A privilege escalation vulnerability exists due to\n improper loading of dynamic-link library (DLL) files. A\n local attacker can exploit this, via a specially crafted\n DLL file in the installation path, to inject and execute\n arbitrary code. (CVE-2017-7755)\n\n - A use-after-free error exists in the SetRequestHead()\n function in XMLHttpRequestMainThread.cpp that is\n triggered when logging XML HTTP Requests (XHR). An\n unauthenticated, remote attacker can exploit this to\n cause a denial of service condition or the execution of\n arbitrary code. (CVE-2017-7756)\n\n - A use-after-free error exists in ActorsParent.cpp due to\n improper handling of objects in memory. An\n unauthenticated, remote attacker can exploit this to\n cause a denial of service condition or the execution of\n arbitrary code. (CVE-2017-7757)\n\n - An out-of-bounds read error exists in the\n AppendAudioSegment() function in TrackEncoder.cpp that\n is triggered when the number of channels in an audio\n stream changes while the Opus encoder is in use. An\n unauthenticated, remote attacker can exploit this to\n disclose sensitive information. (CVE-2017-7758)\n\n - A flaw exists in the NS_main() function in updater.cpp\n due to improper validation of input when handling\n callback file path parameters. A local attacker can\n exploit this to manipulate files in the installation\n directory. (CVE-2017-7760)\n\n - A flaw exists in the Maintenance Service helper.exe\n application that is triggered as permissions for a\n temporary directory are set to writable by\n non-privileged users. A local attacker can exploit this\n to delete arbitrary files on the system. (CVE-2017-7761)\n\n - A flaw exists that is triggered when displaying URLs\n including authentication sections in reader mode. An\n unauthenticated, remote attacker can exploit this, via a\n specially crafted URL, to spoof domains in the address\n bar. (CVE-2017-7762)\n\n - A flaw exists in the ReadCMAP() function in\n gfxMacPlatformFontList.mm that is triggered when\n handling tibetan characters in combination with macOS\n fonts. An unauthenticated, remote attacker can exploit\n this, via a specially crafted IDN domain, to spoof a\n valid URL. (CVE-2017-7763)\n\n - A flaw exists in the isLabelSafe() function in\n nsIDNService.cpp that is triggered when handling\n characters from different unicode blocks. An\n unauthenticated, remote attacker can exploit this, via a\n specially crafted IDN domain, to spoof a valid URL and\n conduct phishing attacks. (CVE-2017-7764)\n\n - Multiple integer overflow conditions exist in the\n Graphite component in the decompress() function in\n Decompressor.cpp due to improper validation of\n user-supplied input. An unauthenticated, remote attacker\n can exploit this to cause a denial of service condition\n or the execution of arbitrary code. (CVE-2017-7772,\n CVE-2017-7778)\n\n - An out-of-bounds read error exists in the Graphite\n component in the readGraphite() function in Silf.cpp. An\n unauthenticated, remote attacker can exploit this to\n cause a denial of service condition or disclose memory\n contents. (CVE-2017-7774)\n\n - An assertion flaw exists in the Graphite component when\n handling zero value sizes. An unauthenticated, remote\n attacker can exploit this to cause a denial of service\n condition. (CVE-2017-7775)\n\n - An out-of-bounds read error exists in the Graphite\n component in getClassGlyph() function in Silf.cpp due to\n improper validation of user-supplied input. An\n unauthenticated, remote attacker can exploit this to\n cause a denial of service condition. (CVE-2017-7776)\n\n - A flaw exists in the Graphite component in the\n read_glyph() function in GlyphCache.cpp related to use\n of uninitialized memory. An unauthenticated, remote\n attacker can exploit this to have an unspecified impact.