## Abstract
SONAS includes multiple software components for which the vendors have provided fixes for security vulnerabilities in such components.
## Content
**VULNERABILITY DETAILS: **
**CVE ID:**
**Vendor**| **Vendor ID**| **Vendor Title**| **Included CVEs**
---|---|---|---
IBM| [_TSM 6.3.1.0_](<http://www-01.ibm.com/support/docview.wss?uid=swg21615292>)| Two unauthorized access vulnerabilities in IBM TSM for Space Management| [_CVE-2012-4859_](<https://vulners.com/cve/CVE-2012-4859>)
[_CVE-2012-5954_](<https://vulners.com/cve/CVE-2012-5954>)
Red Hat| [_RHSA-2012-0128_](<https://rhn.redhat.com/errata/RHSA-2012-0128.html>)| Moderate: httpd security update| [_CVE-2011-3639_](<https://www.redhat.com/security/data/cve/CVE-2011-3639.html>)
Apache| [_Apache Tomcat 6.0.33_](<http://tomcat.apache.org/security-6.html>)| Fixed in Apache Tomcat 6.0.33| [_CVE-2011-1184_](<https://vulners.com/cve/CVE-2011-1184>)
Apache| [_Apache Tomcat 6.0.35_](<http://tomcat.apache.org/security-6.html>)| Fixed in Apache Tomcat 6.0.35| [_CVE-2011-3190_](<https://vulners.com/cve/CVE-2011-3190>)
IBM| [_IBM Java 6.0.0 SR12_](<https://www.ibm.com/developerworks/java/jdk/alerts/>)| Oracle October 16 2012 CPU| [_CVE-2012-5081_](<https://vulners.com/cve/CVE-2012-5081>)
Red Hat| [_RHSA-2012-0143_](<https://rhn.redhat.com/errata/RHSA-2012-0143.html>)| Critical: xulrunner security update| [_CVE-2011-3026_](<https://www.redhat.com/security/data/cve/CVE-2011-3026.html>)
Red Hat| [_RHSA-2012-0317_](<https://rhn.redhat.com/errata/RHSA-2012-0317.html>)| Important: libpng security update| [_CVE-2011-3026_](<https://www.redhat.com/security/data/cve/CVE-2011-3026.html>)
Red Hat| [_RHSA-2012-1210_](<https://rhn.redhat.com/errata/RHSA-2012-1210.html>)| Critical: firefox security update| [_CVE-2012-1970_](<https://www.redhat.com/security/data/cve/CVE-2012-1970.html>)
[_CVE-2012-1972_](<https://www.redhat.com/security/data/cve/CVE-2012-1972.html>)
[_CVE-2012-1973_](<https://www.redhat.com/security/data/cve/CVE-2012-1973.html>)
[_CVE-2012-1974_](<https://www.redhat.com/security/data/cve/CVE-2012-1974.html>)
[_CVE-2012-1975_](<https://www.redhat.com/security/data/cve/CVE-2012-1975.html>)
[_CVE-2012-1976_](<https://www.redhat.com/security/data/cve/CVE-2012-1976.html>)
[_CVE-2012-3956_](<https://www.redhat.com/security/data/cve/CVE-2012-3956.html>)
[_CVE-2012-3957_](<https://www.redhat.com/security/data/cve/CVE-2012-3957.html>)
[_CVE-2012-3958_](<https://www.redhat.com/security/data/cve/CVE-2012-3958.html>)
[_CVE-2012-3959_](<https://www.redhat.com/security/data/cve/CVE-2012-3959.html>)
[_CVE-2012-3960_](<https://www.redhat.com/security/data/cve/CVE-2012-3960.html>)
[_CVE-2012-3961_](<https://www.redhat.com/security/data/cve/CVE-2012-3961.html>)
[_CVE-2012-3962_](<https://www.redhat.com/security/data/cve/CVE-2012-3962.html>)
[_CVE-2012-3963_](<https://www.redhat.com/security/data/cve/CVE-2012-3963.html>)
[_CVE-2012-3964_](<https://www.redhat.com/security/data/cve/CVE-2012-3964.html>)
[_CVE-2012-3966_](<https://www.redhat.com/security/data/cve/CVE-2012-3966.html>)
[_CVE-2012-3967_](<https://www.redhat.com/security/data/cve/CVE-2012-3967.html>)
[_CVE-2012-3968_](<https://www.redhat.com/security/data/cve/CVE-2012-3968.html>)
[_CVE-2012-3969_](<https://www.redhat.com/security/data/cve/CVE-2012-3969.html>)
[_CVE-2012-3970_](<https://www.redhat.com/security/data/cve/CVE-2012-3970.html>)
[_CVE-2012-3972_](<https://www.redhat.com/security/data/cve/CVE-2012-3972.html>)
[_CVE-2012-3976_](<https://www.redhat.com/security/data/cve/CVE-2012-3976.html>)
[_CVE-2012-3978_](<https://www.redhat.com/security/data/cve/CVE-2012-3978.html>)
[_CVE-2012-3980_](<https://www.redhat.com/security/data/cve/CVE-2012-3980.html>)
Red Hat| [_RHSA-2012-1350_](<https://rhn.redhat.com/errata/RHSA-2012-1350.html>)| Critical: firefox security and bug fix update| [_CVE-2012-1956_](<https://www.redhat.com/security/data/cve/CVE-2012-1956.html>)
[_CVE-2012-3982_](<https://www.redhat.com/security/data/cve/CVE-2012-3982.html>)
[_CVE-2012-3986_](<https://www.redhat.com/security/data/cve/CVE-2012-3986.html>)
[_CVE-2012-3988_](<https://www.redhat.com/security/data/cve/CVE-2012-3988.html>)
[_CVE-2012-3990_](<https://www.redhat.com/security/data/cve/CVE-2012-3990.html>)
[_CVE-2012-3991_](<https://www.redhat.com/security/data/cve/CVE-2012-3991.html>)
[_CVE-2012-3992_](<https://www.redhat.com/security/data/cve/CVE-2012-3992.html>)
[_CVE-2012-3993_](<https://www.redhat.com/security/data/cve/CVE-2012-3993.html>)
[_CVE-2012-3994_](<https://www.redhat.com/security/data/cve/CVE-2012-3994.html>)
[_CVE-2012-3995_](<https://www.redhat.com/security/data/cve/CVE-2012-3995.html>)
[_CVE-2012-4179_](<https://www.redhat.com/security/data/cve/CVE-2012-4179.html>)
[_CVE-2012-4180_](<https://www.redhat.com/security/data/cve/CVE-2012-4180.html>)
[_CVE-2012-4181_](<https://www.redhat.com/security/data/cve/CVE-2012-4181.html>)
[_CVE-2012-4182_](<https://www.redhat.com/security/data/cve/CVE-2012-4182.html>)
[_CVE-2012-4183_](<https://www.redhat.com/security/data/cve/CVE-2012-4183.html>)
[_CVE-2012-4184_](<https://www.redhat.com/security/data/cve/CVE-2012-4184.html>)
[_CVE-2012-4185_](<https://www.redhat.com/security/data/cve/CVE-2012-4185.html>)
[_CVE-2012-4186_](<https://www.redhat.com/security/data/cve/CVE-2012-4186.html>)
[_CVE-2012-4187_](<https://www.redhat.com/security/data/cve/CVE-2012-4187.html>)
[_CVE-2012-4188_](<https://www.redhat.com/security/data/cve/CVE-2012-4188.html>)
Red Hat| [_RHSA-2012-1361_](<https://rhn.redhat.com/errata/RHSA-2012-1361.html>)| Critical: xulrunner security update| [_CVE-2012-4193_](<https://www.redhat.com/security/data/cve/CVE-2012-4193.html>)
Red Hat| [_RHSA-2012-1407_](<https://rhn.redhat.com/errata/RHSA-2012-1407.html>)| Critical: firefox security update| [_CVE-2012-4194_](<https://www.redhat.com/security/data/cve/CVE-2012-4194.html>)
[_CVE-2012-4195_](<https://www.redhat.com/security/data/cve/CVE-2012-4195.html>)
[_CVE-2012-4196_](<https://www.redhat.com/security/data/cve/CVE-2012-4196.html>)
Red Hat| [_RHSA-2012-1482_](<https://rhn.redhat.com/errata/RHSA-2012-1482.html>)| Critical: firefox security update| [_CVE-2012-4201_](<https://www.redhat.com/security/data/cve/CVE-2012-4201.html>)
[_CVE-2012-4202_](<https://www.redhat.com/security/data/cve/CVE-2012-4202.html>)
[_CVE-2012-4207_](<https://www.redhat.com/security/data/cve/CVE-2012-4207.html>)
[_CVE-2012-4209_](<https://www.redhat.com/security/data/cve/CVE-2012-4209.html>)
[_CVE-2012-4210_](<https://www.redhat.com/security/data/cve/CVE-2012-4210.html>)
[_CVE-2012-4214_](<https://www.redhat.com/security/data/cve/CVE-2012-4214.html>)
[_CVE-2012-4215_](<https://www.redhat.com/security/data/cve/CVE-2012-4215.html>)
[_CVE-2012-4216_](<https://www.redhat.com/security/data/cve/CVE-2012-4216.html>)
[_CVE-2012-5829_](<https://www.redhat.com/security/data/cve/CVE-2012-5829.html>)
[_CVE-2012-5830_](<https://www.redhat.com/security/data/cve/CVE-2012-5830.html>)
[_CVE-2012-5833_](<https://www.redhat.com/security/data/cve/CVE-2012-5833.html>)
[_CVE-2012-5835_](<https://www.redhat.com/security/data/cve/CVE-2012-5835.html>)
[_CVE-2012-5839_](<https://www.redhat.com/security/data/cve/CVE-2012-5839.html>)
[_CVE-2012-5840_](<https://www.redhat.com/security/data/cve/CVE-2012-5840.html>)
[_CVE-2012-5841_](<https://www.redhat.com/security/data/cve/CVE-2012-5841.html>)
[_CVE-2012-5842_](<https://www.redhat.com/security/data/cve/CVE-2012-5842.html>)
Red Hat| [](<https://rhn.redhat.com/errata/RHSA-2012-1361.html>)[_RHSA-2012-0699_](<https://rhn.redhat.com/errata/RHSA-2012-0699.html>)| Moderate: openssl security and bug fix update| [_ CVE-2012-2333_](<https://www.redhat.com/security/data/cve/CVE-2012-2333.html>)
Red Hat| [_RHSA-2012-0518_](<https://rhn.redhat.com/errata/RHSA-2012-0518.html>)| Important: openssl security update| [_ CVE-2012-2110_](<https://www.redhat.com/security/data/cve/CVE-2012-2110.html>)
Red Hat| [_RHSA-2012-0426_](<https://rhn.redhat.com/errata/RHSA-2012-0426.html>)| Moderate: openssl security and bug fix update| [_ CVE-2012-0884_](<https://www.redhat.com/security/data/cve/CVE-2012-0884.html>)
[_ CVE-2012-1165_](<https://www.redhat.com/security/data/cve/CVE-2012-1165.html>)
**DESCRIPTION:**
SONAS has integrated updated versions of the software components for which the vendors have provided fixes for security vulnerabilities.
**CVSS:**
Please see vendor documentation for CVSS scores and CVSS vector.
**AFFECTED PLATFORMS: **
* Affected releases: SONAS 1.1 through 1.3.2.2.
* Releases/systems/configurations NOT affected: SONAS 1.3.2.3 and above.
**REMEDIATION: **
**_Vendor Fix(es):_** The issue was fixed beginning with version SONAS 1.3.2.3. SONAS customers running an earlier SONAS version (e.g. SONAS 1.3.2.1) must upgrade to SONAS 1.3.2.3 or a later version.
**_Workaround(s):_** None.
**_Mitigation(s):_** SONAS is not exposed to CVEs related to Firefox and Xulrunner and to CVE-2011-3026 during normal operation. Service procedures which use the Firefox web browser may activate the vulnerable code. Service personnel must not browse web pages on the internet to avoid the processing of web pages with malicious content.
The Tomcat related vulnerabilities are exposed to the SONAS management and service IP addresses only, but not to the public IP addresses which are used for NAS data access. It is recommended that the management and service IP addresses will be attached to a management network only.
CVE-2012-4859 is not directly exploitable on SONAS, because SONAS does not provide a capability to logon as native Unix or Linux user.
CVE-2012-5954 impacts only SONAS systems, which are configured with TSM HSM.
**REFERENCES: **
* [__Complete CVSS Guide__](<http://www.first.org/cvss/v2/guide>)
* [__On-line Calculator V2__](<http://nvd.nist.gov/cvss.cfm?calculator&adv&version=2>)
* [_TSM 6.3.1.0_](<http://www-01.ibm.com/support/docview.wss?uid=swg21615292>)
[_CVE-2012-4859_](<https://vulners.com/cve/CVE-2012-4859>)
[_CVE-2012-5954_](<https://vulners.com/cve/CVE-2012-5954>)
* [_RHSA-2012-0128_](<https://rhn.redhat.com/errata/RHSA-2012-0128.html>)
[_CVE-2011-3639_](<https://www.redhat.com/security/data/cve/CVE-2011-3639.html>)
[_CVE-2011-4317_](<https://www.redhat.com/security/data/cve/CVE-2011-4317.html>)
[_CVE-2012-0053_](<file:///C:/Users/ADMINI~1.IMG/AppData/Local/Temp/notesC9812B/CVE-2012-0053>)
* [_Apache Tomcat 6.0.33_](<http://tomcat.apache.org/security-6.html>)
[_CVE-2011-1184_](<https://vulners.com/cve/CVE-2011-1184>)
[_CVE-2011-2204_](<https://vulners.com/cve/CVE-2011-2204>)
[_CVE-2011-2526_](<https://vulners.com/cve/CVE-2011-2526>)
* [_Apache Tomcat 6.0.35_](<http://tomcat.apache.org/security-6.html>)
[_CVE-2011-3190_](<https://vulners.com/cve/CVE-2011-3190>)
[_CVE-2011-3375_](<https://vulners.com/cve/CVE-2011-3375>)
[_CVE-2012-0022_](<https://vulners.com/cve/CVE-2012-0022>)
* [_IBM Java 6.0.0 SR12_](<https://www.ibm.com/developerworks/java/jdk/alerts/>)
[_CVE-2012-5081_](<https://vulners.com/cve/CVE-2012-5081>)
* [_RHSA-2012-0143_](<https://rhn.redhat.com/errata/RHSA-2012-0143.html>)
[_CVE-2011-3026_](<https://www.redhat.com/security/data/cve/CVE-2011-3026.html>)
* [_RHSA-2012-0317_](<https://rhn.redhat.com/errata/RHSA-2012-0317.html>)
[_CVE-2011-3026_](<https://www.redhat.com/security/data/cve/CVE-2011-3026.html>)
* [_RHSA-2012-1210_](<https://rhn.redhat.com/errata/RHSA-2012-1210.html>)
[_CVE-2012-1970_](<https://www.redhat.com/security/data/cve/CVE-2012-1970.html>)
[_CVE-2012-1972_](<https://www.redhat.com/security/data/cve/CVE-2012-1972.html>)
[_CVE-2012-1973_](<https://www.redhat.com/security/data/cve/CVE-2012-1973.html>)
[_CVE-2012-1974_](<https://www.redhat.com/security/data/cve/CVE-2012-1974.html>)
[_CVE-2012-1975_](<https://www.redhat.com/security/data/cve/CVE-2012-1975.html>)
[_CVE-2012-1976_](<https://www.redhat.com/security/data/cve/CVE-2012-1976.html>)
[_CVE-2012-3956_](<https://www.redhat.com/security/data/cve/CVE-2012-3956.html>)
[_CVE-2012-3957_](<https://www.redhat.com/security/data/cve/CVE-2012-3957.html>)
[_CVE-2012-3958_](<https://www.redhat.com/security/data/cve/CVE-2012-3958.html>)
[_CVE-2012-3959_](<https://www.redhat.com/security/data/cve/CVE-2012-3959.html>)
[_CVE-2012-3960_](<https://www.redhat.com/security/data/cve/CVE-2012-3960.html>)
[_CVE-2012-3961_](<https://www.redhat.com/security/data/cve/CVE-2012-3961.html>)
[_CVE-2012-3962_](<https://www.redhat.com/security/data/cve/CVE-2012-3962.html>)
[_CVE-2012-3963_](<https://www.redhat.com/security/data/cve/CVE-2012-3963.html>)
[_CVE-2012-3964_](<https://www.redhat.com/security/data/cve/CVE-2012-3964.html>)
[_CVE-2012-3966_](<https://www.redhat.com/security/data/cve/CVE-2012-3966.html>)
[_CVE-2012-3967_](<https://www.redhat.com/security/data/cve/CVE-2012-3967.html>)
[_CVE-2012-3968_](<https://www.redhat.com/security/data/cve/CVE-2012-3968.html>)
[_CVE-2012-3969_](<https://www.redhat.com/security/data/cve/CVE-2012-3969.html>)
[_CVE-2012-3970_](<https://www.redhat.com/security/data/cve/CVE-2012-3970.html>)
[_CVE-2012-3972_](<https://www.redhat.com/security/data/cve/CVE-2012-3972.html>)
[_CVE-2012-3976_](<https://www.redhat.com/security/data/cve/CVE-2012-3976.html>)
[_CVE-2012-3978_](<https://www.redhat.com/security/data/cve/CVE-2012-3978.html>)
[_CVE-2012-3980_](<https://www.redhat.com/security/data/cve/CVE-2012-3980.html>)
* [_RHSA-2012-1350_](<https://rhn.redhat.com/errata/RHSA-2012-1350.html>)
[_CVE-2012-1956_](<https://www.redhat.com/security/data/cve/CVE-2012-1956.html>)
[_CVE-2012-3982_](<https://www.redhat.com/security/data/cve/CVE-2012-3982.html>)
[_CVE-2012-3986_](<https://www.redhat.com/security/data/cve/CVE-2012-3986.html>)
[_CVE-2012-3988_](<https://www.redhat.com/security/data/cve/CVE-2012-3988.html>)
[_CVE-2012-3990_](<https://www.redhat.com/security/data/cve/CVE-2012-3990.html>)
[_CVE-2012-3991_](<https://www.redhat.com/security/data/cve/CVE-2012-3991.html>)
[_CVE-2012-3992_](<https://www.redhat.com/security/data/cve/CVE-2012-3992.html>)
[_CVE-2012-3993_](<https://www.redhat.com/security/data/cve/CVE-2012-3993.html>)
[_CVE-2012-3994_](<https://www.redhat.com/security/data/cve/CVE-2012-3994.html>)
[_CVE-2012-3995_](<https://www.redhat.com/security/data/cve/CVE-2012-3995.html>)
[_CVE-2012-4179_](<https://www.redhat.com/security/data/cve/CVE-2012-4179.html>)
[_CVE-2012-4180_](<https://www.redhat.com/security/data/cve/CVE-2012-4180.html>)
[_CVE-2012-4181_](<https://www.redhat.com/security/data/cve/CVE-2012-4181.html>)
[_CVE-2012-4182_](<https://www.redhat.com/security/data/cve/CVE-2012-4182.html>)
[_CVE-2012-4183_](<https://www.redhat.com/security/data/cve/CVE-2012-4183.html>)
[_CVE-2012-4184_](<https://www.redhat.com/security/data/cve/CVE-2012-4184.html>)
[_CVE-2012-4185_](<https://www.redhat.com/security/data/cve/CVE-2012-4185.html>)
[_CVE-2012-4186_](<https://www.redhat.com/security/data/cve/CVE-2012-4186.html>)
[_CVE-2012-4187_](<https://www.redhat.com/security/data/cve/CVE-2012-4187.html>)
[_CVE-2012-4188_](<https://www.redhat.com/security/data/cve/CVE-2012-4188.html>)
* [_RHSA-2012-1361_](<https://rhn.redhat.com/errata/RHSA-2012-1361.html>)
[_CVE-2012-4193_](<https://www.redhat.com/security/data/cve/CVE-2012-4193.html>)
* [_RHSA-2012-1407_](<https://rhn.redhat.com/errata/RHSA-2012-1407.html>)
[_CVE-2012-4194_](<https://www.redhat.com/security/data/cve/CVE-2012-4194.html>)
[_CVE-2012-4195_](<https://www.redhat.com/security/data/cve/CVE-2012-4195.html>)
[_CVE-2012-4196_](<https://www.redhat.com/security/data/cve/CVE-2012-4196.html>)
* [_RHSA-2012-1482_](<https://rhn.redhat.com/errata/RHSA-2012-1482.html>)
[_CVE-2012-4201_](<https://www.redhat.com/security/data/cve/CVE-2012-4201.html>)
[_CVE-2012-4202_](<https://www.redhat.com/security/data/cve/CVE-2012-4202.html>)
[_CVE-2012-4207_](<https://www.redhat.com/security/data/cve/CVE-2012-4207.html>)
[_CVE-2012-4209_](<https://www.redhat.com/security/data/cve/CVE-2012-4209.html>)
[_CVE-2012-4210_](<https://www.redhat.com/security/data/cve/CVE-2012-4210.html>)
[_CVE-2012-4214_](<https://www.redhat.com/security/data/cve/CVE-2012-4214.html>)
[_CVE-2012-4215_](<https://www.redhat.com/security/data/cve/CVE-2012-4215.html>)
[_CVE-2012-4216_](<https://www.redhat.com/security/data/cve/CVE-2012-4216.html>)
[_CVE-2012-5829_](<https://www.redhat.com/security/data/cve/CVE-2012-5829.html>)
[_CVE-2012-5830_](<https://www.redhat.com/security/data/cve/CVE-2012-5830.html>)
[_CVE-2012-5833_](<https://www.redhat.com/security/data/cve/CVE-2012-5833.html>)
[_CVE-2012-5835_](<https://www.redhat.com/security/data/cve/CVE-2012-5835.html>)
[_CVE-2012-5839_](<https://www.redhat.com/security/data/cve/CVE-2012-5839.html>)
[_CVE-2012-5840_](<https://www.redhat.com/security/data/cve/CVE-2012-5840.html>)
[_CVE-2012-5841_](<https://www.redhat.com/security/data/cve/CVE-2012-5841.html>)
[_CVE-2012-5842_](<https://www.redhat.com/security/data/cve/CVE-2012-5842.html>)
* [](<https://rhn.redhat.com/errata/RHSA-2012-1482.html>)[](<https://rhn.redhat.com/errata/RHSA-2012-1361.html>)[_RHSA-2012-0699_](<https://rhn.redhat.com/errata/RHSA-2012-0699.html>)
[_CVE-2012-2333_](<https://www.redhat.com/security/data/cve/CVE-2012-2333.html>)
* [_RHSA-2012-0518_](<https://rhn.redhat.com/errata/RHSA-2012-0518.html>)
[_CVE-2012-2110_](<https://www.redhat.com/security/data/cve/CVE-2012-2110.html>)
* [_RHSA-2012-0426_](<https://rhn.redhat.com/errata/RHSA-2012-0426.html>)
[_CVE-2012-0884_](<https://www.redhat.com/security/data/cve/CVE-2012-0884.html>)
[_CVE-2012-1165_](<https://www.redhat.com/security/data/cve/CVE-2012-1165.html>)
**RELATED INFORMATION: **
* [_IBM Secure Engineering Web Portal_](<https://www-304.ibm.com/jct03001c/security/secure-engineering/>)
* [_IBM Product Security Incident Response Blog_](<https://www.ibm.com/blogs/PSIRT>)
**CHANGE HISTORY: **
* _28/03/2013__: Original copy published._
* _03/04/2013__: Restructured the document as per new guidelines._
* _30/01/2014__: Restructured the document_
_The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash. _
**_Note: _**_According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY._
[{"Product":{"code":"STAV45","label":"Network Attached Storage (NAS)-\u003EScale Out Network Attached Storage"},"Business Unit":{"code":"BU054","label":"Systems w\/TPS"},"Component":"1.3.2","Platform":[{"code":"PF016","label":"Linux"}],"Version":"1.3.2","Edition":"","Line of Business":{"code":"","label":""}}]
{"ibm": [{"lastseen": "2022-09-29T21:26:05", "description": "## Abstract\n\nStorwize V7000 Unified includes multiple software components for which the vendors have provided fixes for security vulnerabilities in such components.\n\n## Content\n\n**VULNERABILITY DETAILS: ** \n \n**CVE ID:** \n \n\n\n**Vendor**| **Vendor ID**| **Vendor Title**| **Included CVEs** \n---|---|---|--- \nIBM| [_TSM 6.3.1.0_](<http://www-01.ibm.com/support/docview.wss?uid=swg21615292>)| Two unauthorized access vulnerabilities in IBM TSM for Space Management| [_CVE-2012-4859_](<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4859>) \n[_CVE-2012-5954_](<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5954>) \nIBM| [_IBM Java 6.0.0 SR12_](<https://www.ibm.com/developerworks/java/jdk/alerts/>)| Oracle October 16 2012 CPU| [_CVE-2012-5081_](<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5081>) \nRed Hat| [_RHSA-2012-1210_](<https://rhn.redhat.com/errata/RHSA-2012-1210.html>)| Critical: Firefox security update| [_CVE-2012-1970_](<https://www.redhat.com/security/data/cve/CVE-2012-1970.html>) \n[_CVE-2012-1972_](<https://www.redhat.com/security/data/cve/CVE-2012-1972.html>) \n[_CVE-2012-1973_](<https://www.redhat.com/security/data/cve/CVE-2012-1973.html>) \n[_CVE-2012-1974_](<https://www.redhat.com/security/data/cve/CVE-2012-1974.html>) \n[_CVE-2012-1975_](<https://www.redhat.com/security/data/cve/CVE-2012-1975.html>) \n[_CVE-2012-1976_](<https://www.redhat.com/security/data/cve/CVE-2012-1976.html>) \n[_CVE-2012-3956_](<https://www.redhat.com/security/data/cve/CVE-2012-3956.html>) \n[_CVE-2012-3957_](<https://www.redhat.com/security/data/cve/CVE-2012-3957.html>) \n[_CVE-2012-3958_](<https://www.redhat.com/security/data/cve/CVE-2012-3958.html>) \n[_CVE-2012-3959_](<https://www.redhat.com/security/data/cve/CVE-2012-3959.html>) \n[_CVE-2012-3960_](<https://www.redhat.com/security/data/cve/CVE-2012-3960.html>) \n[_CVE-2012-3961_](<https://www.redhat.com/security/data/cve/CVE-2012-3961.html>) \n[_CVE-2012-3962_](<https://www.redhat.com/security/data/cve/CVE-2012-3962.html>) \n[_CVE-2012-3963_](<https://www.redhat.com/security/data/cve/CVE-2012-3963.html>) \n[_CVE-2012-3964_](<https://www.redhat.com/security/data/cve/CVE-2012-3964.html>) \n[_CVE-2012-3966_](<https://www.redhat.com/security/data/cve/CVE-2012-3966.html>) \n[_CVE-2012-3967_](<https://www.redhat.com/security/data/cve/CVE-2012-3967.html>) \n[_CVE-2012-3968_](<https://www.redhat.com/security/data/cve/CVE-2012-3968.html>) \n[_CVE-2012-3969_](<https://www.redhat.com/security/data/cve/CVE-2012-3969.html>) \n[_CVE-2012-3970_](<https://www.redhat.com/security/data/cve/CVE-2012-3970.html>) \n[_CVE-2012-3972_](<https://www.redhat.com/security/data/cve/CVE-2012-3972.html>) \n[_CVE-2012-3976_](<https://www.redhat.com/security/data/cve/CVE-2012-3976.html>) \n[_CVE-2012-3978_](<https://www.redhat.com/security/data/cve/CVE-2012-3978.html>) \n[_CVE-2012-3980_](<https://www.redhat.com/security/data/cve/CVE-2012-3980.html>) \nRed Hat| [_RHSA-2012-1350_](<https://rhn.redhat.com/errata/RHSA-2012-1350.html>)| Critical: Firefox security and bug fix update| [_CVE-2012-1956_](<https://www.redhat.com/security/data/cve/CVE-2012-1956.html>) \n[_CVE-2012-3982_](<https://www.redhat.com/security/data/cve/CVE-2012-3982.html>) \n[_CVE-2012-3986_](<https://www.redhat.com/security/data/cve/CVE-2012-3986.html>) \n[_CVE-2012-3988_](<https://www.redhat.com/security/data/cve/CVE-2012-3988.html>) \n[_CVE-2012-3990_](<https://www.redhat.com/security/data/cve/CVE-2012-3990.html>) \n[_CVE-2012-3991_](<https://www.redhat.com/security/data/cve/CVE-2012-3991.html>) \n[_CVE-2012-3992_](<https://www.redhat.com/security/data/cve/CVE-2012-3992.html>) \n[_CVE-2012-3993_](<https://www.redhat.com/security/data/cve/CVE-2012-3993.html>) \n[_CVE-2012-3994_](<https://www.redhat.com/security/data/cve/CVE-2012-3994.html>) \n[_CVE-2012-3995_](<https://www.redhat.com/security/data/cve/CVE-2012-3995.html>) \n[_CVE-2012-4179_](<https://www.redhat.com/security/data/cve/CVE-2012-4179.html>) \n[_CVE-2012-4180_](<https://www.redhat.com/security/data/cve/CVE-2012-4180.html>) \n[_CVE-2012-4181_](<https://www.redhat.com/security/data/cve/CVE-2012-4181.html>) \n[_CVE-2012-4182_](<https://www.redhat.com/security/data/cve/CVE-2012-4182.html>) \n[_CVE-2012-4183_](<https://www.redhat.com/security/data/cve/CVE-2012-4183.html>) \n[_CVE-2012-4184_](<https://www.redhat.com/security/data/cve/CVE-2012-4184.html>) \n[_CVE-2012-4185_](<https://www.redhat.com/security/data/cve/CVE-2012-4185.html>) \n[_CVE-2012-4186_](<https://www.redhat.com/security/data/cve/CVE-2012-4186.html>) \n[_CVE-2012-4187_](<https://www.redhat.com/security/data/cve/CVE-2012-4187.html>) \n[_CVE-2012-4188_](<https://www.redhat.com/security/data/cve/CVE-2012-4188.html>) \nRed Hat| [_RHSA-2012-1361_](<https://rhn.redhat.com/errata/RHSA-2012-1361.html>)| Critical: xulrunner security update| [_CVE-2012-4193_](<https://www.redhat.com/security/data/cve/CVE-2012-4193.html>) \nRed Hat| [_RHSA-2012-1407_](<https://rhn.redhat.com/errata/RHSA-2012-1407.html>)| Critical: Firefox security update| [_CVE-2012-4194_](<https://www.redhat.com/security/data/cve/CVE-2012-4194.html>) \n[_CVE-2012-4195_](<https://www.redhat.com/security/data/cve/CVE-2012-4195.html>) \n[_CVE-2012-4196_](<https://www.redhat.com/security/data/cve/CVE-2012-4196.html>) \nRed Hat| [_RHSA-2012-1482_](<https://rhn.redhat.com/errata/RHSA-2012-1482.html>)| Critical: Firefox security update| [_CVE-2012-4201_](<https://www.redhat.com/security/data/cve/CVE-2012-4201.html>) \n[_CVE-2012-4202_](<https://www.redhat.com/security/data/cve/CVE-2012-4202.html>) \n[_CVE-2012-4207_](<https://www.redhat.com/security/data/cve/CVE-2012-4207.html>) \n[_CVE-2012-4209_](<https://www.redhat.com/security/data/cve/CVE-2012-4209.html>) \n[_CVE-2012-4210_](<https://www.redhat.com/security/data/cve/CVE-2012-4210.html>) \n[_CVE-2012-4214_](<https://www.redhat.com/security/data/cve/CVE-2012-4214.html>) \n[_CVE-2012-4215_](<https://www.redhat.com/security/data/cve/CVE-2012-4215.html>) \n[_CVE-2012-4216_](<https://www.redhat.com/security/data/cve/CVE-2012-4216.html>) \n[_CVE-2012-5829_](<https://www.redhat.com/security/data/cve/CVE-2012-5829.html>) \n[_CVE-2012-5830_](<https://www.redhat.com/security/data/cve/CVE-2012-5830.html>) \n[_CVE-2012-5833_](<https://www.redhat.com/security/data/cve/CVE-2012-5833.html>) \n[_CVE-2012-5835_](<https://www.redhat.com/security/data/cve/CVE-2012-5835.html>) \n[_CVE-2012-5839_](<https://www.redhat.com/security/data/cve/CVE-2012-5839.html>) \n[_CVE-2012-5840_](<https://www.redhat.com/security/data/cve/CVE-2012-5840.html>) \n[_CVE-2012-5841_](<https://www.redhat.com/security/data/cve/CVE-2012-5841.html>) \n[_CVE-2012-5842_](<https://www.redhat.com/security/data/cve/CVE-2012-5842.html>) \nRed Hat| [_RHSA-2012-0699_](<https://rhn.redhat.com/errata/RHSA-2012-0699.html>)| Moderate: openssl security and bug fix update| [_CVE-2012-2333_](<https://www.redhat.com/security/data/cve/CVE-2012-2333.html>) \nRed Hat| [_RHSA-2012-0518_](<https://rhn.redhat.com/errata/RHSA-2012-0518.html>)| Important: openssl security update| [_CVE-2012-2110_](<https://www.redhat.com/security/data/cve/CVE-2012-2110.html>) \nRed Hat| [_RHSA-2012-0426_](<https://rhn.redhat.com/errata/RHSA-2012-0426.html>)| Moderate: openssl security and bug fix update| [_CVE-2012-0884_](<https://www.redhat.com/security/data/cve/CVE-2012-0884.html>) \n[_CVE-2012-1165_](<https://www.redhat.com/security/data/cve/CVE-2012-1165.html>) \n \n**DESCRIPTION:** \nStorwize V7000 Unified has integrated updated versions of the software components for which the vendors have provided fixes for security vulnerabilities. \n \n \n**CVSS:** \nPlease see vendor documentation for CVSS scores and CVSS vector. \n \n \n**AFFECTED PLATFORMS: **\n\n * **_Affected releases:_**\n * _Storwize V7000 Unified 1.3 code stream_: Storwize V7000 Unified 1.3.0.0 through 1.3.2.0. \n * _Storwize V7000 Unified 1.4 code stream_: Storwize V7000 Unified 1.4.0.X. \n * **_Releases/systems/configurations NOT affected: _**\n * _Storwize V7000 Unified 1.3 code stream_: Storwize V7000 Unified 1.3.2.3 and above. \n * _Storwize V7000 Unified 1.4 code stream_: Refer remediation section below for the list of issues fixed in 1.4.0.4 and 1.4.1.0. \n \n\n\n**REMEDIATION: **\n\n \n**_Vendor Fix(es):_** \n_Storwize V7000 Unified 1.3 code stream_: The issues were fixed beginning with version Storwize V7000 Unified 1.3.2.3. Storwize V7000 Unified customers running an earlier version (e.g. Storwize V7000 Unified 1.3.2.0) must upgrade to Storwize V7000 Unified 1.3.2.3 or a later version in order to get these fixes. \n_Storwize V7000 Unified 1.4 code stream_**:** The OpenSSL issues ([_CVE-2012-2333_](<https://www.redhat.com/security/data/cve/CVE-2012-2333.html>), [_CVE-2012-2110_](<https://www.redhat.com/security/data/cve/CVE-2012-2110.html>), [_CVE-2012-0884_](<https://www.redhat.com/security/data/cve/CVE-2012-0884.html>), [_CVE-2012-1165_](<https://www.redhat.com/security/data/cve/CVE-2012-1165.html>)) were fixed beginning with version Storwize V7000 Unified 1.4.0.4 and above. Remaining CVEs were fixed beginning with version Storwize V7000 Unified 1.4.1.0 and above. \n \n \n**_Workaround(s):_** None. \n \n**_Mitigation(s):_** Storwize V7000 Unified is not exposed to CVEs related to Firefox and Xulrunner during normal operation. Service procedures which use the Firefox web browser may activate the vulnerable code. Service personnel must not browse web pages on the internet to avoid the processing of web pages with malicious content. \n\nCVE-2012-4859 is not directly exploitable on Storwize V7000 Unified, because Storwize V7000 Unified does not provide a capability to logon as native Unix or Linux user.\n\nCVE-2012-5954 impacts only Storwize V7000 Unified systems, which are configured with TSM HSM.\n\n \n \n \n**REFERENCES: ** \n\n\n * [](<https://www-304.ibm.com/support/docview.wss?uid=swg21496117&wv=1>)[__Complete CVSS Guide__](<http://www.first.org/cvss/v2/guide>)\n * [__On-line Calculator V2__](<http://nvd.nist.gov/cvss.cfm?calculator&adv&version=2>)\n * * [_TSM 6.3.1.0_](<http://www-01.ibm.com/support/docview.wss?uid=swg21615292>) \n[_CVE-2012-4859_](<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4859>) \n[_CVE-2012-5954_](<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5954>) \n\n * [_IBM Java 6.0.0 SR12_](<https://www.ibm.com/developerworks/java/jdk/alerts/>) \n[_CVE-2012-5081_](<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5081>) \n\n * [_RHSA-2012-1210_](<https://rhn.redhat.com/errata/RHSA-2012-1210.html>) \n[_CVE-2012-1970_](<https://www.redhat.com/security/data/cve/CVE-2012-1970.html>) \n[_CVE-2012-1972_](<https://www.redhat.com/security/data/cve/CVE-2012-1972.html>) \n[_CVE-2012-1973_](<https://www.redhat.com/security/data/cve/CVE-2012-1973.html>) \n[_CVE-2012-1974_](<https://www.redhat.com/security/data/cve/CVE-2012-1974.html>) \n[_CVE-2012-1975_](<https://www.redhat.com/security/data/cve/CVE-2012-1975.html>) \n[_CVE-2012-1976_](<https://www.redhat.com/security/data/cve/CVE-2012-1976.html>) \n[_CVE-2012-3956_](<https://www.redhat.com/security/data/cve/CVE-2012-3956.html>) \n[_CVE-2012-3957_](<https://www.redhat.com/security/data/cve/CVE-2012-3957.html>) \n[_CVE-2012-3958_](<https://www.redhat.com/security/data/cve/CVE-2012-3958.html>) \n[_CVE-2012-3959_](<https://www.redhat.com/security/data/cve/CVE-2012-3959.html>) \n[_CVE-2012-3960_](<https://www.redhat.com/security/data/cve/CVE-2012-3960.html>) \n[_CVE-2012-3961_](<https://www.redhat.com/security/data/cve/CVE-2012-3961.html>) \n[_CVE-2012-3962_](<https://www.redhat.com/security/data/cve/CVE-2012-3962.html>) \n[_CVE-2012-3963_](<https://www.redhat.com/security/data/cve/CVE-2012-3963.html>) \n[_CVE-2012-3964_](<https://www.redhat.com/security/data/cve/CVE-2012-3964.html>) \n[_CVE-2012-3966_](<https://www.redhat.com/security/data/cve/CVE-2012-3966.html>) \n[_CVE-2012-3967_](<https://www.redhat.com/security/data/cve/CVE-2012-3967.html>) \n[_CVE-2012-3968_](<https://www.redhat.com/security/data/cve/CVE-2012-3968.html>) \n[_CVE-2012-3969_](<https://www.redhat.com/security/data/cve/CVE-2012-3969.html>) \n[_CVE-2012-3970_](<https://www.redhat.com/security/data/cve/CVE-2012-3970.html>) \n[_CVE-2012-3972_](<https://www.redhat.com/security/data/cve/CVE-2012-3972.html>) \n[_CVE-2012-3976_](<https://www.redhat.com/security/data/cve/CVE-2012-3976.html>) \n[_CVE-2012-3978_](<https://www.redhat.com/security/data/cve/CVE-2012-3978.html>) \n[_CVE-2012-3980_](<https://www.redhat.com/security/data/cve/CVE-2012-3980.html>) \n\n * [_RHSA-2012-1350_](<https://rhn.redhat.com/errata/RHSA-2012-1350.html>) \n[_CVE-2012-1956_](<https://www.redhat.com/security/data/cve/CVE-2012-1956.html>) \n[_CVE-2012-3982_](<https://www.redhat.com/security/data/cve/CVE-2012-3982.html>) \n[_CVE-2012-3986_](<https://www.redhat.com/security/data/cve/CVE-2012-3986.html>) \n[_CVE-2012-3988_](<https://www.redhat.com/security/data/cve/CVE-2012-3988.html>) \n[_CVE-2012-3990_](<https://www.redhat.com/security/data/cve/CVE-2012-3990.html>) \n[_CVE-2012-3991_](<https://www.redhat.com/security/data/cve/CVE-2012-3991.html>) \n[_CVE-2012-3992_](<https://www.redhat.com/security/data/cve/CVE-2012-3992.html>) \n[_CVE-2012-3993_](<https://www.redhat.com/security/data/cve/CVE-2012-3993.html>) \n[_CVE-2012-3994_](<https://www.redhat.com/security/data/cve/CVE-2012-3994.html>) \n[_CVE-2012-3995_](<https://www.redhat.com/security/data/cve/CVE-2012-3995.html>) \n[_CVE-2012-4179_](<https://www.redhat.com/security/data/cve/CVE-2012-4179.html>) \n[_CVE-2012-4180_](<https://www.redhat.com/security/data/cve/CVE-2012-4180.html>) \n[_CVE-2012-4181_](<https://www.redhat.com/security/data/cve/CVE-2012-4181.html>) \n[_CVE-2012-4182_](<https://www.redhat.com/security/data/cve/CVE-2012-4182.html>) \n[_CVE-2012-4183_](<https://www.redhat.com/security/data/cve/CVE-2012-4183.html>) \n[_CVE-2012-4184_](<https://www.redhat.com/security/data/cve/CVE-2012-4184.html>) \n[_CVE-2012-4185_](<https://www.redhat.com/security/data/cve/CVE-2012-4185.html>) \n[_CVE-2012-4186_](<https://www.redhat.com/security/data/cve/CVE-2012-4186.html>) \n[_CVE-2012-4187_](<https://www.redhat.com/security/data/cve/CVE-2012-4187.html>) \n[_CVE-2012-4188_](<https://www.redhat.com/security/data/cve/CVE-2012-4188.html>) \n\n * [_RHSA-2012-1361_](<https://rhn.redhat.com/errata/RHSA-2012-1361.html>) \n[_CVE-2012-4193_](<https://www.redhat.com/security/data/cve/CVE-2012-4193.html>) \n\n * [_RHSA-2012-1407_](<https://rhn.redhat.com/errata/RHSA-2012-1407.html>) \n[_CVE-2012-4194_](<https://www.redhat.com/security/data/cve/CVE-2012-4194.html>) \n[_CVE-2012-4195_](<https://www.redhat.com/security/data/cve/CVE-2012-4195.html>) \n[_CVE-2012-4196_](<https://www.redhat.com/security/data/cve/CVE-2012-4196.html>) \n\n * [_RHSA-2012-1482_](<https://rhn.redhat.com/errata/RHSA-2012-1482.html>) \n[_CVE-2012-4201_](<https://www.redhat.com/security/data/cve/CVE-2012-4201.html>) \n[_CVE-2012-4202_](<https://www.redhat.com/security/data/cve/CVE-2012-4202.html>) \n[_CVE-2012-4207_](<https://www.redhat.com/security/data/cve/CVE-2012-4207.html>) \n[_CVE-2012-4209_](<https://www.redhat.com/security/data/cve/CVE-2012-4209.html>) \n[_CVE-2012-4210_](<https://www.redhat.com/security/data/cve/CVE-2012-4210.html>) \n[_CVE-2012-4214_](<https://www.redhat.com/security/data/cve/CVE-2012-4214.html>) \n[_CVE-2012-4215_](<https://www.redhat.com/security/data/cve/CVE-2012-4215.html>) \n[_CVE-2012-4216_](<https://www.redhat.com/security/data/cve/CVE-2012-4216.html>) \n[_CVE-2012-5829_](<https://www.redhat.com/security/data/cve/CVE-2012-5829.html>) \n[_CVE-2012-5830_](<https://www.redhat.com/security/data/cve/CVE-2012-5830.html>) \n[_CVE-2012-5833_](<https://www.redhat.com/security/data/cve/CVE-2012-5833.html>) \n[_CVE-2012-5835_](<https://www.redhat.com/security/data/cve/CVE-2012-5835.html>) \n[_CVE-2012-5839_](<https://www.redhat.com/security/data/cve/CVE-2012-5839.html>) \n[_CVE-2012-5840_](<https://www.redhat.com/security/data/cve/CVE-2012-5840.html>) \n[_CVE-2012-5841_](<https://www.redhat.com/security/data/cve/CVE-2012-5841.html>) \n[_CVE-2012-5842_](<https://www.redhat.com/security/data/cve/CVE-2012-5842.html>)\n * [_RHSA-2012-0699_](<https://rhn.redhat.com/errata/RHSA-2012-0699.html>) \n[_CVE-2012-2333_](<https://www.redhat.com/security/data/cve/CVE-2012-2333.html>) \n\n * [_RHSA-2012-0518_](<https://rhn.redhat.com/errata/RHSA-2012-0518.html>) \n[_CVE-2012-2110_](<https://www.redhat.com/security/data/cve/CVE-2012-2110.html>) \n\n * [_RHSA-2012-0426_](<https://rhn.redhat.com/errata/RHSA-2012-0426.html>) \n[_CVE-2012-0884_](<https://www.redhat.com/security/data/cve/CVE-2012-0884.html>) \n[_CVE-2012-1165_](<https://www.redhat.com/security/data/cve/CVE-2012-1165.html>) \n\n \n**RELATED INFORMATION: ** \n\n\n * [_IBM Secure Engineering Web Portal_](<https://www-304.ibm.com/jct03001c/security/secure-engineering/>)\n * [_IBM Product Security Incident Response Blog_](<https://www.ibm.com/blogs/PSIRT>)\n \n \n \n**CHANGE HISTORY: ** \n\n\n * _03/18/13: Original copy published._\n\n_The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash. _\n\n \n**_Note: _**_According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an \"industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response.\" _ \n_IBM PROVIDES THE CVSS SCORES \"AS IS\" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY._\n\n[{\"Product\":{\"code\":\"ST5Q4U\",\"label\":\"IBM Storwize V7000 Unified (2073)\"},\"Business Unit\":{\"code\":\"BU058\",\"label\":\"IBM Infrastructure w\\/TPS\"},\"Component\":\"1.4\",\"Platform\":[{\"code\":\"PF025\",\"label\":\"Platform Independent\"}],\"Version\":\"1.3;1.4\",\"Edition\":\"\",\"Line of Business\":{\"code\":\"LOB26\",\"label\":\"Storage\"}}]", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2022-09-26T04:23:14", "type": "ibm", "title": "Security Bulletin: Storwize V7000 Unified V1.4.1.0 Includes Fixes for Multiple Vendor Security Vulnerabilities", "bulletinFamily": "software", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2012-0884", "CVE-2012-1165", "CVE-2012-1956", "CVE-2012-1970", "CVE-2012-1972", "CVE-2012-1973", "CVE-2012-1974", "CVE-2012-1975", "CVE-2012-1976", "CVE-2012-2110", "CVE-2012-2333", "CVE-2012-3956", "CVE-2012-3957", "CVE-2012-3958", "CVE-2012-3959", "CVE-2012-3960", "CVE-2012-3961", "CVE-2012-3962", "CVE-2012-3963", "CVE-2012-3964", "CVE-2012-3966", "CVE-2012-3967", "CVE-2012-3968", "CVE-2012-3969", "CVE-2012-3970", "CVE-2012-3972", "CVE-2012-3976", "CVE-2012-3978", "CVE-2012-3980", "CVE-2012-3982", "CVE-2012-3986", "CVE-2012-3988", "CVE-2012-3990", "CVE-2012-3991", "CVE-2012-3992", "CVE-2012-3993", "CVE-2012-3994", "CVE-2012-3995", "CVE-2012-4179", "CVE-2012-4180", "CVE-2012-4181", "CVE-2012-4182", "CVE-2012-4183", "CVE-2012-4184", "CVE-2012-4185", "CVE-2012-4186", "CVE-2012-4187", "CVE-2012-4188", "CVE-2012-4193", "CVE-2012-4194", "CVE-2012-4195", "CVE-2012-4196", "CVE-2012-4201", "CVE-2012-4202", "CVE-2012-4207", "CVE-2012-4209", "CVE-2012-4210", "CVE-2012-4214", "CVE-2012-4215", "CVE-2012-4216", "CVE-2012-4859", "CVE-2012-5081", "CVE-2012-5829", "CVE-2012-5830", "CVE-2012-5833", "CVE-2012-5835", "CVE-2012-5839", "CVE-2012-5840", "CVE-2012-5841", "CVE-2012-5842", "CVE-2012-5954"], "modified": "2022-09-26T04:23:14", "id": "D6EE1AE15F7BD96FCB1799E31A9E36026979DFE8E702302D459578E3398E8FC4", "href": "https://www.ibm.com/support/pages/node/689123", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "openvas": [{"lastseen": "2019-05-29T18:38:45", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2012-08-30T00:00:00", "type": "openvas", "title": "RedHat Update for thunderbird RHSA-2012:1211-01", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-1970", "CVE-2012-1973", "CVE-2012-1974", "CVE-2012-3968", "CVE-2012-3963", "CVE-2012-3978", "CVE-2012-1972", "CVE-2012-3962", "CVE-2012-3969", "CVE-2012-3970", "CVE-2012-3957", "CVE-2012-3958", "CVE-2012-1975", "CVE-2012-3956", "CVE-2012-3966", "CVE-2012-3967", "CVE-2012-3959", "CVE-2012-3980", "CVE-2012-3960", "CVE-2012-1976", "CVE-2012-3972", "CVE-2012-3964", "CVE-2012-3961"], "modified": "2018-11-23T00:00:00", "id": "OPENVAS:1361412562310870817", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310870817", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for thunderbird RHSA-2012:1211-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"https://www.redhat.com/archives/rhsa-announce/2012-August/msg00030.