firefox -- arbitrary code execution from sidebar panel
2005-03-03T00:00:00
ID 741F8841-9C6B-11D9-9DBE-000A95BC6FAE Type freebsd Reporter FreeBSD Modified 2005-03-03T00:00:00
Description
A Mozilla Foundation Security Advisory states:
If a user bookmarked a malicious page as a Firefox
sidebar panel that page could execute arbitrary programs
by opening a privileged page and injecting javascript into
it.
{"cve": [{"lastseen": "2019-05-29T18:08:13", "bulletinFamily": "NVD", "description": "Firefox before 1.0.2 allows remote attackers to execute arbitrary code by tricking a user into saving a page as a Firefox sidebar panel, then using the sidebar panel to inject Javascript into a privileged page.", "modified": "2017-10-11T01:29:00", "id": "CVE-2005-0402", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-0402", "published": "2005-05-02T04:00:00", "title": "CVE-2005-0402", "type": "cve", "cvss": {"score": 2.6, "vector": "AV:N/AC:H/Au:N/C:N/I:P/A:N"}}], "openvas": [{"lastseen": "2017-07-02T21:10:12", "bulletinFamily": "scanner", "description": "The remote host is missing an update to the system\nas announced in the referenced advisory.", "modified": "2016-09-19T00:00:00", "published": "2008-09-04T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=52150", "id": "OPENVAS:52150", "title": "FreeBSD Ports: firefox", "type": "openvas", "sourceData": "#\n#VID 741f8841-9c6b-11d9-9dbe-000a95bc6fae\n# OpenVAS Vulnerability Test\n# $\n# Description: Auto generated from vuxml or freebsd advisories\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The following packages are affected:\n firefox\n linux-firefox\n\nCVE-2005-0402\nFirefox before 1.0.2 allows remote attackers to execute arbitrary code\nby tricking a user into saving a page as a Firefox sidebar panel, then\nusing the sidebar panel to inject Javascript into a privileged page.\";\ntag_solution = \"Update your system with the appropriate patches or\nsoftware upgrades.\n\nhttp://www.mozilla.org/security/announce/mfsa2005-31.html\nhttp://www.vuxml.org/freebsd/741f8841-9c6b-11d9-9dbe-000a95bc6fae.html\";\ntag_summary = \"The remote host is missing an update to the system\nas announced in the referenced advisory.\";\n\n\nif(description)\n{\n script_id(52150);\n script_version(\"$Revision: 4112 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2016-09-19 15:17:59 +0200 (Mon, 19 Sep 2016) $\");\n script_tag(name:\"creation_date\", value:\"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)\");\n script_cve_id(\"CVE-2005-0402\");\n script_tag(name:\"cvss_base\", value:\"2.6\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:H/Au:N/C:N/I:P/A:N\");\n script_name(\"FreeBSD Ports: firefox\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"FreeBSD Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/freebsdrel\", \"login/SSH/success\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-bsd.inc\");\n\ntxt = \"\";\nvuln = 0;\nbver = portver(pkg:\"firefox\");\nif(!isnull(bver) && revcomp(a:bver, b:\"1.0.2,1\")<0) {\n txt += 'Package firefox version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\nbver = portver(pkg:\"linux-firefox\");\nif(!isnull(bver) && revcomp(a:bver, b:\"1.0.2\")<0) {\n txt += 'Package linux-firefox version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\n\nif(vuln) {\n security_message(data:string(txt));\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 2.6, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2017-07-24T12:50:20", "bulletinFamily": "scanner", "description": "The remote host is missing updates announced in\nadvisory GLSA 200503-31.", "modified": "2017-07-07T00:00:00", "published": "2008-09-24T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=54896", "id": "OPENVAS:54896", "title": "Gentoo Security Advisory GLSA 200503-31 (Firefox)", "type": "openvas", "sourceData": "# OpenVAS Vulnerability Test\n# $\n# Description: Auto generated from Gentoo's XML based advisory\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Mozilla Firefox 1.0.2 fixes new security vulnerabilities, including the\nremote execution of arbitrary code through malicious GIF images or\nsidebars.\";\ntag_solution = \"All Mozilla Firefox users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose\n'>=www-client/mozilla-firefox-1.0.2'\n\nAll Mozilla Firefox binary users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose\n'>=www-client/mozilla-firefox-bin-1.0.2'\n\nhttp://www.securityspace.com/smysecure/catid.html?in=GLSA%20200503-31\nhttp://bugs.gentoo.org/show_bug.cgi?id=86148\nhttp://www.mozilla.org/projects/security/known-vulnerabilities.html\";\ntag_summary = \"The remote host is missing updates announced in\nadvisory GLSA 200503-31.