\n (CVE-2017-7777)\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2017-15/\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Mozilla Firefox version 54 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2017-7778\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/06/13\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/06/13\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/06/15\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:mozilla:firefox\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"MacOS X Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"macosx_firefox_installed.nasl\");\n script_require_keys(\"MacOSX/Firefox/Installed\");\n\n exit(0);\n}\n\ninclude(\"mozilla_version.inc\");\n\nkb_base = \"MacOSX/Firefox\";\nget_kb_item_or_exit(kb_base+\"/Installed\");\n\nversion = get_kb_item_or_exit(kb_base+\"/Version\", exit_code:1);\npath = get_kb_item_or_exit(kb_base+\"/Path\", exit_code:1);\n\nif (get_kb_item(kb_base + '/is_esr')) exit(0, 'The Mozilla Firefox installation is in the ESR branch.');\n\nmozilla_check_version(product:'firefox', version:version, path:path, esr:FALSE, fix:'54', severity:SECURITY_HOLE);\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-06T10:53:01", "description": "Mozilla Foundation reports :\n\nPlease reference CVE/URL list for details", "edition": 29, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2017-06-14T00:00:00", "title": "FreeBSD : mozilla -- multiple vulnerabilities (6cec1b0a-da15-467d-8691-1dea392d4c8d)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-7757", "CVE-2017-7754", "CVE-2017-7758", "CVE-2017-7755", "CVE-2017-7752", "CVE-2017-7765", "CVE-2017-7763", "CVE-2017-7766", "CVE-2017-7778", "CVE-2017-5472", "CVE-2017-7759", "CVE-2017-7756", "CVE-2017-7761", "CVE-2017-7767", "CVE-2017-7764", "CVE-2017-7749", "CVE-2017-5470", "CVE-2017-5471", "CVE-2017-7751", "CVE-2017-7750", "CVE-2017-7762", "CVE-2017-7760", "CVE-2017-7768"], "modified": "2017-06-14T00:00:00", "cpe": ["p-cpe:/a:freebsd:freebsd:linux-thunderbird", "p-cpe:/a:freebsd:freebsd:linux-firefox", "cpe:/o:freebsd:freebsd", "p-cpe:/a:freebsd:freebsd:libxul", "p-cpe:/a:freebsd:freebsd:seamonkey", "p-cpe:/a:freebsd:freebsd:linux-seamonkey", "p-cpe:/a:freebsd:freebsd:firefox", "p-cpe:/a:freebsd:freebsd:thunderbird", "p-cpe:/a:freebsd:freebsd:firefox-esr"], "id": "FREEBSD_PKG_6CEC1B0ADA15467D86911DEA392D4C8D.NASL", "href": "https://www.tenable.com/plugins/nessus/100775", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2019 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(100775);\n script_version(\"3.11\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2017-5470\", \"CVE-2017-5471\", \"CVE-2017-5472\", \"CVE-2017-7749\", \"CVE-2017-7750\", \"CVE-2017-7751\", \"CVE-2017-7752\", \"CVE-2017-7754\", \"CVE-2017-7755\", \"CVE-2017-7756\", \"CVE-2017-7757\", \"CVE-2017-7758\", \"CVE-2017-7759\", \"CVE-2017-7760\", \"CVE-2017-7761\", \"CVE-2017-7762\", \"CVE-2017-7763\", \"CVE-2017-7764\", \"CVE-2017-7765\", \"CVE-2017-7766\", \"CVE-2017-7767\", \"CVE-2017-7768\", \"CVE-2017-7778\");\n\n script_name(english:\"FreeBSD : mozilla -- multiple vulnerabilities (6cec1b0a-da15-467d-8691-1dea392d4c8d)\");\n script_summary(english:\"Checks for updated packages in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote FreeBSD host is missing one or more security-related\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Mozilla Foundation reports :\n\nPlease reference CVE/URL list for details\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2017-15/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2017-16/\"\n );\n # https://vuxml.freebsd.org/freebsd/6cec1b0a-da15-467d-8691-1dea392d4c8d.