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.870817\");\n script_version(\"$Revision: 12497 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-11-23 09:28:21 +0100 (Fri, 23 Nov 2018) $\");\n script_tag(name:\"creation_date\", value:\"2012-08-30 10:35:23 +0530 (Thu, 30 Aug 2012)\");\n script_cve_id(\"CVE-2012-1970\", \"CVE-2012-1972\", \"CVE-2012-1973\", \"CVE-2012-1974\",\n \"CVE-2012-1975\", \"CVE-2012-1976\", \"CVE-2012-3956\", \"CVE-2012-3957\",\n \"CVE-2012-3958\", \"CVE-2012-3959\", \"CVE-2012-3960\", \"CVE-2012-3961\",\n \"CVE-2012-3962\", \"CVE-2012-3963\", \"CVE-2012-3964\", \"CVE-2012-3966\",\n \"CVE-2012-3967\", \"CVE-2012-3968\", \"CVE-2012-3969\", \"CVE-2012-3970\",\n \"CVE-2012-3972\", \"CVE-2012-3978\", \"CVE-2012-3980\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name:\"RHSA\", value:\"2012:1211-01\");\n script_name(\"RedHat Update for thunderbird RHSA-2012:1211-01\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'thunderbird'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\", re:\"ssh/login/release=RHENT_6\");\n script_tag(name:\"affected\", value:\"thunderbird on Red Hat Enterprise Linux Desktop (v. 6),\n Red Hat Enterprise Linux Workstation (v. 6)\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"insight\", value:\"Mozilla Thunderbird is a standalone mail and newsgroup client.\n\n Several flaws were found in the processing of malformed content. Malicious\n content could cause Thunderbird to crash or, potentially, execute arbitrary\n code with the privileges of the user running Thunderbird. (CVE-2012-1970,\n CVE-2012-1972, CVE-2012-1973, CVE-2012-1974, CVE-2012-1975, CVE-2012-1976,\n CVE-2012-3956, CVE-2012-3957, CVE-2012-3958, CVE-2012-3959, CVE-2012-3960,\n CVE-2012-3961, CVE-2012-3962, CVE-2012-3963, CVE-2012-3964)\n\n Content containing a malicious Scalable Vector Graphics (SVG) image file\n could cause Thunderbird to crash or, potentially, execute arbitrary code\n with the privileges of the user running Thunderbird. (CVE-2012-3969,\n CVE-2012-3970)\n\n Two flaws were found in the way Thunderbird rendered certain images using\n WebGL. Malicious content could cause Thunderbird to crash or, under certain\n conditions, possibly execute arbitrary code with the privileges of the user\n running Thunderbird. (CVE-2012-3967, CVE-2012-3968)\n\n A flaw was found in the way Thunderbird decoded embedded bitmap images in\n Icon Format (ICO) files. Content containing a malicious ICO file could\n cause Thunderbird to crash or, under certain conditions, possibly execute\n arbitrary code with the privileges of the user running Thunderbird.\n (CVE-2012-3966)\n\n Red Hat would like to thank the Mozilla project for reporting these issues.\n Upstream acknowledges Gary Kwong, Christian Holler, Jesse Ruderman, John\n Schoenick, Vladimir Vukicevic, Daniel Holbert, Abhishek Arya, Frederic\n Hoguin, miaubiz, Arthur Gerkis, Nicolas Gregoire, moz_bug_r_a4, and Colby\n Russell as the original reporters of these issues.\n\n Description truncated, please see the referenced URL(s) for more information.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"RHENT_6\")\n{\n\n if ((res = isrpmvuln(pkg:\"thunderbird\", rpm:\"thunderbird~10.0.7~1.el6_3\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"thunderbird-debuginfo\", rpm:\"thunderbird-debuginfo~10.0.7~1.el6_3\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2018-01-06T13:07:20", "description": "Check for the Version of thunderbird", "cvss3": {}, "published": "2012-08-30T00:00:00", "type": "openvas", "title": "RedHat Update for thunderbird RHSA-2012:1211-01", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-1970", "CVE-2012-1973", "CVE-2012-1974", "CVE-2012-3968", "CVE-2012-3963", "CVE-2012-3978", "CVE-2012-1972", "CVE-2012-3962", "CVE-2012-3969", "CVE-2012-3970", "CVE-2012-3957", "CVE-2012-3958", "CVE-2012-1975", "CVE-2012-3956", "CVE-2012-3966", "CVE-2012-3967", "CVE-2012-3959", "CVE-2012-3980", "CVE-2012-3960", "CVE-2012-1976", "CVE-2012-3972", "CVE-2012-3964", "CVE-2012-3961"], "modified": "2018-01-05T00:00:00", "id": "OPENVAS:870817", "href": "http://plugins.openvas.org/nasl.php?oid=870817", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for thunderbird RHSA-2012:1211-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Mozilla Thunderbird is a standalone mail and newsgroup client.\n\n Several flaws were found in the processing of malformed content. Malicious\n content could cause Thunderbird to crash or, potentially, execute arbitrary\n code with the privileges of the user running Thunderbird. (CVE-2012-1970,\n CVE-2012-1972, CVE-2012-1973, CVE-2012-1974, CVE-2012-1975, CVE-2012-1976,\n CVE-2012-3956, CVE-2012-3957, CVE-2012-3958, CVE-2012-3959, CVE-2012-3960,\n CVE-2012-3961, CVE-2012-3962, CVE-2012-3963, CVE-2012-3964)\n\n Content containing a malicious Scalable Vector Graphics (SVG) image file\n could cause Thunderbird to crash or, potentially, execute arbitrary code\n with the privileges of the user running Thunderbird. (CVE-2012-3969,\n CVE-2012-3970)\n\n Two flaws were found in the way Thunderbird rendered certain images using\n WebGL. Malicious content could cause Thunderbird to crash or, under certain\n conditions, possibly execute arbitrary code with the privileges of the user\n running Thunderbird. (CVE-2012-3967, CVE-2012-3968)\n\n A flaw was found in the way Thunderbird decoded embedded bitmap images in\n Icon Format (ICO) files. Content containing a malicious ICO file could\n cause Thunderbird to crash or, under certain conditions, possibly execute\n arbitrary code with the privileges of the user running Thunderbird.\n (CVE-2012-3966)\n\n Red Hat would like to thank the Mozilla project for reporting these issues.\n Upstream acknowledges Gary Kwong, Christian Holler, Jesse Ruderman, John\n Schoenick, Vladimir Vukicevic, Daniel Holbert, Abhishek Arya, Fr\u00e9d\u00e9ric\n Hoguin, miaubiz, Arthur Gerkis, Nicolas Gr\u00e9goire, moz_bug_r_a4, and Colby\n Russell as the original reporters of these issues.\n\n Description truncated, for more information please check the Reference URL\";\n\ntag_affected = \"thunderbird on Red Hat Enterprise Linux Desktop (v. 6),\n Red Hat Enterprise Linux Workstation (v. 6)\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/rhsa-announce/2012-August/msg00030.html\");\n script_id(870817);\n script_version(\"$Revision: 8295 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-05 07:29:18 +0100 (Fri, 05 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2012-08-30 10:35:23 +0530 (Thu, 30 Aug 2012)\");\n script_cve_id(\"CVE-2012-1970\", \"CVE-2012-1972\", \"CVE-2012-1973\", \"CVE-2012-1974\",\n \"CVE-2012-1975\", \"CVE-2012-1976\", \"CVE-2012-3956\", \"CVE-2012-3957\",\n \"CVE-2012-3958\", \"CVE-2012-3959\", \"CVE-2012-3960\", \"CVE-2012-3961\",\n \"CVE-2012-3962\", \"CVE-2012-3963\", \"CVE-2012-3964\", \"CVE-2012-3966\",\n \"CVE-2012-3967\", \"CVE-2012-3968\", \"CVE-2012-3969\", \"CVE-2012-3970\",\n \"CVE-2012-3972\", \"CVE-2012-3978\", \"CVE-2012-3980\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"RHSA\", value: \"2012:1211-01\");\n script_name(\"RedHat Update for thunderbird RHSA-2012:1211-01\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of thunderbird\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"RHENT_6\")\n{\n\n if ((res = isrpmvuln(pkg:\"thunderbird\", rpm:\"thunderbird~10.0.7~1.el6_3\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"thunderbird-debuginfo\", rpm:\"thunderbird-debuginfo~10.0.7~1.el6_3\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-05-29T18:38:44", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2012-08-30T00:00:00", "type": "openvas", "title": "CentOS Update for thunderbird CESA-2012:1211 centos5", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-1970", "CVE-2012-1973", "CVE-2012-1974", "CVE-2012-3968", "CVE-2012-3963", "CVE-2012-3978", "CVE-2012-1972", "CVE-2012-3962", "CVE-2012-3969", "CVE-2012-3970", "CVE-2012-3957", "CVE-2012-3958", "CVE-2012-1975", "CVE-2012-3956", "CVE-2012-3966", "CVE-2012-3967", "CVE-2012-3959", "CVE-2012-3980", "CVE-2012-3960", "CVE-2012-1976", "CVE-2012-3972", "CVE-2012-3964", "CVE-2012-3961"], "modified": "2019-03-15T00:00:00", "id": "OPENVAS:1361412562310881480", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310881480", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for thunderbird CESA-2012:1211 centos5\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.centos.org/pipermail/centos-announce/2012-August/018833.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.881480\");\n script_version(\"$Revision: 14222 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 13:50:48 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2012-08-30 10:44:44 +0530 (Thu, 30 Aug 2012)\");\n script_cve_id(\"CVE-2012-1970\", \"CVE-2012-1972\", \"CVE-2012-1973\", \"CVE-2012-1974\",\n \"CVE-2012-1975\", \"CVE-2012-1976\", \"CVE-2012-3956\", \"CVE-2012-3957\",\n \"CVE-2012-3958\", \"CVE-2012-3959\", \"CVE-2012-3960\", \"CVE-2012-3961\",\n \"CVE-2012-3962\", \"CVE-2012-3963\", \"CVE-2012-3964\", \"CVE-2012-3966\",\n \"CVE-2012-3967\", \"CVE-2012-3968\", \"CVE-2012-3969\", \"CVE-2012-3970\",\n \"CVE-2012-3972\", \"CVE-2012-3978\", \"CVE-2012-3980\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name:\"CESA\", value:\"2012:1211\");\n script_name(\"CentOS Update for thunderbird CESA-2012:1211 centos5\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'thunderbird'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\", re:\"ssh/login/release=CentOS5\");\n script_tag(name:\"affected\", value:\"thunderbird on CentOS 5\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n script_tag(name:\"insight\", value:\"Mozilla Thunderbird is a standalone mail and newsgroup client.\n\n Several flaws were found in the processing of malformed content. Malicious\n content could cause Thunderbird to crash or, potentially, execute arbitrary\n code with the privileges of the user running Thunderbird. (CVE-2012-1970,\n CVE-2012-1972, CVE-2012-1973, CVE-2012-1974, CVE-2012-1975, CVE-2012-1976,\n CVE-2012-3956, CVE-2012-3957, CVE-2012-3958, CVE-2012-3959, CVE-2012-3960,\n CVE-2012-3961, CVE-2012-3962, CVE-2012-3963, CVE-2012-3964)\n\n Content containing a malicious Scalable Vector Graphics (SVG) image file\n could cause Thunderbird to crash or, potentially, execute arbitrary code\n with the privileges of the user running Thunderbird. (CVE-2012-3969,\n CVE-2012-3970)\n\n Two flaws were found in the way Thunderbird rendered certain images using\n WebGL. Malicious content could cause Thunderbird to crash or, under certain\n conditions, possibly execute arbitrary code with the privileges of the user\n running Thunderbird. (CVE-2012-3967, CVE-2012-3968)\n\n A flaw was found in the way Thunderbird decoded embedded bitmap images in\n Icon Format (ICO) files. Content containing a malicious ICO file could\n cause Thunderbird to crash or, under certain conditions, possibly execute\n arbitrary code with the privileges of the user running Thunderbird.\n (CVE-2012-3966)\n\n A flaw was found in the way the 'eval' command was handled by the\n Thunderbird Error Console. Running 'eval' in the Error Console while\n viewing malicious content could possibly cause Thunderbird to execute\n arbitrary code with the privileges of the user running Thunderbird.\n (CVE-2012-3980)\n\n An out-of-bounds memory read flaw was found in the way Thunderbird used the\n format-number feature of XSLT (Extensible Stylesheet Language\n Transformations). Malicious content could possibly cause an information\n leak, or cause Thunderbird to crash. (CVE-2012-3972)\n\n A flaw was found in the location object implementation in Thunderbird.\n Malicious content could use this flaw to possibly allow restricted content\n to be loaded. (CVE-2012-3978)\n\n Red Hat would like to thank the Mozilla project for reporting these issues.\n Upstream acknowledges Gary Kwong, Christian Holler, Jesse Ruderman, John\n Schoenick, Vladimir Vukicevic, Daniel Holbert, Abhishek Arya, Fr\u00e9d\u00e9ric\n Hoguin, miaubiz, Arthur Gerkis, Nicolas Gr\u00e9goire, moz_bug_r_a4, and Colby\n Russell as the original reporters of these issues.\n\n Note: All issues except CVE-2012-3969 and CVE-2012-3970 cannot be exploited\n by a specially-crafted HTML mail message as JavaScrip ...\n\n Description truncated, please see the referenced URL(s) for more information.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"CentOS5\")\n{\n\n if ((res = isrpmvuln(pkg:\"thunderbird\", rpm:\"thunderbird~10.0.7~1.el5.centos\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2018-01-03T10:57:56", "description": "Check for the Version of thunderbird", "cvss3": {}, "published": "2012-08-30T00:00:00", "type": "openvas", "title": "CentOS Update for thunderbird CESA-2012:1211 centos6 ", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-1970", "CVE-2012-1973", "CVE-2012-1974", "CVE-2012-3968", "CVE-2012-3963", "CVE-2012-3978", "CVE-2012-1972", "CVE-2012-3962", "CVE-2012-3969", "CVE-2012-3970", "CVE-2012-3957", "CVE-2012-3958", "CVE-2012-1975", "CVE-2012-3956", "CVE-2012-3966", "CVE-2012-3967", "CVE-2012-3959", "CVE-2012-3980", "CVE-2012-3960", "CVE-2012-1976", "CVE-2012-3972", "CVE-2012-3964", "CVE-2012-3961"], "modified": "2018-01-03T00:00:00", "id": "OPENVAS:881478", "href": "http://plugins.openvas.org/nasl.php?oid=881478", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for thunderbird CESA-2012:1211 centos6 \n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Mozilla Thunderbird is a standalone mail and newsgroup client.\n\n Several flaws were found in the processing of malformed content. Malicious\n content could cause Thunderbird to crash or, potentially, execute arbitrary\n code with the privileges of the user running Thunderbird. (CVE-2012-1970,\n CVE-2012-1972, CVE-2012-1973, CVE-2012-1974, CVE-2012-1975, CVE-2012-1976,\n CVE-2012-3956, CVE-2012-3957, CVE-2012-3958, CVE-2012-3959, CVE-2012-3960,\n CVE-2012-3961, CVE-2012-3962, CVE-2012-3963, CVE-2012-3964)\n \n Content containing a malicious Scalable Vector Graphics (SVG) image file\n could cause Thunderbird to crash or, potentially, execute arbitrary code\n with the privileges of the user running Thunderbird. (CVE-2012-3969,\n CVE-2012-3970)\n \n Two flaws were found in the way Thunderbird rendered certain images using\n WebGL. Malicious content could cause Thunderbird to crash or, under certain\n conditions, possibly execute arbitrary code with the privileges of the user\n running Thunderbird. (CVE-2012-3967, CVE-2012-3968)\n \n A flaw was found in the way Thunderbird decoded embedded bitmap images in\n Icon Format (ICO) files. Content containing a malicious ICO file could\n cause Thunderbird to crash or, under certain conditions, possibly execute\n arbitrary code with the privileges of the user running Thunderbird.\n (CVE-2012-3966)\n \n A flaw was found in the way the "eval" command was handled by the\n Thunderbird Error Console. Running "eval" in the Error Console while\n viewing malicious content could possibly cause Thunderbird to execute\n arbitrary code with the privileges of the user running Thunderbird.\n (CVE-2012-3980)\n \n An out-of-bounds memory read flaw was found in the way Thunderbird used the\n format-number feature of XSLT (Extensible Stylesheet Language\n Transformations). Malicious content could possibly cause an information\n leak, or cause Thunderbird to crash. (CVE-2012-3972)\n \n A flaw was found in the location object implementation in Thunderbird.\n Malicious content could use this flaw to possibly allow restricted content\n to be loaded. (CVE-2012-3978)\n \n Red Hat would like to thank the Mozilla project for reporting these issues.\n Upstream acknowledges Gary Kwong, Christian Holler, Jesse Ruderman, John\n Schoenick, Vladimir Vukicevic, Daniel Holbert, Abhishek Arya, Fr\u00e9d\u00e9ric\n Hoguin, miaubiz, Arthur Gerkis, Nicolas Gr\u00e9goire, moz_bug_r_a4, and Colby\n Russell as the original reporters of these issues.\n \n Note: All issues except CVE-2012-3969 and CVE-2012-3970 cannot be exploited\n by a specially-crafted HTML mail message as JavaScrip ... \n\n Description truncated, for more information please check the Reference URL\";\n\ntag_affected = \"thunderbird on CentOS 6\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.centos.org/pipermail/centos-announce/2012-August/018835.html\");\n script_id(881478);\n script_version(\"$Revision: 8273 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-03 07:29:19 +0100 (Wed, 03 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2012-08-30 10:40:41 +0530 (Thu, 30 Aug 2012)\");\n script_cve_id(\"CVE-2012-1970\", \"CVE-2012-1972\", \"CVE-2012-1973\", \"CVE-2012-1974\",\n \"CVE-2012-1975\", \"CVE-2012-1976\", \"CVE-2012-3956\", \"CVE-2012-3957\",\n \"CVE-2012-3958\", \"CVE-2012-3959\", \"CVE-2012-3960\", \"CVE-2012-3961\",\n \"CVE-2012-3962\", \"CVE-2012-3963\", \"CVE-2012-3964\", \"CVE-2012-3966\",\n \"CVE-2012-3967\", \"CVE-2012-3968\", \"CVE-2012-3969\", \"CVE-2012-3970\",\n \"CVE-2012-3972\", \"CVE-2012-3978\", \"CVE-2012-3980\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"CESA\", value: \"2012:1211\");\n script_name(\"CentOS Update for thunderbird CESA-2012:1211 centos6 \");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of thunderbird\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"CentOS6\")\n{\n\n if ((res = isrpmvuln(pkg:\"thunderbird\", rpm:\"thunderbird~10.0.7~1.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-05-29T18:39:19", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2012-08-30T00:00:00", "type": "openvas", "title": "RedHat Update for firefox RHSA-2012:1210-01", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-1970", "CVE-2012-1973", "CVE-2012-1974", "CVE-2012-3968", "CVE-2012-3963", "CVE-2012-3978", "CVE-2012-3976", "CVE-2012-1972", "CVE-2012-3962", "CVE-2012-3969", "CVE-2012-3970", "CVE-2012-3957", "CVE-2012-3958", "CVE-2012-1975", "CVE-2012-3956", "CVE-2012-3966", "CVE-2012-3967", "CVE-2012-3959", "CVE-2012-3980", "CVE-2012-3960", "CVE-2012-1976", "CVE-2012-3972", "CVE-2012-3964", "CVE-2012-3961"], "modified": "2019-03-12T00:00:00", "id": "OPENVAS:1361412562310870818", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310870818", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for firefox RHSA-2012:1210-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"https://www.redhat.com/archives/rhsa-announce/2012-August/msg00029.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.870818\");\n script_version(\"$Revision: 14114 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-12 12:48:52 +0100 (Tue, 12 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2012-08-30 10:37:45 +0530 (Thu, 30 Aug 2012)\");\n script_cve_id(\"CVE-2012-1970\", \"CVE-2012-1972\", \"CVE-2012-1973\", \"CVE-2012-1974\",\n \"CVE-2012-1975\", \"CVE-2012-1976\", \"CVE-2012-3956\", \"CVE-2012-3957\",\n \"CVE-2012-3958\", \"CVE-2012-3959\", \"CVE-2012-3960\", \"CVE-2012-3961\",\n \"CVE-2012-3962\", \"CVE-2012-3963\", \"CVE-2012-3964\", \"CVE-2012-3966\",\n \"CVE-2012-3967\", \"CVE-2012-3968\", \"CVE-2012-3969\", \"CVE-2012-3970\",\n \"CVE-2012-3972\", \"CVE-2012-3976\", \"CVE-2012-3978\", \"CVE-2012-3980\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name:\"RHSA\", value:\"2012:1210-01\");\n script_name(\"RedHat Update for firefox RHSA-2012:1210-01\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'firefox'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\", re:\"ssh/login/release=RHENT_(6|5)\");\n script_tag(name:\"affected\", value:\"firefox on Red Hat Enterprise Linux (v. 5 server),\n Red Hat Enterprise Linux Desktop (v. 6),\n Red Hat Enterprise Linux Server (v. 6),\n Red Hat Enterprise Linux Workstation (v. 6)\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"insight\", value:\"Mozilla Firefox is an open source web browser. XULRunner provides the XUL\n Runtime environment for Mozilla Firefox.\n\n A web page containing malicious content could cause Firefox to crash or,\n potentially, execute arbitrary code with the privileges of the user running\n Firefox. (CVE-2012-1970, CVE-2012-1972, CVE-2012-1973, CVE-2012-1974,\n CVE-2012-1975, CVE-2012-1976, CVE-2012-3956, CVE-2012-3957, CVE-2012-3958,\n CVE-2012-3959, CVE-2012-3960, CVE-2012-3961, CVE-2012-3962, CVE-2012-3963,\n CVE-2012-3964)\n\n A web page containing a malicious Scalable Vector Graphics (SVG) image file\n could cause Firefox to crash or, potentially, execute arbitrary code with\n the privileges of the user running Firefox. (CVE-2012-3969, CVE-2012-3970)\n\n Two flaws were found in the way Firefox rendered certain images using\n WebGL. A web page containing malicious content could cause Firefox to crash\n or, under certain conditions, possibly execute arbitrary code with the\n privileges of the user running Firefox. (CVE-2012-3967, CVE-2012-3968)\n\n A flaw was found in the way Firefox decoded embedded bitmap images in Icon\n Format (ICO) files. A web page containing a malicious ICO file could cause\n Firefox to crash or, under certain conditions, possibly execute arbitrary\n code with the privileges of the user running Firefox. (CVE-2012-3966)\n\n A flaw was found in the way the 'eval' command was handled by the Firefox\n Web Console. Running 'eval' in the Web Console while viewing a web page\n containing malicious content could possibly cause Firefox to execute\n arbitrary code with the privileges of the user running Firefox.\n (CVE-2012-3980)\n\n An out-of-bounds memory read flaw was found in the way Firefox used the\n format-number feature of XSLT (Extensible Stylesheet Language\n Transformations). A web page containing malicious content could possibly\n cause an information leak, or cause Firefox to crash. (CVE-2012-3972)\n\n Description truncated, please see the referenced URL(s) for more information.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"RHENT_6\")\n{\n\n if ((res = isrpmvuln(pkg:\"firefox\", rpm:\"firefox~10.0.7~1.el6_3\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-debuginfo\", rpm:\"firefox-debuginfo~10.0.7~1.el6_3\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner\", rpm:\"xulrunner~10.0.7~1.el6_3\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner-debuginfo\", rpm:\"xulrunner-debuginfo~10.0.7~1.el6_3\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"RHENT_5\")\n{\n\n if ((res = isrpmvuln(pkg:\"firefox\", rpm:\"firefox~10.0.7~1.el5_8\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-debuginfo\", rpm:\"firefox-debuginfo~10.0.7~1.el5_8\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner\", rpm:\"xulrunner~10.0.7~2.el5_8\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner-debuginfo\", rpm:\"xulrunner-debuginfo~10.0.7~2.el5_8\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner-devel\", rpm:\"xulrunner-devel~10.0.7~2.el5_8\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2018-01-02T10:57:08", "description": "Check for the Version of firefox", "cvss3": {}, "published": "2012-08-30T00:00:00", "type": "openvas", "title": "RedHat Update for firefox RHSA-2012:1210-01", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-1970", "CVE-2012-1973", "CVE-2012-1974", "CVE-2012-3968", "CVE-2012-3963", "CVE-2012-3978", "CVE-2012-3976", "CVE-2012-1972", "CVE-2012-3962", "CVE-2012-3969", "CVE-2012-3970", "CVE-2012-3957", "CVE-2012-3958", "CVE-2012-1975", "CVE-2012-3956", "CVE-2012-3966", "CVE-2012-3967", "CVE-2012-3959", "CVE-2012-3980", "CVE-2012-3960", "CVE-2012-1976", "CVE-2012-3972", "CVE-2012-3964", "CVE-2012-3961"], "modified": "2017-12-27T00:00:00", "id": "OPENVAS:870818", "href": "http://plugins.openvas.org/nasl.php?oid=870818", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for firefox RHSA-2012:1210-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Mozilla Firefox is an open source web browser. XULRunner provides the XUL\n Runtime environment for Mozilla Firefox.\n\n A web page containing malicious content could cause Firefox to crash or,\n potentially, execute arbitrary code with the privileges of the user running\n Firefox. (CVE-2012-1970, CVE-2012-1972, CVE-2012-1973, CVE-2012-1974,\n CVE-2012-1975, CVE-2012-1976, CVE-2012-3956, CVE-2012-3957, CVE-2012-3958,\n CVE-2012-3959, CVE-2012-3960, CVE-2012-3961, CVE-2012-3962, CVE-2012-3963,\n CVE-2012-3964)\n\n A web page containing a malicious Scalable Vector Graphics (SVG) image file\n could cause Firefox to crash or, potentially, execute arbitrary code with\n the privileges of the user running Firefox. (CVE-2012-3969, CVE-2012-3970)\n\n Two flaws were found in the way Firefox rendered certain images using\n WebGL. A web page containing malicious content could cause Firefox to crash\n or, under certain conditions, possibly execute arbitrary code with the\n privileges of the user running Firefox. (CVE-2012-3967, CVE-2012-3968)\n\n A flaw was found in the way Firefox decoded embedded bitmap images in Icon\n Format (ICO) files. A web page containing a malicious ICO file could cause\n Firefox to crash or, under certain conditions, possibly execute arbitrary\n code with the privileges of the user running Firefox. (CVE-2012-3966)\n\n A flaw was found in the way the "eval" command was handled by the Firefox\n Web Console. Running "eval" in the Web Console while viewing a web page\n containing malicious content could possibly cause Firefox to execute\n arbitrary code with the privileges of the user running Firefox.\n (CVE-2012-3980)\n\n An out-of-bounds memory read flaw was found in the way Firefox used the\n format-number feature of XSLT (Extensible Stylesheet Language\n Transformations). A web page containing malicious content could possibly\n cause an information leak, or cause Firefox to crash. (CVE-2012-3972)\n\n Description truncated, for more information please check the Reference URL\";\n\ntag_affected = \"firefox on Red Hat Enterprise Linux (v. 5 server),\n Red Hat Enterprise Linux Desktop (v. 6),\n Red Hat Enterprise Linux Server (v. 6),\n Red Hat Enterprise Linux Workstation (v. 6)\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/rhsa-announce/2012-August/msg00029.html\");\n script_id(870818);\n script_version(\"$Revision: 8249 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-27 07:29:56 +0100 (Wed, 27 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2012-08-30 10:37:45 +0530 (Thu, 30 Aug 2012)\");\n script_cve_id(\"CVE-2012-1970\", \"CVE-2012-1972\", \"CVE-2012-1973\", \"CVE-2012-1974\",\n \"CVE-2012-1975\", \"CVE-2012-1976\", \"CVE-2012-3956\", \"CVE-2012-3957\",\n \"CVE-2012-3958\", \"CVE-2012-3959\", \"CVE-2012-3960\", \"CVE-2012-3961\",\n \"CVE-2012-3962\", \"CVE-2012-3963\", \"CVE-2012-3964\", \"CVE-2012-3966\",\n \"CVE-2012-3967\", \"CVE-2012-3968\", \"CVE-2012-3969\", \"CVE-2012-3970\",\n \"CVE-2012-3972\", \"CVE-2012-3976\", \"CVE-2012-3978\", \"CVE-2012-3980\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"RHSA\", value: \"2012:1210-01\");\n script_name(\"RedHat Update for firefox RHSA-2012:1210-01\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of firefox\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"RHENT_6\")\n{\n\n if ((res = isrpmvuln(pkg:\"firefox\", rpm:\"firefox~10.0.7~1.el6_3\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-debuginfo\", rpm:\"firefox-debuginfo~10.0.7~1.el6_3\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner\", rpm:\"xulrunner~10.0.7~1.el6_3\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner-debuginfo\", rpm:\"xulrunner-debuginfo~10.0.7~1.el6_3\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"RHENT_5\")\n{\n\n if ((res = isrpmvuln(pkg:\"firefox\", rpm:\"firefox~10.0.7~1.el5_8\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-debuginfo\", rpm:\"firefox-debuginfo~10.0.7~1.el5_8\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner\", rpm:\"xulrunner~10.0.7~2.el5_8\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner-debuginfo\", rpm:\"xulrunner-debuginfo~10.0.7~2.el5_8\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner-devel\", rpm:\"xulrunner-devel~10.0.7~2.el5_8\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-05-29T18:36:10", "description": "Oracle Linux Local Security Checks ELSA-2012-1211", "cvss3": {}, "published": "2015-10-06T00:00:00", "type": "openvas", "title": "Oracle Linux Local Check: ELSA-2012-1211", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-1970", "CVE-2012-1973", "CVE-2012-1974", "CVE-2012-3968", "CVE-2012-3963", "CVE-2012-3978", "CVE-2012-1972", "CVE-2012-3962", "CVE-2012-3969", "CVE-2012-3970", "CVE-2012-3957", "CVE-2012-3958", "CVE-2012-1975", "CVE-2012-3956", "CVE-2012-3966", "CVE-2012-3967", "CVE-2012-3959", "CVE-2012-3980", "CVE-2012-3960", "CVE-2012-1976", "CVE-2012-3972", "CVE-2012-3964", "CVE-2012-3961"], "modified": "2018-09-28T00:00:00", "id": "OPENVAS:1361412562310123835", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310123835", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: ELSA-2012-1211.nasl 11688 2018-09-28 13:36:28Z cfischer $\n#\n# Oracle Linux Local Check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.123835\");\n script_version(\"$Revision: 11688 $\");\n script_tag(name:\"creation_date\", value:\"2015-10-06 14:09:11 +0300 (Tue, 06 Oct 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-09-28 15:36:28 +0200 (Fri, 28 Sep 2018) $\");\n script_name(\"Oracle Linux Local Check: ELSA-2012-1211\");\n script_tag(name:\"insight\", value:\"ELSA-2012-1211 - thunderbird security update. Please see the references for more insight.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"summary\", value:\"Oracle Linux Local Security Checks ELSA-2012-1211\");\n script_xref(name:\"URL\", value:\"http://linux.oracle.com/errata/ELSA-2012-1211.html\");\n script_cve_id(\"CVE-2012-1970\", \"CVE-2012-1972\", \"CVE-2012-1973\", \"CVE-2012-1974\", \"CVE-2012-1975\", \"CVE-2012-1976\", \"CVE-2012-3956\", \"CVE-2012-3957\", \"CVE-2012-3958\", \"CVE-2012-3959\", \"CVE-2012-3960\", \"CVE-2012-3961\", \"CVE-2012-3962\", \"CVE-2012-3963\", \"CVE-2012-3964\", \"CVE-2012-3966\", \"CVE-2012-3967\", \"CVE-2012-3968\", \"CVE-2012-3969\", \"CVE-2012-3970\", \"CVE-2012-3972\", \"CVE-2012-3978\", \"CVE-2012-3980\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/oracle_linux\", \"ssh/login/release\", re:\"ssh/login/release=OracleLinux6\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Eero Volotinen\");\n script_family(\"Oracle Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"OracleLinux6\")\n{\n if ((res = isrpmvuln(pkg:\"thunderbird\", rpm:\"thunderbird~10.0.7~1.0.1.el6_3\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif (__pkg_match) exit(99);\n exit(0);\n\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2018-01-08T12:58:27", "description": "Check for the Version of thunderbird", "cvss3": {}, "published": "2012-08-30T00:00:00", "type": "openvas", "title": "CentOS Update for thunderbird CESA-2012:1211 centos5 ", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-1970", "CVE-2012-1973", "CVE-2012-1974", "CVE-2012-3968", "CVE-2012-3963", "CVE-2012-3978", "CVE-2012-1972", "CVE-2012-3962", "CVE-2012-3969", "CVE-2012-3970", "CVE-2012-3957", "CVE-2012-3958", "CVE-2012-1975", "CVE-2012-3956", "CVE-2012-3966", "CVE-2012-3967", "CVE-2012-3959", "CVE-2012-3980", "CVE-2012-3960", "CVE-2012-1976", "CVE-2012-3972", "CVE-2012-3964", "CVE-2012-3961"], "modified": "2018-01-08T00:00:00", "id": "OPENVAS:881480", "href": "http://plugins.openvas.org/nasl.php?oid=881480", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for thunderbird CESA-2012:1211 centos5 \n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Mozilla Thunderbird is a standalone mail and newsgroup client.\n\n Several flaws were found in the processing of malformed content. Malicious\n content could cause Thunderbird to crash or, potentially, execute arbitrary\n code with the privileges of the user running Thunderbird. (CVE-2012-1970,\n CVE-2012-1972, CVE-2012-1973, CVE-2012-1974, CVE-2012-1975, CVE-2012-1976,\n CVE-2012-3956, CVE-2012-3957, CVE-2012-3958, CVE-2012-3959, CVE-2012-3960,\n CVE-2012-3961, CVE-2012-3962, CVE-2012-3963, CVE-2012-3964)\n \n Content containing a malicious Scalable Vector Graphics (SVG) image file\n could cause Thunderbird to crash or, potentially, execute arbitrary code\n with the privileges of the user running Thunderbird. (CVE-2012-3969,\n CVE-2012-3970)\n \n Two flaws were found in the way Thunderbird rendered certain images using\n WebGL. Malicious content could cause Thunderbird to crash or, under certain\n conditions, possibly execute arbitrary code with the privileges of the user\n running Thunderbird. (CVE-2012-3967, CVE-2012-3968)\n \n A flaw was found in the way Thunderbird decoded embedded bitmap images in\n Icon Format (ICO) files. Content containing a malicious ICO file could\n cause Thunderbird to crash or, under certain conditions, possibly execute\n arbitrary code with the privileges of the user running Thunderbird.\n (CVE-2012-3966)\n \n A flaw was found in the way the "eval" command was handled by the\n Thunderbird Error Console. Running "eval" in the Error Console while\n viewing malicious content could possibly cause Thunderbird to execute\n arbitrary code with the privileges of the user running Thunderbird.\n (CVE-2012-3980)\n \n An out-of-bounds memory read flaw was found in the way Thunderbird used the\n format-number feature of XSLT (Extensible Stylesheet Language\n Transformations). Malicious content could possibly cause an information\n leak, or cause Thunderbird to crash. (CVE-2012-3972)\n \n A flaw was found in the location object implementation in Thunderbird.\n Malicious content could use this flaw to possibly allow restricted content\n to be loaded. (CVE-2012-3978)\n \n Red Hat would like to thank the Mozilla project for reporting these issues.\n Upstream acknowledges Gary Kwong, Christian Holler, Jesse Ruderman, John\n Schoenick, Vladimir Vukicevic, Daniel Holbert, Abhishek Arya, Fr\u00e9d\u00e9ric\n Hoguin, miaubiz, Arthur Gerkis, Nicolas Gr\u00e9goire, moz_bug_r_a4, and Colby\n Russell as the original reporters of these issues.\n \n Note: All issues except CVE-2012-3969 and CVE-2012-3970 cannot be exploited\n by a specially-crafted HTML mail message as JavaScrip ... \n\n Description truncated, for more information please check the Reference URL\";\n\ntag_affected = \"thunderbird on CentOS 5\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.centos.org/pipermail/centos-announce/2012-August/018833.html\");\n script_id(881480);\n script_version(\"$Revision: 8313 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-08 08:02:11 +0100 (Mon, 08 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2012-08-30 10:44:44 +0530 (Thu, 30 Aug 2012)\");\n script_cve_id(\"CVE-2012-1970\", \"CVE-2012-1972\", \"CVE-2012-1973\", \"CVE-2012-1974\",\n \"CVE-2012-1975\", \"CVE-2012-1976\", \"CVE-2012-3956\", \"CVE-2012-3957\",\n \"CVE-2012-3958\", \"CVE-2012-3959\", \"CVE-2012-3960\", \"CVE-2012-3961\",\n \"CVE-2012-3962\", \"CVE-2012-3963\", \"CVE-2012-3964\", \"CVE-2012-3966\",\n \"CVE-2012-3967\", \"CVE-2012-3968\", \"CVE-2012-3969\", \"CVE-2012-3970\",\n \"CVE-2012-3972\", \"CVE-2012-3978\", \"CVE-2012-3980\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"CESA\", value: \"2012:1211\");\n script_name(\"CentOS Update for thunderbird CESA-2012:1211 centos5 \");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of thunderbird\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"CentOS5\")\n{\n\n if ((res = isrpmvuln(pkg:\"thunderbird\", rpm:\"thunderbird~10.0.7~1.el5.centos\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-01-08T12:56:43", "description": "Check for the Version of firefox", "cvss3": {}, "published": "2012-08-30T00:00:00", "type": "openvas", "title": "CentOS Update for firefox CESA-2012:1210 centos6 ", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-1970", "CVE-2012-1973", "CVE-2012-1974", "CVE-2012-3968", "CVE-2012-3963", "CVE-2012-3978", "CVE-2012-3976", "CVE-2012-1972", "CVE-2012-3962", "CVE-2012-3969", "CVE-2012-3970", "CVE-2012-3957", "CVE-2012-3958", "CVE-2012-1975", "CVE-2012-3956", "CVE-2012-3966", "CVE-2012-3967", "CVE-2012-3959", "CVE-2012-3980", "CVE-2012-3960", "CVE-2012-1976", "CVE-2012-3972", "CVE-2012-3964", "CVE-2012-3961"], "modified": "2018-01-08T00:00:00", "id": "OPENVAS:881481", "href": "http://plugins.openvas.org/nasl.php?oid=881481", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for firefox CESA-2012:1210 centos6 \n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Mozilla Firefox is an open source web browser. XULRunner provides the XUL\n Runtime environment for Mozilla Firefox.