\";\n\n \n\nif(description)\n{\n script_id(54896);\n script_version(\"$Revision: 6596 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 11:21:37 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)\");\n script_cve_id(\"CVE-2005-0399\", \"CVE-2005-0401\", \"CVE-2005-0402\");\n script_tag(name:\"cvss_base\", value:\"5.1\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:H/Au:N/C:P/I:P/A:P\");\n script_name(\"Gentoo Security Advisory GLSA 200503-31 (Firefox)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Gentoo Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/gentoo\", \"ssh/login/pkg\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-gentoo.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = ispkgvuln(pkg:\"www-client/mozilla-firefox\", unaffected: make_list(\"ge 1.0.2\"), vulnerable: make_list(\"lt 1.0.2\"))) != NULL) {\n report += res;\n}\nif ((res = ispkgvuln(pkg:\"www-client/mozilla-firefox-bin\", unaffected: make_list(\"ge 1.0.2\"), vulnerable: make_list(\"lt 1.0.2\"))) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 5.1, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "nessus": [{"lastseen": "2019-11-01T02:38:40", "bulletinFamily": "scanner", "description": "A Mozilla Foundation Security Advisory states :\n\nIf a user bookmarked a malicious page as a Firefox sidebar panel that\npage could execute arbitrary programs by opening a privileged page and\ninjecting JavaScript into it.", "modified": "2019-11-02T00:00:00", "id": "FREEBSD_PKG_741F88419C6B11D99DBE000A95BC6FAE.NASL", "href": "https://www.tenable.com/plugins/nessus/18983", "published": "2005-07-13T00:00:00", "title": "FreeBSD : firefox -- arbitrary code execution from sidebar panel (741f8841-9c6b-11d9-9dbe-000a95bc6fae)", "type": "nessus", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2018 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(18983);\n script_version(\"1.15\");\n script_cvs_date(\"Date: 2019/08/02 13:32:37\");\n\n script_cve_id(\"CVE-2005-0402\");\n\n script_name(english:\"FreeBSD : firefox -- arbitrary code execution from sidebar panel (741f8841-9c6b-11d9-9dbe-000a95bc6fae)\");\n script_summary(english:\"Checks for updated packages in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote FreeBSD host is missing one or more security-related\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"A Mozilla Foundation Security Advisory states :\n\nIf a user bookmarked a malicious page as a Firefox sidebar panel that\npage could execute arbitrary programs by opening a privileged page and\ninjecting JavaScript into it.\"\n );\n # http://www.mozilla.org/security/announce/mfsa2005-31.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2005-31/\"\n );\n # https://vuxml.freebsd.org/freebsd/741f8841-9c6b-11d9-9dbe-000a95bc6fae.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?b214992e\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:H/Au:N/C:N/I:P/A:N\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:firefox\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:linux-firefox\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2005/03/03\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/03/24\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2005/07/13\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2005-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"firefox<1.0.2,1\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"linux-firefox<1.0.2\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_note(port:0, extra:pkg_report_get());\n else security_note(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 2.6, "vector": "AV:N/AC:H/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2019-11-01T02:40:13", "bulletinFamily": "scanner", "description": "The remote host is affected by the vulnerability described in GLSA-200503-31\n(Mozilla Firefox: Multiple vulnerabilities)\n\n The following vulnerabilities were found and fixed in Mozilla\n Firefox:\n Mark Dowd from ISS X-Force reported an\n exploitable heap overrun in the GIF processing of obsolete Netscape\n extension 2 (CAN-2005-0399)\n Kohei Yoshino discovered that a\n page bookmarked as a sidebar could bypass privileges control\n (CAN-2005-0402)\n Michael Krax reported a new way to bypass XUL\n security restrictions through drag-and-drop of items like scrollbars\n (CAN-2005-0401)\n \nImpact :\n\n The GIF heap overflow could be triggered by a malicious GIF\n image that would end up executing arbitrary code with the rights of the\n user running Firefox\n By tricking the user into bookmarking a\n malicious page as a Sidebar, a remote attacker could potentially\n execute arbitrary code with the rights of the user running the\n browser\n By setting up a malicious website and convincing users\n to obey very specific drag-and-drop instructions, attackers may\n leverage drag-and-drop features to bypass XUL security restrictions,\n which could be used as a stepping stone to exploit other\n vulnerabilities\n \nWorkaround :\n\n There is no known workaround at this time.", "modified": "2019-11-02T00:00:00", "id": "GENTOO_GLSA-200503-31.NASL", "href": "https://www.tenable.com/plugins/nessus/17620", "published": "2005-03-25T00:00:00", "title": "GLSA-200503-31 : Mozilla Firefox: Multiple vulnerabilities", "type": "nessus", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Gentoo Linux Security Advisory GLSA 200503-31.