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?0775f4b7\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:firefox\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:firefox-esr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:libxul\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:linux-firefox\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:linux-seamonkey\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:linux-thunderbird\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:seamonkey\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:thunderbird\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/06/13\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/06/13\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/06/14\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"firefox<54.0,1\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"seamonkey<2.49.1\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"linux-seamonkey<2.49.1\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"firefox-esr<52.2.0,1\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"linux-firefox<52.2.0,2\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"libxul<52.2.0\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"thunderbird<52.2.0\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"linux-thunderbird<52.2.0\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:pkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "oraclelinux": [{"lastseen": "2019-05-29T18:38:21", "bulletinFamily": "unix", "cvelist": ["CVE-2018-12360", "CVE-2018-12362", "CVE-2018-12359", "CVE-2018-5156", "CVE-2018-5188", "CVE-2017-5428", "CVE-2018-12366", "CVE-2017-7762", "CVE-2018-12365", "CVE-2018-12363", "CVE-2018-12364", "CVE-2018-6126"], "description": "[60.1.0-4.0.1]\n- Add firefox-oracle-default-prefs.js and remove the corresponding Red Hat file\n[60.1.0-4]\n- Disabled jemalloc on all second arches\n[60.1.0-3]\n- Updated to 60.1.0 ESR build2\n[60.1.0-2]\n- Disabled jemalloc on second arches\n[60.1.0-1]\n- Updated to 60.1.0 ESR\n[60.0-12]\n- Fixing bundled libffi issues\n- Readded some requirements\n[60.0-10]\n- Added fix for mozilla BZ#1436242 - IPC crashes.\n[60.0-9]\n- Bundling libffi for the sec-arches\n- Added openssl-devel for the Python\n- Fixing bundled gtk3\n[60.0-8]\n- Added fix for mozilla BZ#1458492\n[60.0-7]\n- Added patch from rhbz#1498561 to fix ppc64(le) crashes.\n[60.0-6]\n- Disabled jemalloc on second arches\n[60.0-4]\n- Update to 60.0 ESR\n[52.7.0-1]\n- Update to 52.7.0 ESR\n[52.6.0-2]\n- Build Firefox for desktop arches only (x86_64 and ppc64le)\n[52.6.0-1]\n- Update to 52.6.0 ESR\n[52.5.0-1]\n- Update to 52.5.0 ESR\n[52.4.0-1]\n- Update to 52.4.0 ESR\n[52.3.0-3]\n- Update to 52.3.0 ESR (b2)\n- Require correct nss version\n[52.2.0-1]\n- Update to 52.2.0 ESR\n[52.1.2-1]\n- Update to 52.1.2 ESR\n[52.0-7]\n- Added fix for accept language (rhbz#1454322)\n[52.0-6]\n- Removing patch required for older NSS from RHEL 7.3\n- Added patch for rhbz#1414564\n[52.0-5]\n- Added fix for mozbz#1348168/CVE-2017-5428\n[52.0-4]\n- Update to 52.0 ESR (b4)\n[52.0-3]\n- Added fix for rhbz#1423012 - ppc64 gfx crashes\n[52.0-2]\n- Enable system nss\n[52.0-1]\n- Update to 52.0ESR (B1)\n- Build RHEL7 package for Gtk3\n[52.0-0.13]\n- Added fix for rhbz#1414535\n[52.0-0.12]\n- Update to 