\n\n A web page containing malicious content could cause Firefox to crash or,\n potentially, execute arbitrary code with the privileges of the user running\n Firefox. (CVE-2012-1970, CVE-2012-1972, CVE-2012-1973, CVE-2012-1974,\n CVE-2012-1975, CVE-2012-1976, CVE-2012-3956, CVE-2012-3957, CVE-2012-3958,\n CVE-2012-3959, CVE-2012-3960, CVE-2012-3961, CVE-2012-3962, CVE-2012-3963,\n CVE-2012-3964)\n \n A web page containing a malicious Scalable Vector Graphics (SVG) image file\n could cause Firefox to crash or, potentially, execute arbitrary code with\n the privileges of the user running Firefox. (CVE-2012-3969, CVE-2012-3970)\n \n Two flaws were found in the way Firefox rendered certain images using\n WebGL. A web page containing malicious content could cause Firefox to crash\n or, under certain conditions, possibly execute arbitrary code with the\n privileges of the user running Firefox. (CVE-2012-3967, CVE-2012-3968)\n \n A flaw was found in the way Firefox decoded embedded bitmap images in Icon\n Format (ICO) files. A web page containing a malicious ICO file could cause\n Firefox to crash or, under certain conditions, possibly execute arbitrary\n code with the privileges of the user running Firefox. (CVE-2012-3966)\n \n A flaw was found in the way the "eval" command was handled by the Firefox\n Web Console. Running "eval" in the Web Console while viewing a web page\n containing malicious content could possibly cause Firefox to execute\n arbitrary code with the privileges of the user running Firefox.\n (CVE-2012-3980)\n \n An out-of-bounds memory read flaw was found in the way Firefox used the\n format-number feature of XSLT (Extensible Stylesheet Language\n Transformations). A web page containing malicious content could possibly\n cause an information leak, or cause Firefox to crash. (CVE-2012-3972)\n \n It was found that the SSL certificate information for a previously visited\n site could be displayed in the address bar while the main window displayed\n a new page. This could lead to phishing attacks as attackers could use this\n flaw to trick users into believing they are viewing a trusted site.\n (CVE-2012-3976)\n \n A flaw was found in the location object implementation in Firefox.\n Malicious content could use this flaw to possibly allow restricted content\n to be loaded. (CVE-2012-3978)\n \n For technical details regarding these flaws, refer to the Mozilla security\n advisories for Firefox 10.0.7 ESR. You can find a link to the Mozilla\n advisories in ... \n\n Description truncated, for more information please check the Reference URL\";\n\ntag_affected = \"firefox on CentOS 6\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.centos.org/pipermail/centos-announce/2012-August/018834.html\");\n script_id(881481);\n script_version(\"$Revision: 8313 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-08 08:02:11 +0100 (Mon, 08 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2012-08-30 10:46:59 +0530 (Thu, 30 Aug 2012)\");\n script_cve_id(\"CVE-2012-1970\", \"CVE-2012-1972\", \"CVE-2012-1973\", \"CVE-2012-1974\",\n \"CVE-2012-1975\", \"CVE-2012-1976\", \"CVE-2012-3956\", \"CVE-2012-3957\",\n \"CVE-2012-3958\", \"CVE-2012-3959\", \"CVE-2012-3960\", \"CVE-2012-3961\",\n \"CVE-2012-3962\", \"CVE-2012-3963\", \"CVE-2012-3964\", \"CVE-2012-3966\",\n \"CVE-2012-3967\", \"CVE-2012-3968\", \"CVE-2012-3969\", \"CVE-2012-3970\",\n \"CVE-2012-3972\", \"CVE-2012-3976\", \"CVE-2012-3978\", \"CVE-2012-3980\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"CESA\", value: \"2012:1210\");\n script_name(\"CentOS Update for firefox CESA-2012:1210 centos6 \");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of firefox\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"CentOS6\")\n{\n\n if ((res = isrpmvuln(pkg:\"firefox\", rpm:\"firefox~10.0.7~1.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner\", rpm:\"xulrunner~10.0.7~1.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner-devel\", rpm:\"xulrunner-devel~10.0.7~1.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-05-29T18:38:44", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2012-08-30T00:00:00", "type": "openvas", "title": "CentOS Update for firefox CESA-2012:1210 centos6", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-1970", "CVE-2012-1973", "CVE-2012-1974", "CVE-2012-3968", "CVE-2012-3963", "CVE-2012-3978", "CVE-2012-3976", "CVE-2012-1972", "CVE-2012-3962", "CVE-2012-3969", "CVE-2012-3970", "CVE-2012-3957", "CVE-2012-3958", "CVE-2012-1975", "CVE-2012-3956", "CVE-2012-3966", "CVE-2012-3967", "CVE-2012-3959", "CVE-2012-3980", "CVE-2012-3960", "CVE-2012-1976", "CVE-2012-3972", "CVE-2012-3964", "CVE-2012-3961"], "modified": "2019-03-15T00:00:00", "id": "OPENVAS:1361412562310881481", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310881481", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for firefox CESA-2012:1210 centos6\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.centos.org/pipermail/centos-announce/2012-August/018834.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.881481\");\n script_version(\"$Revision: 14222 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 13:50:48 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2012-08-30 10:46:59 +0530 (Thu, 30 Aug 2012)\");\n script_cve_id(\"CVE-2012-1970\", \"CVE-2012-1972\", \"CVE-2012-1973\", \"CVE-2012-1974\",\n \"CVE-2012-1975\", \"CVE-2012-1976\", \"CVE-2012-3956\", \"CVE-2012-3957\",\n \"CVE-2012-3958\", \"CVE-2012-3959\", \"CVE-2012-3960\", \"CVE-2012-3961\",\n \"CVE-2012-3962\", \"CVE-2012-3963\", \"CVE-2012-3964\", \"CVE-2012-3966\",\n \"CVE-2012-3967\", \"CVE-2012-3968\", \"CVE-2012-3969\", \"CVE-2012-3970\",\n \"CVE-2012-3972\", \"CVE-2012-3976\", \"CVE-2012-3978\", \"CVE-2012-3980\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name:\"CESA\", value:\"2012:1210\");\n script_name(\"CentOS Update for firefox CESA-2012:1210 centos6\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'firefox'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\", re:\"ssh/login/release=CentOS6\");\n script_tag(name:\"affected\", value:\"firefox on CentOS 6\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n script_tag(name:\"insight\", value:\"Mozilla Firefox is an open source web browser. XULRunner provides the XUL\n Runtime environment for Mozilla Firefox.\n\n A web page containing malicious content could cause Firefox to crash or,\n potentially, execute arbitrary code with the privileges of the user running\n Firefox. (CVE-2012-1970, CVE-2012-1972, CVE-2012-1973, CVE-2012-1974,\n CVE-2012-1975, CVE-2012-1976, CVE-2012-3956, CVE-2012-3957, CVE-2012-3958,\n CVE-2012-3959, CVE-2012-3960, CVE-2012-3961, CVE-2012-3962, CVE-2012-3963,\n CVE-2012-3964)\n\n A web page containing a malicious Scalable Vector Graphics (SVG) image file\n could cause Firefox to crash or, potentially, execute arbitrary code with\n the privileges of the user running Firefox. (CVE-2012-3969, CVE-2012-3970)\n\n Two flaws were found in the way Firefox rendered certain images using\n WebGL. A web page containing malicious content could cause Firefox to crash\n or, under certain conditions, possibly execute arbitrary code with the\n privileges of the user running Firefox. (CVE-2012-3967, CVE-2012-3968)\n\n A flaw was found in the way Firefox decoded embedded bitmap images in Icon\n Format (ICO) files. A web page containing a malicious ICO file could cause\n Firefox to crash or, under certain conditions, possibly execute arbitrary\n code with the privileges of the user running Firefox. (CVE-2012-3966)\n\n A flaw was found in the way the 'eval' command was handled by the Firefox\n Web Console. Running 'eval' in the Web Console while viewing a web page\n containing malicious content could possibly cause Firefox to execute\n arbitrary code with the privileges of the user running Firefox.\n (CVE-2012-3980)\n\n An out-of-bounds memory read flaw was found in the way Firefox used the\n format-number feature of XSLT (Extensible Stylesheet Language\n Transformations). A web page containing malicious content could possibly\n cause an information leak, or cause Firefox to crash. (CVE-2012-3972)\n\n It was found that the SSL certificate information for a previously visited\n site could be displayed in the address bar while the main window displayed\n a new page. This could lead to phishing attacks as attackers could use this\n flaw to trick users into believing they are viewing a trusted site.\n (CVE-2012-3976)\n\n A flaw was found in the location object implementation in Firefox.\n Malicious content could use this flaw to possibly allow restricted content\n to be loaded. (CVE-2012-3978)\n\n For technical details regarding these flaws, refer to the Mozilla security\n advisories for Firefox 10.0.7 ESR. You can find a link to the Mozilla\n advisories in ...\n\n Description truncated, please see the referenced URL(s) for more information.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"CentOS6\")\n{\n\n if ((res = isrpmvuln(pkg:\"firefox\", rpm:\"firefox~10.0.7~1.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner\", rpm:\"xulrunner~10.0.7~1.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner-devel\", rpm:\"xulrunner-devel~10.0.7~1.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2018-01-02T10:56:30", "description": "Check for the Version of firefox", "cvss3": {}, "published": "2012-08-30T00:00:00", "type": "openvas", "title": "CentOS Update for firefox CESA-2012:1210 centos5 ", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-1970", "CVE-2012-1973", "CVE-2012-1974", "CVE-2012-3968", "CVE-2012-3963", "CVE-2012-3978", "CVE-2012-3976", "CVE-2012-1972", "CVE-2012-3962", "CVE-2012-3969", "CVE-2012-3970", "CVE-2012-3957", "CVE-2012-3958", "CVE-2012-1975", "CVE-2012-3956", "CVE-2012-3966", "CVE-2012-3967", "CVE-2012-3959", "CVE-2012-3980", "CVE-2012-3960", "CVE-2012-1976", "CVE-2012-3972", "CVE-2012-3964", "CVE-2012-3961"], "modified": "2017-12-27T00:00:00", "id": "OPENVAS:881479", "href": "http://plugins.openvas.org/nasl.php?oid=881479", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for firefox CESA-2012:1210 centos5 \n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Mozilla Firefox is an open source web browser. XULRunner provides the XUL\n Runtime environment for Mozilla Firefox.\n\n A web page containing malicious content could cause Firefox to crash or,\n potentially, execute arbitrary code with the privileges of the user running\n Firefox. (CVE-2012-1970, CVE-2012-1972, CVE-2012-1973, CVE-2012-1974,\n CVE-2012-1975, CVE-2012-1976, CVE-2012-3956, CVE-2012-3957, CVE-2012-3958,\n CVE-2012-3959, CVE-2012-3960, CVE-2012-3961, CVE-2012-3962, CVE-2012-3963,\n CVE-2012-3964)\n \n A web page containing a malicious Scalable Vector Graphics (SVG) image file\n could cause Firefox to crash or, potentially, execute arbitrary code with\n the privileges of the user running Firefox. (CVE-2012-3969, CVE-2012-3970)\n \n Two flaws were found in the way Firefox rendered certain images using\n WebGL. A web page containing malicious content could cause Firefox to crash\n or, under certain conditions, possibly execute arbitrary code with the\n privileges of the user running Firefox. (CVE-2012-3967, CVE-2012-3968)\n \n A flaw was found in the way Firefox decoded embedded bitmap images in Icon\n Format (ICO) files. A web page containing a malicious ICO file could cause\n Firefox to crash or, under certain conditions, possibly execute arbitrary\n code with the privileges of the user running Firefox. (CVE-2012-3966)\n \n A flaw was found in the way the "eval" command was handled by the Firefox\n Web Console. Running "eval" in the Web Console while viewing a web page\n containing malicious content could possibly cause Firefox to execute\n arbitrary code with the privileges of the user running Firefox.\n (CVE-2012-3980)\n \n An out-of-bounds memory read flaw was found in the way Firefox used the\n format-number feature of XSLT (Extensible Stylesheet Language\n Transformations). A web page containing malicious content could possibly\n cause an information leak, or cause Firefox to crash. (CVE-2012-3972)\n \n It was found that the SSL certificate information for a previously visited\n site could be displayed in the address bar while the main window displayed\n a new page. This could lead to phishing attacks as attackers could use this\n flaw to trick users into believing they are viewing a trusted site.\n (CVE-2012-3976)\n \n A flaw was found in the location object implementation in Firefox.\n Malicious content could use this flaw to possibly allow restricted content\n to be loaded. (CVE-2012-3978)\n \n For technical details regarding these flaws, refer to the Mozilla security\n advisories for Firefox 10.0.7 ESR. You can find a link to the Mozilla\n advisories in ... \n\n Description truncated, for more information please check the Reference URL\";\n\ntag_affected = \"firefox on CentOS 5\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.centos.org/pipermail/centos-announce/2012-August/018832.html\");\n script_id(881479);\n script_version(\"$Revision: 8249 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-27 07:29:56 +0100 (Wed, 27 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2012-08-30 10:42:44 +0530 (Thu, 30 Aug 2012)\");\n script_cve_id(\"CVE-2012-1970\", \"CVE-2012-1972\", \"CVE-2012-1973\", \"CVE-2012-1974\",\n \"CVE-2012-1975\", \"CVE-2012-1976\", \"CVE-2012-3956\", \"CVE-2012-3957\",\n \"CVE-2012-3958\", \"CVE-2012-3959\", \"CVE-2012-3960\", \"CVE-2012-3961\",\n \"CVE-2012-3962\", \"CVE-2012-3963\", \"CVE-2012-3964\", \"CVE-2012-3966\",\n \"CVE-2012-3967\", \"CVE-2012-3968\", \"CVE-2012-3969\", \"CVE-2012-3970\",\n \"CVE-2012-3972\", \"CVE-2012-3976\", \"CVE-2012-3978\", \"CVE-2012-3980\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"CESA\", value: \"2012:1210\");\n script_name(\"CentOS Update for firefox CESA-2012:1210 centos5 \");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of firefox\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"CentOS5\")\n{\n\n if ((res = isrpmvuln(pkg:\"firefox\", rpm:\"firefox~10.0.7~1.el5.centos\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner\", rpm:\"xulrunner~10.0.7~2.el5_8\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner-devel\", rpm:\"xulrunner-devel~10.0.7~2.el5_8\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-05-29T18:39:19", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2012-08-30T00:00:00", "type": "openvas", "title": "CentOS Update for firefox CESA-2012:1210 centos5", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-1970", "CVE-2012-1973", "CVE-2012-1974", "CVE-2012-3968", "CVE-2012-3963", "CVE-2012-3978", "CVE-2012-3976", "CVE-2012-1972", "CVE-2012-3962", "CVE-2012-3969", "CVE-2012-3970", "CVE-2012-3957", "CVE-2012-3958", "CVE-2012-1975", "CVE-2012-3956", "CVE-2012-3966", "CVE-2012-3967", "CVE-2012-3959", "CVE-2012-3980", "CVE-2012-3960", "CVE-2012-1976", "CVE-2012-3972", "CVE-2012-3964", "CVE-2012-3961"], "modified": "2019-03-15T00:00:00", "id": "OPENVAS:1361412562310881479", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310881479", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for firefox CESA-2012:1210 centos5\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.centos.org/pipermail/centos-announce/2012-August/018832.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.881479\");\n script_version(\"$Revision: 14222 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 13:50:48 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2012-08-30 10:42:44 +0530 (Thu, 30 Aug 2012)\");\n script_cve_id(\"CVE-2012-1970\", \"CVE-2012-1972\", \"CVE-2012-1973\", \"CVE-2012-1974\",\n \"CVE-2012-1975\", \"CVE-2012-1976\", \"CVE-2012-3956\", \"CVE-2012-3957\",\n \"CVE-2012-3958\", \"CVE-2012-3959\", \"CVE-2012-3960\", \"CVE-2012-3961\",\n \"CVE-2012-3962\", \"CVE-2012-3963\", \"CVE-2012-3964\", \"CVE-2012-3966\",\n \"CVE-2012-3967\", \"CVE-2012-3968\", \"CVE-2012-3969\", \"CVE-2012-3970\",\n \"CVE-2012-3972\", \"CVE-2012-3976\", \"CVE-2012-3978\", \"CVE-2012-3980\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name:\"CESA\", value:\"2012:1210\");\n script_name(\"CentOS Update for firefox CESA-2012:1210 centos5\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'firefox'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\", re:\"ssh/login/release=CentOS5\");\n script_tag(name:\"affected\", value:\"firefox on CentOS 5\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n script_tag(name:\"insight\", value:\"Mozilla Firefox is an open source web browser. XULRunner provides the XUL\n Runtime environment for Mozilla Firefox.\n\n A web page containing malicious content could cause Firefox to crash or,\n potentially, execute arbitrary code with the privileges of the user running\n Firefox. (CVE-2012-1970, CVE-2012-1972, CVE-2012-1973, CVE-2012-1974,\n CVE-2012-1975, CVE-2012-1976, CVE-2012-3956, CVE-2012-3957, CVE-2012-3958,\n CVE-2012-3959, CVE-2012-3960, CVE-2012-3961, CVE-2012-3962, CVE-2012-3963,\n CVE-2012-3964)\n\n A web page containing a malicious Scalable Vector Graphics (SVG) image file\n could cause Firefox to crash or, potentially, execute arbitrary code with\n the privileges of the user running Firefox. (CVE-2012-3969, CVE-2012-3970)\n\n Two flaws were found in the way Firefox rendered certain images using\n WebGL. A web page containing malicious content could cause Firefox to crash\n or, under certain conditions, possibly execute arbitrary code with the\n privileges of the user running Firefox. (CVE-2012-3967, CVE-2012-3968)\n\n A flaw was found in the way Firefox decoded embedded bitmap images in Icon\n Format (ICO) files. A web page containing a malicious ICO file could cause\n Firefox to crash or, under certain conditions, possibly execute arbitrary\n code with the privileges of the user running Firefox. (CVE-2012-3966)\n\n A flaw was found in the way the 'eval' command was handled by the Firefox\n Web Console. Running 'eval' in the Web Console while viewing a web page\n containing malicious content could possibly cause Firefox to execute\n arbitrary code with the privileges of the user running Firefox.\n (CVE-2012-3980)\n\n An out-of-bounds memory read flaw was found in the way Firefox used the\n format-number feature of XSLT (Extensible Stylesheet Language\n Transformations). A web page containing malicious content could possibly\n cause an information leak, or cause Firefox to crash. (CVE-2012-3972)\n\n It was found that the SSL certificate information for a previously visited\n site could be displayed in the address bar while the main window displayed\n a new page. This could lead to phishing attacks as attackers could use this\n flaw to trick users into believing they are viewing a trusted site.\n (CVE-2012-3976)\n\n A flaw was found in the location object implementation in Firefox.\n Malicious content could use this flaw to possibly allow restricted content\n to be loaded. (CVE-2012-3978)\n\n For technical details regarding these flaws, refer to the Mozilla security\n advisories for Firefox 10.0.7 ESR. You can find a link to the Mozilla\n advisories in ...\n\n Description truncated, please see the referenced URL(s) for more information.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"CentOS5\")\n{\n\n if ((res = isrpmvuln(pkg:\"firefox\", rpm:\"firefox~10.0.7~1.el5.centos\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner\", rpm:\"xulrunner~10.0.7~2.el5_8\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner-devel\", rpm:\"xulrunner-devel~10.0.7~2.el5_8\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:38:58", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2012-08-30T00:00:00", "type": "openvas", "title": "CentOS Update for thunderbird CESA-2012:1211 centos6", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-1970", "CVE-2012-1973", "CVE-2012-1974", "CVE-2012-3968", "CVE-2012-3963", "CVE-2012-3978", "CVE-2012-1972", "CVE-2012-3962", "CVE-2012-3969", "CVE-2012-3970", "CVE-2012-3957", "CVE-2012-3958", "CVE-2012-1975", "CVE-2012-3956", "CVE-2012-3966", "CVE-2012-3967", "CVE-2012-3959", "CVE-2012-3980", "CVE-2012-3960", "CVE-2012-1976", "CVE-2012-3972", "CVE-2012-3964", "CVE-2012-3961"], "modified": "2019-03-15T00:00:00", "id": "OPENVAS:1361412562310881478", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310881478", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for thunderbird CESA-2012:1211 centos6\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.centos.org/pipermail/centos-announce/2012-August/018835.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.881478\");\n script_version(\"$Revision: 14222 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 13:50:48 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2012-08-30 10:40:41 +0530 (Thu, 30 Aug 2012)\");\n script_cve_id(\"CVE-2012-1970\", \"CVE-2012-1972\", \"CVE-2012-1973\", \"CVE-2012-1974\",\n \"CVE-2012-1975\", \"CVE-2012-1976\", \"CVE-2012-3956\", \"CVE-2012-3957\",\n \"CVE-2012-3958\", \"CVE-2012-3959\", \"CVE-2012-3960\", \"CVE-2012-3961\",\n \"CVE-2012-3962\", \"CVE-2012-3963\", \"CVE-2012-3964\", \"CVE-2012-3966\",\n \"CVE-2012-3967\", \"CVE-2012-3968\", \"CVE-2012-3969\", \"CVE-2012-3970\",\n \"CVE-2012-3972\", \"CVE-2012-3978\", \"CVE-2012-3980\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name:\"CESA\", value:\"2012:1211\");\n script_name(\"CentOS Update for thunderbird CESA-2012:1211 centos6\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'thunderbird'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\", re:\"ssh/login/release=CentOS6\");\n script_tag(name:\"affected\", value:\"thunderbird on CentOS 6\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n script_tag(name:\"insight\", value:\"Mozilla Thunderbird is a standalone mail and newsgroup client.\n\n Several flaws were found in the processing of malformed content. Malicious\n content could cause Thunderbird to crash or, potentially, execute arbitrary\n code with the privileges of the user running Thunderbird. (CVE-2012-1970,\n CVE-2012-1972, CVE-2012-1973, CVE-2012-1974, CVE-2012-1975, CVE-2012-1976,\n CVE-2012-3956, CVE-2012-3957, CVE-2012-3958, CVE-2012-3959, CVE-2012-3960,\n CVE-2012-3961, CVE-2012-3962, CVE-2012-3963, CVE-2012-3964)\n\n Content containing a malicious Scalable Vector Graphics (SVG) image file\n could cause Thunderbird to crash or, potentially, execute arbitrary code\n with the privileges of the user running Thunderbird. (CVE-2012-3969,\n CVE-2012-3970)\n\n Two flaws were found in the way Thunderbird rendered certain images using\n WebGL. Malicious content could cause Thunderbird to crash or, under certain\n conditions, possibly execute arbitrary code with the privileges of the user\n running Thunderbird. (CVE-2012-3967, CVE-2012-3968)\n\n A flaw was found in the way Thunderbird decoded embedded bitmap images in\n Icon Format (ICO) files. Content containing a malicious ICO file could\n cause Thunderbird to crash or, under certain conditions, possibly execute\n arbitrary code with the privileges of the user running Thunderbird.\n (CVE-2012-3966)\n\n A flaw was found in the way the 'eval' command was handled by the\n Thunderbird Error Console. Running 'eval' in the Error Console while\n viewing malicious content could possibly cause Thunderbird to execute\n arbitrary code with the privileges of the user running Thunderbird.\n (CVE-2012-3980)\n\n An out-of-bounds memory read flaw was found in the way Thunderbird used the\n format-number feature of XSLT (Extensible Stylesheet Language\n Transformations). Malicious content could possibly cause an information\n leak, or cause Thunderbird to crash. (CVE-2012-3972)\n\n A flaw was found in the location object implementation in Thunderbird.\n Malicious content could use this flaw to possibly allow restricted content\n to be loaded. (CVE-2012-3978)\n\n Red Hat would like to thank the Mozilla project for reporting these issues.\n Upstream acknowledges Gary Kwong, Christian Holler, Jesse Ruderman, John\n Schoenick, Vladimir Vukicevic, Daniel Holbert, Abhishek Arya, Fr\u00e9d\u00e9ric\n Hoguin, miaubiz, Arthur Gerkis, Nicolas Gr\u00e9goire, moz_bug_r_a4, and Colby\n Russell as the original reporters of these issues.\n\n Note: All issues except CVE-2012-3969 and CVE-2012-3970 cannot be exploited\n by a specially-crafted HTML mail message as JavaScrip ...\n\n Description truncated, please see the referenced URL(s) for more information.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"CentOS6\")\n{\n\n if ((res = isrpmvuln(pkg:\"thunderbird\", rpm:\"thunderbird~10.0.7~1.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:36:08", "description": "Oracle Linux Local Security Checks ELSA-2012-1210", "cvss3": {}, "published": "2015-10-06T00:00:00", "type": "openvas", "title": "Oracle Linux Local Check: ELSA-2012-1210", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-1970", "CVE-2012-1973", "CVE-2012-1974", "CVE-2012-3968", "CVE-2012-3963", "CVE-2012-3978", "CVE-2012-3976", "CVE-2012-1972", "CVE-2012-3962", "CVE-2012-3969", "CVE-2012-3970", "CVE-2012-3957", "CVE-2012-3958", "CVE-2012-1975", "CVE-2012-3956", "CVE-2012-3966", "CVE-2012-3967", "CVE-2012-3959", "CVE-2012-3980", "CVE-2012-3960", "CVE-2012-1976", "CVE-2012-3972", "CVE-2012-3964", "CVE-2012-3961"], "modified": "2018-09-28T00:00:00", "id": "OPENVAS:1361412562310123834", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310123834", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: ELSA-2012-1210.nasl 11688 2018-09-28 13:36:28Z cfischer $\n#\n# Oracle Linux Local Check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.123834\");\n script_version(\"$Revision: 11688 $\");\n script_tag(name:\"creation_date\", value:\"2015-10-06 14:09:10 +0300 (Tue, 06 Oct 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-09-28 15:36:28 +0200 (Fri, 28 Sep 2018) $\");\n script_name(\"Oracle Linux Local Check: ELSA-2012-1210\");\n script_tag(name:\"insight\", value:\"ELSA-2012-1210 - firefox security update. Please see the references for more insight.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"summary\", value:\"Oracle Linux Local Security Checks ELSA-2012-1210\");\n script_xref(name:\"URL\", value:\"http://linux.oracle.com/errata/ELSA-2012-1210.html\");\n script_cve_id(\"CVE-2012-1970\", \"CVE-2012-1972\", \"CVE-2012-1973\", \"CVE-2012-1974\", \"CVE-2012-1975\", \"CVE-2012-1976\", \"CVE-2012-3956\", \"CVE-2012-3957\", \"CVE-2012-3958\", \"CVE-2012-3959\", \"CVE-2012-3960\", \"CVE-2012-3961\", \"CVE-2012-3962\", \"CVE-2012-3963\", \"CVE-2012-3964\", \"CVE-2012-3966\", \"CVE-2012-3967\", \"CVE-2012-3968\", \"CVE-2012-3969\", \"CVE-2012-3970\", \"CVE-2012-3972\", \"CVE-2012-3976\", \"CVE-2012-3978\", \"CVE-2012-3980\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/oracle_linux\", \"ssh/login/release\", re:\"ssh/login/release=OracleLinux(5|6)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Eero Volotinen\");\n script_family(\"Oracle Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"OracleLinux5\")\n{\n if ((res = isrpmvuln(pkg:\"firefox\", rpm:\"firefox~10.0.7~1.0.1.el5_8\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"xulrunner\", rpm:\"xulrunner~10.0.7~2.0.1.el5_8\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"xulrunner-devel\", rpm:\"xulrunner-devel~10.0.7~2.0.1.el5_8\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif(release == \"OracleLinux6\")\n{\n if ((res = isrpmvuln(pkg:\"firefox\", rpm:\"firefox~10.0.7~1.0.1.el6_3\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"xulrunner\", rpm:\"xulrunner~10.0.7~1.0.1.el6_3\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"xulrunner-devel\", rpm:\"xulrunner-devel~10.0.7~1.0.1.el6_3\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif (__pkg_match) exit(99);\n exit(0);\n\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-08-14T16:16:27", "description": "Oracle Linux Local Security Checks ELSA-2012-1350", "cvss3": {}, "published": "2015-10-06T00:00:00", "type": "openvas", "title": "Oracle Linux Local Check: ELSA-2012-1350", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-3986", "CVE-2012-4185", "CVE-2012-3991", "CVE-2012-1956", "CVE-2012-3993", "CVE-2012-3995", "CVE-2012-3988", "CVE-2012-3994", "CVE-2012-4183", "CVE-2012-4181", "CVE-2012-4186", "CVE-2012-4182", "CVE-2012-4187", "CVE-2012-3982", "CVE-2012-4184", "CVE-2012-3992", "CVE-2012-4180", "CVE-2012-4188", "CVE-2012-3990", "CVE-2012-4179"], "modified": "2018-09-28T00:00:00", "id": "OPENVAS:1361412562310123805", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310123805", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: ELSA-2012-1350.nasl 11688 2018-09-28 13:36:28Z cfischer $\n#\n# Oracle Linux Local Check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.123805\");\n script_version(\"$Revision: 11688 $\");\n script_tag(name:\"creation_date\", value:\"2015-10-06 14:08:47 +0300 (Tue, 06 Oct 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-09-28 15:36:28 +0200 (Fri, 28 Sep 2018) $\");\n script_name(\"Oracle Linux Local Check: ELSA-2012-1350\");\n script_tag(name:\"insight\", value:\"ELSA-2012-1350 - firefox security and bug fix update. Please see the references for more insight.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"summary\", value:\"Oracle Linux Local Security Checks ELSA-2012-1350\");\n script_xref(name:\"URL\", value:\"http://linux.oracle.com/errata/ELSA-2012-1350.html\");\n script_cve_id(\"CVE-2012-1956\", \"CVE-2012-3982\", \"CVE-2012-3986\", \"CVE-2012-3988\", \"CVE-2012-3990\", \"CVE-2012-3991\", \"CVE-2012-3992\", \"CVE-2012-3993\", \"CVE-2012-3994\", \"CVE-2012-3995\", \"CVE-2012-4179\", \"CVE-2012-4180\", \"CVE-2012-4181\", \"CVE-2012-4182\", \"CVE-2012-4183\", \"CVE-2012-4184\", \"CVE-2012-4185\", \"CVE-2012-4186\", \"CVE-2012-4187\", \"CVE-2012-4188\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/oracle_linux\", \"ssh/login/release\", re:\"ssh/login/release=OracleLinux(5|6)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Eero Volotinen\");\n script_family(\"Oracle Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"OracleLinux5\")\n{\n if ((res = isrpmvuln(pkg:\"firefox\", rpm:\"firefox~10.0.8~1.0.2.el5_8\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"xulrunner\", rpm:\"xulrunner~10.0.8~1.0.1.el5_8\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"xulrunner-devel\", rpm:\"xulrunner-devel~10.0.8~1.0.1.el5_8\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif(release == \"OracleLinux6\")\n{\n if ((res = isrpmvuln(pkg:\"firefox\", rpm:\"firefox~10.0.8~1.0.2.el6_3\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"xulrunner\", rpm:\"xulrunner~10.0.8~1.0.1.el6_3\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"xulrunner-devel\", rpm:\"xulrunner-devel~10.0.8~1.0.1.el6_3\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif (__pkg_match) exit(99);\n exit(0);\n\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2018-01-02T10:57:43", "description": "Check for the Version of firefox", "cvss3": {}, "published": "2012-10-11T00:00:00", "type": "openvas", "title": "RedHat Update for firefox RHSA-2012:1350-01", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-3986", "CVE-2012-4185", "CVE-2012-3991", "CVE-2012-1956", "CVE-2012-3993", "CVE-2012-3995", "CVE-2012-3988", "CVE-2012-3994", "CVE-2012-4183", "CVE-2012-4181", "CVE-2012-4186", "CVE-2012-4182", "CVE-2012-4187", "CVE-2012-3982", "CVE-2012-4184", "CVE-2012-3992", "CVE-2012-4180", "CVE-2012-4188", "CVE-2012-3990", "CVE-2012-4179"], "modified": "2017-12-28T00:00:00", "id": "OPENVAS:870843", "href": "http://plugins.openvas.org/nasl.php?oid=870843", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for firefox RHSA-2012:1350-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Mozilla Firefox is an open source web browser. XULRunner provides the XUL\n Runtime environment for Mozilla Firefox.\n\n Several flaws were found in the processing of malformed web content. A web\n page containing malicious content could cause Firefox to crash or,\n potentially, execute arbitrary code with the privileges of the user running\n Firefox. (CVE-2012-3982, CVE-2012-3988, CVE-2012-3990, CVE-2012-3995,\n CVE-2012-4179, CVE-2012-4180, CVE-2012-4181, CVE-2012-4182, CVE-2012-4183,\n CVE-2012-4185, CVE-2012-4186, CVE-2012-4187, CVE-2012-4188)\n\n Two flaws in Firefox could allow a malicious website to bypass intended\n restrictions, possibly leading to information disclosure, or Firefox\n executing arbitrary code. Note that the information disclosure issue could\n possibly be combined with other flaws to achieve arbitrary code execution.\n (CVE-2012-3986, CVE-2012-3991)\n\n Multiple flaws were found in the location object implementation in Firefox.\n Malicious content could be used to perform cross-site scripting attacks,\n script injection, or spoofing attacks. (CVE-2012-1956, CVE-2012-3992,\n CVE-2012-3994)\n\n Two flaws were found in the way Chrome Object Wrappers were implemented.\n Malicious content could be used to perform cross-site scripting attacks or\n cause Firefox to execute arbitrary code. (CVE-2012-3993, CVE-2012-4184)\n\n For technical details regarding these flaws, refer to the Mozilla security\n advisories for Firefox 10.0.8 ESR. You can find a link to the Mozilla\n advisories in the References section of this erratum.\n\n Description truncated, for more information please check the Reference URL\";\n\ntag_affected = \"firefox on Red Hat Enterprise Linux (v. 5 server),\n Red Hat Enterprise Linux Desktop (v. 6),\n Red Hat Enterprise Linux Server (v. 6),\n Red Hat Enterprise Linux Workstation (v. 6)\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/rhsa-announce/2012-October/msg00011.html\");\n script_id(870843);\n script_version(\"$Revision: 8253 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-28 07:29:51 +0100 (Thu, 28 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2012-10-11 10:00:28 +0530 (Thu, 11 Oct 2012)\");\n script_cve_id(\"CVE-2012-1956\", \"CVE-2012-3982\", \"CVE-2012-3986\", \"CVE-2012-3988\",\n \"CVE-2012-3990\", \"CVE-2012-3991\", \"CVE-2012-3992\", \"CVE-2012-3993\",\n \"CVE-2012-3994\", \"CVE-2012-3995\", \"CVE-2012-4179\", \"CVE-2012-4180\",\n \"CVE-2012-4181\", \"CVE-2012-4182\", \"CVE-2012-4183\", \"CVE-2012-4184\",\n \"CVE-2012-4185\", \"CVE-2012-4186\", \"CVE-2012-4187\", \"CVE-2012-4188\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"RHSA\", value: \"2012:1350-01\");\n script_name(\"RedHat Update for firefox RHSA-2012:1350-01\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of firefox\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"RHENT_6\")\n{\n\n if ((res = isrpmvuln(pkg:\"firefox\", rpm:\"firefox~10.0.8~1.el6_3\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-debuginfo\", rpm:\"firefox-debuginfo~10.0.8~1.el6_3\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner\", rpm:\"xulrunner~10.0.8~1.el6_3\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner-debuginfo\", rpm:\"xulrunner-debuginfo~10.0.8~1.el6_3\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"RHENT_5\")\n{\n\n if ((res = isrpmvuln(pkg:\"firefox\", rpm:\"firefox~10.0.8~1.el5_8\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-debuginfo\", rpm:\"firefox-debuginfo~10.0.8~1.el5_8\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner\", rpm:\"xulrunner~10.0.8~1.el5_8\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner-debuginfo\", rpm:\"xulrunner-debuginfo~10.0.8~1.el5_8\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner-devel\", rpm:\"xulrunner-devel~10.0.8~1.el5_8\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2020-08-14T16:15:41", "description": "Oracle Linux Local Security Checks ELSA-2012-1351", "cvss3": {}, "published": "2015-10-06T00:00:00", "type": "openvas", "title": "Oracle Linux Local Check: ELSA-2012-1351", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-3986", "CVE-2012-4185", "CVE-2012-3991", "CVE-2012-1956", "CVE-2012-3993", "CVE-2012-3995", "CVE-2012-3988", "CVE-2012-3994", "CVE-2012-4183", "CVE-2012-4181", "CVE-2012-4186", "CVE-2012-4182", "CVE-2012-4187", "CVE-2012-3982", "CVE-2012-4184", "CVE-2012-3992", "CVE-2012-4180", "CVE-2012-4188", "CVE-2012-3990", "CVE-2012-4179"], "modified": "2018-09-28T00:00:00", "id": "OPENVAS:1361412562310123804", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310123804", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: ELSA-2012-1351.nasl 11688 2018-09-28 13:36:28Z cfischer $\n#\n# Oracle Linux Local Check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.123804\");\n script_version(\"$Revision: 11688 $\");\n script_tag(name:\"creation_date\", value:\"2015-10-06 14:08:46 +0300 (Tue, 06 Oct 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-09-28 15:36:28 +0200 (Fri, 28 Sep 2018) $\");\n script_name(\"Oracle Linux Local Check: ELSA-2012-1351\");\n script_tag(name:\"insight\", value:\"ELSA-2012-1351 - thunderbird security update. Please see the references for more insight.