\n#\n# The advisory text is Copyright (C) 2001-2018 Gentoo Foundation, Inc.\n# and licensed under the Creative Commons - Attribution / Share Alike \n# license. See http://creativecommons.org/licenses/by-sa/3.0/\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(17620);\n script_version(\"1.17\");\n script_cvs_date(\"Date: 2019/08/02 13:32:42\");\n\n script_cve_id(\"CVE-2005-0399\", \"CVE-2005-0401\", \"CVE-2005-0402\");\n script_xref(name:\"GLSA\", value:\"200503-31\");\n\n script_name(english:\"GLSA-200503-31 : Mozilla Firefox: Multiple vulnerabilities\");\n script_summary(english:\"Checks for updated package(s) in /var/db/pkg\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Gentoo host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote host is affected by the vulnerability described in GLSA-200503-31\n(Mozilla Firefox: Multiple vulnerabilities)\n\n The following vulnerabilities were found and fixed in Mozilla\n Firefox:\n Mark Dowd from ISS X-Force reported an\n exploitable heap overrun in the GIF processing of obsolete Netscape\n extension 2 (CAN-2005-0399)\n Kohei Yoshino discovered that a\n page bookmarked as a sidebar could bypass privileges control\n (CAN-2005-0402)\n Michael Krax reported a new way to bypass XUL\n security restrictions through drag-and-drop of items like scrollbars\n (CAN-2005-0401)\n \nImpact :\n\n The GIF heap overflow could be triggered by a malicious GIF\n image that would end up executing arbitrary code with the rights of the\n user running Firefox\n By tricking the user into bookmarking a\n malicious page as a Sidebar, a remote attacker could potentially\n execute arbitrary code with the rights of the user running the\n browser\n By setting up a malicious website and convincing users\n to obey very specific drag-and-drop instructions, attackers may\n leverage drag-and-drop features to bypass XUL security restrictions,\n which could be used as a stepping stone to exploit other\n vulnerabilities\n \nWorkaround :\n\n There is no known workaround at this time.\"\n );\n # http://www.mozilla.org/projects/security/known-vulnerabilities.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/known-vulnerabilities/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.gentoo.org/glsa/200503-31\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"All Mozilla Firefox users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=www-client/mozilla-firefox-1.0.2'\n All Mozilla Firefox binary users should upgrade to the latest\n version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=www-client/mozilla-firefox-bin-1.0.2'\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:mozilla-firefox\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:mozilla-firefox-bin\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:gentoo:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/03/25\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2005/03/25\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2005-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Gentoo Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Gentoo/release\", \"Host/Gentoo/qpkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"qpkg.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Gentoo/release\")) audit(AUDIT_OS_NOT, \"Gentoo\");\nif (!get_kb_item(\"Host/Gentoo/qpkg-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (qpkg_check(package:\"www-client/mozilla-firefox-bin\", unaffected:make_list(\"ge 1.0.2\"), vulnerable:make_list(\"lt 1.0.2\"))) flag++;\nif (qpkg_check(package:\"www-client/mozilla-firefox\", unaffected:make_list(\"ge 1.0.2\"), vulnerable:make_list(\"lt 1.0.2\"))) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:qpkg_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = qpkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"Mozilla Firefox\");\n}\n", "cvss": {"score": 5.1, "vector": "AV:N/AC:H/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-11-01T02:55:27", "bulletinFamily": "scanner", "description": "The remote version of Firefox contains various security issues that\nmay allow an attacker to impersonate a website and to trick a user\ninto accepting and executing arbitrary files or to cause a heap\noverflow in the FireFox process and execute arbitrary code on the\nremote host.", "modified": "2019-11-02T00:00:00", "id": "MOZILLA_FIREFOX_102.NASL", "href": "https://www.tenable.com/plugins/nessus/17603", "published": "2005-03-23T00:00:00", "title": "Firefox < 1.0.2 Multiple Vulnerabilities", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\n\ninclude(\"compat.inc\");\n\nif(description)\n{\n script_id(17603);\n script_version(\"1.27\");\n\n script_cve_id(\"CVE-2005-0399\", \"CVE-2005-0401\", \"CVE-2005-0402\");\n script_bugtraq_id(12672, 12881, 12884, 12885);\n\n script_name(english:\"Firefox < 1.0.2 Multiple Vulnerabilities\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host contains a web browser that is affected by\nmultiple vulnerabilities.