52.0b8\n[52.0-0.11]\n- Readded addons patch\n[52.0-0.10]\n- Update to 52.0b3\n[52.0-0.9]\n- Update to 52.0b2\n[52.0-0.8]\n- Update to 52.0b1\n[52.0-0.5]\n- Firefox Aurora 52 testing build", "edition": 7, "modified": "2018-07-04T00:00:00", "published": "2018-07-04T00:00:00", "id": "ELSA-2018-2113", "href": "http://linux.oracle.com/errata/ELSA-2018-2113.html", "title": "firefox security update", "type": "oraclelinux", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "ubuntu": [{"lastseen": "2020-07-02T11:42:50", "bulletinFamily": "unix", "cvelist": ["CVE-2017-7772", "CVE-2017-7757", "CVE-2017-7754", "CVE-2017-7758", "CVE-2017-7773", "CVE-2017-7752", "CVE-2017-7778", "CVE-2017-5472", "CVE-2017-7756", "CVE-2017-7764", "CVE-2017-7771", "CVE-2017-7749", "CVE-2017-5470", "CVE-2017-5471", "CVE-2017-7751", "CVE-2017-7750", "CVE-2017-7777", "CVE-2017-7762", "CVE-2017-7775", "CVE-2017-7774", "CVE-2017-7776"], "description": "Multiple security issues were discovered in Firefox. If a user were \ntricked in to opening a specially crafted website, an attacker could \npotentially exploit these to cause a denial of service, read uninitialized \nmemory, obtain sensitive information, spoof the addressbar contents, or \nexecute arbitrary code. (CVE-2017-5470, CVE-2017-5471, CVE-2017-5472, \nCVE-2017-7749, CVE-2017-7750, CVE-2017-7751, CVE-2017-7752, CVE-2017-7754, \nCVE-2017-7756, CVE-2017-7757, CVE-2017-7758, CVE-2017-7762, CVE-2017-7764)\n\nMultiple security issues were discovered in the Graphite 2 library used by \nFirefox. If a user were tricked in to opening a specially crafted website, \nan attacker could potentially exploit these to cause a denial of service, \nread uninitialized memory, or execute arbitrary code. (CVE-2017-7771, \nCVE-2017-7772, CVE-2017-7773, CVE-2017-7774, CVE-2017-7775, CVE-2017-7776, \nCVE-2017-7777, CVE-2017-7778)", "edition": 7, "modified": "2017-06-15T00:00:00", "published": "2017-06-15T00:00:00", "id": "USN-3315-1", "href": "https://ubuntu.com/security/notices/USN-3315-1", "title": "Firefox vulnerabilities", "type": "ubuntu", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "archlinux": [{"lastseen": "2020-09-22T18:36:43", "bulletinFamily": "unix", "cvelist": ["CVE-2017-5470", "CVE-2017-5471", "CVE-2017-5472", "CVE-2017-7749", "CVE-2017-7750", "CVE-2017-7751", "CVE-2017-7752", "CVE-2017-7754", "CVE-2017-7756", "CVE-2017-7757", "CVE-2017-7758", "CVE-2017-7762", "CVE-2017-7764", "CVE-2017-7771", "CVE-2017-7772", "CVE-2017-7773", "CVE-2017-7774", "CVE-2017-7775", "CVE-2017-7776", "CVE-2017-7777", "CVE-2017-7778"], "description": "Arch Linux Security Advisory ASA-201706-19\n==========================================\n\nSeverity: Critical\nDate : 2017-06-16\nCVE-ID : CVE-2017-5470 CVE-2017-5471 CVE-2017-5472 CVE-2017-7749\nCVE-2017-7750 CVE-2017-7751 CVE-2017-7752 CVE-2017-7754\nCVE-2017-7756 CVE-2017-7757 CVE-2017-7758 CVE-2017-7762\nCVE-2017-7764 CVE-2017-7771 CVE-2017-7772 CVE-2017-7773\nCVE-2017-7774 CVE-2017-7775 CVE-2017-7776 CVE-2017-7777\nCVE-2017-7778\nPackage : firefox\nType : multiple issues\nRemote : Yes\nLink : https://security.archlinux.org/AVG-302\n\nSummary\n=======\n\nThe package firefox before version 54.0-1 is vulnerable to multiple\nissues including arbitrary code execution, denial of service,\ninformation disclosure and content spoofing.\n\nResolution\n==========\n\nUpgrade to 54.0-1.\n\n# pacman -Syu \"firefox>=54.0-1\"\n\nThe problems have been fixed upstream in version 54.0.\n\nWorkaround\n==========\n\nNone.\n\nDescription\n===========\n\n- CVE-2017-5470 (arbitrary code execution)\n\nSeveral memory safety issues leading to arbitrary code execution have\nbeen found in Firefox < 54.0 and Thunderbird < 52.2.