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"summary\", value:\"Oracle Linux Local Security Checks ELSA-2012-1351\");\n script_xref(name:\"URL\", value:\"http://linux.oracle.com/errata/ELSA-2012-1351.html\");\n script_cve_id(\"CVE-2012-1956\", \"CVE-2012-3982\", \"CVE-2012-3986\", \"CVE-2012-3988\", \"CVE-2012-3990\", \"CVE-2012-3991\", \"CVE-2012-3992\", \"CVE-2012-3993\", \"CVE-2012-3994\", \"CVE-2012-3995\", \"CVE-2012-4179\", \"CVE-2012-4180\", \"CVE-2012-4181\", \"CVE-2012-4182\", \"CVE-2012-4183\", \"CVE-2012-4184\", \"CVE-2012-4185\", \"CVE-2012-4186\", \"CVE-2012-4187\", \"CVE-2012-4188\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/oracle_linux\", \"ssh/login/release\", re:\"ssh/login/release=OracleLinux(5|6)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Eero Volotinen\");\n script_family(\"Oracle Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"OracleLinux5\")\n{\n if ((res = isrpmvuln(pkg:\"thunderbird\", rpm:\"thunderbird~10.0.8~1.0.2.el5_8\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif(release == \"OracleLinux6\")\n{\n if ((res = isrpmvuln(pkg:\"thunderbird\", rpm:\"thunderbird~10.0.8~1.0.1.el6_3\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif (__pkg_match) exit(99);\n exit(0);\n\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-08-14T16:23:17", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2012-10-11T00:00:00", "type": "openvas", "title": "CentOS Update for thunderbird CESA-2012:1351 centos5", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-3986", "CVE-2012-4185", "CVE-2012-3991", "CVE-2012-1956", "CVE-2012-3993", "CVE-2012-3995", "CVE-2012-3988", "CVE-2012-3994", "CVE-2012-4183", "CVE-2012-4181", "CVE-2012-4186", "CVE-2012-4182", "CVE-2012-4187", "CVE-2012-3982", "CVE-2012-4184", "CVE-2012-3992", "CVE-2012-4180", "CVE-2012-4188", "CVE-2012-3990", "CVE-2012-4179"], "modified": "2019-03-15T00:00:00", "id": "OPENVAS:1361412562310881514", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310881514", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for thunderbird CESA-2012:1351 centos5\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.centos.org/pipermail/centos-announce/2012-October/018929.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.881514\");\n script_version(\"$Revision: 14222 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 13:50:48 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2012-10-11 10:03:01 +0530 (Thu, 11 Oct 2012)\");\n script_cve_id(\"CVE-2012-1956\", \"CVE-2012-3982\", \"CVE-2012-3986\", \"CVE-2012-3988\",\n \"CVE-2012-3990\", \"CVE-2012-3991\", \"CVE-2012-3992\", \"CVE-2012-3993\",\n \"CVE-2012-3994\", \"CVE-2012-3995\", \"CVE-2012-4179\", \"CVE-2012-4180\",\n \"CVE-2012-4181\", \"CVE-2012-4182\", \"CVE-2012-4183\", \"CVE-2012-4184\",\n \"CVE-2012-4185\", \"CVE-2012-4186\", \"CVE-2012-4187\", \"CVE-2012-4188\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name:\"CESA\", value:\"2012:1351\");\n script_name(\"CentOS Update for thunderbird CESA-2012:1351 centos5\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'thunderbird'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\", re:\"ssh/login/release=CentOS5\");\n script_tag(name:\"affected\", value:\"thunderbird on CentOS 5\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n script_tag(name:\"insight\", value:\"Mozilla Thunderbird is a standalone mail and newsgroup client.\n\n Several flaws were found in the processing of malformed content. Malicious\n content could cause Thunderbird to crash or, potentially, execute arbitrary\n code with the privileges of the user running Thunderbird. (CVE-2012-3982,\n CVE-2012-3988, CVE-2012-3990, CVE-2012-3995, CVE-2012-4179, CVE-2012-4180,\n CVE-2012-4181, CVE-2012-4182, CVE-2012-4183, CVE-2012-4185, CVE-2012-4186,\n CVE-2012-4187, CVE-2012-4188)\n\n Two flaws in Thunderbird could allow malicious content to bypass intended\n restrictions, possibly leading to information disclosure, or Thunderbird\n executing arbitrary code. Note that the information disclosure issue could\n possibly be combined with other flaws to achieve arbitrary code execution.\n (CVE-2012-3986, CVE-2012-3991)\n\n Multiple flaws were found in the location object implementation in\n Thunderbird. Malicious content could be used to perform cross-site\n scripting attacks, script injection, or spoofing attacks. (CVE-2012-1956,\n CVE-2012-3992, CVE-2012-3994)\n\n Two flaws were found in the way Chrome Object Wrappers were implemented.\n Malicious content could be used to perform cross-site scripting attacks or\n cause Thunderbird to execute arbitrary code. (CVE-2012-3993, CVE-2012-4184)\n\n Red Hat would like to thank the Mozilla project for reporting these issues.\n Upstream acknowledges Christian Holler, Jesse Ruderman, Soroush Dalili,\n miaubiz, Abhishek Arya, Atte Kettunen, Johnny Stenback, Alice White,\n moz_bug_r_a4, and Mariusz Mlynski as the original reporters of these\n issues.\n\n Note: None of the issues in this advisory can be exploited by a\n specially-crafted HTML mail message as JavaScript is disabled by default\n for mail messages. They could be exploited another way in Thunderbird, for\n example, when viewing the full remote content of an RSS feed.\n\n All Thunderbird users should upgrade to this updated package, which\n contains Thunderbird version 10.0.8 ESR, which corrects these issues. After\n installing the update, Thunderbird must be restarted for the changes to\n take effect.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"CentOS5\")\n{\n\n if ((res = isrpmvuln(pkg:\"thunderbird\", rpm:\"thunderbird~10.0.8~1.el5.centos\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2018-01-06T13:06:25", "description": "Check for the Version of thunderbird", "cvss3": {}, "published": "2012-10-11T00:00:00", "type": "openvas", "title": "CentOS Update for thunderbird CESA-2012:1351 centos5 ", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-3986", "CVE-2012-4185", "CVE-2012-3991", "CVE-2012-1956", "CVE-2012-3993", "CVE-2012-3995", "CVE-2012-3988", "CVE-2012-3994", "CVE-2012-4183", "CVE-2012-4181", "CVE-2012-4186", "CVE-2012-4182", "CVE-2012-4187", "CVE-2012-3982", "CVE-2012-4184", "CVE-2012-3992", "CVE-2012-4180", "CVE-2012-4188", "CVE-2012-3990", "CVE-2012-4179"], "modified": "2018-01-05T00:00:00", "id": "OPENVAS:881514", "href": "http://plugins.openvas.org/nasl.php?oid=881514", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for thunderbird CESA-2012:1351 centos5 \n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Mozilla Thunderbird is a standalone mail and newsgroup client.\n\n Several flaws were found in the processing of malformed content. Malicious\n content could cause Thunderbird to crash or, potentially, execute arbitrary\n code with the privileges of the user running Thunderbird. (CVE-2012-3982,\n CVE-2012-3988, CVE-2012-3990, CVE-2012-3995, CVE-2012-4179, CVE-2012-4180,\n CVE-2012-4181, CVE-2012-4182, CVE-2012-4183, CVE-2012-4185, CVE-2012-4186,\n CVE-2012-4187, CVE-2012-4188)\n \n Two flaws in Thunderbird could allow malicious content to bypass intended\n restrictions, possibly leading to information disclosure, or Thunderbird\n executing arbitrary code. Note that the information disclosure issue could\n possibly be combined with other flaws to achieve arbitrary code execution.\n (CVE-2012-3986, CVE-2012-3991)\n \n Multiple flaws were found in the location object implementation in\n Thunderbird. Malicious content could be used to perform cross-site\n scripting attacks, script injection, or spoofing attacks. (CVE-2012-1956,\n CVE-2012-3992, CVE-2012-3994)\n \n Two flaws were found in the way Chrome Object Wrappers were implemented.\n Malicious content could be used to perform cross-site scripting attacks or\n cause Thunderbird to execute arbitrary code. (CVE-2012-3993, CVE-2012-4184)\n \n Red Hat would like to thank the Mozilla project for reporting these issues.\n Upstream acknowledges Christian Holler, Jesse Ruderman, Soroush Dalili,\n miaubiz, Abhishek Arya, Atte Kettunen, Johnny Stenback, Alice White,\n moz_bug_r_a4, and Mariusz Mlynski as the original reporters of these\n issues.\n \n Note: None of the issues in this advisory can be exploited by a\n specially-crafted HTML mail message as JavaScript is disabled by default\n for mail messages. They could be exploited another way in Thunderbird, for\n example, when viewing the full remote content of an RSS feed.\n \n All Thunderbird users should upgrade to this updated package, which\n contains Thunderbird version 10.0.8 ESR, which corrects these issues. After\n installing the update, Thunderbird must be restarted for the changes to\n take effect.\";\n\ntag_affected = \"thunderbird on CentOS 5\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.centos.org/pipermail/centos-announce/2012-October/018929.html\");\n script_id(881514);\n script_version(\"$Revision: 8295 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-05 07:29:18 +0100 (Fri, 05 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2012-10-11 10:03:01 +0530 (Thu, 11 Oct 2012)\");\n script_cve_id(\"CVE-2012-1956\", \"CVE-2012-3982\", \"CVE-2012-3986\", \"CVE-2012-3988\",\n \"CVE-2012-3990\", \"CVE-2012-3991\", \"CVE-2012-3992\", \"CVE-2012-3993\",\n \"CVE-2012-3994\", \"CVE-2012-3995\", \"CVE-2012-4179\", \"CVE-2012-4180\",\n \"CVE-2012-4181\", \"CVE-2012-4182\", \"CVE-2012-4183\", \"CVE-2012-4184\",\n \"CVE-2012-4185\", \"CVE-2012-4186\", \"CVE-2012-4187\", \"CVE-2012-4188\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"CESA\", value: \"2012:1351\");\n script_name(\"CentOS Update for thunderbird CESA-2012:1351 centos5 \");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of thunderbird\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"CentOS5\")\n{\n\n if ((res = isrpmvuln(pkg:\"thunderbird\", rpm:\"thunderbird~10.0.8~1.el5.centos\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2020-08-14T16:20:58", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2012-10-11T00:00:00", "type": "openvas", "title": "CentOS Update for firefox CESA-2012:1350 centos5", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-3986", "CVE-2012-4185", "CVE-2012-3991", "CVE-2012-1956", "CVE-2012-3993", "CVE-2012-3995", "CVE-2012-3988", "CVE-2012-3994", "CVE-2012-4183", "CVE-2012-4181", "CVE-2012-4186", "CVE-2012-4182", "CVE-2012-4187", "CVE-2012-3982", "CVE-2012-4184", "CVE-2012-3992", "CVE-2012-4180", "CVE-2012-4188", "CVE-2012-3990", "CVE-2012-4179"], "modified": "2019-03-15T00:00:00", "id": "OPENVAS:1361412562310881512", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310881512", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for firefox CESA-2012:1350 centos5\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.centos.org/pipermail/centos-announce/2012-October/018928.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.881512\");\n script_version(\"$Revision: 14222 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 13:50:48 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2012-10-11 10:02:01 +0530 (Thu, 11 Oct 2012)\");\n script_cve_id(\"CVE-2012-1956\", \"CVE-2012-3982\", \"CVE-2012-3986\", \"CVE-2012-3988\",\n \"CVE-2012-3990\", \"CVE-2012-3991\", \"CVE-2012-3992\", \"CVE-2012-3993\",\n \"CVE-2012-3994\", \"CVE-2012-3995\", \"CVE-2012-4179\", \"CVE-2012-4180\",\n \"CVE-2012-4181\", \"CVE-2012-4182\", \"CVE-2012-4183\", \"CVE-2012-4184\",\n \"CVE-2012-4185\", \"CVE-2012-4186\", \"CVE-2012-4187\", \"CVE-2012-4188\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name:\"CESA\", value:\"2012:1350\");\n script_name(\"CentOS Update for firefox CESA-2012:1350 centos5\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'firefox'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\", re:\"ssh/login/release=CentOS5\");\n script_tag(name:\"affected\", value:\"firefox on CentOS 5\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n script_tag(name:\"insight\", value:\"Mozilla Firefox is an open source web browser. XULRunner provides the XUL\n Runtime environment for Mozilla Firefox.\n\n Several flaws were found in the processing of malformed web content. A web\n page containing malicious content could cause Firefox to crash or,\n potentially, execute arbitrary code with the privileges of the user running\n Firefox. (CVE-2012-3982, CVE-2012-3988, CVE-2012-3990, CVE-2012-3995,\n CVE-2012-4179, CVE-2012-4180, CVE-2012-4181, CVE-2012-4182, CVE-2012-4183,\n CVE-2012-4185, CVE-2012-4186, CVE-2012-4187, CVE-2012-4188)\n\n Two flaws in Firefox could allow a malicious website to bypass intended\n restrictions, possibly leading to information disclosure, or Firefox\n executing arbitrary code. Note that the information disclosure issue could\n possibly be combined with other flaws to achieve arbitrary code execution.\n (CVE-2012-3986, CVE-2012-3991)\n\n Multiple flaws were found in the location object implementation in Firefox.\n Malicious content could be used to perform cross-site scripting attacks,\n script injection, or spoofing attacks. (CVE-2012-1956, CVE-2012-3992,\n CVE-2012-3994)\n\n Two flaws were found in the way Chrome Object Wrappers were implemented.\n Malicious content could be used to perform cross-site scripting attacks or\n cause Firefox to execute arbitrary code. (CVE-2012-3993, CVE-2012-4184)\n\n For technical details regarding these flaws, refer to the Mozilla security\n advisories for Firefox 10.0.8 ESR. You can find a link to the Mozilla\n advisories in the References section of this erratum.\n\n Red Hat would like to thank the Mozilla project for reporting these issues.\n Upstream acknowledges Christian Holler, Jesse Ruderman, Soroush Dalili,\n miaubiz, Abhishek Arya, Atte Kettunen, Johnny Stenback, Alice White,\n moz_bug_r_a4, and Mariusz Mlynski as the original reporters of these\n issues.\n\n This update also fixes the following bug:\n\n * In certain environments, storing personal Firefox configuration files\n (~/.mozilla/) on an NFS share, such as when your home directory is on a\n NFS share, led to Firefox functioning incorrectly, for example, navigation\n buttons not working as expected, and bookmarks not saving. This update\n adds a new configuration option, storage.nfs_filesystem, that can be used\n to resolve this issue.\n\n If you experience this issue:\n\n 1) Start Firefox.\n\n 2) Type 'about:config' (without quotes) into the URL bar and press the\n Enter key.\n\n 3) If prompted with 'This might void your warranty!', click the 'I'll be\n careful, I promise!' button.\n\n 4) Right-click in the ...\n\n Description truncated, please see the referenced URL(s) for more information.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"CentOS5\")\n{\n\n if ((res = isrpmvuln(pkg:\"firefox\", rpm:\"firefox~10.0.8~1.el5.centos\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner\", rpm:\"xulrunner~10.0.8~1.el5_8\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner-devel\", rpm:\"xulrunner-devel~10.0.8~1.el5_8\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2018-01-02T10:57:25", "description": "Check for the Version of firefox", "cvss3": {}, "published": "2012-10-11T00:00:00", "type": "openvas", "title": "CentOS Update for firefox CESA-2012:1350 centos6 ", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-3986", "CVE-2012-4185", "CVE-2012-3991", "CVE-2012-1956", "CVE-2012-3993", "CVE-2012-3995", "CVE-2012-3988", "CVE-2012-3994", "CVE-2012-4183", "CVE-2012-4181", "CVE-2012-4186", "CVE-2012-4182", "CVE-2012-4187", "CVE-2012-3982", "CVE-2012-4184", "CVE-2012-3992", "CVE-2012-4180", "CVE-2012-4188", "CVE-2012-3990", "CVE-2012-4179"], "modified": "2018-01-01T00:00:00", "id": "OPENVAS:881513", "href": "http://plugins.openvas.org/nasl.php?oid=881513", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for firefox CESA-2012:1350 centos6 \n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Mozilla Firefox is an open source web browser. XULRunner provides the XUL\n Runtime environment for Mozilla Firefox.\n\n Several flaws were found in the processing of malformed web content. A web\n page containing malicious content could cause Firefox to crash or,\n potentially, execute arbitrary code with the privileges of the user running\n Firefox. (CVE-2012-3982, CVE-2012-3988, CVE-2012-3990, CVE-2012-3995,\n CVE-2012-4179, CVE-2012-4180, CVE-2012-4181, CVE-2012-4182, CVE-2012-4183,\n CVE-2012-4185, CVE-2012-4186, CVE-2012-4187, CVE-2012-4188)\n \n Two flaws in Firefox could allow a malicious website to bypass intended\n restrictions, possibly leading to information disclosure, or Firefox\n executing arbitrary code. Note that the information disclosure issue could\n possibly be combined with other flaws to achieve arbitrary code execution.\n (CVE-2012-3986, CVE-2012-3991)\n \n Multiple flaws were found in the location object implementation in Firefox.\n Malicious content could be used to perform cross-site scripting attacks,\n script injection, or spoofing attacks. (CVE-2012-1956, CVE-2012-3992,\n CVE-2012-3994)\n \n Two flaws were found in the way Chrome Object Wrappers were implemented.\n Malicious content could be used to perform cross-site scripting attacks or\n cause Firefox to execute arbitrary code. (CVE-2012-3993, CVE-2012-4184)\n \n For technical details regarding these flaws, refer to the Mozilla security\n advisories for Firefox 10.0.8 ESR. You can find a link to the Mozilla\n advisories in the References section of this erratum.\n \n Red Hat would like to thank the Mozilla project for reporting these issues.\n Upstream acknowledges Christian Holler, Jesse Ruderman, Soroush Dalili,\n miaubiz, Abhishek Arya, Atte Kettunen, Johnny Stenback, Alice White,\n moz_bug_r_a4, and Mariusz Mlynski as the original reporters of these\n issues.\n \n This update also fixes the following bug:\n \n * In certain environments, storing personal Firefox configuration files\n (~/.mozilla/) on an NFS share, such as when your home directory is on a\n NFS share, led to Firefox functioning incorrectly, for example, navigation\n buttons not working as expected, and bookmarks not saving. This update\n adds a new configuration option, storage.nfs_filesystem, that can be used\n to resolve this issue.\n \n If you experience this issue:\n \n 1) Start Firefox.\n \n 2) Type "about:config" (without quotes) into the URL bar and press the\n Enter key.\n \n 3) If prompted with "This might void your warranty!", click the "I'll be\n careful, I promise!" button.\n \n 4) Right-click in the ... \n\n Description truncated, for more information please check the Reference URL\";\n\ntag_affected = \"firefox on CentOS 6\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.centos.org/pipermail/centos-announce/2012-October/018930.html\");\n script_id(881513);\n script_version(\"$Revision: 8265 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-01 07:29:23 +0100 (Mon, 01 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2012-10-11 10:02:34 +0530 (Thu, 11 Oct 2012)\");\n script_cve_id(\"CVE-2012-1956\", \"CVE-2012-3982\", \"CVE-2012-3986\", \"CVE-2012-3988\",\n \"CVE-2012-3990\", \"CVE-2012-3991\", \"CVE-2012-3992\", \"CVE-2012-3993\",\n \"CVE-2012-3994\", \"CVE-2012-3995\", \"CVE-2012-4179\", \"CVE-2012-4180\",\n \"CVE-2012-4181\", \"CVE-2012-4182\", \"CVE-2012-4183\", \"CVE-2012-4184\",\n \"CVE-2012-4185\", \"CVE-2012-4186\", \"CVE-2012-4187\", \"CVE-2012-4188\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"CESA\", value: \"2012:1350\");\n script_name(\"CentOS Update for firefox CESA-2012:1350 centos6 \");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of firefox\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"CentOS6\")\n{\n\n if ((res = isrpmvuln(pkg:\"firefox\", rpm:\"firefox~10.0.8~1.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner\", rpm:\"xulrunner~10.0.8~1.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner-devel\", rpm:\"xulrunner-devel~10.0.8~1.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2020-08-14T16:22:03", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2012-10-11T00:00:00", "type": "openvas", "title": "CentOS Update for thunderbird CESA-2012:1351 centos6", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-3986", "CVE-2012-4185", "CVE-2012-3991", "CVE-2012-1956", "CVE-2012-3993", "CVE-2012-3995", "CVE-2012-3988", "CVE-2012-3994", "CVE-2012-4183", "CVE-2012-4181", "CVE-2012-4186", "CVE-2012-4182", "CVE-2012-4187", "CVE-2012-3982", "CVE-2012-4184", "CVE-2012-3992", "CVE-2012-4180", "CVE-2012-4188", "CVE-2012-3990", "CVE-2012-4179"], "modified": "2019-03-15T00:00:00", "id": "OPENVAS:1361412562310881515", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310881515", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for thunderbird CESA-2012:1351 centos6\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.centos.org/pipermail/centos-announce/2012-October/018931.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.881515\");\n script_version(\"$Revision: 14222 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 13:50:48 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2012-10-11 10:03:30 +0530 (Thu, 11 Oct 2012)\");\n script_cve_id(\"CVE-2012-1956\", \"CVE-2012-3982\", \"CVE-2012-3986\", \"CVE-2012-3988\",\n \"CVE-2012-3990\", \"CVE-2012-3991\", \"CVE-2012-3992\", \"CVE-2012-3993\",\n \"CVE-2012-3994\", \"CVE-2012-3995\", \"CVE-2012-4179\", \"CVE-2012-4180\",\n \"CVE-2012-4181\", \"CVE-2012-4182\", \"CVE-2012-4183\", \"CVE-2012-4184\",\n \"CVE-2012-4185\", \"CVE-2012-4186\", \"CVE-2012-4187\", \"CVE-2012-4188\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name:\"CESA\", value:\"2012:1351\");\n script_name(\"CentOS Update for thunderbird CESA-2012:1351 centos6\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'thunderbird'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\", re:\"ssh/login/release=CentOS6\");\n script_tag(name:\"affected\", value:\"thunderbird on CentOS 6\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n script_tag(name:\"insight\", value:\"Mozilla Thunderbird is a standalone mail and newsgroup client.\n\n Several flaws were found in the processing of malformed content. Malicious\n content could cause Thunderbird to crash or, potentially, execute arbitrary\n code with the privileges of the user running Thunderbird. (CVE-2012-3982,\n CVE-2012-3988, CVE-2012-3990, CVE-2012-3995, CVE-2012-4179, CVE-2012-4180,\n CVE-2012-4181, CVE-2012-4182, CVE-2012-4183, CVE-2012-4185, CVE-2012-4186,\n CVE-2012-4187, CVE-2012-4188)\n\n Two flaws in Thunderbird could allow malicious content to bypass intended\n restrictions, possibly leading to information disclosure, or Thunderbird\n executing arbitrary code. Note that the information disclosure issue could\n possibly be combined with other flaws to achieve arbitrary code execution.\n (CVE-2012-3986, CVE-2012-3991)\n\n Multiple flaws were found in the location object implementation in\n Thunderbird. Malicious content could be used to perform cross-site\n scripting attacks, script injection, or spoofing attacks. (CVE-2012-1956,\n CVE-2012-3992, CVE-2012-3994)\n\n Two flaws were found in the way Chrome Object Wrappers were implemented.\n Malicious content could be used to perform cross-site scripting attacks or\n cause Thunderbird to execute arbitrary code. (CVE-2012-3993, CVE-2012-4184)\n\n Red Hat would like to thank the Mozilla project for reporting these issues.\n Upstream acknowledges Christian Holler, Jesse Ruderman, Soroush Dalili,\n miaubiz, Abhishek Arya, Atte Kettunen, Johnny Stenback, Alice White,\n moz_bug_r_a4, and Mariusz Mlynski as the original reporters of these\n issues.\n\n Note: None of the issues in this advisory can be exploited by a\n specially-crafted HTML mail message as JavaScript is disabled by default\n for mail messages. They could be exploited another way in Thunderbird, for\n example, when viewing the full remote content of an RSS feed.\n\n All Thunderbird users should upgrade to this updated package, which\n contains Thunderbird version 10.0.8 ESR, which corrects these issues. After\n installing the update, Thunderbird must be restarted for the changes to\n take effect.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"CentOS6\")\n{\n\n if ((res = isrpmvuln(pkg:\"thunderbird\", rpm:\"thunderbird~10.0.8~1.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-08-14T16:26:37", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2012-10-11T00:00:00", "type": "openvas", "title": "RedHat Update for firefox RHSA-2012:1350-01", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-3986", "CVE-2012-4185", "CVE-2012-3991", "CVE-2012-1956", "CVE-2012-3993", "CVE-2012-3995", "CVE-2012-3988", "CVE-2012-3994", "CVE-2012-4183", "CVE-2012-4181", "CVE-2012-4186", "CVE-2012-4182", "CVE-2012-4187", "CVE-2012-3982", "CVE-2012-4184", "CVE-2012-3992", "CVE-2012-4180", "CVE-2012-4188", "CVE-2012-3990", "CVE-2012-4179"], "modified": "2018-11-23T00:00:00", "id": "OPENVAS:1361412562310870843", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310870843", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for firefox RHSA-2012:1350-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"https://www.redhat.com/archives/rhsa-announce/2012-October/msg00011.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.870843\");\n script_version(\"$Revision: 12497 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-11-23 09:28:21 +0100 (Fri, 23 Nov 2018) $\");\n script_tag(name:\"creation_date\", value:\"2012-10-11 10:00:28 +0530 (Thu, 11 Oct 2012)\");\n script_cve_id(\"CVE-2012-1956\", \"CVE-2012-3982\", \"CVE-2012-3986\", \"CVE-2012-3988\",\n \"CVE-2012-3990\", \"CVE-2012-3991\", \"CVE-2012-3992\", \"CVE-2012-3993\",\n \"CVE-2012-3994\", \"CVE-2012-3995\", \"CVE-2012-4179\", \"CVE-2012-4180\",\n \"CVE-2012-4181\", \"CVE-2012-4182\", \"CVE-2012-4183\", \"CVE-2012-4184\",\n \"CVE-2012-4185\", \"CVE-2012-4186\", \"CVE-2012-4187\", \"CVE-2012-4188\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name:\"RHSA\", value:\"2012:1350-01\");\n script_name(\"RedHat Update for firefox RHSA-2012:1350-01\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'firefox'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\", re:\"ssh/login/release=RHENT_(6|5)\");\n script_tag(name:\"affected\", value:\"firefox on Red Hat Enterprise Linux (v. 5 server),\n Red Hat Enterprise Linux Desktop (v. 6),\n Red Hat Enterprise Linux Server (v. 6),\n Red Hat Enterprise Linux Workstation (v. 6)\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"insight\", value:\"Mozilla Firefox is an open source web browser. XULRunner provides the XUL\n Runtime environment for Mozilla Firefox.\n\n Several flaws were found in the processing of malformed web content. A web\n page containing malicious content could cause Firefox to crash or,\n potentially, execute arbitrary code with the privileges of the user running\n Firefox. (CVE-2012-3982, CVE-2012-3988, CVE-2012-3990, CVE-2012-3995,\n CVE-2012-4179, CVE-2012-4180, CVE-2012-4181, CVE-2012-4182, CVE-2012-4183,\n CVE-2012-4185, CVE-2012-4186, CVE-2012-4187, CVE-2012-4188)\n\n Two flaws in Firefox could allow a malicious website to bypass intended\n restrictions, possibly leading to information disclosure, or Firefox\n executing arbitrary code. Note that the information disclosure issue could\n possibly be combined with other flaws to achieve arbitrary code execution.\n (CVE-2012-3986, CVE-2012-3991)\n\n Multiple flaws were found in the location object implementation in Firefox.\n Malicious content could be used to perform cross-site scripting attacks,\n script injection, or spoofing attacks. (CVE-2012-1956, CVE-2012-3992,\n CVE-2012-3994)\n\n Two flaws were found in the way Chrome Object Wrappers were implemented.\n Malicious content could be used to perform cross-site scripting attacks or\n cause Firefox to execute arbitrary code. (CVE-2012-3993, CVE-2012-4184)\n\n For technical details regarding these flaws, refer to the Mozilla security\n advisories for Firefox 10.0.8 ESR. You can find a link to the Mozilla\n advisories in the References section of this erratum.\n\n Description truncated, please see the referenced URL(s) for more information.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"RHENT_6\")\n{\n\n if ((res = isrpmvuln(pkg:\"firefox\", rpm:\"firefox~10.0.8~1.el6_3\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-debuginfo\", rpm:\"firefox-debuginfo~10.0.8~1.el6_3\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner\", rpm:\"xulrunner~10.0.8~1.el6_3\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner-debuginfo\", rpm:\"xulrunner-debuginfo~10.0.8~1.el6_3\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"RHENT_5\")\n{\n\n if ((res = isrpmvuln(pkg:\"firefox\", rpm:\"firefox~10.0.8~1.el5_8\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-debuginfo\", rpm:\"firefox-debuginfo~10.0.8~1.el5_8\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner\", rpm:\"xulrunner~10.0.8~1.el5_8\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner-debuginfo\", rpm:\"xulrunner-debuginfo~10.0.8~1.el5_8\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner-devel\", rpm:\"xulrunner-devel~10.0.8~1.el5_8\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-04-26T15:07:25", "description": "This host is installed with Mozilla Seamonkey and is prone to multiple\n vulnerabilities.", "cvss3": {}, "published": "2012-11-26T00:00:00", "type": "openvas", "title": "Mozilla SeaMonkey Multiple Vulnerabilities-02 November12 (Windows)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-5842", "CVE-2012-4214", "CVE-2012-5830", "CVE-2012-5829", "CVE-2012-4201", "CVE-2012-5840", "CVE-2012-4202", "CVE-2012-5839", "CVE-2012-4216", "CVE-2012-5835", "CVE-2012-4207", "CVE-2012-5833", "CVE-2012-5841", "CVE-2012-4215", "CVE-2012-4209"], "modified": "2020-04-22T00:00:00", "id": "OPENVAS:1361412562310803353", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310803353", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mozilla SeaMonkey Multiple Vulnerabilities-02 November12 (Windows)\n#\n# Authors:\n# Arun Kallavi <karun@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.803353\");\n script_version(\"2020-04-22T10:27:30+0000\");\n script_cve_id(\"CVE-2012-4209\", \"CVE-2012-4214\", \"CVE-2012-4215\", \"CVE-2012-4216\",\n \"CVE-2012-4201\", \"CVE-2012-4202\", \"CVE-2012-4207\", \"CVE-2012-5842\",\n \"CVE-2012-5841\", \"CVE-2012-5829\", \"CVE-2012-5830\", \"CVE-2012-5833\",\n \"CVE-2012-5835\", \"CVE-2012-5839\", \"CVE-2012-5840\");\n script_bugtraq_id(56629, 56628, 56633, 56634, 56618, 56614, 56632, 56611,\n 56631, 56636, 56642, 56637, 56635);\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-04-22 10:27:30 +0000 (Wed, 22 Apr 2020)\");\n script_tag(name:\"creation_date\", value:\"2012-11-26 12:30:03 +0530 (Mon, 26 Nov 2012)\");\n script_name(\"Mozilla SeaMonkey Multiple Vulnerabilities-02 November12 (Windows)\");\n script_xref(name:\"URL\", value:\"http://secunia.com/advisories/51358\");\n script_xref(name:\"URL\", value:\"http://securitytracker.com/id?1027791\");\n script_xref(name:\"URL\", value:\"http://securitytracker.com/id?1027792\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-91.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-94.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-96.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-97.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-99.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-105.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-106.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2012 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_seamonkey_detect_win.nasl\");\n script_mandatory_keys(\"Seamonkey/Win/Ver\");\n script_tag(name:\"impact\", value:\"Successful exploitation could allow attackers to inject scripts, bypass\n certain security restrictions, execute arbitrary code in the context of the browser.\");\n script_tag(name:\"affected\", value:\"SeaMonkey version before 2.14 on Windows\");\n script_tag(name:\"insight\", value:\"Multiple error exists\n\n - When combining SVG text with the setting of CSS properties.\n\n - Within the 'copyTexImage2D' implementation in the WebGL subsystem and\n in the XrayWrapper implementation.\n\n - Within 'str_unescape' in the Javascript engin and in 'XMLHttpRequest'\n objects created within sandboxes.\");\n script_tag(name:\"solution\", value:\"Upgrade to SeaMonkey version to 2.14 or later.\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Mozilla Seamonkey and is prone to multiple\n vulnerabilities.\");\n script_tag(name:\"qod_type\", value:\"registry\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\nseaVer = get_kb_item(\"Seamonkey/Win/Ver\");\n\nif(seaVer)\n{\n if(version_is_less(version:seaVer, test_version:\"2.14\"))\n {\n report = report_fixed_ver(installed_version:seaVer, fixed_version:\"2.14\");\n security_message(port:0, data:report);\n exit(0);\n }\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-04-26T15:06:57", "description": "This host is installed with Mozilla Thunderbird and is prone to multiple\n vulnerabilities.", "cvss3": {}, "published": "2012-11-26T00:00:00", "type": "openvas", "title": "Mozilla Thunderbird Multiple Vulnerabilities-02 November12 (Windows)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-5842", "CVE-2012-4214", "CVE-2012-5830", "CVE-2012-5829", "CVE-2012-4201", "CVE-2012-5840", "CVE-2012-4202", "CVE-2012-5839", "CVE-2012-4216", "CVE-2012-5835", "CVE-2012-4207", "CVE-2012-5833", "CVE-2012-5841", "CVE-2012-4215", "CVE-2012-4209"], "modified": "2020-04-22T00:00:00", "id": "OPENVAS:1361412562310803354", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310803354", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mozilla Thunderbird Multiple Vulnerabilities-02 November12 (Windows)\n#\n# Authors:\n# Arun Kallavi <karun@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.803354\");\n script_version(\"2020-04-22T10:27:30+0000\");\n script_cve_id(\"CVE-2012-4209\", \"CVE-2012-4214\", \"CVE-2012-4215\", \"CVE-2012-4216\",\n \"CVE-2012-4201\", \"CVE-2012-4202\", \"CVE-2012-4207\", \"CVE-2012-5842\",\n \"CVE-2012-5841\", \"CVE-2012-5829\", \"CVE-2012-5830\", \"CVE-2012-5833\",\n \"CVE-2012-5835\", \"CVE-2012-5839\", \"CVE-2012-5840\");\n script_bugtraq_id(56629, 56628, 56633, 56634, 56618, 56614, 56632, 56611,\n 56631, 56636, 56642, 56637, 56635);\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-04-22 10:27:30 +0000 (Wed, 22 Apr 2020)\");\n script_tag(name:\"creation_date\", value:\"2012-11-26 12:30:03 +0530 (Mon, 26 Nov 2012)\");\n script_name(\"Mozilla Thunderbird Multiple Vulnerabilities-02 November12 (Windows)\");\n script_xref(name:\"URL\", value:\"http://secunia.com/advisories/51358\");\n script_xref(name:\"URL\", value:\"http://securitytracker.com/id?1027791\");\n script_xref(name:\"URL\", value:\"http://securitytracker.com/id?1027792\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-91.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-94.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-96.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-97.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-99.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-105.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-106.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2012 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_thunderbird_detect_portable_win.nasl\");\n script_mandatory_keys(\"Thunderbird/Win/Ver\");\n script_tag(name:\"impact\", value:\"Successful exploitation could allow attackers to inject scripts, bypass\n certain security restrictions, execute arbitrary code in the context of the\n browser.\");\n script_tag(name:\"affected\", value:\"Thunderbird version before 17.0 on Windows\");\n script_tag(name:\"insight\", value:\"Multiple errors exist:\n\n - When combining SVG text with the setting of CSS properties.\n\n - Within the 'copyTexImage2D' implementation in the WebGL subsystem and\n in the XrayWrapper implementation.\n\n - Within 'str_unescape' in the Javascript engin and in 'XMLHttpRequest'\n objects created within sandboxes.\");\n script_tag(name:\"solution\", value:\"Upgrade to Thunderbird version to 17.0 or later.\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Mozilla Thunderbird and is prone to multiple\n vulnerabilities.\");\n script_tag(name:\"qod_type\", value:\"registry\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\ntbVer = get_kb_item(\"Thunderbird/Win/Ver\");\n\nif(tbVer)\n{\n if(version_is_less(version:tbVer, test_version:\"17.0\"))\n {\n report = report_fixed_ver(installed_version:tbVer, fixed_version:\"17.0\");\n security_message(port:0, data:report);\n exit(0);\n }\n}\n\nexit(99);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2017-07-02T21:10:59", "description": "This host is installed with Mozilla Seamonkey and is prone to multiple\n vulnerabilities.", "cvss3": {}, "published": "2012-11-26T00:00:00", "type": "openvas", "title": "Mozilla SeaMonkey Multiple Vulnerabilities-01 November12 (Mac OS X)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-5842", "CVE-2012-4214", "CVE-2012-5830", "CVE-2012-5829", "CVE-2012-4201", "CVE-2012-5840", "CVE-2012-4202", "CVE-2012-5839", "CVE-2012-4216", "CVE-2012-5835", "CVE-2012-4207", "CVE-2012-5833", "CVE-2012-5841", "CVE-2012-4215", "CVE-2012-4209"], "modified": "2017-05-10T00:00:00", "id": "OPENVAS:803362", "href": "http://plugins.openvas.org/nasl.php?oid=803362", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_mozilla_seamonkey_mult_vuln01_nov12_macosx.nasl 6093 2017-05-10 09:03:18Z teissa $\n#\n# Mozilla SeaMonkey Multiple Vulnerabilities-01 November12 (Mac OS X)\n#\n# Authors:\n# Arun Kallavi <karun@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_impact = \"Successful exploitation could allow attackers to inject scripts, bypass\n certain security restrictions, execute arbitrary code in the context of the\n browser.