\" );\n script_set_attribute(attribute:\"description\", value:\n\"The remote version of Firefox contains various security issues that\nmay allow an attacker to impersonate a website and to trick a user\ninto accepting and executing arbitrary files or to cause a heap\noverflow in the FireFox process and execute arbitrary code on the\nremote host.\" );\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2005-30/\" );\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2005-31/\" );\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2005-32/\" );\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Firefox 1.0.2 or later.\" );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_publication_date\", value: \"2005/03/23\");\n script_set_attribute(attribute:\"vuln_publication_date\", value: \"2005/03/23\");\n script_cvs_date(\"Date: 2018/07/16 14:09:14\");\n script_set_attribute(attribute:\"patch_publication_date\", value: \"2005/03/23\");\nscript_set_attribute(attribute:\"plugin_type\", value:\"local\");\nscript_set_attribute(attribute:\"cpe\", value:\"cpe:/a:mozilla:firefox\");\nscript_end_attributes();\n\n script_summary(english:\"Determines the version of Firefox\");\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2005-2018 Tenable Network Security, Inc.\");\n script_family(english:\"Windows\");\n script_dependencies(\"mozilla_org_installed.nasl\");\n script_require_keys(\"Mozilla/Firefox/Version\");\n exit(0);\n}\n\n#\ninclude(\"mozilla_version.inc\");\nport = get_kb_item_or_exit(\"SMB/transport\"); \n\ninstalls = get_kb_list(\"SMB/Mozilla/Firefox/*\");\nif (isnull(installs)) audit(AUDIT_NOT_INST, \"Firefox\");\n\nmozilla_check_version(installs:installs, product:'firefox', esr:FALSE, fix:'1.0.2', severity:SECURITY_WARNING);", "cvss": {"score": 5.1, "vector": "AV:N/AC:H/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-11-01T03:20:10", "bulletinFamily": "scanner", "description": "Updated firefox packages that fix various bugs are now available.\n\nThis update has been rated as having critical security impact by the\nRed Hat Security Response Team.\n\nMozilla Firefox is an open source Web browser.\n\nA buffer overflow bug was found in the way Firefox processes GIF\nimages. It is possible for an attacker to create a specially crafted\nGIF image, which when viewed by a victim will execute arbitrary code\nas the victim. The Common Vulnerabilities and Exposures project\n(cve.mitre.org) has assigned the name CVE-2005-0399 to this issue.\n\nA bug was found in the way Firefox processes XUL content. If a\nmalicious web page can trick a user into dragging an object, it is\npossible to load malicious XUL content. The Common Vulnerabilities and\nExposures project (cve.mitre.org) has assigned the name CVE-2005-0401\nto this issue.\n\nA bug was found in the way Firefox bookmarks content to the sidebar.\nIf a user can be tricked into bookmarking a malicious web page into\nthe sidebar panel, that page could execute arbitrary programs. The\nCommon Vulnerabilities and Exposures project (cve.mitre.org) has\nassigned the name CVE-2005-0402 to this issue.\n\nUsers of Firefox are advised to upgrade to this updated package which\ncontains Firefox version 1.0.2 and is not vulnerable to these issues.", "modified": "2019-11-02T00:00:00", "id": "REDHAT-RHSA-2005-336.NASL", "href": "https://www.tenable.com/plugins/nessus/17627", "published": "2005-03-25T00:00:00", "title": "RHEL 4 : firefox (RHSA-2005:336)", "type": "nessus", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2005:336. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(17627);\n script_version (\"1.22\");\n script_cvs_date(\"Date: 2019/10/25 13:36:11\");\n\n script_cve_id(\"CVE-2005-0399\", \"CVE-2005-0401\", \"CVE-2005-0402\");\n script_xref(name:\"RHSA\", value:\"2005:336\");\n\n script_name(english:\"RHEL 4 : firefox (RHSA-2005:336)\");\n script_summary(english:\"Checks the rpm output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated firefox packages that fix various bugs are now available.\n\nThis update has been rated as having critical security impact by the\nRed Hat Security Response Team.\n\nMozilla Firefox is an open source Web browser.