\n\n- CVE-2017-5471 (arbitrary code execution)\n\nSeveral memory safety issues leading to arbitrary code execution have\nbeen found in Firefox < 54.0.\n\n- CVE-2017-5472 (arbitrary code execution)\n\nA use-after-free vulnerability has been found in Firefox < 54.0 and\nThunderbird < 52.2, in the frameloader during tree reconstruction while\nregenerating CSS layout when attempting to use a node in the tree that\nno longer exists.\n\n- CVE-2017-7749 (arbitrary code execution)\n\nA user-after-free has been found in Firefox < 54.0 and Thunderbird <\n52.2, when using an incorrect URL during the reloading of a docshell.\n\n- CVE-2017-7750 (arbitrary code execution)\n\nA use-after-free has been found in Firefox < 54.0 and Thunderbird <\n52.2, during video control operations when a <track> element holds a\nreference to an older window if that window has been replaced in the\nDOM.\n\n- CVE-2017-7751 (arbitrary code execution)\n\nA use-after-free has been found in Firefox < 54.0 and Thunderbird <\n52.2, in content viewer listeners.\n\n- CVE-2017-7752 (arbitrary code execution)\n\nA use-after-free has been found in Firefox < 54.0 and Thunderbird <\n52.2, during specific user interactions with the input method editor\n(IME) in some languages due to how events are handled. This results in\na potentially exploitable crash but would require specific user\ninteraction to trigger.\n\n- CVE-2017-7754 (information disclosure)\n\nAn out-of-bounds read has been found in Firefox < 54.0 and Thunderbird\n< 52.2, with a maliciously crafted ImageInfo object during WebGL\noperations.\n\n- CVE-2017-7756 (arbitrary code execution)\n\nA use after-free and use-after-scope vulnerability has been found in\nFirefox < 54.0 and Thunderbird < 52.2, when logging errors from headers\nfor XML HTTP Requests (XHR).\n\n- CVE-2017-7757 (arbitrary code execution)\n\nA use after-free vulnerability has been found in Firefox < 54.0 and\nThunderbird < 52.2, in IndexedDB when one of its objects is destroyed\nin memory while a method on it is still being executed.\n\n- CVE-2017-7758 (information disclosure)\n\nAn out-of-bounds read vulnerability has been found in Firefox < 54.0\nand Thunderbird < 52.2, with the Opus encoder when the number of\nchannels in an audio stream changes while the encoder is in use.\n\n- CVE-2017-7762 (content spoofing)\n\nA security issue has been found in Firefox < 54.0. When entered\ndirectly, Reader Mode did not strip the username and password section\nof URLs displayed in the addressbar. This can be used for spoofing the\ndomain of the current page.\n\n- CVE-2017-7764 (content spoofing)\n\nA security issue has been found in Firefox < 54.0 and Thunderbird <\n52.2, where characters from the \"Canadian Syllabics\" unicode block can\nbe mixed with characters from other unicode blocks in the addressbar\ninstead of being rendered as their raw \"punycode\" form, allowing for\ndomain name spoofing attacks through character confusion. The current\nUnicode standard allows characters from \"Aspirational Use Scripts\" such\nas Canadian Syllabics to be mixed with Latin characters in the\n\"moderately restrictive\" IDN profile. Firefox and Thunderbird behavior\nhas been changed to match the upcoming Unicode version 10.0 which\nremoves this category and treats them as \"Limited Use Scripts.\"\n\n- CVE-2017-7771 (information disclosure)\n\nAn out-of-bounds read has been found in the Graphite 2 library used in\nFirefox < 54.0 and Thunderbird < 52.2, in Pass::readPass.