\n Impact Level: System/Application\";\n\ntag_affected = \"SeaMonkey version before 2.14 on Mac OS X\";\ntag_insight = \"- The 'location' property can be accessed through 'top.location' with a\n frame whose name attributes value is set to 'top'.\n - Use-after-free error exists within the functions\n 'nsTextEditorState::PrepareEditor', 'gfxFont::GetFontEntry',\n 'nsWindow::OnExposeEvent' and 'nsPlaintextEditor::FireClipboardEvent'.\n - An error within the 'evalInSandbox()' when handling the 'location.href'\n property.\n - Error when rendering GIF images.\";\ntag_solution = \"Upgrade to SeaMonkey version to 2.14 or later,\n http://www.mozilla.org/projects/seamonkey\";\ntag_summary = \"This host is installed with Mozilla Seamonkey and is prone to multiple\n vulnerabilities.\";\n\nif(description)\n{\n script_id(803362);\n script_version(\"$Revision: 6093 $\");\n script_cve_id(\"CVE-2012-4209\", \"CVE-2012-4214\", \"CVE-2012-4215\", \"CVE-2012-4216\",\n \"CVE-2012-4201\", \"CVE-2012-4202\", \"CVE-2012-4207\", \"CVE-2012-5842\",\n \"CVE-2012-5841\", \"CVE-2012-5829\", \"CVE-2012-5830\", \"CVE-2012-5833\",\n \"CVE-2012-5835\", \"CVE-2012-5839\", \"CVE-2012-5840\");\n script_bugtraq_id(56629, 56628, 56633, 56634, 56618, 56614, 56632, 56611,\n 56631, 56636, 56641, 56642, 56637, 56635);\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-05-10 11:03:18 +0200 (Wed, 10 May 2017) $\");\n script_tag(name:\"creation_date\", value:\"2012-11-26 11:10:03 +0530 (Mon, 26 Nov 2012)\");\n script_name(\"Mozilla SeaMonkey Multiple Vulnerabilities-01 November12 (Mac OS X)\");\n script_xref(name : \"URL\" , value : \"http://secunia.com/advisories/51358\");\n script_xref(name : \"URL\" , value : \"http://securitytracker.com/id?1027791\");\n script_xref(name : \"URL\" , value : \"http://securitytracker.com/id?1027792\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-91.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-92.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-93.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-100.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-101.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-103.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-105.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-106.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2012 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_mozilla_prdts_detect_macosx.nasl\");\n script_mandatory_keys(\"SeaMonkey/MacOSX/Version\");\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\n# Variable Initialization\nseaVer = \"\";\n\n# Get version from KB\nseaVer = get_kb_item(\"SeaMonkey/MacOSX/Version\");\nif(seaVer)\n{\n # Grep for SeaMonkey version\n if(version_is_less(version:seaVer, test_version:\"2.14\"))\n {\n security_message(0);\n exit(0);\n }\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-05-29T18:38:43", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2012-11-23T00:00:00", "type": "openvas", "title": "CentOS Update for thunderbird CESA-2012:1483 centos6", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-5842", "CVE-2012-4214", "CVE-2012-5830", "CVE-2012-5829", "CVE-2012-4201", "CVE-2012-5840", "CVE-2012-4202", "CVE-2012-5839", "CVE-2012-4216", "CVE-2012-5835", "CVE-2012-4207", "CVE-2012-5833", "CVE-2012-5841", "CVE-2012-4215", "CVE-2012-4209"], "modified": "2019-03-15T00:00:00", "id": "OPENVAS:1361412562310881543", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310881543", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for thunderbird CESA-2012:1483 centos6\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.centos.org/pipermail/centos-announce/2012-November/019009.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.881543\");\n script_version(\"$Revision: 14222 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 13:50:48 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2012-11-23 11:46:46 +0530 (Fri, 23 Nov 2012)\");\n script_cve_id(\"CVE-2012-4201\", \"CVE-2012-4202\", \"CVE-2012-4207\", \"CVE-2012-4209\",\n \"CVE-2012-4214\", \"CVE-2012-4215\", \"CVE-2012-4216\", \"CVE-2012-5829\",\n \"CVE-2012-5830\", \"CVE-2012-5833\", \"CVE-2012-5835\", \"CVE-2012-5839\",\n \"CVE-2012-5840\", \"CVE-2012-5841\", \"CVE-2012-5842\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name:\"CESA\", value:\"2012:1483\");\n script_name(\"CentOS Update for thunderbird CESA-2012:1483 centos6\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'thunderbird'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\", re:\"ssh/login/release=CentOS6\");\n script_tag(name:\"affected\", value:\"thunderbird on CentOS 6\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n script_tag(name:\"insight\", value:\"Mozilla Thunderbird is a standalone mail and newsgroup client.\n\n Several flaws were found in the processing of malformed content. Malicious\n content could cause Thunderbird to crash or, potentially, execute arbitrary\n code with the privileges of the user running Thunderbird. (CVE-2012-4214,\n CVE-2012-4215, CVE-2012-4216, CVE-2012-5829, CVE-2012-5830, CVE-2012-5833,\n CVE-2012-5835, CVE-2012-5839, CVE-2012-5840, CVE-2012-5842)\n\n A buffer overflow flaw was found in the way Thunderbird handled GIF\n (Graphics Interchange Format) images. Content containing a malicious GIF\n image could cause Thunderbird to crash or, possibly, execute arbitrary code\n with the privileges of the user running Thunderbird. (CVE-2012-4202)\n\n A flaw was found in the way Thunderbird decoded the HZ-GB-2312 character\n encoding. Malicious content could cause Thunderbird to run JavaScript code\n with the permissions of different content. (CVE-2012-4207)\n\n A flaw was found in the location object implementation in Thunderbird.\n Malicious content could possibly use this flaw to allow restricted content\n to be loaded by plug-ins. (CVE-2012-4209)\n\n A flaw was found in the way cross-origin wrappers were implemented.\n Malicious content could use this flaw to perform cross-site scripting\n attacks. (CVE-2012-5841)\n\n A flaw was found in the evalInSandbox implementation in Thunderbird.\n Malicious content could use this flaw to perform cross-site scripting\n attacks. (CVE-2012-4201)\n\n Red Hat would like to thank the Mozilla project for reporting these issues.\n Upstream acknowledges Abhishek Arya, miaubiz, Jesse Ruderman, Andrew\n McCreight, Bob Clary, Kyle Huey, Atte Kettunen, Masato Kinugawa, Mariusz\n Mlynski, Bobby Holley, and moz_bug_r_a4 as the original reporters of\n these issues.\n\n Note: All issues except CVE-2012-4202 cannot be exploited by a\n specially-crafted HTML mail message as JavaScript is disabled by default\n for mail messages. They could be exploited another way in Thunderbird, for\n example, when viewing the full remote content of an RSS feed.\n\n All Thunderbird users should upgrade to this updated package, which\n contains Thunderbird version 10.0.11 ESR, which corrects these issues.\n After installing the update, Thunderbird must be restarted for the changes\n to take effect.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"CentOS6\")\n{\n\n if ((res = isrpmvuln(pkg:\"thunderbird\", rpm:\"thunderbird~10.0.11~1.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-08-14T16:24:04", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2012-10-11T00:00:00", "type": "openvas", "title": "RedHat Update for thunderbird RHSA-2012:1351-01", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-3986", "CVE-2012-4185", "CVE-2012-3991", "CVE-2012-1956", "CVE-2012-3993", "CVE-2012-3995", "CVE-2012-3988", "CVE-2012-3994", "CVE-2012-4183", "CVE-2012-4181", "CVE-2012-4186", "CVE-2012-4182", "CVE-2012-4187", "CVE-2012-3982", "CVE-2012-4184", "CVE-2012-3992", "CVE-2012-4180", "CVE-2012-4188", "CVE-2012-3990", "CVE-2012-4179"], "modified": "2018-11-23T00:00:00", "id": "OPENVAS:1361412562310870844", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310870844", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for thunderbird RHSA-2012:1351-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"https://www.redhat.com/archives/rhsa-announce/2012-October/msg00012.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.870844\");\n script_version(\"$Revision: 12497 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-11-23 09:28:21 +0100 (Fri, 23 Nov 2018) $\");\n script_tag(name:\"creation_date\", value:\"2012-10-11 10:00:57 +0530 (Thu, 11 Oct 2012)\");\n script_cve_id(\"CVE-2012-1956\", \"CVE-2012-3982\", \"CVE-2012-3986\", \"CVE-2012-3988\",\n \"CVE-2012-3990\", \"CVE-2012-3991\", \"CVE-2012-3992\", \"CVE-2012-3993\",\n \"CVE-2012-3994\", \"CVE-2012-3995\", \"CVE-2012-4179\", \"CVE-2012-4180\",\n \"CVE-2012-4181\", \"CVE-2012-4182\", \"CVE-2012-4183\", \"CVE-2012-4184\",\n \"CVE-2012-4185\", \"CVE-2012-4186\", \"CVE-2012-4187\", \"CVE-2012-4188\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name:\"RHSA\", value:\"2012:1351-01\");\n script_name(\"RedHat Update for thunderbird RHSA-2012:1351-01\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'thunderbird'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\", re:\"ssh/login/release=RHENT_6\");\n script_tag(name:\"affected\", value:\"thunderbird on Red Hat Enterprise Linux Desktop (v. 6),\n Red Hat Enterprise Linux Workstation (v. 6)\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"insight\", value:\"Mozilla Thunderbird is a standalone mail and newsgroup client.\n\n Several flaws were found in the processing of malformed content. Malicious\n content could cause Thunderbird to crash or, potentially, execute arbitrary\n code with the privileges of the user running Thunderbird. (CVE-2012-3982,\n CVE-2012-3988, CVE-2012-3990, CVE-2012-3995, CVE-2012-4179, CVE-2012-4180,\n CVE-2012-4181, CVE-2012-4182, CVE-2012-4183, CVE-2012-4185, CVE-2012-4186,\n CVE-2012-4187, CVE-2012-4188)\n\n Two flaws in Thunderbird could allow malicious content to bypass intended\n restrictions, possibly leading to information disclosure, or Thunderbird\n executing arbitrary code. Note that the information disclosure issue could\n possibly be combined with other flaws to achieve arbitrary code execution.\n (CVE-2012-3986, CVE-2012-3991)\n\n Multiple flaws were found in the location object implementation in\n Thunderbird. Malicious content could be used to perform cross-site\n scripting attacks, script injection, or spoofing attacks. (CVE-2012-1956,\n CVE-2012-3992, CVE-2012-3994)\n\n Note: None of the issues in this advisory can be exploited by a\n specially-crafted HTML mail message as JavaScript is disabled by default\n for mail messages. They could be exploited another way in Thunderbird, for\n example, when viewing the full remote content of an RSS feed.\n\n All Thunderbird users should upgrade to this updated package, which\n contains Thunderbird version 10.0.8 ESR, which corrects these issues. After\n installing the update, Thunderbird must be restarted for the changes to\n take effect.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"RHENT_6\")\n{\n\n if ((res = isrpmvuln(pkg:\"thunderbird\", rpm:\"thunderbird~10.0.8~1.el6_3\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"thunderbird-debuginfo\", rpm:\"thunderbird-debuginfo~10.0.8~1.el6_3\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-08-14T16:25:22", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2012-10-11T00:00:00", "type": "openvas", "title": "CentOS Update for firefox CESA-2012:1350 centos6", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-3986", "CVE-2012-4185", "CVE-2012-3991", "CVE-2012-1956", "CVE-2012-3993", "CVE-2012-3995", "CVE-2012-3988", "CVE-2012-3994", "CVE-2012-4183", "CVE-2012-4181", "CVE-2012-4186", "CVE-2012-4182", "CVE-2012-4187", "CVE-2012-3982", "CVE-2012-4184", "CVE-2012-3992", "CVE-2012-4180", "CVE-2012-4188", "CVE-2012-3990", "CVE-2012-4179"], "modified": "2019-03-15T00:00:00", "id": "OPENVAS:1361412562310881513", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310881513", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for firefox CESA-2012:1350 centos6\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.centos.org/pipermail/centos-announce/2012-October/018930.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.881513\");\n script_version(\"$Revision: 14222 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 13:50:48 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2012-10-11 10:02:34 +0530 (Thu, 11 Oct 2012)\");\n script_cve_id(\"CVE-2012-1956\", \"CVE-2012-3982\", \"CVE-2012-3986\", \"CVE-2012-3988\",\n \"CVE-2012-3990\", \"CVE-2012-3991\", \"CVE-2012-3992\", \"CVE-2012-3993\",\n \"CVE-2012-3994\", \"CVE-2012-3995\", \"CVE-2012-4179\", \"CVE-2012-4180\",\n \"CVE-2012-4181\", \"CVE-2012-4182\", \"CVE-2012-4183\", \"CVE-2012-4184\",\n \"CVE-2012-4185\", \"CVE-2012-4186\", \"CVE-2012-4187\", \"CVE-2012-4188\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name:\"CESA\", value:\"2012:1350\");\n script_name(\"CentOS Update for firefox CESA-2012:1350 centos6\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'firefox'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\", re:\"ssh/login/release=CentOS6\");\n script_tag(name:\"affected\", value:\"firefox on CentOS 6\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n script_tag(name:\"insight\", value:\"Mozilla Firefox is an open source web browser. XULRunner provides the XUL\n Runtime environment for Mozilla Firefox.\n\n Several flaws were found in the processing of malformed web content. A web\n page containing malicious content could cause Firefox to crash or,\n potentially, execute arbitrary code with the privileges of the user running\n Firefox. (CVE-2012-3982, CVE-2012-3988, CVE-2012-3990, CVE-2012-3995,\n CVE-2012-4179, CVE-2012-4180, CVE-2012-4181, CVE-2012-4182, CVE-2012-4183,\n CVE-2012-4185, CVE-2012-4186, CVE-2012-4187, CVE-2012-4188)\n\n Two flaws in Firefox could allow a malicious website to bypass intended\n restrictions, possibly leading to information disclosure, or Firefox\n executing arbitrary code. Note that the information disclosure issue could\n possibly be combined with other flaws to achieve arbitrary code execution.\n (CVE-2012-3986, CVE-2012-3991)\n\n Multiple flaws were found in the location object implementation in Firefox.\n Malicious content could be used to perform cross-site scripting attacks,\n script injection, or spoofing attacks. (CVE-2012-1956, CVE-2012-3992,\n CVE-2012-3994)\n\n Two flaws were found in the way Chrome Object Wrappers were implemented.\n Malicious content could be used to perform cross-site scripting attacks or\n cause Firefox to execute arbitrary code. (CVE-2012-3993, CVE-2012-4184)\n\n For technical details regarding these flaws, refer to the Mozilla security\n advisories for Firefox 10.0.8 ESR. You can find a link to the Mozilla\n advisories in the References section of this erratum.\n\n Red Hat would like to thank the Mozilla project for reporting these issues.\n Upstream acknowledges Christian Holler, Jesse Ruderman, Soroush Dalili,\n miaubiz, Abhishek Arya, Atte Kettunen, Johnny Stenback, Alice White,\n moz_bug_r_a4, and Mariusz Mlynski as the original reporters of these\n issues.\n\n This update also fixes the following bug:\n\n * In certain environments, storing personal Firefox configuration files\n (~/.mozilla/) on an NFS share, such as when your home directory is on a\n NFS share, led to Firefox functioning incorrectly, for example, navigation\n buttons not working as expected, and bookmarks not saving. This update\n adds a new configuration option, storage.nfs_filesystem, that can be used\n to resolve this issue.\n\n If you experience this issue:\n\n 1) Start Firefox.\n\n 2) Type 'about:config' (without quotes) into the URL bar and press the\n Enter key.\n\n 3) If prompted with 'This might void your warranty!', click the 'I'll be\n careful, I promise!' button.\n\n 4) Right-click in the ...\n\n Description truncated, please see the referenced URL(s) for more information.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"CentOS6\")\n{\n\n if ((res = isrpmvuln(pkg:\"firefox\", rpm:\"firefox~10.0.8~1.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner\", rpm:\"xulrunner~10.0.8~1.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner-devel\", rpm:\"xulrunner-devel~10.0.8~1.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2018-01-11T11:05:57", "description": "Check for the Version of firefox", "cvss3": {}, "published": "2012-10-11T00:00:00", "type": "openvas", "title": "CentOS Update for firefox CESA-2012:1350 centos5 ", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-3986", "CVE-2012-4185", "CVE-2012-3991", "CVE-2012-1956", "CVE-2012-3993", "CVE-2012-3995", "CVE-2012-3988", "CVE-2012-3994", "CVE-2012-4183", "CVE-2012-4181", "CVE-2012-4186", "CVE-2012-4182", "CVE-2012-4187", "CVE-2012-3982", "CVE-2012-4184", "CVE-2012-3992", "CVE-2012-4180", "CVE-2012-4188", "CVE-2012-3990", "CVE-2012-4179"], "modified": "2018-01-10T00:00:00", "id": "OPENVAS:881512", "href": "http://plugins.openvas.org/nasl.php?oid=881512", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for firefox CESA-2012:1350 centos5 \n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Mozilla Firefox is an open source web browser. XULRunner provides the XUL\n Runtime environment for Mozilla Firefox.\n\n Several flaws were found in the processing of malformed web content. A web\n page containing malicious content could cause Firefox to crash or,\n potentially, execute arbitrary code with the privileges of the user running\n Firefox. (CVE-2012-3982, CVE-2012-3988, CVE-2012-3990, CVE-2012-3995,\n CVE-2012-4179, CVE-2012-4180, CVE-2012-4181, CVE-2012-4182, CVE-2012-4183,\n CVE-2012-4185, CVE-2012-4186, CVE-2012-4187, CVE-2012-4188)\n \n Two flaws in Firefox could allow a malicious website to bypass intended\n restrictions, possibly leading to information disclosure, or Firefox\n executing arbitrary code. Note that the information disclosure issue could\n possibly be combined with other flaws to achieve arbitrary code execution.\n (CVE-2012-3986, CVE-2012-3991)\n \n Multiple flaws were found in the location object implementation in Firefox.\n Malicious content could be used to perform cross-site scripting attacks,\n script injection, or spoofing attacks. (CVE-2012-1956, CVE-2012-3992,\n CVE-2012-3994)\n \n Two flaws were found in the way Chrome Object Wrappers were implemented.\n Malicious content could be used to perform cross-site scripting attacks or\n cause Firefox to execute arbitrary code. (CVE-2012-3993, CVE-2012-4184)\n \n For technical details regarding these flaws, refer to the Mozilla security\n advisories for Firefox 10.0.8 ESR. You can find a link to the Mozilla\n advisories in the References section of this erratum.\n \n Red Hat would like to thank the Mozilla project for reporting these issues.\n Upstream acknowledges Christian Holler, Jesse Ruderman, Soroush Dalili,\n miaubiz, Abhishek Arya, Atte Kettunen, Johnny Stenback, Alice White,\n moz_bug_r_a4, and Mariusz Mlynski as the original reporters of these\n issues.\n \n This update also fixes the following bug:\n \n * In certain environments, storing personal Firefox configuration files\n (~/.mozilla/) on an NFS share, such as when your home directory is on a\n NFS share, led to Firefox functioning incorrectly, for example, navigation\n buttons not working as expected, and bookmarks not saving. This update\n adds a new configuration option, storage.nfs_filesystem, that can be used\n to resolve this issue.\n \n If you experience this issue:\n \n 1) Start Firefox.\n \n 2) Type "about:config" (without quotes) into the URL bar and press the\n Enter key.\n \n 3) If prompted with "This might void your warranty!", click the "I'll be\n careful, I promise!" button.\n \n 4) Right-click in the ... \n\n Description truncated, for more information please check the Reference URL\";\n\ntag_affected = \"firefox on CentOS 5\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.centos.org/pipermail/centos-announce/2012-October/018928.html\");\n script_id(881512);\n script_version(\"$Revision: 8352 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-10 08:01:57 +0100 (Wed, 10 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2012-10-11 10:02:01 +0530 (Thu, 11 Oct 2012)\");\n script_cve_id(\"CVE-2012-1956\", \"CVE-2012-3982\", \"CVE-2012-3986\", \"CVE-2012-3988\",\n \"CVE-2012-3990\", \"CVE-2012-3991\", \"CVE-2012-3992\", \"CVE-2012-3993\",\n \"CVE-2012-3994\", \"CVE-2012-3995\", \"CVE-2012-4179\", \"CVE-2012-4180\",\n \"CVE-2012-4181\", \"CVE-2012-4182\", \"CVE-2012-4183\", \"CVE-2012-4184\",\n \"CVE-2012-4185\", \"CVE-2012-4186\", \"CVE-2012-4187\", \"CVE-2012-4188\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"CESA\", value: \"2012:1350\");\n script_name(\"CentOS Update for firefox CESA-2012:1350 centos5 \");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of firefox\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"CentOS5\")\n{\n\n if ((res = isrpmvuln(pkg:\"firefox\", rpm:\"firefox~10.0.8~1.el5.centos\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner\", rpm:\"xulrunner~10.0.8~1.el5_8\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner-devel\", rpm:\"xulrunner-devel~10.0.8~1.el5_8\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-01-11T11:07:49", "description": "Check for the Version of thunderbird", "cvss3": {}, "published": "2012-10-11T00:00:00", "type": "openvas", "title": "CentOS Update for thunderbird CESA-2012:1351 centos6 ", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-3986", "CVE-2012-4185", "CVE-2012-3991", "CVE-2012-1956", "CVE-2012-3993", "CVE-2012-3995", "CVE-2012-3988", "CVE-2012-3994", "CVE-2012-4183", "CVE-2012-4181", "CVE-2012-4186", "CVE-2012-4182", "CVE-2012-4187", "CVE-2012-3982", "CVE-2012-4184", "CVE-2012-3992", "CVE-2012-4180", "CVE-2012-4188", "CVE-2012-3990", "CVE-2012-4179"], "modified": "2018-01-09T00:00:00", "id": "OPENVAS:881515", "href": "http://plugins.openvas.org/nasl.php?oid=881515", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for thunderbird CESA-2012:1351 centos6 \n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Mozilla Thunderbird is a standalone mail and newsgroup client.\n\n Several flaws were found in the processing of malformed content. Malicious\n content could cause Thunderbird to crash or, potentially, execute arbitrary\n code with the privileges of the user running Thunderbird. (CVE-2012-3982,\n CVE-2012-3988, CVE-2012-3990, CVE-2012-3995, CVE-2012-4179, CVE-2012-4180,\n CVE-2012-4181, CVE-2012-4182, CVE-2012-4183, CVE-2012-4185, CVE-2012-4186,\n CVE-2012-4187, CVE-2012-4188)\n \n Two flaws in Thunderbird could allow malicious content to bypass intended\n restrictions, possibly leading to information disclosure, or Thunderbird\n executing arbitrary code. Note that the information disclosure issue could\n possibly be combined with other flaws to achieve arbitrary code execution.\n (CVE-2012-3986, CVE-2012-3991)\n \n Multiple flaws were found in the location object implementation in\n Thunderbird. Malicious content could be used to perform cross-site\n scripting attacks, script injection, or spoofing attacks. (CVE-2012-1956,\n CVE-2012-3992, CVE-2012-3994)\n \n Two flaws were found in the way Chrome Object Wrappers were implemented.\n Malicious content could be used to perform cross-site scripting attacks or\n cause Thunderbird to execute arbitrary code. (CVE-2012-3993, CVE-2012-4184)\n \n Red Hat would like to thank the Mozilla project for reporting these issues.\n Upstream acknowledges Christian Holler, Jesse Ruderman, Soroush Dalili,\n miaubiz, Abhishek Arya, Atte Kettunen, Johnny Stenback, Alice White,\n moz_bug_r_a4, and Mariusz Mlynski as the original reporters of these\n issues.\n \n Note: None of the issues in this advisory can be exploited by a\n specially-crafted HTML mail message as JavaScript is disabled by default\n for mail messages. They could be exploited another way in Thunderbird, for\n example, when viewing the full remote content of an RSS feed.\n \n All Thunderbird users should upgrade to this updated package, which\n contains Thunderbird version 10.0.8 ESR, which corrects these issues. After\n installing the update, Thunderbird must be restarted for the changes to\n take effect.\";\n\ntag_affected = \"thunderbird on CentOS 6\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.centos.org/pipermail/centos-announce/2012-October/018931.html\");\n script_id(881515);\n script_version(\"$Revision: 8336 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-09 08:01:48 +0100 (Tue, 09 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2012-10-11 10:03:30 +0530 (Thu, 11 Oct 2012)\");\n script_cve_id(\"CVE-2012-1956\", \"CVE-2012-3982\", \"CVE-2012-3986\", \"CVE-2012-3988\",\n \"CVE-2012-3990\", \"CVE-2012-3991\", \"CVE-2012-3992\", \"CVE-2012-3993\",\n \"CVE-2012-3994\", \"CVE-2012-3995\", \"CVE-2012-4179\", \"CVE-2012-4180\",\n \"CVE-2012-4181\", \"CVE-2012-4182\", \"CVE-2012-4183\", \"CVE-2012-4184\",\n \"CVE-2012-4185\", \"CVE-2012-4186\", \"CVE-2012-4187\", \"CVE-2012-4188\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"CESA\", value: \"2012:1351\");\n script_name(\"CentOS Update for thunderbird CESA-2012:1351 centos6 \");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of thunderbird\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"CentOS6\")\n{\n\n if ((res = isrpmvuln(pkg:\"thunderbird\", rpm:\"thunderbird~10.0.8~1.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-01-03T10:56:55", "description": "Check for the Version of thunderbird", "cvss3": {}, "published": "2012-10-11T00:00:00", "type": "openvas", "title": "RedHat Update for thunderbird RHSA-2012:1351-01", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-3986", "CVE-2012-4185", "CVE-2012-3991", "CVE-2012-1956", "CVE-2012-3993", "CVE-2012-3995", "CVE-2012-3988", "CVE-2012-3994", "CVE-2012-4183", "CVE-2012-4181", "CVE-2012-4186", "CVE-2012-4182", "CVE-2012-4187", "CVE-2012-3982", "CVE-2012-4184", "CVE-2012-3992", "CVE-2012-4180", "CVE-2012-4188", "CVE-2012-3990", "CVE-2012-4179"], "modified": "2018-01-03T00:00:00", "id": "OPENVAS:870844", "href": "http://plugins.openvas.org/nasl.php?oid=870844", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for thunderbird RHSA-2012:1351-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Mozilla Thunderbird is a standalone mail and newsgroup client.\n\n Several flaws were found in the processing of malformed content. Malicious\n content could cause Thunderbird to crash or, potentially, execute arbitrary\n code with the privileges of the user running Thunderbird. (CVE-2012-3982,\n CVE-2012-3988, CVE-2012-3990, CVE-2012-3995, CVE-2012-4179, CVE-2012-4180,\n CVE-2012-4181, CVE-2012-4182, CVE-2012-4183, CVE-2012-4185, CVE-2012-4186,\n CVE-2012-4187, CVE-2012-4188)\n\n Two flaws in Thunderbird could allow malicious content to bypass intended\n restrictions, possibly leading to information disclosure, or Thunderbird\n executing arbitrary code. Note that the information disclosure issue could\n possibly be combined with other flaws to achieve arbitrary code execution.\n (CVE-2012-3986, CVE-2012-3991)\n\n Multiple flaws were found in the location object implementation in\n Thunderbird. Malicious content could be used to perform cross-site\n scripting attacks, script injection, or spoofing attacks. (CVE-2012-1956,\n CVE-2012-3992, CVE-2012-3994)\n\n Note: None of the issues in this advisory can be exploited by a\n specially-crafted HTML mail message as JavaScript is disabled by default\n for mail messages. They could be exploited another way in Thunderbird, for\n example, when viewing the full remote content of an RSS feed.\n\n All Thunderbird users should upgrade to this updated package, which\n contains Thunderbird version 10.0.8 ESR, which corrects these issues. After\n installing the update, Thunderbird must be restarted for the changes to\n take effect.\";\n\ntag_affected = \"thunderbird on Red Hat Enterprise Linux Desktop (v. 6),\n Red Hat Enterprise Linux Workstation (v. 6)\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/rhsa-announce/2012-October/msg00012.html\");\n script_id(870844);\n script_version(\"$Revision: 8273 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-03 07:29:19 +0100 (Wed, 03 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2012-10-11 10:00:57 +0530 (Thu, 11 Oct 2012)\");\n script_cve_id(\"CVE-2012-1956\", \"CVE-2012-3982\", \"CVE-2012-3986\", \"CVE-2012-3988\",\n \"CVE-2012-3990\", \"CVE-2012-3991\", \"CVE-2012-3992\", \"CVE-2012-3993\",\n \"CVE-2012-3994\", \"CVE-2012-3995\", \"CVE-2012-4179\", \"CVE-2012-4180\",\n \"CVE-2012-4181\", \"CVE-2012-4182\", \"CVE-2012-4183\", \"CVE-2012-4184\",\n \"CVE-2012-4185\", \"CVE-2012-4186\", \"CVE-2012-4187\", \"CVE-2012-4188\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"RHSA\", value: \"2012:1351-01\");\n script_name(\"RedHat Update for thunderbird RHSA-2012:1351-01\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of thunderbird\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"RHENT_6\")\n{\n\n if ((res = isrpmvuln(pkg:\"thunderbird\", rpm:\"thunderbird~10.0.8~1.el6_3\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"thunderbird-debuginfo\", rpm:\"thunderbird-debuginfo~10.0.8~1.el6_3\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-05-29T18:38:38", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2012-11-23T00:00:00", "type": "openvas", "title": "CentOS Update for firefox CESA-2012:1482 centos6", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-5842", "CVE-2012-4214", "CVE-2012-5830", "CVE-2012-4210", "CVE-2012-5829", "CVE-2012-4201", "CVE-2012-5840", "CVE-2012-4202", "CVE-2012-5839", "CVE-2012-4216", "CVE-2012-5835", "CVE-2012-4207", "CVE-2012-5833", "CVE-2012-5841", "CVE-2012-4215", "CVE-2012-4209"], "modified": "2019-03-15T00:00:00", "id": "OPENVAS:1361412562310881542", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310881542", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for firefox CESA-2012:1482 centos6\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.centos.org/pipermail/centos-announce/2012-November/019006.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.881542\");\n script_version(\"$Revision: 14222 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 13:50:48 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2012-11-23 11:45:16 +0530 (Fri, 23 Nov 2012)\");\n script_cve_id(\"CVE-2012-4201\", \"CVE-2012-4202\", \"CVE-2012-4207\", \"CVE-2012-4209\",\n \"CVE-2012-4210\", \"CVE-2012-4214\", \"CVE-2012-4215\", \"CVE-2012-4216\",\n \"CVE-2012-5829\", \"CVE-2012-5830\", \"CVE-2012-5833\", \"CVE-2012-5835\",\n \"CVE-2012-5839\", \"CVE-2012-5840\", \"CVE-2012-5841\", \"CVE-2012-5842\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name:\"CESA\", value:\"2012:1482\");\n script_name(\"CentOS Update for firefox CESA-2012:1482 centos6\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'firefox'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\", re:\"ssh/login/release=CentOS6\");\n script_tag(name:\"affected\", value:\"firefox on CentOS 6\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n script_tag(name:\"insight\", value:\"Mozilla Firefox is an open source web browser. XULRunner provides the\n XUL Runtime environment for Mozilla Firefox.\n\n Several flaws were found in the processing of malformed web content. A web\n page containing malicious content could cause Firefox to crash or,\n potentially, execute arbitrary code with the privileges of the user running\n Firefox. (CVE-2012-4214, CVE-2012-4215, CVE-2012-4216, CVE-2012-5829,\n CVE-2012-5830, CVE-2012-5833, CVE-2012-5835, CVE-2012-5839, CVE-2012-5840,\n CVE-2012-5842)\n\n A buffer overflow flaw was found in the way Firefox handled GIF (Graphics\n Interchange Format) images. A web page containing a malicious GIF image\n could cause Firefox to crash or, possibly, execute arbitrary code with the\n privileges of the user running Firefox. (CVE-2012-4202)\n\n A flaw was found in the way the Style Inspector tool in Firefox handled\n certain Cascading Style Sheets (CSS). Running the tool (Tools -> Web\n Developer -> Inspect) on malicious CSS could result in the execution of\n HTML and CSS content with chrome privileges. (CVE-2012-4210)\n\n A flaw was found in the way Firefox decoded the HZ-GB-2312 character\n encoding. A web page containing malicious content could cause Firefox to\n run JavaScript code with the permissions of a different website.\n (CVE-2012-4207)\n\n A flaw was found in the location object implementation in Firefox.\n Malicious content could possibly use this flaw to allow restricted content\n to be loaded by plug-ins. (CVE-2012-4209)\n\n A flaw was found in the way cross-origin wrappers were implemented.\n Malicious content could use this flaw to perform cross-site scripting\n attacks. (CVE-2012-5841)\n\n A flaw was found in the evalInSandbox implementation in Firefox. Malicious\n content could use this flaw to perform cross-site scripting attacks.\n (CVE-2012-4201)\n\n For technical details regarding these flaws, refer to the Mozilla security\n advisories for Firefox 10.0.11 ESR. You can find a link to the Mozilla\n advisories in the References section of this erratum.\n\n Red Hat would like to thank the Mozilla project for reporting these issues.\n Upstream acknowledges Abhishek Arya, miaubiz, Jesse Ruderman, Andrew\n McCreight, Bob Clary, Kyle Huey, Atte Kettunen, Mariusz Mlynski, Masato\n Kinugawa, Bobby Holley, and moz_bug_r_a4 as the original reporters of these\n issues.\n\n All Firefox users should upgrade to these updated packages, which contain\n Firefox version 10.0.11 ESR, which corrects these issues. After installing\n the update, Firefox must be restarted for the changes to take effect.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"CentOS6\")\n{\n\n if ((res = isrpmvuln(pkg:\"firefox\", rpm:\"firefox~10.0.11~1.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner\", rpm:\"xulrunner~10.0.11~1.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner-devel\", rpm:\"xulrunner-devel~10.0.11~1.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-06-25T14:53:39", "description": "This host is installed with Mozilla Thunderbird ESR and is prone to multiple\n vulnerabilities.", "cvss3": {}, "published": "2012-11-26T00:00:00", "type": "openvas", "title": "Mozilla Thunderbird ESR Multiple Vulnerabilities-01 November12 (Mac OS X)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-5842", "CVE-2012-4214", "CVE-2012-5830", "CVE-2012-5829", "CVE-2012-4201", "CVE-2012-5840", "CVE-2012-4202", "CVE-2012-5839", "CVE-2012-4216", "CVE-2012-5835", "CVE-2012-4207", "CVE-2012-5833", "CVE-2012-5841", "CVE-2012-4215", "CVE-2012-4209"], "modified": "2019-06-25T00:00:00", "id": "OPENVAS:1361412562310803364", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310803364", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mozilla Thunderbird ESR Multiple Vulnerabilities-01 November12 (Mac OS X)\n#\n# Authors:\n# Arun Kallavi <karun@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.803364\");\n script_version(\"2019-06-25T08:25:15+0000\");\n script_cve_id(\"CVE-2012-4209\", \"CVE-2012-4214\", \"CVE-2012-4215\", \"CVE-2012-4216\",\n \"CVE-2012-4201\", \"CVE-2012-4202\", \"CVE-2012-4207\", \"CVE-2012-5842\",\n \"CVE-2012-5841\", \"CVE-2012-5829\", \"CVE-2012-5830\", \"CVE-2012-5833\",\n \"CVE-2012-5835\", \"CVE-2012-5839\", \"CVE-2012-5840\");\n script_bugtraq_id(56629, 56628, 56633, 56634, 56618, 56614, 56632, 56611,\n 56631, 56636, 56641, 56642, 56637, 56635);\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-06-25 08:25:15 +0000 (Tue, 25 Jun 2019)\");\n script_tag(name:\"creation_date\", value:\"2012-11-26 11:10:03 +0530 (Mon, 26 Nov 2012)\");\n script_name(\"Mozilla Thunderbird ESR Multiple Vulnerabilities-01 November12 (Mac OS X)\");\n script_xref(name:\"URL\", value:\"http://secunia.com/advisories/51358\");\n script_xref(name:\"URL\", value:\"http://securitytracker.com/id?1027791\");\n script_xref(name:\"URL\", value:\"http://securitytracker.com/id?1027792\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-91.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-92.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-93.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-100.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-101.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-103.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-105.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-106.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2012 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_mozilla_prdts_detect_macosx.nasl\");\n script_mandatory_keys(\"Thunderbird-ESR/MacOSX/Version\");\n script_tag(name:\"impact\", value:\"Successful exploitation could allow attackers to inject scripts, bypass\n certain security restrictions, execute arbitrary code in the context of the\n browser.\");\n script_tag(name:\"affected\", value:\"Thunderbird ESR version 10.x before 10.0.11 on Mac OS X\");\n script_tag(name:\"insight\", value:\"- The 'location' property can be accessed through 'top.location' with a\n frame whose name attributes value is set to 'top'.\n\n - Use-after-free error exists within the functions\n 'nsTextEditorState::PrepareEditor', 'gfxFont::GetFontEntry',\n 'nsWindow::OnExposeEvent' and 'nsPlaintextEditor::FireClipboardEvent'.\n\n - An error within the 'evalInSandbox()' when handling the 'location.href'\n property.\n\n - Error when rendering GIF images.