\n\nA buffer overflow bug was found in the way Firefox processes GIF\nimages. It is possible for an attacker to create a specially crafted\nGIF image, which when viewed by a victim will execute arbitrary code\nas the victim. The Common Vulnerabilities and Exposures project\n(cve.mitre.org) has assigned the name CVE-2005-0399 to this issue.\n\nA bug was found in the way Firefox processes XUL content. If a\nmalicious web page can trick a user into dragging an object, it is\npossible to load malicious XUL content. The Common Vulnerabilities and\nExposures project (cve.mitre.org) has assigned the name CVE-2005-0401\nto this issue.\n\nA bug was found in the way Firefox bookmarks content to the sidebar.\nIf a user can be tricked into bookmarking a malicious web page into\nthe sidebar panel, that page could execute arbitrary programs. The\nCommon Vulnerabilities and Exposures project (cve.mitre.org) has\nassigned the name CVE-2005-0402 to this issue.\n\nUsers of Firefox are advised to upgrade to this updated package which\ncontains Firefox version 1.0.2 and is not vulnerable to these issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-0399\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-0401\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-0402\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2005:336\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected firefox package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:firefox\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:4\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2005/05/02\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/03/23\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2005/03/25\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2005-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^4([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 4.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2005:336\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL4\", reference:\"firefox-1.0.2-1.4.1\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"firefox\");\n }\n}\n", "cvss": {"score": 5.1, "vector": "AV:N/AC:H/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-11-01T02:26:29", "bulletinFamily": "scanner", "description": "A buffer overflow bug was found in the way Firefox processes GIF\nimages. It is possible for an attacker to create a specially crafted\nGIF image, which when viewed by a victim will execute arbitrary code\nas the victim. The Common Vulnerabilities and Exposures project\n(cve.mitre.org) has assigned the name CVE-2005-0399 to this issue.\n\nA bug was found in the way Firefox processes XUL content. If a\nmalicious web page can trick a user into dragging an object, it is\npossible to load malicious XUL content. The Common Vulnerabilities and\nExposures project (cve.mitre.org) has assigned the name CVE-2005-0401\nto this issue.\n\nA bug was found in the way Firefox bookmarks content to the sidebar.\nIf a user can be tricked into bookmarking a malicious web page into\nthe sidebar panel, that page could execute arbitrary programs. The\nCommon Vulnerabilities and Exposures project (cve.mitre.org) has\nassigned the name CVE-2005-0402 to this issue.\n\nUsers of Firefox are advised to upgrade to this updated package which\ncontains Firefox version 1.0.2 and is not vulnerable to these issues.\n\nAdditionally, there was a bug found in the way Firefox rendered some\nfonts, notably the Tahoma font while italicized. This issue has been\nfiled as Bug 150041 (bugzilla.redhat.com). This updated package\ncontains a fix for this issue.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "modified": "2019-11-02T00:00:00", "id": "FEDORA_2005-246.NASL", "href": "https://www.tenable.com/plugins/nessus/19632", "published": "2005-09-12T00:00:00", "title": "Fedora Core 3 : firefox-1.0.2-1.3.1 (2005-246)", "type": "nessus", "sourceData": "#%NASL_MIN_LEVEL 80502\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2005-246.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(19632);\n script_version (\"1.14\");\n script_cvs_date(\"Date: 2019/08/02 13:32:23\");\n\n script_cve_id(\"CVE-2005-0399\");\n script_xref(name:\"FEDORA\", value:\"2005-246\");\n\n script_name(english:\"Fedora Core 3 : firefox-1.0.2-1.3.1 (2005-246)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora Core host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"A buffer overflow bug was found in the way Firefox processes GIF\nimages. It is possible for an attacker to create a specially crafted\nGIF image, which when viewed by a victim will execute arbitrary code\nas the victim. The Common Vulnerabilities and Exposures project\n(cve.mitre.org) has assigned the name CVE-2005-0399 to this issue.\n\nA bug was found in the way Firefox processes XUL content. If a\nmalicious web page can trick a user into dragging an object, it is\npossible to load malicious XUL content. The Common Vulnerabilities and\nExposures project (cve.mitre.org) has assigned the name CVE-2005-0401\nto this issue.