\n\n- CVE-2017-7772 (arbitrary code execution)\n\nA heap-buffer-overflow write has been found in the Graphite 2 library\nused in Firefox < 54.0 and Thunderbird < 52.2, in lz4::decompress.\n\n- CVE-2017-7773 (arbitrary code execution)\n\nA heap-buffer-overflow write has been found in the Graphite 2 library\nused in Firefox < 54.0 and Thunderbird < 52.2, in lz4::decompress.\n\n- CVE-2017-7774 (information disclosure)\n\nAn out-of-bounds read has been found in the Graphite 2 library used in\nFirefox < 54.0 and Thunderbird < 52.2, in Silf::readGraphite.\n\n- CVE-2017-7775 (denial of service)\n\nAn assertion failure has been found in the Graphite 2 library used in\nFirefox < 54.0 and Thunderbird < 52.2.\n\n- CVE-2017-7776 (information disclosure)\n\nA heap-buffer-overflow read has been found in the Graphite 2 library\nused in Firefox < 54.0 and Thunderbird < 52.2, in Silf::getClassGlyph.\n\n- CVE-2017-7777 (information disclosure)\n\nAn use of initialized memory has been found in the Graphite 2 library\nused in Firefox < 54.0 and Thunderbird < 52.2, in\nGlyphCache::Loader::read_glyph.\n\n- CVE-2017-7778 (arbitrary code execution)\n\nAn out-of-bounds write has been found in the Graphite 2 library used in\nFirefox < 54.0 and Thunderbird < 52.2, in lz4::decompress.\n\nImpact\n======\n\nA remote attacker may be able to crash Firefox, access sensitive\ninformation, spoof content to trick the user into performing an\nunwanted action and execute arbitrary code on the affected host.\n\nReferences\n==========\n\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2017-15/\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2017-15/#CVE-2017-5470\nhttps://bugzilla.mozilla.org/buglist.cgi?bug_id=1359639%2C1349595%2C1352295%2C1352556%2C1342552%2C1342567%2C1346012%2C1366140%2C1368732%2C1297111%2C1362590%2C1357462%2C1363280%2C1349266%2C1352093%2C1348424%2C1347748%2C1356025%2C1325513%2C1367692\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2017-15/#CVE-2017-5471\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2017-15/#CVE-2017-5472\nhttps://bugzilla.mozilla.org/show_bug.cgi?id=1365602\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2017-15/#CVE-2017-7749\nhttps://bugzilla.mozilla.org/show_bug.cgi?id=1355039\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2017-15/#CVE-2017-7750\nhttps://bugzilla.mozilla.org/show_bug.cgi?id=1356558\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2017-15/#CVE-2017-7751\nhttps://bugzilla.mozilla.org/show_bug.cgi?id=1363396\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2017-15/#CVE-2017-7752\nhttps://bugzilla.mozilla.org/show_bug.cgi?id=1359547\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2017-15/#CVE-2017-7754\nhttps://bugzilla.mozilla.org/show_bug.cgi?id=1357090\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2017-15/#CVE-2017-7756\nhttps://bugzilla.mozilla.org/show_bug.cgi?id=1366595\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2017-15/#CVE-2017-7757\nhttps://bugzilla.mozilla.org/show_bug.cgi?id=1356824\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2017-15/#CVE-2017-7758\nhttps://bugzilla.mozilla.org/show_bug.cgi?id=1368490\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2017-15/#CVE-2017-7762\nhttps://bugzilla.mozilla.org/show_bug.cgi?id=1358248\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2017-15/#CVE-2017-7764\nhttps://bugzilla.mozilla.org/show_bug.cgi?id=1364283\nhttp://www.unicode.org/reports/tr31/tr31-26.html#Aspirational_Use_Scripts\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2017-15/#CVE-2017-7778\nhttps://bugzilla.mozilla.org/show_bug.cgi?id=1350047\nhttps://bugzilla.mozilla.org/show_bug.cgi?id=1352745\nhttps://bugzilla.