\");\n script_tag(name:\"solution\", value:\"Upgrade to Thunderbird ESR 10.0.11 or later.\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/en-US/thunderbird\");\n script_tag(name:\"summary\", value:\"This host is installed with Mozilla Thunderbird ESR and is prone to multiple\n vulnerabilities.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\ntbesrVer = get_kb_item(\"Thunderbird-ESR/MacOSX/Version\");\n\nif(tbesrVer && tbesrVer =~ \"^10\\.0\")\n{\n if(version_in_range(version:tbesrVer, test_version:\"10.0\", test_version2:\"10.0.10\"))\n {\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n exit(0);\n }\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2017-07-02T21:11:02", "description": "This host is installed with Mozilla Thunderbird ESR and is prone to multiple\n vulnerabilities.", "cvss3": {}, "published": "2012-11-26T00:00:00", "type": "openvas", "title": "Mozilla Thunderbird ESR Multiple Vulnerabilities-01 November12 (Mac OS X)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-5842", "CVE-2012-4214", "CVE-2012-5830", "CVE-2012-5829", "CVE-2012-4201", "CVE-2012-5840", "CVE-2012-4202", "CVE-2012-5839", "CVE-2012-4216", "CVE-2012-5835", "CVE-2012-4207", "CVE-2012-5833", "CVE-2012-5841", "CVE-2012-4215", "CVE-2012-4209"], "modified": "2017-05-04T00:00:00", "id": "OPENVAS:803364", "href": "http://plugins.openvas.org/nasl.php?oid=803364", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_mozilla_thunderbird_esr_mult_vuln01_nov12_macosx.nasl 6065 2017-05-04 09:03:08Z teissa $\n#\n# Mozilla Thunderbird ESR Multiple Vulnerabilities-01 November12 (Mac OS X)\n#\n# Authors:\n# Arun Kallavi <karun@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_impact = \"Successful exploitation could allow attackers to inject scripts, bypass\n certain security restrictions, execute arbitrary code in the context of the\n browser.\n Impact Level: System/Application\";\n\ntag_affected = \"Thunderbird ESR version 10.x before 10.0.11 on Mac OS X\";\ntag_insight = \"- The 'location' property can be accessed through 'top.location' with a\n frame whose name attributes value is set to 'top'.\n - Use-after-free error exists within the functions\n 'nsTextEditorState::PrepareEditor', 'gfxFont::GetFontEntry',\n 'nsWindow::OnExposeEvent' and 'nsPlaintextEditor::FireClipboardEvent'.\n - An error within the 'evalInSandbox()' when handling the 'location.href'\n property.\n - Error when rendering GIF images.\";\ntag_solution = \"Upgrade to Thunderbird ESR 10.0.11 or later,\n http://www.mozilla.org/en-US/thunderbird\";\ntag_summary = \"This host is installed with Mozilla Thunderbird ESR and is prone to multiple\n vulnerabilities.\";\n\nif(description)\n{\n script_id(803364);\n script_version(\"$Revision: 6065 $\");\n script_cve_id(\"CVE-2012-4209\", \"CVE-2012-4214\", \"CVE-2012-4215\", \"CVE-2012-4216\",\n \"CVE-2012-4201\", \"CVE-2012-4202\", \"CVE-2012-4207\", \"CVE-2012-5842\",\n \"CVE-2012-5841\", \"CVE-2012-5829\", \"CVE-2012-5830\", \"CVE-2012-5833\",\n \"CVE-2012-5835\", \"CVE-2012-5839\", \"CVE-2012-5840\");\n script_bugtraq_id(56629, 56628, 56633, 56634, 56618, 56614, 56632, 56611,\n 56631, 56636, 56641, 56642, 56637, 56635);\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-05-04 11:03:08 +0200 (Thu, 04 May 2017) $\");\n script_tag(name:\"creation_date\", value:\"2012-11-26 11:10:03 +0530 (Mon, 26 Nov 2012)\");\n script_name(\"Mozilla Thunderbird ESR Multiple Vulnerabilities-01 November12 (Mac OS X)\");\n script_xref(name : \"URL\" , value : \"http://secunia.com/advisories/51358\");\n script_xref(name : \"URL\" , value : \"http://securitytracker.com/id?1027791\");\n script_xref(name : \"URL\" , value : \"http://securitytracker.com/id?1027792\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-91.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-92.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-93.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-100.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-101.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-103.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-105.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-106.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2012 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_mozilla_prdts_detect_macosx.nasl\");\n script_mandatory_keys(\"ThunderBird-ESR/MacOSX/Version\");\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\n# Variable Initialization\ntbesrVer = \"\";\n\n# Get version from KB\ntbesrVer = get_kb_item(\"ThunderBird-ESR/MacOSX/Version\");\n\nif(tbesrVer && tbesrVer =~ \"^10.0\")\n{\n # Grep for Thunderbird version\n if(version_in_range(version:tbesrVer, test_version:\"10.0\", test_version2:\"10.0.10\"))\n {\n security_message(0);\n exit(0);\n }\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2020-04-26T15:08:32", "description": "This host is installed with Mozilla Firefox and is prone to multiple\n vulnerabilities.", "cvss3": {}, "published": "2012-11-26T00:00:00", "type": "openvas", "title": "Mozilla Firefox Multiple Vulnerabilities-01 November12 (Mac OS X)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-5842", "CVE-2012-4214", "CVE-2012-5830", "CVE-2012-5829", "CVE-2012-4201", "CVE-2012-5840", "CVE-2012-4202", "CVE-2012-5839", "CVE-2012-4216", "CVE-2012-5835", "CVE-2012-4207", "CVE-2012-5833", "CVE-2012-5841", "CVE-2012-4215", "CVE-2012-4209"], "modified": "2020-04-22T00:00:00", "id": "OPENVAS:1361412562310803056", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310803056", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mozilla Firefox Multiple Vulnerabilities-01 November12 (Mac OS X)\n#\n# Authors:\n# Rachana Shetty <srachana@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.803056\");\n script_version(\"2020-04-22T10:27:30+0000\");\n script_cve_id(\"CVE-2012-4209\", \"CVE-2012-4214\", \"CVE-2012-4215\", \"CVE-2012-4216\",\n \"CVE-2012-4201\", \"CVE-2012-4202\", \"CVE-2012-4207\", \"CVE-2012-5842\",\n \"CVE-2012-5841\", \"CVE-2012-5829\", \"CVE-2012-5830\", \"CVE-2012-5833\",\n \"CVE-2012-5835\", \"CVE-2012-5839\", \"CVE-2012-5840\");\n script_bugtraq_id(56629, 56628, 56633, 56634, 56618, 56614, 56632, 56611,\n 56631, 56636, 56641, 56642, 56637, 56635);\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-04-22 10:27:30 +0000 (Wed, 22 Apr 2020)\");\n script_tag(name:\"creation_date\", value:\"2012-11-26 11:10:03 +0530 (Mon, 26 Nov 2012)\");\n script_name(\"Mozilla Firefox Multiple Vulnerabilities-01 November12 (Mac OS X)\");\n script_xref(name:\"URL\", value:\"http://secunia.com/advisories/51358\");\n script_xref(name:\"URL\", value:\"http://securitytracker.com/id?1027791\");\n script_xref(name:\"URL\", value:\"http://securitytracker.com/id?1027792\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-91.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-92.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-93.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-100.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-101.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-103.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-105.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-106.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2012 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_mozilla_prdts_detect_macosx.nasl\");\n script_mandatory_keys(\"Mozilla/Firefox/MacOSX/Version\");\n script_tag(name:\"impact\", value:\"Successful exploitation could allow attackers to inject scripts, bypass\n certain security restrictions, execute arbitrary code in the context of the\n browser.\");\n script_tag(name:\"affected\", value:\"Mozilla Firefox version before 17.0 on Mac OS X\");\n script_tag(name:\"insight\", value:\"- The 'location' property can be accessed through 'top.location' with a\n frame whose name attributes value is set to 'top'.\n\n - Use-after-free error exists within the functions\n 'nsTextEditorState::PrepareEditor', 'gfxFont::GetFontEntry',\n 'nsWindow::OnExposeEvent' and 'nsPlaintextEditor::FireClipboardEvent'.\n\n - An error within the 'evalInSandbox()' when handling the 'location.href'\n property.\n\n - Error when rendering GIF images.\");\n script_tag(name:\"solution\", value:\"Upgrade to Mozilla Firefox version 17.0 or later.\");\n script_tag(name:\"summary\", value:\"This host is installed with Mozilla Firefox and is prone to multiple\n vulnerabilities.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\nffVer = get_kb_item(\"Mozilla/Firefox/MacOSX/Version\");\n\nif(ffVer)\n{\n if(version_is_less(version:ffVer, test_version:\"17.0\"))\n {\n report = report_fixed_ver(installed_version:ffVer, fixed_version:\"17.0\");\n security_message(port:0, data:report);\n exit(0);\n }\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-04-23T19:05:44", "description": "This host is installed with Mozilla Seamonkey and is prone to multiple\n vulnerabilities.", "cvss3": {}, "published": "2012-11-26T00:00:00", "type": "openvas", "title": "Mozilla SeaMonkey Multiple Vulnerabilities-01 November12 (Mac OS X)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-5842", "CVE-2012-4214", "CVE-2012-5830", "CVE-2012-5829", "CVE-2012-4201", "CVE-2012-5840", "CVE-2012-4202", "CVE-2012-5839", "CVE-2012-4216", "CVE-2012-5835", "CVE-2012-4207", "CVE-2012-5833", "CVE-2012-5841", "CVE-2012-4215", "CVE-2012-4209"], "modified": "2020-04-21T00:00:00", "id": "OPENVAS:1361412562310803362", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310803362", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mozilla SeaMonkey Multiple Vulnerabilities-01 November12 (Mac OS X)\n#\n# Authors:\n# Arun Kallavi <karun@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.803362\");\n script_version(\"2020-04-21T11:03:03+0000\");\n script_cve_id(\"CVE-2012-4209\", \"CVE-2012-4214\", \"CVE-2012-4215\", \"CVE-2012-4216\",\n \"CVE-2012-4201\", \"CVE-2012-4202\", \"CVE-2012-4207\", \"CVE-2012-5842\",\n \"CVE-2012-5841\", \"CVE-2012-5829\", \"CVE-2012-5830\", \"CVE-2012-5833\",\n \"CVE-2012-5835\", \"CVE-2012-5839\", \"CVE-2012-5840\");\n script_bugtraq_id(56629, 56628, 56633, 56634, 56618, 56614, 56632, 56611,\n 56631, 56636, 56641, 56642, 56637, 56635);\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-04-21 11:03:03 +0000 (Tue, 21 Apr 2020)\");\n script_tag(name:\"creation_date\", value:\"2012-11-26 11:10:03 +0530 (Mon, 26 Nov 2012)\");\n script_name(\"Mozilla SeaMonkey Multiple Vulnerabilities-01 November12 (Mac OS X)\");\n script_xref(name:\"URL\", value:\"http://secunia.com/advisories/51358\");\n script_xref(name:\"URL\", value:\"http://securitytracker.com/id?1027791\");\n script_xref(name:\"URL\", value:\"http://securitytracker.com/id?1027792\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-91.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-92.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-93.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-100.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-101.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-103.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-105.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-106.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2012 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_mozilla_prdts_detect_macosx.nasl\");\n script_mandatory_keys(\"SeaMonkey/MacOSX/Version\");\n script_tag(name:\"impact\", value:\"Successful exploitation could allow attackers to inject scripts, bypass\n certain security restrictions, execute arbitrary code in the context of the\n browser.\");\n script_tag(name:\"affected\", value:\"SeaMonkey version before 2.14 on Mac OS X\");\n script_tag(name:\"insight\", value:\"- The 'location' property can be accessed through 'top.location' with a\n frame whose name attributes value is set to 'top'.\n\n - Use-after-free error exists within the functions\n 'nsTextEditorState::PrepareEditor', 'gfxFont::GetFontEntry',\n 'nsWindow::OnExposeEvent' and 'nsPlaintextEditor::FireClipboardEvent'.\n\n - An error within the 'evalInSandbox()' when handling the 'location.href'\n property.\n\n - Error when rendering GIF images.\");\n script_tag(name:\"solution\", value:\"Upgrade to SeaMonkey version to 2.14 or later.\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/projects/seamonkey\");\n script_tag(name:\"summary\", value:\"This host is installed with Mozilla Seamonkey and is prone to multiple\n vulnerabilities.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\nseaVer = get_kb_item(\"SeaMonkey/MacOSX/Version\");\nif(seaVer)\n{\n if(version_is_less(version:seaVer, test_version:\"2.14\"))\n {\n report = report_fixed_ver(installed_version:seaVer, fixed_version:\"2.14\");\n security_message(port: 0, data: report);\n exit(0);\n }\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:36:25", "description": "Oracle Linux Local Security Checks ELSA-2012-1483", "cvss3": {}, "published": "2015-10-06T00:00:00", "type": "openvas", "title": "Oracle Linux Local Check: ELSA-2012-1483", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-5842", "CVE-2012-4214", "CVE-2012-5830", "CVE-2012-5829", "CVE-2012-4201", "CVE-2012-5840", "CVE-2012-4202", "CVE-2012-5839", "CVE-2012-4216", "CVE-2012-5835", "CVE-2012-4207", "CVE-2012-5833", "CVE-2012-5841", "CVE-2012-4215", "CVE-2012-4209"], "modified": "2018-09-28T00:00:00", "id": "OPENVAS:1361412562310123776", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310123776", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: ELSA-2012-1483.nasl 11688 2018-09-28 13:36:28Z cfischer $\n#\n# Oracle Linux Local Check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.123776\");\n script_version(\"$Revision: 11688 $\");\n script_tag(name:\"creation_date\", value:\"2015-10-06 14:08:24 +0300 (Tue, 06 Oct 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-09-28 15:36:28 +0200 (Fri, 28 Sep 2018) $\");\n script_name(\"Oracle Linux Local Check: ELSA-2012-1483\");\n script_tag(name:\"insight\", value:\"ELSA-2012-1483 - thunderbird security update. Please see the references for more insight.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"summary\", value:\"Oracle Linux Local Security Checks ELSA-2012-1483\");\n script_xref(name:\"URL\", value:\"http://linux.oracle.com/errata/ELSA-2012-1483.html\");\n script_cve_id(\"CVE-2012-4201\", \"CVE-2012-4202\", \"CVE-2012-4207\", \"CVE-2012-4209\", \"CVE-2012-4214\", \"CVE-2012-4215\", \"CVE-2012-4216\", \"CVE-2012-5829\", \"CVE-2012-5830\", \"CVE-2012-5833\", \"CVE-2012-5835\", \"CVE-2012-5839\", \"CVE-2012-5840\", \"CVE-2012-5841\", \"CVE-2012-5842\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/oracle_linux\", \"ssh/login/release\", re:\"ssh/login/release=OracleLinux(5|6)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Eero Volotinen\");\n script_family(\"Oracle Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"OracleLinux5\")\n{\n if ((res = isrpmvuln(pkg:\"thunderbird\", rpm:\"thunderbird~10.0.11~1.0.1.el5_8\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif(release == \"OracleLinux6\")\n{\n if ((res = isrpmvuln(pkg:\"thunderbird\", rpm:\"thunderbird~10.0.11~1.0.1.el6_3\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif (__pkg_match) exit(99);\n exit(0);\n\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2018-01-08T12:58:11", "description": "Check for the Version of thunderbird", "cvss3": {}, "published": "2012-11-23T00:00:00", "type": "openvas", "title": "CentOS Update for thunderbird CESA-2012:1483 centos6 ", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-5842", "CVE-2012-4214", "CVE-2012-5830", "CVE-2012-5829", "CVE-2012-4201", "CVE-2012-5840", "CVE-2012-4202", "CVE-2012-5839", "CVE-2012-4216", "CVE-2012-5835", "CVE-2012-4207", "CVE-2012-5833", "CVE-2012-5841", "CVE-2012-4215", "CVE-2012-4209"], "modified": "2018-01-08T00:00:00", "id": "OPENVAS:881543", "href": "http://plugins.openvas.org/nasl.php?oid=881543", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for thunderbird CESA-2012:1483 centos6 \n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Mozilla Thunderbird is a standalone mail and newsgroup client.\n\n Several flaws were found in the processing of malformed content. Malicious\n content could cause Thunderbird to crash or, potentially, execute arbitrary\n code with the privileges of the user running Thunderbird. (CVE-2012-4214,\n CVE-2012-4215, CVE-2012-4216, CVE-2012-5829, CVE-2012-5830, CVE-2012-5833,\n CVE-2012-5835, CVE-2012-5839, CVE-2012-5840, CVE-2012-5842)\n \n A buffer overflow flaw was found in the way Thunderbird handled GIF\n (Graphics Interchange Format) images. Content containing a malicious GIF\n image could cause Thunderbird to crash or, possibly, execute arbitrary code\n with the privileges of the user running Thunderbird. (CVE-2012-4202)\n \n A flaw was found in the way Thunderbird decoded the HZ-GB-2312 character\n encoding. Malicious content could cause Thunderbird to run JavaScript code\n with the permissions of different content. (CVE-2012-4207)\n \n A flaw was found in the location object implementation in Thunderbird.\n Malicious content could possibly use this flaw to allow restricted content\n to be loaded by plug-ins. (CVE-2012-4209)\n \n A flaw was found in the way cross-origin wrappers were implemented.\n Malicious content could use this flaw to perform cross-site scripting\n attacks. (CVE-2012-5841)\n \n A flaw was found in the evalInSandbox implementation in Thunderbird.\n Malicious content could use this flaw to perform cross-site scripting\n attacks. (CVE-2012-4201)\n \n Red Hat would like to thank the Mozilla project for reporting these issues.\n Upstream acknowledges Abhishek Arya, miaubiz, Jesse Ruderman, Andrew\n McCreight, Bob Clary, Kyle Huey, Atte Kettunen, Masato Kinugawa, Mariusz\n Mlynski, Bobby Holley, and moz_bug_r_a4 as the original reporters of\n these issues.\n \n Note: All issues except CVE-2012-4202 cannot be exploited by a\n specially-crafted HTML mail message as JavaScript is disabled by default\n for mail messages. They could be exploited another way in Thunderbird, for\n example, when viewing the full remote content of an RSS feed.\n \n All Thunderbird users should upgrade to this updated package, which\n contains Thunderbird version 10.0.11 ESR, which corrects these issues.\n After installing the update, Thunderbird must be restarted for the changes\n to take effect.\";\n\ntag_affected = \"thunderbird on CentOS 6\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.centos.org/pipermail/centos-announce/2012-November/019009.html\");\n script_id(881543);\n script_version(\"$Revision: 8313 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-08 08:02:11 +0100 (Mon, 08 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2012-11-23 11:46:46 +0530 (Fri, 23 Nov 2012)\");\n script_cve_id(\"CVE-2012-4201\", \"CVE-2012-4202\", \"CVE-2012-4207\", \"CVE-2012-4209\",\n \"CVE-2012-4214\", \"CVE-2012-4215\", \"CVE-2012-4216\", \"CVE-2012-5829\",\n \"CVE-2012-5830\", \"CVE-2012-5833\", \"CVE-2012-5835\", \"CVE-2012-5839\",\n \"CVE-2012-5840\", \"CVE-2012-5841\", \"CVE-2012-5842\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"CESA\", value: \"2012:1483\");\n script_name(\"CentOS Update for thunderbird CESA-2012:1483 centos6 \");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of thunderbird\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"CentOS6\")\n{\n\n if ((res = isrpmvuln(pkg:\"thunderbird\", rpm:\"thunderbird~10.0.11~1.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-02T21:11:24", "description": "This host is installed with Mozilla Thunderbird and is prone to multiple\n vulnerabilities.", "cvss3": {}, "published": "2012-11-26T00:00:00", "type": "openvas", "title": "Mozilla Thunderbird Multiple Vulnerabilities-01 November12 (Mac OS X)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-5842", "CVE-2012-4214", "CVE-2012-5830", "CVE-2012-5829", "CVE-2012-4201", "CVE-2012-5840", "CVE-2012-4202", "CVE-2012-5839", "CVE-2012-4216", "CVE-2012-5835", "CVE-2012-4207", "CVE-2012-5833", "CVE-2012-5841", "CVE-2012-4215", "CVE-2012-4209"], "modified": "2017-05-05T00:00:00", "id": "OPENVAS:803363", "href": "http://plugins.openvas.org/nasl.php?oid=803363", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_mozilla_thunderbird_mult_vuln01_nov12_macosx.nasl 6074 2017-05-05 09:03:14Z teissa $\n#\n# Mozilla Thunderbird Multiple Vulnerabilities-01 November12 (Mac OS X)\n#\n# Authors:\n# Arun Kallavi <karun@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_impact = \"Successful exploitation could allow attackers to inject scripts, bypass\n certain security restrictions, execute arbitrary code in the context of the\n browser.\n Impact Level: System/Application\";\n\ntag_affected = \"Thunderbird version before 17.0 on Mac OS X\";\ntag_insight = \"- The 'location' property can be accessed through 'top.location' with a\n frame whose name attributes value is set to 'top'.\n - Use-after-free error exists within the functions\n 'nsTextEditorState::PrepareEditor', 'gfxFont::GetFontEntry',\n 'nsWindow::OnExposeEvent' and 'nsPlaintextEditor::FireClipboardEvent'.\n - An error within the 'evalInSandbox()' when handling the 'location.href'\n property.\n - Error when rendering GIF images.\";\ntag_solution = \"Upgrade to Thunderbird version to 17.0 or later,\n http://www.mozilla.org/en-US/thunderbird\";\ntag_summary = \"This host is installed with Mozilla Thunderbird and is prone to multiple\n vulnerabilities.\";\n\nif(description)\n{\n script_id(803363);\n script_version(\"$Revision: 6074 $\");\n script_cve_id(\"CVE-2012-4209\", \"CVE-2012-4214\", \"CVE-2012-4215\", \"CVE-2012-4216\",\n \"CVE-2012-4201\", \"CVE-2012-4202\", \"CVE-2012-4207\", \"CVE-2012-5842\",\n \"CVE-2012-5841\", \"CVE-2012-5829\", \"CVE-2012-5830\", \"CVE-2012-5833\",\n \"CVE-2012-5835\", \"CVE-2012-5839\", \"CVE-2012-5840\");\n script_bugtraq_id(56629, 56628, 56633, 56634, 56618, 56614, 56632, 56611,\n 56631, 56636, 56641, 56642, 56637, 56635);\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-05-05 11:03:14 +0200 (Fri, 05 May 2017) $\");\n script_tag(name:\"creation_date\", value:\"2012-11-26 11:10:03 +0530 (Mon, 26 Nov 2012)\");\n script_name(\"Mozilla Thunderbird Multiple Vulnerabilities-01 November12 (Mac OS X)\");\n script_xref(name : \"URL\" , value : \"http://secunia.com/advisories/51358\");\n script_xref(name : \"URL\" , value : \"http://securitytracker.com/id?1027791\");\n script_xref(name : \"URL\" , value : \"http://securitytracker.com/id?1027792\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-91.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-92.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-93.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-100.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-101.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-103.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-105.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-106.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2012 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_mozilla_prdts_detect_macosx.nasl\");\n script_mandatory_keys(\"ThunderBird/MacOSX/Version\");\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\n# Variable Initialization\ntbVer = \"\";\n\n# Get version from KB\ntbVer = get_kb_item(\"ThunderBird/MacOSX/Version\");\n\nif(tbVer)\n{\n # Grep for Thunderbird version\n if(version_is_less(version:tbVer, test_version:\"17.0\"))\n {\n security_message(0);\n exit(0);\n }\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-01-02T10:58:16", "description": "Check for the Version of firefox", "cvss3": {}, "published": "2012-11-23T00:00:00", "type": "openvas", "title": "RedHat Update for firefox RHSA-2012:1482-01", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-5842", "CVE-2012-4214", "CVE-2012-5830", "CVE-2012-4210", "CVE-2012-5829", "CVE-2012-4201", "CVE-2012-5840", "CVE-2012-4202", "CVE-2012-5839", "CVE-2012-4216", "CVE-2012-5835", "CVE-2012-4207", "CVE-2012-5833", "CVE-2012-5841", "CVE-2012-4215", "CVE-2012-4209"], "modified": "2017-12-29T00:00:00", "id": "OPENVAS:870865", "href": "http://plugins.openvas.org/nasl.php?oid=870865", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for firefox RHSA-2012:1482-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Mozilla Firefox is an open source web browser. XULRunner provides the\n XUL Runtime environment for Mozilla Firefox.\n\n Several flaws were found in the processing of malformed web content. A web\n page containing malicious content could cause Firefox to crash or,\n potentially, execute arbitrary code with the privileges of the user running\n Firefox. (CVE-2012-4214, CVE-2012-4215, CVE-2012-4216, CVE-2012-5829,\n CVE-2012-5830, CVE-2012-5833, CVE-2012-5835, CVE-2012-5839, CVE-2012-5840,\n CVE-2012-5842)\n\n A buffer overflow flaw was found in the way Firefox handled GIF (Graphics\n Interchange Format) images. A web page containing a malicious GIF image\n could cause Firefox to crash or, possibly, execute arbitrary code with the\n privileges of the user running Firefox. (CVE-2012-4202)\n\n For technical details regarding these flaws, refer to the Mozilla security\n advisories for Firefox 10.0.11 ESR. You can find a link to the Mozilla\n advisories in the References section of this erratum.\n\n Red Hat would like to thank the Mozilla project for reporting these issues.\n Upstream acknowledges Abhishek Arya, miaubiz, Jesse Ruderman, Andrew\n McCreight, Bob Clary, Kyle Huey, Atte Kettunen, Mariusz Mlynski, Masato\n Kinugawa, Bobby Holley, and moz_bug_r_a4 as the original reporters of these\n issues.\n\n All Firefox users should upgrade to these updated packages, which contain\n Firefox version 10.0.11 ESR, which corrects these issues. After installing\n the update, Firefox must be restarted for the changes to take effect.\";\n\ntag_affected = \"firefox on Red Hat Enterprise Linux (v. 5 server),\n Red Hat Enterprise Linux Desktop (v. 6),\n Red Hat Enterprise Linux Server (v. 6),\n Red Hat Enterprise Linux Workstation (v. 6)\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/rhsa-announce/2012-November/msg00015.html\");\n script_id(870865);\n script_version(\"$Revision: 8257 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-29 07:29:46 +0100 (Fri, 29 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2012-11-23 11:35:44 +0530 (Fri, 23 Nov 2012)\");\n script_cve_id(\"CVE-2012-4201\", \"CVE-2012-4202\", \"CVE-2012-4207\", \"CVE-2012-4209\",\n \"CVE-2012-4210\", \"CVE-2012-4214\", \"CVE-2012-4215\", \"CVE-2012-4216\",\n \"CVE-2012-5829\", \"CVE-2012-5830\", \"CVE-2012-5833\", \"CVE-2012-5835\",\n \"CVE-2012-5839\", \"CVE-2012-5840\", \"CVE-2012-5841\", \"CVE-2012-5842\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"RHSA\", value: \"2012:1482-01\");\n script_name(\"RedHat Update for firefox RHSA-2012:1482-01\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of firefox\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"RHENT_6\")\n{\n\n if ((res = isrpmvuln(pkg:\"firefox\", rpm:\"firefox~10.0.11~1.el6_3\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-debuginfo\", rpm:\"firefox-debuginfo~10.0.11~1.el6_3\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner\", rpm:\"xulrunner~10.0.11~1.el6_3\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner-debuginfo\", rpm:\"xulrunner-debuginfo~10.0.11~1.el6_3\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"RHENT_5\")\n{\n\n if ((res = isrpmvuln(pkg:\"firefox\", rpm:\"firefox~10.0.11~1.el5_8\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-debuginfo\", rpm:\"firefox-debuginfo~10.0.11~1.el5_8\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner\", rpm:\"xulrunner~10.0.11~1.el5_8\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner-debuginfo\", rpm:\"xulrunner-debuginfo~10.0.11~1.el5_8\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner-devel\", rpm:\"xulrunner-devel~10.0.11~1.el5_8\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-01-11T11:07:41", "description": "Check for the Version of firefox", "cvss3": {}, "published": "2012-11-23T00:00:00", "type": "openvas", "title": "CentOS Update for firefox CESA-2012:1482 centos6 ", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-5842", "CVE-2012-4214", "CVE-2012-5830", "CVE-2012-4210", "CVE-2012-5829", "CVE-2012-4201", "CVE-2012-5840", "CVE-2012-4202", "CVE-2012-5839", "CVE-2012-4216", "CVE-2012-5835", "CVE-2012-4207", "CVE-2012-5833", "CVE-2012-5841", "CVE-2012-4215", "CVE-2012-4209"], "modified": "2018-01-09T00:00:00", "id": "OPENVAS:881542", "href": "http://plugins.openvas.org/nasl.php?oid=881542", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for firefox CESA-2012:1482 centos6 \n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Mozilla Firefox is an open source web browser. XULRunner provides the\n XUL Runtime environment for Mozilla Firefox.\n\n Several flaws were found in the processing of malformed web content. A web\n page containing malicious content could cause Firefox to crash or,\n potentially, execute arbitrary code with the privileges of the user running\n Firefox. (CVE-2012-4214, CVE-2012-4215, CVE-2012-4216, CVE-2012-5829,\n CVE-2012-5830, CVE-2012-5833, CVE-2012-5835, CVE-2012-5839, CVE-2012-5840,\n CVE-2012-5842)\n \n A buffer overflow flaw was found in the way Firefox handled GIF (Graphics\n Interchange Format) images. A web page containing a malicious GIF image\n could cause Firefox to crash or, possibly, execute arbitrary code with the\n privileges of the user running Firefox. (CVE-2012-4202)\n \n A flaw was found in the way the Style Inspector tool in Firefox handled\n certain Cascading Style Sheets (CSS). Running the tool (Tools -> Web\n Developer -> Inspect) on malicious CSS could result in the execution of\n HTML and CSS content with chrome privileges. (CVE-2012-4210)\n \n A flaw was found in the way Firefox decoded the HZ-GB-2312 character\n encoding. A web page containing malicious content could cause Firefox to\n run JavaScript code with the permissions of a different website.\n (CVE-2012-4207)\n \n A flaw was found in the location object implementation in Firefox.\n Malicious content could possibly use this flaw to allow restricted content\n to be loaded by plug-ins. (CVE-2012-4209)\n \n A flaw was found in the way cross-origin wrappers were implemented.\n Malicious content could use this flaw to perform cross-site scripting\n attacks. (CVE-2012-5841)\n \n A flaw was found in the evalInSandbox implementation in Firefox. Malicious\n content could use this flaw to perform cross-site scripting attacks.\n (CVE-2012-4201)\n \n For technical details regarding these flaws, refer to the Mozilla security\n advisories for Firefox 10.0.11 ESR. You can find a link to the Mozilla\n advisories in the References section of this erratum.\n \n Red Hat would like to thank the Mozilla project for reporting these issues.\n Upstream acknowledges Abhishek Arya, miaubiz, Jesse Ruderman, Andrew\n McCreight, Bob Clary, Kyle Huey, Atte Kettunen, Mariusz Mlynski, Masato\n Kinugawa, Bobby Holley, and moz_bug_r_a4 as the original reporters of these\n issues.\n \n All Firefox users should upgrade to these updated packages, which contain\n Firefox version 10.0.11 ESR, which corrects these issues. After installing\n the update, Firefox must be restarted for the changes to take effect.\";\n\ntag_affected = \"firefox on CentOS 6\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.centos.org/pipermail/centos-announce/2012-November/019006.html\");\n script_id(881542);\n script_version(\"$Revision: 8336 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-09 08:01:48 +0100 (Tue, 09 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2012-11-23 11:45:16 +0530 (Fri, 23 Nov 2012)\");\n script_cve_id(\"CVE-2012-4201\", \"CVE-2012-4202\", \"CVE-2012-4207\", \"CVE-2012-4209\",\n \"CVE-2012-4210\", \"CVE-2012-4214\", \"CVE-2012-4215\", \"CVE-2012-4216\",\n \"CVE-2012-5829\", \"CVE-2012-5830\", \"CVE-2012-5833\", \"CVE-2012-5835\",\n \"CVE-2012-5839\", \"CVE-2012-5840\", \"CVE-2012-5841\", \"CVE-2012-5842\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"CESA\", value: \"2012:1482\");\n script_name(\"CentOS Update for firefox CESA-2012:1482 centos6 \");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of firefox\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"CentOS6\")\n{\n\n if ((res = isrpmvuln(pkg:\"firefox\", rpm:\"firefox~10.0.11~1.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner\", rpm:\"xulrunner~10.0.11~1.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner-devel\", rpm:\"xulrunner-devel~10.0.11~1.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-12T10:51:44", "description": "This host is installed with Mozilla firefox/thunderbird/seamonkey and is\n prone to multiple vulnerabilities.", "cvss3": {}, "published": "2012-08-30T00:00:00", "type": "openvas", "title": "Mozilla Products Multiple Vulnerabilities - August12 (Windows)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-1970", "CVE-2012-1973", "CVE-2012-1974", "CVE-2012-3968", "CVE-2012-3963", "CVE-2012-3978", "CVE-2012-3962", "CVE-2012-3969", "CVE-2012-3970", "CVE-2012-3957", "CVE-2012-3958", "CVE-2012-1975", "CVE-2012-3956", "CVE-2012-3966", "CVE-2012-3967", "CVE-2012-3959", "CVE-2012-1976", "CVE-2012-3972", "CVE-2012-3964", "CVE-2012-3971"], "modified": "2017-06-27T00:00:00", "id": "OPENVAS:803011", "href": "http://plugins.openvas.org/nasl.php?oid=803011", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_mozilla_prdts_mult_vuln_aug12_win.nasl 6444 2017-06-27 11:24:02Z santu $\n#\n# Mozilla Products Multiple Vulnerabilities - August12 (Windows)\n#\n# Authors:\n# Rachana Shetty <srachana@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_solution = \"Upgrade to Mozilla Firefox version 15.0 or ESR version 10.0.7 or later,\n For updates refer to http://www.mozilla.com/en-US/firefox/all.html\n\n Upgrade to SeaMonkey version to 2.12 or later,\n http://www.mozilla.org/projects/seamonkey/\n\n Upgrade to Thunderbird version to 15.0 or ESR 10.0.7 or later,\n http://www.mozilla.org/en-US/thunderbird/\";\n\ntag_impact = \"Successful exploitation could allow attackers to inject scripts, bypass\n certain security restrictions, execute arbitrary code in the context of the\n browser or cause a denial of service.\n Impact Level: System/Application\";\ntag_affected = \"SeaMonkey version before 2.12 on Windows\n Thunderbird version before 15.0 on Windows\n Mozilla Firefox version before 15.0 on Windows\n Thunderbird ESR version 10.x before 10.0.7 on Windows\n Mozilla Firefox ESR version 10.x before 10.0.7 on Windows\";\ntag_insight = \"- Use-after-free error exists within the functions\n 'nsRangeUpdater::SelAdjDeleteNode', 'nsHTMLEditRules::DeleteNonTableElements',\n 'MediaStreamGraphThreadRunnable::Run', 'nsTArray_base::Length',\n 'nsHTMLSelectElement::SubmitNamesValues', 'PresShell::CompleteMove',\n 'gfxTextRun::GetUserData' and 'gfxTextRun::CanBreakLineBefore'.\n - Multiple unspecified errors within funcions 'nsBlockFrame::MarkLineDirty'\n and the browser engine can be exploited to\n corrupt memory.\n - Errors in 'Silf::readClassMap' and 'Pass::readPass' functions within\n Graphite 2 library.\n - Use-after-free error exists within the WebGL implementation.\";\ntag_summary = \"This host is installed with Mozilla firefox/thunderbird/seamonkey and is\n prone to multiple vulnerabilities.\";\n\nif(description)\n{\n script_id(803011);\n script_version(\"$Revision: 6444 $\");\n script_cve_id(\"CVE-2012-3959\", \"CVE-2012-3958\", \"CVE-2012-3957\", \"CVE-2012-3972\",\n \"CVE-2012-3956\", \"CVE-2012-3971\", \"CVE-2012-1976\", \"CVE-2012-3970\",\n \"CVE-2012-1975\", \"CVE-2012-3969\", \"CVE-2012-1974\", \"CVE-2012-3968\",\n \"CVE-2012-1973\", \"CVE-2012-3967\", \"CVE-2012-3966\", \"CVE-2012-1970\",\n \"CVE-2012-3964\", \"CVE-2012-3963\", \"CVE-2012-3962\", \"CVE-2012-3978\");\n script_bugtraq_id(55249);\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-06-27 13:24:02 +0200 (Tue, 27 Jun 2017) $\");\n script_tag(name:\"creation_date\", value:\"2012-08-30 12:20:04 +0530 (Thu, 30 Aug 2012)\");\n script_name(\"Mozilla Products Multiple Vulnerabilities - August12 (Windows)\");\n\n script_xref(name : \"URL\" , value : \"http://secunia.com/advisories/50088\");\n script_xref(name : \"URL\" , value : \"http://securitytracker.com/id/1027450\");\n script_xref(name : \"URL\" , value : \"http://securitytracker.com/id/1027451\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-57.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-58.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-62.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-63.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-64.