\n\nA bug was found in the way Firefox bookmarks content to the sidebar.\nIf a user can be tricked into bookmarking a malicious web page into\nthe sidebar panel, that page could execute arbitrary programs. The\nCommon Vulnerabilities and Exposures project (cve.mitre.org) has\nassigned the name CVE-2005-0402 to this issue.\n\nUsers of Firefox are advised to upgrade to this updated package which\ncontains Firefox version 1.0.2 and is not vulnerable to these issues.\n\nAdditionally, there was a bug found in the way Firefox rendered some\nfonts, notably the Tahoma font while italicized. This issue has been\nfiled as Bug 150041 (bugzilla.redhat.com). This updated package\ncontains a fix for this issue.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n # https://lists.fedoraproject.org/pipermail/announce/2005-March/000792.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?78830c62\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected firefox and / or firefox-debuginfo packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:firefox\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:firefox-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora_core:3\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/03/23\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2005/09/12\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2005-2019 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^3([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 3.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC3\", reference:\"firefox-1.0.2-1.3.1\")) flag++;\nif (rpm_check(release:\"FC3\", reference:\"firefox-debuginfo-1.0.2-1.3.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"firefox / firefox-debuginfo\");\n}\n", "cvss": {"score": 5.1, "vector": "AV:N/AC:H/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-11-03T12:30:37", "bulletinFamily": "scanner", "description": "USN-149-1 fixed some vulnerabilities in the Ubuntu 5.04 (Hoary\nHedgehog) version of Firefox. The version shipped with Ubuntu 4.10\n(Warty Warthog) is also vulnerable to these flaws, so it needs to be\nupgraded as well. Please see\n\nhttp://www.ubuntulinux.org/support/documentation/usn/usn-149-1\n\nfor the original advisory.\n\nThis update also fixes several older vulnerabilities; Some of them\ncould be exploited to execute arbitrary code with full user privileges\nif the user visited a malicious website. (MFSA-2005-01 to\nMFSA-2005-44; please see the following website for details:\nhttp://www.mozilla.org/projects/security/known-vulnerabilities.html)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "modified": "2019-11-02T00:00:00", "id": "UBUNTU_USN-149-3.NASL", "href": "https://www.tenable.com/plugins/nessus/20546", "published": "2006-01-15T00:00:00", "title": "Ubuntu 4.10 : mozilla-firefox vulnerabilities (USN-149-3)", "type": "nessus", "sourceData": "#%NASL_MIN_LEVEL 80502\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-149-3. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(20546);\n script_version(\"1.21\");\n script_cvs_date(\"Date: 2019/08/02 13:33:00\");\n\n script_cve_id(\"CVE-2004-1156\", \"CVE-2004-1381\", \"CVE-2005-0141\", \"CVE-2005-0142\", \"CVE-2005-0143\", \"CVE-2005-0144\", \"CVE-2005-0145\", \"CVE-2005-0146\", \"CVE-2005-0147\", \"CVE-2005-0150\", \"CVE-2005-0230\", \"CVE-2005-0231\", \"CVE-2005-0232\", \"CVE-2005-0233\", \"CVE-2005-0255\", \"CVE-2005-0399\", \"CVE-2005-0401\", \"CVE-2005-0402\", \"CVE-2005-0578\", \"CVE-2005-0584\", \"CVE-2005-0585\", \"CVE-2005-0586\", \"CVE-2005-0587\", \"CVE-2005-0588\", \"CVE-2005-0589\", \"CVE-2005-0590\", \"CVE-2005-0591\", \"CVE-2005-0592\", \"CVE-2005-0593\", \"CVE-2005-0752\", \"CVE-2005-0989\", \"CVE-2005-1153\", \"CVE-2005-1154\", \"CVE-2005-1155\", \"CVE-2005-1156\", \"CVE-2005-1157\", \"CVE-2005-1158\", \"CVE-2005-1159\", \"CVE-2005-1160\", \"CVE-2005-1531\", \"CVE-2005-1532\", \"CVE-2005-1937\", \"CVE-2005-2260\", \"CVE-2005-2261\", \"CVE-2005-2262\", \"CVE-2005-2263\", \"CVE-2005-2264\", \"CVE-2005-2265\", \"CVE-2005-2266\", \"CVE-2005-2267\", \"CVE-2005-2268\", \"CVE-2005-2269\", \"CVE-2005-2270\");\n script_xref(name:\"USN\", value:\"149-3\");\n\n script_name(english:\"Ubuntu 4.10 : mozilla-firefox vulnerabilities (USN-149-3)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"USN-149-1 fixed some vulnerabilities in the Ubuntu 5.04 (Hoary\nHedgehog) version of Firefox. The version shipped with Ubuntu 4.10\n(Warty Warthog) is also vulnerable to these flaws, so it needs to be\nupgraded as well. Please see\n\nhttp://www.ubuntulinux.org/support/documentation/usn/usn-149-1\n\nfor the original advisory.