mozilla.org/show_bug.cgi?id=1352747\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2017-17/#CVE-2017-7778\nhttps://bugzilla.mozilla.org/show_bug.cgi?id=1355174\nhttps://bugzilla.mozilla.org/show_bug.cgi?id=1355182\nhttps://bugzilla.mozilla.org/show_bug.cgi?id=1356607\nhttps://bugzilla.mozilla.org/show_bug.cgi?id=1358551\nhttps://bugzilla.mozilla.org/show_bug.cgi?id=1349310\nhttps://security.archlinux.org/CVE-2017-5470\nhttps://security.archlinux.org/CVE-2017-5471\nhttps://security.archlinux.org/CVE-2017-5472\nhttps://security.archlinux.org/CVE-2017-7749\nhttps://security.archlinux.org/CVE-2017-7750\nhttps://security.archlinux.org/CVE-2017-7751\nhttps://security.archlinux.org/CVE-2017-7752\nhttps://security.archlinux.org/CVE-2017-7754\nhttps://security.archlinux.org/CVE-2017-7756\nhttps://security.archlinux.org/CVE-2017-7757\nhttps://security.archlinux.org/CVE-2017-7758\nhttps://security.archlinux.org/CVE-2017-7762\nhttps://security.archlinux.org/CVE-2017-7764\nhttps://security.archlinux.org/CVE-2017-7771\nhttps://security.archlinux.org/CVE-2017-7772\nhttps://security.archlinux.org/CVE-2017-7773\nhttps://security.archlinux.org/CVE-2017-7774\nhttps://security.archlinux.org/CVE-2017-7775\nhttps://security.archlinux.org/CVE-2017-7776\nhttps://security.archlinux.org/CVE-2017-7777\nhttps://security.archlinux.org/CVE-2017-7778", "modified": "2017-06-16T00:00:00", "published": "2017-06-16T00:00:00", "id": "ASA-201706-19", "href": "https://security.archlinux.org/ASA-201706-19", "type": "archlinux", "title": "[ASA-201706-19] firefox: multiple issues", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "freebsd": [{"lastseen": "2019-05-29T18:32:15", "bulletinFamily": "unix", "cvelist": ["CVE-2017-7757", "CVE-2017-7754", "CVE-2017-7758", "CVE-2017-7755", "CVE-2017-7752", "CVE-2017-7765", "CVE-2017-7763", "CVE-2017-7766", "CVE-2017-7778", "CVE-2017-5472", "CVE-2017-7759", "CVE-2017-7756", "CVE-2017-7761", "CVE-2017-7767", "CVE-2017-7764", "CVE-2017-7749", "CVE-2017-5470", "CVE-2017-5471", "CVE-2017-7751", "CVE-2017-7750", "CVE-2017-7762", "CVE-2017-7760", "CVE-2017-7768"], "description": "\nMozilla Foundation reports:\n\nPlease reference CVE/URL list for details\n\n", "edition": 8, "modified": "2017-09-19T00:00:00", "published": "2017-06-13T00:00:00", "id": "6CEC1B0A-DA15-467D-8691-1DEA392D4C8D", "href": "https://vuxml.freebsd.org/freebsd/6cec1b0a-da15-467d-8691-1dea392d4c8d.html", "title": "mozilla -- multiple vulnerabilities", "type": "freebsd", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "kaspersky": [{"lastseen": "2020-09-02T12:00:20", "bulletinFamily": "info", "cvelist": ["CVE-2017-7772", "CVE-2017-7757", "CVE-2017-7754", "CVE-2017-7758", "CVE-2017-7755", "CVE-2017-7773", "CVE-2017-7752", "CVE-2017-7765", "CVE-2017-7763", "CVE-2017-7766", "CVE-2017-7778", "CVE-2017-5472", "CVE-2017-7759", "CVE-2017-7756", "CVE-2017-7761", "CVE-2017-7767", "CVE-2017-7764", "CVE-2017-7771", "CVE-2017-7770", "CVE-2017-7749", "CVE-2017-5470", "CVE-2017-5471", "CVE-2017-7751", "CVE-2017-7750", "CVE-2017-7777", "CVE-2017-7762", "CVE-2017-7775", "CVE-2017-7760", "CVE-2017-7774", "CVE-2017-7776", "CVE-2017-7768"], "description": "### *Detect date*:\n06/13/2017\n\n### *Severity*:\nCritical\n\n### *Description*:\nMultiple serious vulnerabilities have been found in Firefox and Firefox ESR. Malicious users can exploit these vulnerabilities to gain privileges, cause a denial of service, read and write local files, spoof user interface and bypass security restrictions.