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-70.html\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2012 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_firefox_detect_win.nasl\", \"gb_seamonkey_detect_win.nasl\",\n \"gb_thunderbird_detect_win.nasl\");\n script_mandatory_keys(\"Mozilla/Firefox_or_Seamonkey_or_Thunderbird/Installed\");\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"registry\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\n# Firefox Check\nffVer = \"\";\nffVer = get_kb_item(\"Firefox/Win/Ver\");\n\nif(ffVer)\n{\n # Grep for Firefox version\n if(version_is_less(version:ffVer, test_version:\"10.0.7\")||\n version_in_range(version:ffVer, test_version:\"11.0\", test_version2:\"14.0\"))\n {\n security_message(0);\n exit(0);\n }\n}\n\n# SeaMonkey Check\nseaVer = \"\";\nseaVer = get_kb_item(\"Seamonkey/Win/Ver\");\n\nif(seaVer)\n{\n # Grep for SeaMonkey version\n if(version_is_less(version:seaVer, test_version:\"2.12\"))\n {\n security_message(0);\n exit(0);\n }\n}\n\n# Thunderbird Check\ntbVer = \"\";\ntbVer = get_kb_item(\"Thunderbird/Win/Ver\");\n\nif(tbVer)\n{\n # Grep for Thunderbird version\n if(version_is_less(version:tbVer, test_version:\"10.0.7\")||\n version_in_range(version:tbVer, test_version:\"11.0\", test_version2:\"14.0\"))\n {\n security_message(0);\n exit(0);\n }\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-07-19T22:15:59", "description": "This host is installed with Mozilla firefox/thunderbird/seamonkey and is\n prone to multiple vulnerabilities.", "cvss3": {}, "published": "2012-08-30T00:00:00", "type": "openvas", "title": "Mozilla Products Multiple Vulnerabilities - August12 (Windows)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-1970", "CVE-2012-1973", "CVE-2012-1974", "CVE-2012-3968", "CVE-2012-3963", "CVE-2012-3978", "CVE-2012-3962", "CVE-2012-3969", "CVE-2012-3970", "CVE-2012-3957", "CVE-2012-3958", "CVE-2012-1975", "CVE-2012-3956", "CVE-2012-3966", "CVE-2012-3967", "CVE-2012-3959", "CVE-2012-1976", "CVE-2012-3972", "CVE-2012-3964", "CVE-2012-3971"], "modified": "2019-07-17T00:00:00", "id": "OPENVAS:1361412562310803011", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310803011", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mozilla Products Multiple Vulnerabilities - August12 (Windows)\n#\n# Authors:\n# Rachana Shetty <srachana@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.803011\");\n script_version(\"2019-07-17T11:14:11+0000\");\n script_cve_id(\"CVE-2012-3959\", \"CVE-2012-3958\", \"CVE-2012-3957\", \"CVE-2012-3972\",\n \"CVE-2012-3956\", \"CVE-2012-3971\", \"CVE-2012-1976\", \"CVE-2012-3970\",\n \"CVE-2012-1975\", \"CVE-2012-3969\", \"CVE-2012-1974\", \"CVE-2012-3968\",\n \"CVE-2012-1973\", \"CVE-2012-3967\", \"CVE-2012-3966\", \"CVE-2012-1970\",\n \"CVE-2012-3964\", \"CVE-2012-3963\", \"CVE-2012-3962\", \"CVE-2012-3978\");\n script_bugtraq_id(55249);\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-07-17 11:14:11 +0000 (Wed, 17 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2012-08-30 12:20:04 +0530 (Thu, 30 Aug 2012)\");\n script_name(\"Mozilla Products Multiple Vulnerabilities - August12 (Windows)\");\n\n script_xref(name:\"URL\", value:\"http://secunia.com/advisories/50088\");\n script_xref(name:\"URL\", value:\"http://securitytracker.com/id/1027450\");\n script_xref(name:\"URL\", value:\"http://securitytracker.com/id/1027451\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-57.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-58.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-62.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-63.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-64.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-70.html\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2012 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_firefox_detect_portable_win.nasl\", \"gb_seamonkey_detect_win.nasl\",\n \"gb_thunderbird_detect_portable_win.nasl\");\n script_mandatory_keys(\"Mozilla/Firefox_or_Seamonkey_or_Thunderbird/Installed\");\n script_tag(name:\"impact\", value:\"Successful exploitation could allow attackers to inject scripts, bypass\n certain security restrictions, execute arbitrary code in the context of the\n browser or cause a denial of service.\");\n script_tag(name:\"affected\", value:\"SeaMonkey version before 2.12 on Windows\n\n Thunderbird version before 15.0 on Windows\n\n Mozilla Firefox version before 15.0 on Windows\n\n Thunderbird ESR version 10.x before 10.0.7 on Windows\n\n Mozilla Firefox ESR version 10.x before 10.0.7 on Windows\");\n script_tag(name:\"insight\", value:\"- Use-after-free error exists within the functions\n 'nsRangeUpdater::SelAdjDeleteNode', 'nsHTMLEditRules::DeleteNonTableElements',\n 'MediaStreamGraphThreadRunnable::Run', 'nsTArray_base::Length',\n 'nsHTMLSelectElement::SubmitNamesValues', 'PresShell::CompleteMove',\n 'gfxTextRun::GetUserData' and 'gfxTextRun::CanBreakLineBefore'.\n\n - Multiple unspecified errors within functions 'nsBlockFrame::MarkLineDirty'\n and the browser engine can be exploited to\n corrupt memory.\n\n - Errors in 'Silf::readClassMap' and 'Pass::readPass' functions within\n Graphite 2 library.\n\n - Use-after-free error exists within the WebGL implementation.\");\n script_tag(name:\"summary\", value:\"This host is installed with Mozilla firefox/thunderbird/seamonkey and is\n prone to multiple vulnerabilities.\");\n script_tag(name:\"solution\", value:\"Upgrade to Mozilla Firefox version 15.0 or ESR version 10.0.7 or later, upgrade to SeaMonkey version to 2.12 or later\n upgrade to Thunderbird version to 15.0 or ESR 10.0.7 or later.\");\n\n script_tag(name:\"qod_type\", value:\"registry\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/projects/seamonkey/\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/en-US/thunderbird/\");\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\nffVer = get_kb_item(\"Firefox/Win/Ver\");\nif(ffVer)\n{\n if(version_is_less(version:ffVer, test_version:\"10.0.7\")||\n version_in_range(version:ffVer, test_version:\"11.0\", test_version2:\"14.0\"))\n {\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n exit(0);\n }\n}\n\nseaVer = get_kb_item(\"Seamonkey/Win/Ver\");\nif(seaVer)\n{\n if(version_is_less(version:seaVer, test_version:\"2.12\"))\n {\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n exit(0);\n }\n}\n\ntbVer = get_kb_item(\"Thunderbird/Win/Ver\");\nif(tbVer)\n{\n if(version_is_less(version:tbVer, test_version:\"10.0.7\")||\n version_in_range(version:tbVer, test_version:\"11.0\", test_version2:\"14.0\"))\n {\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n exit(0);\n }\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-04-23T19:06:10", "description": "This host is installed with Mozilla Thunderbird and is prone to multiple\n vulnerabilities.", "cvss3": {}, "published": "2012-11-26T00:00:00", "type": "openvas", "title": "Mozilla Thunderbird Multiple Vulnerabilities-01 November12 (Mac OS X)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-5842", "CVE-2012-4214", "CVE-2012-5830", "CVE-2012-5829", "CVE-2012-4201", "CVE-2012-5840", "CVE-2012-4202", "CVE-2012-5839", "CVE-2012-4216", "CVE-2012-5835", "CVE-2012-4207", "CVE-2012-5833", "CVE-2012-5841", "CVE-2012-4215", "CVE-2012-4209"], "modified": "2020-04-21T00:00:00", "id": "OPENVAS:1361412562310803363", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310803363", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mozilla Thunderbird Multiple Vulnerabilities-01 November12 (Mac OS X)\n#\n# Authors:\n# Arun Kallavi <karun@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.803363\");\n script_version(\"2020-04-21T11:03:03+0000\");\n script_cve_id(\"CVE-2012-4209\", \"CVE-2012-4214\", \"CVE-2012-4215\", \"CVE-2012-4216\",\n \"CVE-2012-4201\", \"CVE-2012-4202\", \"CVE-2012-4207\", \"CVE-2012-5842\",\n \"CVE-2012-5841\", \"CVE-2012-5829\", \"CVE-2012-5830\", \"CVE-2012-5833\",\n \"CVE-2012-5835\", \"CVE-2012-5839\", \"CVE-2012-5840\");\n script_bugtraq_id(56629, 56628, 56633, 56634, 56618, 56614, 56632, 56611,\n 56631, 56636, 56641, 56642, 56637, 56635);\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-04-21 11:03:03 +0000 (Tue, 21 Apr 2020)\");\n script_tag(name:\"creation_date\", value:\"2012-11-26 11:10:03 +0530 (Mon, 26 Nov 2012)\");\n script_name(\"Mozilla Thunderbird Multiple Vulnerabilities-01 November12 (Mac OS X)\");\n script_xref(name:\"URL\", value:\"http://secunia.com/advisories/51358\");\n script_xref(name:\"URL\", value:\"http://securitytracker.com/id?1027791\");\n script_xref(name:\"URL\", value:\"http://securitytracker.com/id?1027792\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-91.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-92.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-93.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-100.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-101.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-103.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-105.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-106.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2012 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_mozilla_prdts_detect_macosx.nasl\");\n script_mandatory_keys(\"Thunderbird/MacOSX/Version\");\n script_tag(name:\"impact\", value:\"Successful exploitation could allow attackers to inject scripts, bypass\n certain security restrictions, execute arbitrary code in the context of the\n browser.\");\n script_tag(name:\"affected\", value:\"Thunderbird version before 17.0 on Mac OS X\");\n script_tag(name:\"insight\", value:\"- The 'location' property can be accessed through 'top.location' with a\n frame whose name attributes value is set to 'top'.\n\n - Use-after-free error exists within the functions\n 'nsTextEditorState::PrepareEditor', 'gfxFont::GetFontEntry',\n 'nsWindow::OnExposeEvent' and 'nsPlaintextEditor::FireClipboardEvent'.\n\n - An error within the 'evalInSandbox()' when handling the 'location.href'\n property.\n\n - Error when rendering GIF images.\");\n script_tag(name:\"solution\", value:\"Upgrade to Thunderbird version to 17.0 or later.\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/en-US/thunderbird\");\n script_tag(name:\"summary\", value:\"This host is installed with Mozilla Thunderbird and is prone to multiple\n vulnerabilities.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\ntbVer = get_kb_item(\"Thunderbird/MacOSX/Version\");\n\nif(tbVer)\n{\n if(version_is_less(version:tbVer, test_version:\"17.0\"))\n {\n report = report_fixed_ver(installed_version:tbVer, fixed_version:\"17.0\");\n security_message(port: 0, data: report);\n exit(0);\n }\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:38:46", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2012-11-23T00:00:00", "type": "openvas", "title": "CentOS Update for thunderbird CESA-2012:1483 centos5", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-5842", "CVE-2012-4214", "CVE-2012-5830", "CVE-2012-5829", "CVE-2012-4201", "CVE-2012-5840", "CVE-2012-4202", "CVE-2012-5839", "CVE-2012-4216", "CVE-2012-5835", "CVE-2012-4207", "CVE-2012-5833", "CVE-2012-5841", "CVE-2012-4215", "CVE-2012-4209"], "modified": "2019-03-15T00:00:00", "id": "OPENVAS:1361412562310881541", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310881541", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for thunderbird CESA-2012:1483 centos5\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.centos.org/pipermail/centos-announce/2012-November/019004.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.881541\");\n script_version(\"$Revision: 14222 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 13:50:48 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2012-11-23 11:39:47 +0530 (Fri, 23 Nov 2012)\");\n script_cve_id(\"CVE-2012-4201\", \"CVE-2012-4202\", \"CVE-2012-4207\", \"CVE-2012-4209\",\n \"CVE-2012-4214\", \"CVE-2012-4215\", \"CVE-2012-4216\", \"CVE-2012-5829\",\n \"CVE-2012-5830\", \"CVE-2012-5833\", \"CVE-2012-5835\", \"CVE-2012-5839\",\n \"CVE-2012-5840\", \"CVE-2012-5841\", \"CVE-2012-5842\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name:\"CESA\", value:\"2012:1483\");\n script_name(\"CentOS Update for thunderbird CESA-2012:1483 centos5\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'thunderbird'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\", re:\"ssh/login/release=CentOS5\");\n script_tag(name:\"affected\", value:\"thunderbird on CentOS 5\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n script_tag(name:\"insight\", value:\"Mozilla Thunderbird is a standalone mail and newsgroup client.\n\n Several flaws were found in the processing of malformed content. Malicious\n content could cause Thunderbird to crash or, potentially, execute arbitrary\n code with the privileges of the user running Thunderbird. (CVE-2012-4214,\n CVE-2012-4215, CVE-2012-4216, CVE-2012-5829, CVE-2012-5830, CVE-2012-5833,\n CVE-2012-5835, CVE-2012-5839, CVE-2012-5840, CVE-2012-5842)\n\n A buffer overflow flaw was found in the way Thunderbird handled GIF\n (Graphics Interchange Format) images. Content containing a malicious GIF\n image could cause Thunderbird to crash or, possibly, execute arbitrary code\n with the privileges of the user running Thunderbird. (CVE-2012-4202)\n\n A flaw was found in the way Thunderbird decoded the HZ-GB-2312 character\n encoding. Malicious content could cause Thunderbird to run JavaScript code\n with the permissions of different content. (CVE-2012-4207)\n\n A flaw was found in the location object implementation in Thunderbird.\n Malicious content could possibly use this flaw to allow restricted content\n to be loaded by plug-ins. (CVE-2012-4209)\n\n A flaw was found in the way cross-origin wrappers were implemented.\n Malicious content could use this flaw to perform cross-site scripting\n attacks. (CVE-2012-5841)\n\n A flaw was found in the evalInSandbox implementation in Thunderbird.\n Malicious content could use this flaw to perform cross-site scripting\n attacks. (CVE-2012-4201)\n\n Red Hat would like to thank the Mozilla project for reporting these issues.\n Upstream acknowledges Abhishek Arya, miaubiz, Jesse Ruderman, Andrew\n McCreight, Bob Clary, Kyle Huey, Atte Kettunen, Masato Kinugawa, Mariusz\n Mlynski, Bobby Holley, and moz_bug_r_a4 as the original reporters of\n these issues.\n\n Note: All issues except CVE-2012-4202 cannot be exploited by a\n specially-crafted HTML mail message as JavaScript is disabled by default\n for mail messages. They could be exploited another way in Thunderbird, for\n example, when viewing the full remote content of an RSS feed.\n\n All Thunderbird users should upgrade to this updated package, which\n contains Thunderbird version 10.0.11 ESR, which corrects these issues.\n After installing the update, Thunderbird must be restarted for the changes\n to take effect.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"CentOS5\")\n{\n\n if ((res = isrpmvuln(pkg:\"thunderbird\", rpm:\"thunderbird~10.0.11~1.el5.centos\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2017-07-02T21:10:50", "description": "This host is installed with Mozilla Firefox and is prone to multiple\n vulnerabilities.", "cvss3": {}, "published": "2012-11-26T00:00:00", "type": "openvas", "title": "Mozilla Firefox Multiple Vulnerabilities-01 November12 (Mac OS X)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-5842", "CVE-2012-4214", "CVE-2012-5830", "CVE-2012-5829", "CVE-2012-4201", "CVE-2012-5840", "CVE-2012-4202", "CVE-2012-5839", "CVE-2012-4216", "CVE-2012-5835", "CVE-2012-4207", "CVE-2012-5833", "CVE-2012-5841", "CVE-2012-4215", "CVE-2012-4209"], "modified": "2017-04-12T00:00:00", "id": "OPENVAS:803056", "href": "http://plugins.openvas.org/nasl.php?oid=803056", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_mozilla_prdts_mult_vuln01_nov12_macosx.nasl 5940 2017-04-12 09:02:05Z teissa $\n#\n# Mozilla Firefox Multiple Vulnerabilities-01 November12 (Mac OS X)\n#\n# Authors:\n# Rachana Shetty <srachana@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_impact = \"Successful exploitation could allow attackers to inject scripts, bypass\n certain security restrictions, execute arbitrary code in the context of the\n browser.\n Impact Level: System/Application\";\ntag_affected = \"Mozilla Firefox version before 17.0 on Mac OS X\";\ntag_insight = \"- The 'location' property can be accessed through 'top.location' with a\n frame whose name attributes value is set to 'top'.\n - Use-after-free error exists within the functions\n 'nsTextEditorState::PrepareEditor', 'gfxFont::GetFontEntry',\n 'nsWindow::OnExposeEvent' and 'nsPlaintextEditor::FireClipboardEvent'.\n - An error within the 'evalInSandbox()' when handling the 'location.href'\n property.\n - Error when rendering GIF images.\";\ntag_solution = \"Upgrade to Mozilla Firefox version 17.0 or later,\n For updates refer to http://www.mozilla.com/en-US/firefox/all.html\";\ntag_summary = \"This host is installed with Mozilla Firefox and is prone to multiple\n vulnerabilities.\";\n\nif(description)\n{\n script_id(803056);\n script_version(\"$Revision: 5940 $\");\n script_cve_id(\"CVE-2012-4209\", \"CVE-2012-4214\", \"CVE-2012-4215\", \"CVE-2012-4216\",\n \"CVE-2012-4201\", \"CVE-2012-4202\", \"CVE-2012-4207\", \"CVE-2012-5842\",\n \"CVE-2012-5841\", \"CVE-2012-5829\", \"CVE-2012-5830\", \"CVE-2012-5833\",\n \"CVE-2012-5835\", \"CVE-2012-5839\", \"CVE-2012-5840\");\n script_bugtraq_id(56629, 56628, 56633, 56634, 56618, 56614, 56632, 56611,\n 56631, 56636, 56641, 56642, 56637, 56635);\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-04-12 11:02:05 +0200 (Wed, 12 Apr 2017) $\");\n script_tag(name:\"creation_date\", value:\"2012-11-26 11:10:03 +0530 (Mon, 26 Nov 2012)\");\n script_name(\"Mozilla Firefox Multiple Vulnerabilities-01 November12 (Mac OS X)\");\n script_xref(name : \"URL\" , value : \"http://secunia.com/advisories/51358\");\n script_xref(name : \"URL\" , value : \"http://securitytracker.com/id?1027791\");\n script_xref(name : \"URL\" , value : \"http://securitytracker.com/id?1027792\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-91.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-92.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-93.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-100.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-101.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-103.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-105.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-106.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2012 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_mozilla_prdts_detect_macosx.nasl\");\n script_mandatory_keys(\"Mozilla/Firefox/MacOSX/Version\");\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\n# Variable Initialization\nffVer = \"\";\n\n# Get Version from KB\nffVer = get_kb_item(\"Mozilla/Firefox/MacOSX/Version\");\n\nif(ffVer)\n{\n # Grep for Firefox version\n if(version_is_less(version:ffVer, test_version:\"17.0\"))\n {\n security_message(0);\n exit(0);\n }\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-07-19T22:15:02", "description": "This host is installed with Mozilla Firefox ESR and is prone to multiple\n vulnerabilities.", "cvss3": {}, "published": "2012-11-26T00:00:00", "type": "openvas", "title": "Mozilla Firefox ESR Multiple Vulnerabilities-01 November12 (Mac OS X)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-5842", "CVE-2012-4214", "CVE-2012-5830", "CVE-2012-5829", "CVE-2012-4201", "CVE-2012-5840", "CVE-2012-4202", "CVE-2012-5839", "CVE-2012-4216", "CVE-2012-5835", "CVE-2012-4207", "CVE-2012-5833", "CVE-2012-5841", "CVE-2012-4215", "CVE-2012-4209"], "modified": "2019-07-17T00:00:00", "id": "OPENVAS:1361412562310803361", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310803361", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mozilla Firefox ESR Multiple Vulnerabilities-01 November12 (Mac OS X)\n#\n# Authors:\n# Arun Kallavi <karun@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.803361\");\n script_version(\"2019-07-17T11:14:11+0000\");\n script_cve_id(\"CVE-2012-4209\", \"CVE-2012-4214\", \"CVE-2012-4215\", \"CVE-2012-4216\",\n \"CVE-2012-4201\", \"CVE-2012-4202\", \"CVE-2012-4207\", \"CVE-2012-5842\",\n \"CVE-2012-5841\", \"CVE-2012-5829\", \"CVE-2012-5830\", \"CVE-2012-5833\",\n \"CVE-2012-5835\", \"CVE-2012-5839\", \"CVE-2012-5840\");\n script_bugtraq_id(56629, 56628, 56633, 56634, 56618, 56614, 56632, 56611,\n 56631, 56636, 56641, 56642, 56637, 56635);\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-07-17 11:14:11 +0000 (Wed, 17 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2012-11-26 11:10:03 +0530 (Mon, 26 Nov 2012)\");\n script_name(\"Mozilla Firefox ESR Multiple Vulnerabilities-01 November12 (Mac OS X)\");\n script_xref(name:\"URL\", value:\"http://secunia.com/advisories/51358\");\n script_xref(name:\"URL\", value:\"http://securitytracker.com/id?1027791\");\n script_xref(name:\"URL\", value:\"http://securitytracker.com/id?1027792\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-91.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-92.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-93.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-100.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-101.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-103.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-105.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-106.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2012 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_mozilla_prdts_detect_macosx.nasl\");\n script_mandatory_keys(\"Mozilla/Firefox-ESR/MacOSX/Version\");\n script_tag(name:\"impact\", value:\"Successful exploitation could allow attackers to inject scripts, bypass\n certain security restrictions, execute arbitrary code in the context of the\n browser.\");\n script_tag(name:\"affected\", value:\"Mozilla Firefox ESR version 10.x before 10.0.11 on Mac OS X\");\n script_tag(name:\"insight\", value:\"- The 'location' property can be accessed through 'top.location' with a\n frame whose name attributes value is set to 'top'.\n\n - Use-after-free error exists within the functions\n 'nsTextEditorState::PrepareEditor', 'gfxFont::GetFontEntry',\n 'nsWindow::OnExposeEvent' and 'nsPlaintextEditor::FireClipboardEvent'.\n\n - An error within the 'evalInSandbox()' when handling the 'location.href'\n property.\n\n - Error when rendering GIF images.\");\n script_tag(name:\"solution\", value:\"Upgrade to Mozilla Firefox ESR version 10.0.11 or later.\");\n script_tag(name:\"summary\", value:\"This host is installed with Mozilla Firefox ESR and is prone to multiple\n vulnerabilities.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\nfesrVer = get_kb_item(\"Mozilla/Firefox-ESR/MacOSX/Version\");\nif(fesrVer && fesrVer =~ \"^10\\.0\")\n{\n if(version_in_range(version:fesrVer, test_version:\"10.0\", test_version2:\"10.0.10\"))\n {\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n exit(0);\n }\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2017-07-02T21:11:00", "description": "This host is installed with Mozilla Firefox ESR and is prone to multiple\n vulnerabilities.", "cvss3": {}, "published": "2012-11-26T00:00:00", "type": "openvas", "title": "Mozilla Firefox ESR Multiple Vulnerabilities-01 November12 (Mac OS X)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-5842", "CVE-2012-4214", "CVE-2012-5830", "CVE-2012-5829", "CVE-2012-4201", "CVE-2012-5840", "CVE-2012-4202", "CVE-2012-5839", "CVE-2012-4216", "CVE-2012-5835", "CVE-2012-4207", "CVE-2012-5833", "CVE-2012-5841", "CVE-2012-4215", "CVE-2012-4209"], "modified": "2017-05-11T00:00:00", "id": "OPENVAS:803361", "href": "http://plugins.openvas.org/nasl.php?oid=803361", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_mozilla_firefox_esr_mult_vuln01_nov12_macosx.nasl 6104 2017-05-11 09:03:48Z teissa $\n#\n# Mozilla Firefox ESR Multiple Vulnerabilities-01 November12 (Mac OS X)\n#\n# Authors:\n# Arun Kallavi <karun@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_impact = \"Successful exploitation could allow attackers to inject scripts, bypass\n certain security restrictions, execute arbitrary code in the context of the\n browser.\n Impact Level: System/Application\";\n\ntag_affected = \"Mozilla Firefox ESR version 10.x before 10.0.11 on Mac OS X\";\ntag_insight = \"- The 'location' property can be accessed through 'top.location' with a\n frame whose name attributes value is set to 'top'.\n - Use-after-free error exists within the functions\n 'nsTextEditorState::PrepareEditor', 'gfxFont::GetFontEntry',\n 'nsWindow::OnExposeEvent' and 'nsPlaintextEditor::FireClipboardEvent'.\n - An error within the 'evalInSandbox()' when handling the 'location.href'\n property.\n - Error when rendering GIF images.\";\ntag_solution = \"Upgrade to Mozilla Firefox ESR version 10.0.11 or later,\n For updates refer to http://www.mozilla.com/en-US/firefox/all.html\";\ntag_summary = \"This host is installed with Mozilla Firefox ESR and is prone to multiple\n vulnerabilities.\";\n\nif(description)\n{\n script_id(803361);\n script_version(\"$Revision: 6104 $\");\n script_cve_id(\"CVE-2012-4209\", \"CVE-2012-4214\", \"CVE-2012-4215\", \"CVE-2012-4216\",\n \"CVE-2012-4201\", \"CVE-2012-4202\", \"CVE-2012-4207\", \"CVE-2012-5842\",\n \"CVE-2012-5841\", \"CVE-2012-5829\", \"CVE-2012-5830\", \"CVE-2012-5833\",\n \"CVE-2012-5835\", \"CVE-2012-5839\", \"CVE-2012-5840\");\n script_bugtraq_id(56629, 56628, 56633, 56634, 56618, 56614, 56632, 56611,\n 56631, 56636, 56641, 56642, 56637, 56635);\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-05-11 11:03:48 +0200 (Thu, 11 May 2017) $\");\n script_tag(name:\"creation_date\", value:\"2012-11-26 11:10:03 +0530 (Mon, 26 Nov 2012)\");\n script_name(\"Mozilla Firefox ESR Multiple Vulnerabilities-01 November12 (Mac OS X)\");\n script_xref(name : \"URL\" , value : \"http://secunia.com/advisories/51358\");\n script_xref(name : \"URL\" , value : \"http://securitytracker.com/id?1027791\");\n script_xref(name : \"URL\" , value : \"http://securitytracker.com/id?1027792\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-91.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-92.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-93.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-100.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-101.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-103.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-105.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-106.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2012 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_mozilla_prdts_detect_macosx.nasl\");\n script_mandatory_keys(\"Mozilla/Firefox-ESR/MacOSX/Version\");\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\n# Variable Initialization\nfesrVer = \"\";\n\n# Get version from KB\nfesrVer = get_kb_item(\"Mozilla/Firefox-ESR/MacOSX/Version\");\nif(fesrVer && fesrVer =~ \"^10.0\")\n{\n # Grep for Firefox version\n if(version_in_range(version:fesrVer, test_version:\"10.0\", test_version2:\"10.0.10\"))\n {\n security_message(0);\n exit(0);\n }\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-05-29T18:38:47", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2012-11-23T00:00:00", "type": "openvas", "title": "RedHat Update for thunderbird RHSA-2012:1483-01", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-5842", "CVE-2012-4214", "CVE-2012-5830", "CVE-2012-5829", "CVE-2012-4201", "CVE-2012-5840", "CVE-2012-4202", "CVE-2012-5839", "CVE-2012-4216", "CVE-2012-5835", "CVE-2012-4207", "CVE-2012-5833", "CVE-2012-5841", "CVE-2012-4215", "CVE-2012-4209"], "modified": "2018-11-23T00:00:00", "id": "OPENVAS:1361412562310870866", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310870866", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for thunderbird RHSA-2012:1483-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"https://www.redhat.com/archives/rhsa-announce/2012-November/msg00016.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.870866\");\n script_version(\"$Revision: 12497 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-11-23 09:28:21 +0100 (Fri, 23 Nov 2018) $\");\n script_tag(name:\"creation_date\", value:\"2012-11-23 11:37:15 +0530 (Fri, 23 Nov 2012)\");\n script_cve_id(\"CVE-2012-4201\", \"CVE-2012-4202\", \"CVE-2012-4207\", \"CVE-2012-4209\",\n \"CVE-2012-4214\", \"CVE-2012-4215\", \"CVE-2012-4216\", \"CVE-2012-5829\",\n \"CVE-2012-5830\", \"CVE-2012-5833\", \"CVE-2012-5835\", \"CVE-2012-5839\",\n \"CVE-2012-5840\", \"CVE-2012-5841\", \"CVE-2012-5842\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name:\"RHSA\", value:\"2012:1483-01\");\n script_name(\"RedHat Update for thunderbird RHSA-2012:1483-01\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'thunderbird'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\", re:\"ssh/login/release=RHENT_6\");\n script_tag(name:\"affected\", value:\"thunderbird on Red Hat Enterprise Linux Desktop (v. 6),\n Red Hat Enterprise Linux Workstation (v. 6)\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"insight\", value:\"Mozilla Thunderbird is a standalone mail and newsgroup client.\n\n Several flaws were found in the processing of malformed content. Malicious\n content could cause Thunderbird to crash or, potentially, execute arbitrary\n code with the privileges of the user running Thunderbird. (CVE-2012-4214,\n CVE-2012-4215, CVE-2012-4216, CVE-2012-5829, CVE-2012-5830, CVE-2012-5833,\n CVE-2012-5835, CVE-2012-5839, CVE-2012-5840, CVE-2012-5842)\n\n A buffer overflow flaw was found in the way Thunderbird handled GIF\n (Graphics Interchange Format) images. Content containing a malicious GIF\n image could cause Thunderbird to crash or, possibly, execute arbitrary code\n with the privileges of the user running Thunderbird. (CVE-2012-4202)\n\n Red Hat would like to thank the Mozilla project for reporting these issues.\n Upstream acknowledges Abhishek Arya, miaubiz, Jesse Ruderman, Andrew\n McCreight, Bob Clary, Kyle Huey, Atte Kettunen, Masato Kinugawa, Mariusz\n Mlynski, Bobby Holley, and moz_bug_r_a4 as the original reporters of\n these issues.\n\n Note: All issues except CVE-2012-4202 cannot be exploited by a\n specially-crafted HTML mail message as JavaScript is disabled by default\n for mail messages. They could be exploited another way in Thunderbird, for\n example, when viewing the full remote content of an RSS feed.\n\n All Thunderbird users should upgrade to this updated package, which\n contains Thunderbird version 10.0.11 ESR, which corrects these issues.\n After installing the update, Thunderbird must be restarted for the changes\n to take effect.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"RHENT_6\")\n{\n\n if ((res = isrpmvuln(pkg:\"thunderbird\", rpm:\"thunderbird~10.0.11~1.el6_3\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"thunderbird-debuginfo\", rpm:\"thunderbird-debuginfo~10.0.11~1.el6_3\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-03-23T17:14:09", "description": "This host is installed with Mozilla Firefox and is prone to multiple\n vulnerabilities.", "cvss3": {}, "published": "2012-11-26T00:00:00", "type": "openvas", "title": "Mozilla Firefox Multiple Vulnerabilities-02 November12 (Mac OS X)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-5842", "CVE-2012-4214", "CVE-2012-5830", "CVE-2012-5829", "CVE-2012-4201", "CVE-2012-5840", "CVE-2012-4202", "CVE-2012-5839", "CVE-2012-4216", "CVE-2012-5835", "CVE-2012-4207", "CVE-2012-5833", "CVE-2012-5841", "CVE-2012-4215", "CVE-2012-4209"], "modified": "2020-03-20T00:00:00", "id": "OPENVAS:1361412562310803058", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310803058", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mozilla Firefox Multiple Vulnerabilities-02 November12 (Mac OS X)\n#\n# Authors:\n# Rachana Shetty <srachana@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.803058\");\n script_version(\"2020-03-20T12:10:27+0000\");\n script_cve_id(\"CVE-2012-4209\", \"CVE-2012-4214\", \"CVE-2012-4215\", \"CVE-2012-4216\",\n \"CVE-2012-4201\", \"CVE-2012-4202\", \"CVE-2012-4207\", \"CVE-2012-5842\",\n \"CVE-2012-5841\", \"CVE-2012-5829\", \"CVE-2012-5830\", \"CVE-2012-5833\",\n \"CVE-2012-5835\", \"CVE-2012-5839\", \"CVE-2012-5840\");\n script_bugtraq_id(56630, 56638, 56639, 56639, 56613, 56621,\n 56627, 56612, 56616, 56644);\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-03-20 12:10:27 +0000 (Fri, 20 Mar 2020)\");\n script_tag(name:\"creation_date\", value:\"2012-11-26 01:30:03 +0530 (Mon, 26 Nov 2012)\");\n script_name(\"Mozilla Firefox Multiple Vulnerabilities-02 November12 (Mac OS X)\");\n script_xref(name:\"URL\", value:\"http://secunia.com/advisories/51358\");\n script_xref(name:\"URL\", value:\"http://securitytracker.com/id?1027791\");\n script_xref(name:\"URL\", value:\"http://securitytracker.com/id?1027792\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-91.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-94.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-96.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-97.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-99.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-105.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-106.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2012 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_mozilla_prdts_detect_macosx.nasl\");\n script_mandatory_keys(\"Mozilla/Firefox/MacOSX/Version\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation could allow attackers to inject scripts, bypass\n certain security restrictions, execute arbitrary code in the context of the browser.\");\n\n script_tag(name:\"affected\", value:\"Mozilla Firefox version before 17.0 on Mac OS X.\");\n\n script_tag(name:\"insight\", value:\"Multiple error exists\n\n - When combining SVG text with the setting of CSS properties.\n\n - Within the 'copyTexImage2D' implementation in the WebGL subsystem and\n in the XrayWrapper implementation.\n\n - Within 'str_unescape' in the Javascript engin and in 'XMLHttpRequest'\n objects created within sandboxes.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Mozilla Firefox version 17.0 or later.\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Mozilla Firefox and is prone to multiple\n vulnerabilities.\");\n\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"version_func.inc\");\n\nffVer = get_kb_item(\"Mozilla/Firefox/MacOSX/Version\");\n\nif(ffVer)\n{\n if(version_is_less(version:ffVer, test_version:\"17.0\"))\n {\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n exit(0);\n }\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-04-26T15:07:00", "description": "This host is installed with Mozilla Firefox and is prone to multiple\n vulnerabilities.", "cvss3": {}, "published": "2012-11-26T00:00:00", "type": "openvas", "title": "Mozilla Firefox Multiple Vulnerabilities-02 November12 (Windows)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-5842", "CVE-2012-4214", "CVE-2012-5830", "CVE-2012-5829", "CVE-2012-4201", "CVE-2012-5840", "CVE-2012-4202", "CVE-2012-5839", "CVE-2012-4216", "CVE-2012-5835", "CVE-2012-4207", "CVE-2012-5833", "CVE-2012-5841", "CVE-2012-4215", "CVE-2012-4209"], "modified": "2020-04-22T00:00:00", "id": "OPENVAS:1361412562310803057", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310803057", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mozilla Firefox Multiple Vulnerabilities-02 November12 (Windows)\n#\n# Authors:\n# Rachana Shetty <srachana@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.803057\");\n script_version(\"2020-04-22T10:27:30+0000\");\n script_cve_id(\"CVE-2012-4209\", \"CVE-2012-4214\", \"CVE-2012-4215\", \"CVE-2012-4216\",\n \"CVE-2012-4201\", \"CVE-2012-4202\", \"CVE-2012-4207\", \"CVE-2012-5842\",\n \"CVE-2012-5841\", \"CVE-2012-5829\", \"CVE-2012-5830\", \"CVE-2012-5833\",\n \"CVE-2012-5835\", \"CVE-2012-5839\", \"CVE-2012-5840\");\n script_bugtraq_id(56629, 56628, 56633, 56634, 56618, 56614, 56632, 56611,\n 56631, 56636, 56642, 56637, 56635);\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-04-22 10:27:30 +0000 (Wed, 22 Apr 2020)\");\n script_tag(name:\"creation_date\", value:\"2012-11-26 12:30:03 +0530 (Mon, 26 Nov 2012)\");\n script_name(\"Mozilla Firefox Multiple Vulnerabilities-02 November12 (Windows)\");\n script_xref(name:\"URL\", value:\"http://secunia.com/advisories/51358\");\n script_xref(name:\"URL\", value:\"http://securitytracker.com/id?1027791\");\n script_xref(name:\"URL\", value:\"http://securitytracker.com/id?1027792\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-91.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-94.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-96.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-97.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-99.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-105.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-106.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2012 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_firefox_detect_portable_win.nasl\");\n script_mandatory_keys(\"Firefox/Win/Ver\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation could allow attackers to inject scripts, bypass\n certain security restrictions, execute arbitrary code in the context of the browser.\");\n\n script_tag(name:\"affected\", value:\"Mozilla Firefox version before 17.0 on Windows.\");\n\n script_tag(name:\"insight\", value:\"Multiple error exists\n\n - When combining SVG text with the setting of CSS properties.\n\n - Within the 'copyTexImage2D' implementation in the WebGL subsystem and\n in the XrayWrapper implementation.\n\n - Within 'str_unescape' in the Javascript engin and in 'XMLHttpRequest'\n objects created within sandboxes.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Mozilla Firefox version 17.0 or later.\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Mozilla Firefox and is prone to multiple\n vulnerabilities.