\n\nThis update also fixes several older vulnerabilities; Some of them\ncould be exploited to execute arbitrary code with full user privileges\nif the user visited a malicious website. (MFSA-2005-01 to\nMFSA-2005-44; please see the following website for details:\nhttp://www.mozilla.org/projects/security/known-vulnerabilities.html)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Mozilla Suite/Firefox compareTo() Code Execution');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mozilla-firefox\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mozilla-firefox-dom-inspector\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mozilla-firefox-locale-ca\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mozilla-firefox-locale-de\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mozilla-firefox-locale-es\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mozilla-firefox-locale-fr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mozilla-firefox-locale-it\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mozilla-firefox-locale-ja\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mozilla-firefox-locale-nb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mozilla-firefox-locale-pl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mozilla-firefox-locale-tr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mozilla-firefox-locale-uk\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:4.10\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/07/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/01/15\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2005-2018 Canonical, Inc. / NASL script (C) 2006-2019 Tenable Network Security, Inc.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! ereg(pattern:\"^(4\\.10)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 4.10\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"4.10\", pkgname:\"mozilla-firefox\", pkgver:\"1.0.6-0ubuntu0.0.1\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"mozilla-firefox-dom-inspector\", pkgver:\"1.0.6-0ubuntu0.0.1\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"mozilla-firefox-locale-ca\", pkgver:\"1.0-0ubuntu0.1\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"mozilla-firefox-locale-de\", pkgver:\"1.0-0ubuntu0.1\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"mozilla-firefox-locale-es\", pkgver:\"1.0-0ubuntu0.1\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"mozilla-firefox-locale-fr\", pkgver:\"1.0-0ubuntu0.2\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"mozilla-firefox-locale-it\", pkgver:\"1.0-0ubuntu0.1\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"mozilla-firefox-locale-ja\", pkgver:\"1.0-0ubuntu0.1\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"mozilla-firefox-locale-nb\", pkgver:\"1.0-0ubuntu0.1\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"mozilla-firefox-locale-pl\", pkgver:\"1.0-0ubuntu0.1\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"mozilla-firefox-locale-tr\", pkgver:\"1.0-0ubuntu0.1\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"mozilla-firefox-locale-uk\", pkgver:\"1.0-0ubuntu0.1\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"mozilla-firefox / mozilla-firefox-dom-inspector / etc\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "osvdb": [{"lastseen": "2017-04-28T13:20:11", "bulletinFamily": "software", "description": "## Vulnerability Description\nMozilla Firefox contains a flaw that may allow a malicious user to inject script code in the browser environment with the privleges of the locally-logged on user. The issue is triggered when a malicious web site is bookmarked as a sidebar panel. It is possible that the flaw may allow an attacker to run arbitrary code on the victim's machine, resulting in a loss of integrity.\n## Solution Description\nUpgrade to version 1.0.2 or higher, as it has been reported to fix this vulnerability. It is also possible to correct the flaw by implementing the following workaround(s): Do not bookmark untrusted sites as sidebar panels.\n## Short Description\nMozilla Firefox contains a flaw that may allow a malicious user to inject script code in the browser environment with the privleges of the locally-logged on user. The issue is triggered when a malicious web site is bookmarked as a sidebar panel. It is possible that the flaw may allow an attacker to run arbitrary code on the victim's machine, resulting in a loss of integrity.