\n\n### *Affected products*:\nMozilla Firefox versions earlier than 54 \nMozilla Firefox ESR versions earlier than 52.2\n\n### *Solution*:\nUpdate to the latest version \n[Download Mozilla Firefox ESR](<https://www.mozilla.org/en-US/firefox/organizations/all/>) \n[Download Mozilla Firefox](<https://www.mozilla.org/en-US/firefox/new/>)\n\n### *Original advisories*:\n[MFSA 2017-16](<https://www.mozilla.org/en-US/security/advisories/mfsa2017-16/>) \n[MFSA 2017-15](<https://www.mozilla.org/en-US/security/advisories/mfsa2017-15/>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Mozilla Firefox](<https://threats.kaspersky.com/en/product/Mozilla-Firefox/>)\n\n### *CVE-IDS*:\n[CVE-2017-5472](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5472>)9.8Critical \n[CVE-2017-7749](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7749>)9.8Critical \n[CVE-2017-7750](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7750>)9.8Critical \n[CVE-2017-7751](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7751>)9.8Critical \n[CVE-2017-7755](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7755>)7.8Critical \n[CVE-2017-7752](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7752>)8.8Critical \n[CVE-2017-7754](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7754>)7.5Critical \n[CVE-2017-7756](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7756>)9.8Critical \n[CVE-2017-7757](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7757>)9.8Critical \n[CVE-2017-7778](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7778>)9.8Critical \n[CVE-2017-7771](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7771>)0.0Unknown \n[CVE-2017-7772](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7772>)0.0Unknown \n[CVE-2017-7773](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7773>)0.0Unknown \n[CVE-2017-7774](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7774>)0.0Unknown \n[CVE-2017-7775](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7775>)0.0Unknown \n[CVE-2017-7776](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7776>)0.0Unknown \n[CVE-2017-7777](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7777>)0.0Unknown \n[CVE-2017-7758](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7758>)9.1Critical \n[CVE-2017-7763](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7763>)5.3High \n[CVE-2017-7764](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7764>)5.3High \n[CVE-2017-7765](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7765>)7.5Critical \n[CVE-2017-5470](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5470>)9.8Critical \n[CVE-2017-7759](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7759>)7.5Critical \n[CVE-2017-7760](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7760>)7.8Critical \n[CVE-2017-7761](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7761>)5.5High \n[CVE-2017-7762](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7762>)7.5Critical \n[CVE-2017-7766](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7766>)7.8Critical \n[CVE-2017-7767](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7767>)5.5High \n[CVE-2017-7768](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7768>)5.5High \n[CVE-2017-7770](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7770>)5.9High \n[CVE-2017-5471](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5471>)9.8Critical", "edition": 50, "modified": "2020-05-22T00:00:00", "published": "2017-06-13T00:00:00", "id": "KLA11044", "href": "https://threats.kaspersky.com/en/vulnerability/KLA11044", "title": "\r KLA11044Multiple vulnerabilities in Mozilla Firefox and Mozilla Firefox ESR ", "type": "kaspersky", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}]}