\n## References:\nVendor Specific News/Changelog Entry: https://bugzilla.mozilla.org/show_bug.cgi?id=284627\n[Vendor Specific Advisory URL](http://www.mozilla.org/security/announce/mfsa2005-31.html)\nSecurity Tracker: 1013520\n[Secunia Advisory ID:14736](https://secuniaresearch.flexerasoftware.com/advisories/14736/)\n[Secunia Advisory ID:14654](https://secuniaresearch.flexerasoftware.com/advisories/14654/)\nOther Advisory URL: http://www.gentoo.org/security/en/glsa/glsa-200503-31.xml\n[CVE-2005-0402](https://vulners.com/cve/CVE-2005-0402)\nBugtraq ID: 12884\n", "modified": "2005-03-24T07:25:32", "published": "2005-03-24T07:25:32", "href": "https://vulners.com/osvdb/OSVDB:15009", "id": "OSVDB:15009", "title": "Mozilla Firefox Sidebar Panel Script Injection", "type": "osvdb", "cvss": {"score": 2.6, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}], "gentoo": [{"lastseen": "2016-09-06T19:46:37", "bulletinFamily": "unix", "description": "### Background\n\nMozilla Firefox is the popular next-generation browser from the Mozilla project. \n\n### Description\n\nThe following vulnerabilities were found and fixed in Mozilla Firefox: \n\n * Mark Dowd from ISS X-Force reported an exploitable heap overrun in the GIF processing of obsolete Netscape extension 2 (CAN-2005-0399)\n * Kohei Yoshino discovered that a page bookmarked as a sidebar could bypass privileges control (CAN-2005-0402)\n * Michael Krax reported a new way to bypass XUL security restrictions through drag-and-drop of items like scrollbars (CAN-2005-0401)\n\n### Impact\n\n * The GIF heap overflow could be triggered by a malicious GIF image that would end up executing arbitrary code with the rights of the user running Firefox\n * By tricking the user into bookmarking a malicious page as a Sidebar, a remote attacker could potentially execute arbitrary code with the rights of the user running the browser\n * By setting up a malicious website and convincing users to obey very specific drag-and-drop instructions, attackers may leverage drag-and-drop features to bypass XUL security restrictions, which could be used as a stepping stone to exploit other vulnerabilities\n\n### Workaround\n\nThere is no known workaround at this time. \n\n### Resolution\n\nAll Mozilla Firefox users should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=www-client/mozilla-firefox-1.0.2\"\n\nAll Mozilla Firefox binary users should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=www-client/mozilla-firefox-bin-1.0.2\"", "modified": "2005-03-25T00:00:00", "published": "2005-03-25T00:00:00", "id": "GLSA-200503-31", "href": "https://security.gentoo.org/glsa/200503-31", "type": "gentoo", "title": "Mozilla Firefox: Multiple vulnerabilities", "cvss": {"score": 5.1, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "redhat": [{"lastseen": "2019-08-13T18:45:44", "bulletinFamily": "unix", "description": "Mozilla Firefox is an open source Web browser.\n\nA buffer overflow bug was found in the way Firefox processes GIF images. It\nis possible for an attacker to create a specially crafted GIF image, which\nwhen viewed by a victim will execute arbitrary code as the victim. The\nCommon Vulnerabilities and Exposures project (cve.mitre.org) has assigned\nthe name CAN-2005-0399 to this issue.\n\nA bug was found in the way Firefox processes XUL content. If a malicious\nweb page can trick a user into dragging an object, it is possible to load\nmalicious XUL content. The Common Vulnerabilities and Exposures project\n(cve.mitre.org) has assigned the name CAN-2005-0401 to this issue.\n\nA bug was found in the way Firefox bookmarks content to the sidebar. If a\nuser can be tricked into bookmarking a malicious web page into the sidebar\npanel, that page could execute arbitrary programs. The Common\nVulnerabilities and Exposures project (cve.mitre.org) has assigned the name\nCAN-2005-0402 to this issue.\n\nUsers of Firefox are advised to upgrade to this updated package which\ncontains Firefox version 1.0.2 and is not vulnerable to these issues.", "modified": "2017-09-08T11:47:59", "published": "2005-03-23T05:00:00", "id": "RHSA-2005:336", "href": "https://access.redhat.com/errata/RHSA-2005:336", "type": "redhat", "title": "(RHSA-2005:336) firefox security update", "cvss": {"score": 5.1, "vector": "AV:N/AC:H/Au:N/C:P/I:P/A:P"}}], "ubuntu": [{"lastseen": "2019-05-29T17:21:27", "bulletinFamily": "unix", "description": "USN-149-1 fixed some vulnerabilities in the Ubuntu 5.04 (Hoary Hedgehog) version of Firefox. The version shipped with Ubuntu 4.10 (Warty Warthog) is also vulnerable to these flaws, so it needs to be upgraded as well. Please see\n\n<http://www.ubuntulinux.org/support/documentation/usn/usn-149-1>\n\nfor the original advisory.\n\nThis update also fixes several older vulnerabilities; Some of them could be exploited to execute arbitrary code with full user privileges if the user visited a malicious web site. (MFSA-2005-01 to MFSA-2005-44; please see the following web site for details: <http://www.mozilla.org/projects/security/known-vulnerabilities.html)>", "modified": "2005-07-28T00:00:00", "published": "2005-07-28T00:00:00", "id": "USN-149-3", "href": "https://usn.ubuntu.com/149-3/", "title": "Ubuntu 4.10 update for Firefox vulnerabilities", "type": "ubuntu", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}]}