\");\n\n script_tag(name:\"qod_type\", value:\"registry\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"version_func.inc\");\n\nffVer = get_kb_item(\"Firefox/Win/Ver\");\n\nif(ffVer)\n{\n if(version_is_less(version:ffVer, test_version:\"17.0\"))\n {\n report = report_fixed_ver(installed_version:ffVer, fixed_version:\"17.0\");\n security_message(port:0, data:report);\n exit(0);\n }\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2018-01-06T13:07:16", "description": "Check for the Version of thunderbird", "cvss3": {}, "published": "2012-11-23T00:00:00", "type": "openvas", "title": "RedHat Update for thunderbird RHSA-2012:1483-01", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-5842", "CVE-2012-4214", "CVE-2012-5830", "CVE-2012-5829", "CVE-2012-4201", "CVE-2012-5840", "CVE-2012-4202", "CVE-2012-5839", "CVE-2012-4216", "CVE-2012-5835", "CVE-2012-4207", "CVE-2012-5833", "CVE-2012-5841", "CVE-2012-4215", "CVE-2012-4209"], "modified": "2018-01-05T00:00:00", "id": "OPENVAS:870866", "href": "http://plugins.openvas.org/nasl.php?oid=870866", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for thunderbird RHSA-2012:1483-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Mozilla Thunderbird is a standalone mail and newsgroup client.\n\n Several flaws were found in the processing of malformed content. Malicious\n content could cause Thunderbird to crash or, potentially, execute arbitrary\n code with the privileges of the user running Thunderbird. (CVE-2012-4214,\n CVE-2012-4215, CVE-2012-4216, CVE-2012-5829, CVE-2012-5830, CVE-2012-5833,\n CVE-2012-5835, CVE-2012-5839, CVE-2012-5840, CVE-2012-5842)\n\n A buffer overflow flaw was found in the way Thunderbird handled GIF\n (Graphics Interchange Format) images. Content containing a malicious GIF\n image could cause Thunderbird to crash or, possibly, execute arbitrary code\n with the privileges of the user running Thunderbird. (CVE-2012-4202)\n\n Red Hat would like to thank the Mozilla project for reporting these issues.\n Upstream acknowledges Abhishek Arya, miaubiz, Jesse Ruderman, Andrew\n McCreight, Bob Clary, Kyle Huey, Atte Kettunen, Masato Kinugawa, Mariusz\n Mlynski, Bobby Holley, and moz_bug_r_a4 as the original reporters of\n these issues.\n\n Note: All issues except CVE-2012-4202 cannot be exploited by a\n specially-crafted HTML mail message as JavaScript is disabled by default\n for mail messages. They could be exploited another way in Thunderbird, for\n example, when viewing the full remote content of an RSS feed.\n\n All Thunderbird users should upgrade to this updated package, which\n contains Thunderbird version 10.0.11 ESR, which corrects these issues.\n After installing the update, Thunderbird must be restarted for the changes\n to take effect.\";\n\ntag_affected = \"thunderbird on Red Hat Enterprise Linux Desktop (v. 6),\n Red Hat Enterprise Linux Workstation (v. 6)\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/rhsa-announce/2012-November/msg00016.html\");\n script_id(870866);\n script_version(\"$Revision: 8295 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-05 07:29:18 +0100 (Fri, 05 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2012-11-23 11:37:15 +0530 (Fri, 23 Nov 2012)\");\n script_cve_id(\"CVE-2012-4201\", \"CVE-2012-4202\", \"CVE-2012-4207\", \"CVE-2012-4209\",\n \"CVE-2012-4214\", \"CVE-2012-4215\", \"CVE-2012-4216\", \"CVE-2012-5829\",\n \"CVE-2012-5830\", \"CVE-2012-5833\", \"CVE-2012-5835\", \"CVE-2012-5839\",\n \"CVE-2012-5840\", \"CVE-2012-5841\", \"CVE-2012-5842\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"RHSA\", value: \"2012:1483-01\");\n script_name(\"RedHat Update for thunderbird RHSA-2012:1483-01\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of thunderbird\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"RHENT_6\")\n{\n\n if ((res = isrpmvuln(pkg:\"thunderbird\", rpm:\"thunderbird~10.0.11~1.el6_3\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"thunderbird-debuginfo\", rpm:\"thunderbird-debuginfo~10.0.11~1.el6_3\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-01-06T13:07:28", "description": "Check for the Version of thunderbird", "cvss3": {}, "published": "2012-11-23T00:00:00", "type": "openvas", "title": "CentOS Update for thunderbird CESA-2012:1483 centos5 ", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-5842", "CVE-2012-4214", "CVE-2012-5830", "CVE-2012-5829", "CVE-2012-4201", "CVE-2012-5840", "CVE-2012-4202", "CVE-2012-5839", "CVE-2012-4216", "CVE-2012-5835", "CVE-2012-4207", "CVE-2012-5833", "CVE-2012-5841", "CVE-2012-4215", "CVE-2012-4209"], "modified": "2018-01-05T00:00:00", "id": "OPENVAS:881541", "href": "http://plugins.openvas.org/nasl.php?oid=881541", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for thunderbird CESA-2012:1483 centos5 \n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Mozilla Thunderbird is a standalone mail and newsgroup client.\n\n Several flaws were found in the processing of malformed content. Malicious\n content could cause Thunderbird to crash or, potentially, execute arbitrary\n code with the privileges of the user running Thunderbird. (CVE-2012-4214,\n CVE-2012-4215, CVE-2012-4216, CVE-2012-5829, CVE-2012-5830, CVE-2012-5833,\n CVE-2012-5835, CVE-2012-5839, CVE-2012-5840, CVE-2012-5842)\n \n A buffer overflow flaw was found in the way Thunderbird handled GIF\n (Graphics Interchange Format) images. Content containing a malicious GIF\n image could cause Thunderbird to crash or, possibly, execute arbitrary code\n with the privileges of the user running Thunderbird. (CVE-2012-4202)\n \n A flaw was found in the way Thunderbird decoded the HZ-GB-2312 character\n encoding. Malicious content could cause Thunderbird to run JavaScript code\n with the permissions of different content. (CVE-2012-4207)\n \n A flaw was found in the location object implementation in Thunderbird.\n Malicious content could possibly use this flaw to allow restricted content\n to be loaded by plug-ins. (CVE-2012-4209)\n \n A flaw was found in the way cross-origin wrappers were implemented.\n Malicious content could use this flaw to perform cross-site scripting\n attacks. (CVE-2012-5841)\n \n A flaw was found in the evalInSandbox implementation in Thunderbird.\n Malicious content could use this flaw to perform cross-site scripting\n attacks. (CVE-2012-4201)\n \n Red Hat would like to thank the Mozilla project for reporting these issues.\n Upstream acknowledges Abhishek Arya, miaubiz, Jesse Ruderman, Andrew\n McCreight, Bob Clary, Kyle Huey, Atte Kettunen, Masato Kinugawa, Mariusz\n Mlynski, Bobby Holley, and moz_bug_r_a4 as the original reporters of\n these issues.\n \n Note: All issues except CVE-2012-4202 cannot be exploited by a\n specially-crafted HTML mail message as JavaScript is disabled by default\n for mail messages. They could be exploited another way in Thunderbird, for\n example, when viewing the full remote content of an RSS feed.\n \n All Thunderbird users should upgrade to this updated package, which\n contains Thunderbird version 10.0.11 ESR, which corrects these issues.\n After installing the update, Thunderbird must be restarted for the changes\n to take effect.\";\n\ntag_affected = \"thunderbird on CentOS 5\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.centos.org/pipermail/centos-announce/2012-November/019004.html\");\n script_id(881541);\n script_version(\"$Revision: 8295 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-05 07:29:18 +0100 (Fri, 05 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2012-11-23 11:39:47 +0530 (Fri, 23 Nov 2012)\");\n script_cve_id(\"CVE-2012-4201\", \"CVE-2012-4202\", \"CVE-2012-4207\", \"CVE-2012-4209\",\n \"CVE-2012-4214\", \"CVE-2012-4215\", \"CVE-2012-4216\", \"CVE-2012-5829\",\n \"CVE-2012-5830\", \"CVE-2012-5833\", \"CVE-2012-5835\", \"CVE-2012-5839\",\n \"CVE-2012-5840\", \"CVE-2012-5841\", \"CVE-2012-5842\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"CESA\", value: \"2012:1483\");\n script_name(\"CentOS Update for thunderbird CESA-2012:1483 centos5 \");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of thunderbird\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"CentOS5\")\n{\n\n if ((res = isrpmvuln(pkg:\"thunderbird\", rpm:\"thunderbird~10.0.11~1.el5.centos\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-05-29T18:39:04", "description": "This host is installed with Mozilla Thunderbird ESR prone to multiple\n vulnerabilities.", "cvss3": {}, "published": "2012-11-26T00:00:00", "type": "openvas", "title": "Mozilla Thunderbird ESR Multiple Vulnerabilities-01 November12 (Windows)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-5842", "CVE-2012-4214", "CVE-2012-5829", "CVE-2012-4201", "CVE-2012-5840", "CVE-2012-4202", "CVE-2012-5839", "CVE-2012-4216", "CVE-2012-5835", "CVE-2012-4207", "CVE-2012-5833", "CVE-2012-5841", "CVE-2012-4215", "CVE-2012-4209"], "modified": "2019-03-12T00:00:00", "id": "OPENVAS:1361412562310803352", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310803352", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_mozilla_thunderbird_esr_mult_vuln01_nov12_win.nasl 14117 2019-03-12 14:02:42Z cfischer $\n#\n# Mozilla Thunderbird ESR Multiple Vulnerabilities-01 November12 (Windows)\n#\n# Authors:\n# Arun Kallavi <karun@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.803352\");\n script_version(\"$Revision: 14117 $\");\n script_cve_id(\"CVE-2012-4209\", \"CVE-2012-4214\", \"CVE-2012-4215\", \"CVE-2012-4216\",\n \"CVE-2012-4201\", \"CVE-2012-4202\", \"CVE-2012-4207\", \"CVE-2012-5842\",\n \"CVE-2012-5841\", \"CVE-2012-5829\", \"CVE-2012-5840\", \"CVE-2012-5833\",\n \"CVE-2012-5835\", \"CVE-2012-5839\");\n script_bugtraq_id(56629, 56628, 56633, 56634, 56618, 56614, 56632, 56611,\n 56631, 56636, 56642, 56637, 56635);\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-12 15:02:42 +0100 (Tue, 12 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2012-11-26 12:10:03 +0530 (Mon, 26 Nov 2012)\");\n script_name(\"Mozilla Thunderbird ESR Multiple Vulnerabilities-01 November12 (Windows)\");\n script_xref(name:\"URL\", value:\"http://secunia.com/advisories/51358\");\n script_xref(name:\"URL\", value:\"http://securitytracker.com/id?1027791\");\n script_xref(name:\"URL\", value:\"http://securitytracker.com/id?1027792\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-91.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-92.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-93.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-100.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-101.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-103.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-105.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-106.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2012 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_thunderbird_detect_portable_win.nasl\");\n script_mandatory_keys(\"Thunderbird-ESR/Win/Ver\");\n script_tag(name:\"impact\", value:\"Successful exploitation could allow attackers to inject scripts, bypass\n certain security restrictions, execute arbitrary code in the context of the\n browser.\");\n script_tag(name:\"affected\", value:\"Thunderbird ESR version 10.x before 10.0.11 on Windows\");\n script_tag(name:\"insight\", value:\"The flaws are due to:\n\n - The 'location' property can be accessed through 'top.location' with a\n frame whose name attributes value is set to 'top'.\n\n - Use-after-free error exists within the functions\n 'nsTextEditorState::PrepareEditor', 'gfxFont::GetFontEntry',\n 'nsWindow::OnExposeEvent' and 'nsPlaintextEditor::FireClipboardEvent'.\n\n - An error within the 'evalInSandbox()' when handling the 'location.href'\n property.\n\n - Error when rendering GIF images.\");\n script_tag(name:\"solution\", value:\"Upgrade to Thunderbird ESR 10.0.11 or later.\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Mozilla Thunderbird ESR prone to multiple\n vulnerabilities.\");\n script_tag(name:\"qod_type\", value:\"registry\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\n\ntbesrVer = get_kb_item(\"Thunderbird-ESR/Win/Ver\");\n\nif(tbesrVer && tbesrVer =~ \"^10\\.0\")\n{\n if(version_in_range(version:tbesrVer, test_version:\"10.0\", test_version2:\"10.0.10\"))\n {\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n exit(0);\n }\n}\n\nexit(99);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2017-07-02T21:10:33", "description": "This host is installed with Mozilla Firefox and is prone to multiple\n vulnerabilities.", "cvss3": {}, "published": "2012-11-26T00:00:00", "type": "openvas", "title": "Mozilla Firefox Multiple Vulnerabilities-01 November12 (Windows)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-5842", "CVE-2012-4214", "CVE-2012-5829", "CVE-2012-4201", "CVE-2012-5840", "CVE-2012-4202", "CVE-2012-5839", "CVE-2012-4216", "CVE-2012-5835", "CVE-2012-4207", "CVE-2012-5833", "CVE-2012-5841", "CVE-2012-4215", "CVE-2012-4209"], "modified": "2017-04-24T00:00:00", "id": "OPENVAS:803055", "href": "http://plugins.openvas.org/nasl.php?oid=803055", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_mozilla_prdts_mult_vuln01_nov12_win.nasl 6018 2017-04-24 09:02:24Z teissa $\n#\n# Mozilla Firefox Multiple Vulnerabilities-01 November12 (Windows)\n#\n# Authors:\n# Rachana Shetty <srachana@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_impact = \"Successful exploitation could allow attackers to inject scripts, bypass\n certain security restrictions, execute arbitrary code in the context of the\n browser.\n Impact Level: System/Application\";\ntag_affected = \"Mozilla Firefox version before 17.0 on Windows\";\ntag_insight = \"- The 'location' property can be accessed through 'top.location' with a\n frame whose name attributes value is set to 'top'.\n - Use-after-free error exists within the functions\n 'nsTextEditorState::PrepareEditor', 'gfxFont::GetFontEntry',\n 'nsWindow::OnExposeEvent' and 'nsPlaintextEditor::FireClipboardEvent'.\n - An error within the 'evalInSandbox()' when handling the 'location.href'\n property.\n - Error when rendering GIF images.\";\ntag_solution = \"Upgrade to Mozilla Firefox version 17.0 or later,\n For updates refer to http://www.mozilla.com/en-US/firefox/all.html\";\ntag_summary = \"This host is installed with Mozilla Firefox and is prone to multiple\n vulnerabilities.\";\n\nif(description)\n{\n script_id(803055);\n script_version(\"$Revision: 6018 $\");\n script_cve_id(\"CVE-2012-4209\", \"CVE-2012-4214\", \"CVE-2012-4215\", \"CVE-2012-4216\",\n \"CVE-2012-4201\", \"CVE-2012-4202\", \"CVE-2012-4207\", \"CVE-2012-5842\",\n \"CVE-2012-5841\", \"CVE-2012-5829\", \"CVE-2012-5840\", \"CVE-2012-5833\",\n \"CVE-2012-5835\", \"CVE-2012-5839\");\n script_bugtraq_id(56629, 56628, 56633, 56634, 56618, 56614, 56632, 56611,\n 56631, 56636, 56642, 56637, 56635);\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-04-24 11:02:24 +0200 (Mon, 24 Apr 2017) $\");\n script_tag(name:\"creation_date\", value:\"2012-11-26 12:10:03 +0530 (Mon, 26 Nov 2012)\");\n script_name(\"Mozilla Firefox Multiple Vulnerabilities-01 November12 (Windows)\");\n script_xref(name : \"URL\" , value : \"http://secunia.com/advisories/51358\");\n script_xref(name : \"URL\" , value : \"http://securitytracker.com/id?1027791\");\n script_xref(name : \"URL\" , value : \"http://securitytracker.com/id?1027792\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-91.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-92.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-93.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-100.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-101.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-103.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-105.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-106.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2012 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_firefox_detect_win.nasl\");\n script_mandatory_keys(\"Firefox/Win/Ver\");\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"registry\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\n# Variable Initialization\nffVer = \"\";\n\n# Get version from KB\nffVer = get_kb_item(\"Firefox/Win/Ver\");\n\nif(ffVer)\n{\n # Grep for Firefox version\n if(version_is_less(version:ffVer, test_version:\"17.0\"))\n {\n security_message(0);\n exit(0);\n }\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-07-19T22:15:53", "description": "This host is installed with Mozilla firefox/thunderbird/seamonkey and is\n prone to multiple vulnerabilities.", "cvss3": {}, "published": "2012-08-30T00:00:00", "type": "openvas", "title": "Mozilla Products Multiple Vulnerabilities - August12 (Mac OS X)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-1970", "CVE-2012-1973", "CVE-2012-1974", "CVE-2012-3968", "CVE-2012-3963", "CVE-2012-3978", "CVE-2012-3962", "CVE-2012-3969", "CVE-2012-3970", "CVE-2012-3957", "CVE-2012-3958", "CVE-2012-1975", "CVE-2012-3956", "CVE-2012-3966", "CVE-2012-3967", "CVE-2012-3959", "CVE-2012-1976", "CVE-2012-3972", "CVE-2012-3964", "CVE-2012-3971"], "modified": "2019-07-17T00:00:00", "id": "OPENVAS:1361412562310803012", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310803012", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mozilla Products Multiple Vulnerabilities - August12 (Mac OS X)\n#\n# Authors:\n# Rachana Shetty <srachana@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.803012\");\n script_version(\"2019-07-17T11:14:11+0000\");\n script_cve_id(\"CVE-2012-3959\", \"CVE-2012-3958\", \"CVE-2012-3957\", \"CVE-2012-3972\",\n \"CVE-2012-3956\", \"CVE-2012-3971\", \"CVE-2012-1976\", \"CVE-2012-3970\",\n \"CVE-2012-1975\", \"CVE-2012-3969\", \"CVE-2012-1974\", \"CVE-2012-3968\",\n \"CVE-2012-1973\", \"CVE-2012-3967\", \"CVE-2012-3966\", \"CVE-2012-1970\",\n \"CVE-2012-3964\", \"CVE-2012-3963\", \"CVE-2012-3962\", \"CVE-2012-3978\");\n script_bugtraq_id(55249);\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-07-17 11:14:11 +0000 (Wed, 17 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2012-08-30 12:20:04 +0530 (Thu, 30 Aug 2012)\");\n script_name(\"Mozilla Products Multiple Vulnerabilities - August12 (Mac OS X)\");\n\n script_xref(name:\"URL\", value:\"http://secunia.com/advisories/50088\");\n script_xref(name:\"URL\", value:\"http://securitytracker.com/id/1027450\");\n script_xref(name:\"URL\", value:\"http://securitytracker.com/id/1027451\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-57.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-58.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-62.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-63.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-64.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-70.html\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2012 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_mozilla_prdts_detect_macosx.nasl\");\n script_mandatory_keys(\"Mozilla/Firefox_or_Seamonkey_or_Thunderbird/Mac/Installed\");\n script_tag(name:\"impact\", value:\"Successful exploitation could allow attackers to inject scripts, bypass\n certain security restrictions, execute arbitrary code in the context of the\n browser or cause a denial of service.\");\n script_tag(name:\"affected\", value:\"SeaMonkey version before 2.12 on Mac OS X\n Thunderbird version before 15.0 on Mac OS X\n Mozilla Firefox version before 15.0 on Mac OS X\n Thunderbird ESR version 10.x before 10.0.7 on Mac OS X\n Mozilla Firefox ESR version 10.x before 10.0.7 on Mac OS X\");\n script_tag(name:\"insight\", value:\"- Use-after-free error exists within the functions\n 'nsRangeUpdater::SelAdjDeleteNode', 'nsHTMLEditRules::DeleteNonTableElements',\n 'MediaStreamGraphThreadRunnable::Run', 'nsTArray_base::Length',\n 'nsHTMLSelectElement::SubmitNamesValues', 'PresShell::CompleteMove',\n 'gfxTextRun::GetUserData' and 'gfxTextRun::CanBreakLineBefore'.\n\n - Multiple unspecified errors within functions 'nsBlockFrame::MarkLineDirty'\n and the browser engine can be exploited to\n corrupt memory.\n\n - Errors in 'Silf::readClassMap' and 'Pass::readPass' functions within\n Graphite 2 library.\n\n - Use-after-free error exists within the WebGL implementation.\");\n script_tag(name:\"summary\", value:\"This host is installed with Mozilla firefox/thunderbird/seamonkey and is\n prone to multiple vulnerabilities.\");\n script_tag(name:\"solution\", value:\"Upgrade to Mozilla Firefox version 15.0 or ESR version 10.0.7 or later.\n\n Upgrade to SeaMonkey version to 2.12 or later.\n\n Upgrade to Thunderbird version to 15.0 or ESR 10.0.7 or later.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/projects/seamonkey/\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/en-US/thunderbird/\");\n\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\nffVer = get_kb_item(\"Mozilla/Firefox/MacOSX/Version\");\n\nif(ffVer)\n{\n if(version_is_less(version:ffVer, test_version:\"10.0.7\")||\n version_in_range(version:ffVer, test_version:\"11.0\", test_version2:\"14.0\"))\n {\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n exit(0);\n }\n}\n\nseaVer = get_kb_item(\"SeaMonkey/MacOSX/Version\");\n\nif(seaVer)\n{\n if(version_is_less(version:seaVer, test_version:\"2.12\"))\n {\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n exit(0);\n }\n}\n\ntbVer = get_kb_item(\"Thunderbird/MacOSX/Version\");\n\nif(tbVer)\n{\n if(version_is_less(version:tbVer, test_version:\"10.0.7\")||\n version_in_range(version:tbVer, test_version:\"11.0\", test_version2:\"14.0\"))\n {\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n exit(0);\n }\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:38:30", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2012-11-23T00:00:00", "type": "openvas", "title": "CentOS Update for firefox CESA-2012:1482 centos5", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-5842", "CVE-2012-4214", "CVE-2012-5830", "CVE-2012-4210", "CVE-2012-5829", "CVE-2012-4201", "CVE-2012-5840", "CVE-2012-4202", "CVE-2012-5839", "CVE-2012-4216", "CVE-2012-5835", "CVE-2012-4207", "CVE-2012-5833", "CVE-2012-5841", "CVE-2012-4215", "CVE-2012-4209"], "modified": "2019-03-15T00:00:00", "id": "OPENVAS:1361412562310881544", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310881544", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for firefox CESA-2012:1482 centos5\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.centos.org/pipermail/centos-announce/2012-November/019003.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.881544\");\n script_version(\"$Revision: 14222 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 13:50:48 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2012-11-23 11:48:48 +0530 (Fri, 23 Nov 2012)\");\n script_cve_id(\"CVE-2012-4201\", \"CVE-2012-4202\", \"CVE-2012-4207\", \"CVE-2012-4209\",\n \"CVE-2012-4210\", \"CVE-2012-4214\", \"CVE-2012-4215\", \"CVE-2012-4216\",\n \"CVE-2012-5829\", \"CVE-2012-5830\", \"CVE-2012-5833\", \"CVE-2012-5835\",\n \"CVE-2012-5839\", \"CVE-2012-5840\", \"CVE-2012-5841\", \"CVE-2012-5842\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name:\"CESA\", value:\"2012:1482\");\n script_name(\"CentOS Update for firefox CESA-2012:1482 centos5\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'firefox'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\", re:\"ssh/login/release=CentOS5\");\n script_tag(name:\"affected\", value:\"firefox on CentOS 5\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n script_tag(name:\"insight\", value:\"Mozilla Firefox is an open source web browser. XULRunner provides the\n XUL Runtime environment for Mozilla Firefox.\n\n Several flaws were found in the processing of malformed web content. A web\n page containing malicious content could cause Firefox to crash or,\n potentially, execute arbitrary code with the privileges of the user running\n Firefox. (CVE-2012-4214, CVE-2012-4215, CVE-2012-4216, CVE-2012-5829,\n CVE-2012-5830, CVE-2012-5833, CVE-2012-5835, CVE-2012-5839, CVE-2012-5840,\n CVE-2012-5842)\n\n A buffer overflow flaw was found in the way Firefox handled GIF (Graphics\n Interchange Format) images. A web page containing a malicious GIF image\n could cause Firefox to crash or, possibly, execute arbitrary code with the\n privileges of the user running Firefox. (CVE-2012-4202)\n\n A flaw was found in the way the Style Inspector tool in Firefox handled\n certain Cascading Style Sheets (CSS). Running the tool (Tools -> Web\n Developer -> Inspect) on malicious CSS could result in the execution of\n HTML and CSS content with chrome privileges. (CVE-2012-4210)\n\n A flaw was found in the way Firefox decoded the HZ-GB-2312 character\n encoding. A web page containing malicious content could cause Firefox to\n run JavaScript code with the permissions of a different website.\n (CVE-2012-4207)\n\n A flaw was found in the location object implementation in Firefox.\n Malicious content could possibly use this flaw to allow restricted content\n to be loaded by plug-ins. (CVE-2012-4209)\n\n A flaw was found in the way cross-origin wrappers were implemented.\n Malicious content could use this flaw to perform cross-site scripting\n attacks. (CVE-2012-5841)\n\n A flaw was found in the evalInSandbox implementation in Firefox. Malicious\n content could use this flaw to perform cross-site scripting attacks.\n (CVE-2012-4201)\n\n For technical details regarding these flaws, refer to the Mozilla security\n advisories for Firefox 10.0.11 ESR. You can find a link to the Mozilla\n advisories in the References section of this erratum.\n\n Red Hat would like to thank the Mozilla project for reporting these issues.\n Upstream acknowledges Abhishek Arya, miaubiz, Jesse Ruderman, Andrew\n McCreight, Bob Clary, Kyle Huey, Atte Kettunen, Mariusz Mlynski, Masato\n Kinugawa, Bobby Holley, and moz_bug_r_a4 as the original reporters of these\n issues.\n\n All Firefox users should upgrade to these updated packages, which contain\n Firefox version 10.0.11 ESR, which corrects these issues. After installing\n the update, Firefox must be restarted for the changes to take effect.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"CentOS5\")\n{\n\n if ((res = isrpmvuln(pkg:\"firefox\", rpm:\"firefox~10.0.11~1.el5.centos\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner\", rpm:\"xulrunner~10.0.11~1.el5_8\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner-devel\", rpm:\"xulrunner-devel~10.0.11~1.el5_8\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:39:11", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2012-11-23T00:00:00", "type": "openvas", "title": "RedHat Update for firefox RHSA-2012:1482-01", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-5842", "CVE-2012-4214", "CVE-2012-5830", "CVE-2012-4210", "CVE-2012-5829", "CVE-2012-4201", "CVE-2012-5840", "CVE-2012-4202", "CVE-2012-5839", "CVE-2012-4216", "CVE-2012-5835", "CVE-2012-4207", "CVE-2012-5833", "CVE-2012-5841", "CVE-2012-4215", "CVE-2012-4209"], "modified": "2018-11-23T00:00:00", "id": "OPENVAS:1361412562310870865", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310870865", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for firefox RHSA-2012:1482-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"https://www.redhat.com/archives/rhsa-announce/2012-November/msg00015.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.870865\");\n script_version(\"$Revision: 12497 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-11-23 09:28:21 +0100 (Fri, 23 Nov 2018) $\");\n script_tag(name:\"creation_date\", value:\"2012-11-23 11:35:44 +0530 (Fri, 23 Nov 2012)\");\n script_cve_id(\"CVE-2012-4201\", \"CVE-2012-4202\", \"CVE-2012-4207\", \"CVE-2012-4209\",\n \"CVE-2012-4210\", \"CVE-2012-4214\", \"CVE-2012-4215\", \"CVE-2012-4216\",\n \"CVE-2012-5829\", \"CVE-2012-5830\", \"CVE-2012-5833\", \"CVE-2012-5835\",\n \"CVE-2012-5839\", \"CVE-2012-5840\", \"CVE-2012-5841\", \"CVE-2012-5842\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name:\"RHSA\", value:\"2012:1482-01\");\n script_name(\"RedHat Update for firefox RHSA-2012:1482-01\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'firefox'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\", re:\"ssh/login/release=RHENT_(6|5)\");\n script_tag(name:\"affected\", value:\"firefox on Red Hat Enterprise Linux (v. 5 server),\n Red Hat Enterprise Linux Desktop (v. 6),\n Red Hat Enterprise Linux Server (v. 6),\n Red Hat Enterprise Linux Workstation (v. 6)\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"insight\", value:\"Mozilla Firefox is an open source web browser. XULRunner provides the\n XUL Runtime environment for Mozilla Firefox.\n\n Several flaws were found in the processing of malformed web content. A web\n page containing malicious content could cause Firefox to crash or,\n potentially, execute arbitrary code with the privileges of the user running\n Firefox. (CVE-2012-4214, CVE-2012-4215, CVE-2012-4216, CVE-2012-5829,\n CVE-2012-5830, CVE-2012-5833, CVE-2012-5835, CVE-2012-5839, CVE-2012-5840,\n CVE-2012-5842)\n\n A buffer overflow flaw was found in the way Firefox handled GIF (Graphics\n Interchange Format) images. A web page containing a malicious GIF image\n could cause Firefox to crash or, possibly, execute arbitrary code with the\n privileges of the user running Firefox. (CVE-2012-4202)\n\n For technical details regarding these flaws, refer to the Mozilla security\n advisories for Firefox 10.0.11 ESR. You can find a link to the Mozilla\n advisories in the References section of this erratum.\n\n Red Hat would like to thank the Mozilla project for reporting these issues.\n Upstream acknowledges Abhishek Arya, miaubiz, Jesse Ruderman, Andrew\n McCreight, Bob Clary, Kyle Huey, Atte Kettunen, Mariusz Mlynski, Masato\n Kinugawa, Bobby Holley, and moz_bug_r_a4 as the original reporters of these\n issues.\n\n All Firefox users should upgrade to these updated packages, which contain\n Firefox version 10.0.11 ESR, which corrects these issues. After installing\n the update, Firefox must be restarted for the changes to take effect.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"RHENT_6\")\n{\n\n if ((res = isrpmvuln(pkg:\"firefox\", rpm:\"firefox~10.0.11~1.el6_3\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-debuginfo\", rpm:\"firefox-debuginfo~10.0.11~1.el6_3\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner\", rpm:\"xulrunner~10.0.11~1.el6_3\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner-debuginfo\", rpm:\"xulrunner-debuginfo~10.0.11~1.el6_3\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"RHENT_5\")\n{\n\n if ((res = isrpmvuln(pkg:\"firefox\", rpm:\"firefox~10.0.11~1.el5_8\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-debuginfo\", rpm:\"firefox-debuginfo~10.0.11~1.el5_8\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner\", rpm:\"xulrunner~10.0.11~1.el5_8\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner-debuginfo\", rpm:\"xulrunner-debuginfo~10.0.11~1.el5_8\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner-devel\", rpm:\"xulrunner-devel~10.0.11~1.el5_8\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2018-01-18T11:07:57", "description": "Check for the Version of firefox", "cvss3": {}, "published": "2012-11-23T00:00:00", "type": "openvas", "title": "CentOS Update for firefox CESA-2012:1482 centos5 ", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-5842", "CVE-2012-4214", "CVE-2012-5830", "CVE-2012-4210", "CVE-2012-5829", "CVE-2012-4201", "CVE-2012-5840", "CVE-2012-4202", "CVE-2012-5839", "CVE-2012-4216", "CVE-2012-5835", "CVE-2012-4207", "CVE-2012-5833", "CVE-2012-5841", "CVE-2012-4215", "CVE-2012-4209"], "modified": "2018-01-17T00:00:00", "id": "OPENVAS:881544", "href": "http://plugins.openvas.org/nasl.php?oid=881544", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for firefox CESA-2012:1482 centos5 \n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Mozilla Firefox is an open source web browser. XULRunner provides the\n XUL Runtime environment for Mozilla Firefox.\n\n Several flaws were found in the processing of malformed web content. A web\n page containing malicious content could cause Firefox to crash or,\n potentially, execute arbitrary code with the privileges of the user running\n Firefox. (CVE-2012-4214, CVE-2012-4215, CVE-2012-4216, CVE-2012-5829,\n CVE-2012-5830, CVE-2012-5833, CVE-2012-5835, CVE-2012-5839, CVE-2012-5840,\n CVE-2012-5842)\n \n A buffer overflow flaw was found in the way Firefox handled GIF (Graphics\n Interchange Format) images. A web page containing a malicious GIF image\n could cause Firefox to crash or, possibly, execute arbitrary code with the\n privileges of the user running Firefox. (CVE-2012-4202)\n \n A flaw was found in the way the Style Inspector tool in Firefox handled\n certain Cascading Style Sheets (CSS). Running the tool (Tools -> Web\n Developer -> Inspect) on malicious CSS could result in the execution of\n HTML and CSS content with chrome privileges. (CVE-2012-4210)\n \n A flaw was found in the way Firefox decoded the HZ-GB-2312 character\n encoding. A web page containing malicious content could cause Firefox to\n run JavaScript code with the permissions of a different website.\n (CVE-2012-4207)\n \n A flaw was found in the location object implementation in Firefox.\n Malicious content could possibly use this flaw to allow restricted content\n to be loaded by plug-ins. (CVE-2012-4209)\n \n A flaw was found in the way cross-origin wrappers were implemented.\n Malicious content could use this flaw to perform cross-site scripting\n attacks. (CVE-2012-5841)\n \n A flaw was found in the evalInSandbox implementation in Firefox. Malicious\n content could use this flaw to perform cross-site scripting attacks.\n (CVE-2012-4201)\n \n For technical details regarding these flaws, refer to the Mozilla security\n advisories for Firefox 10.0.11 ESR. You can find a link to the Mozilla\n advisories in the References section of this erratum.\n \n Red Hat would like to thank the Mozilla project for reporting these issues.\n Upstream acknowledges Abhishek Arya, miaubiz, Jesse Ruderman, Andrew\n McCreight, Bob Clary, Kyle Huey, Atte Kettunen, Mariusz Mlynski, Masato\n Kinugawa, Bobby Holley, and moz_bug_r_a4 as the original reporters of these\n issues.\n \n All Firefox users should upgrade to these updated packages, which contain\n Firefox version 10.0.11 ESR, which corrects these issues. After installing\n the update, Firefox must be restarted for the changes to take effect.\";\n\ntag_affected = \"firefox on CentOS 5\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.centos.org/pipermail/centos-announce/2012-November/019003.html\");\n script_id(881544);\n script_version(\"$Revision: 8448 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-17 17:18:06 +0100 (Wed, 17 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2012-11-23 11:48:48 +0530 (Fri, 23 Nov 2012)\");\n script_cve_id(\"CVE-2012-4201\", \"CVE-2012-4202\", \"CVE-2012-4207\", \"CVE-2012-4209\",\n \"CVE-2012-4210\", \"CVE-2012-4214\", \"CVE-2012-4215\", \"CVE-2012-4216\",\n \"CVE-2012-5829\", \"CVE-2012-5830\", \"CVE-2012-5833\", \"CVE-2012-5835\",\n \"CVE-2012-5839\", \"CVE-2012-5840\", \"CVE-2012-5841\", \"CVE-2012-5842\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"CESA\", value: \"2012:1482\");\n script_name(\"CentOS Update for firefox CESA-2012:1482 centos5 \");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of firefox\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"CentOS5\")\n{\n\n if ((res = isrpmvuln(pkg:\"firefox\", rpm:\"firefox~10.0.11~1.el5.centos\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner\", rpm:\"xulrunner~10.0.11~1.el5_8\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner-devel\", rpm:\"xulrunner-devel~10.0.11~1.el5_8\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-05-29T18:36:46", "description": "Oracle Linux Local Security Checks ELSA-2012-1482", "cvss3": {}, "published": "2015-10-06T00:00:00", "type": "openvas", "title": "Oracle Linux Local Check: ELSA-2012-1482", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-5842", "CVE-2012-4214", "CVE-2012-5830", "CVE-2012-4210", "CVE-2012-5829", "CVE-2012-4201", "CVE-2012-5840", "CVE-2012-4202", "CVE-2012-5839", "CVE-2012-4216", "CVE-2012-5835", "CVE-2012-4207", "CVE-2012-5833", "CVE-2012-5841", "CVE-2012-4215", "CVE-2012-4209"], "modified": "2018-09-28T00:00:00", "id": "OPENVAS:1361412562310123777", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310123777", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: ELSA-2012-1482.nasl 11688 2018-09-28 13:36:28Z cfischer $\n#\n# Oracle Linux Local Check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.123777\");\n script_version(\"$Revision: 11688 $\");\n script_tag(name:\"creation_date\", value:\"2015-10-06 14:08:25 +0300 (Tue, 06 Oct 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-09-28 15:36:28 +0200 (Fri, 28 Sep 2018) $\");\n script_name(\"Oracle Linux Local Check: ELSA-2012-1482\");\n script_tag(name:\"insight\", value:\"ELSA-2012-1482 - firefox security update. Please see the references for more insight.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"summary\", value:\"Oracle Linux Local Security Checks ELSA-2012-1482\");\n script_xref(name:\"URL\", value:\"http://linux.oracle.com/errata/ELSA-2012-1482.html\");\n script_cve_id(\"CVE-2012-4201\", \"CVE-2012-4202\", \"CVE-2012-4207\", \"CVE-2012-4209\", \"CVE-2012-4210\", \"CVE-2012-4214\", \"CVE-2012-4215\", \"CVE-2012-4216\", \"CVE-2012-5829\", \"CVE-2012-5830\", \"CVE-2012-5833\", \"CVE-2012-5835\", \"CVE-2012-5839\", \"CVE-2012-5840\", \"CVE-2012-5841\", \"CVE-2012-5842\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/oracle_linux\", \"ssh/login/release\", re:\"ssh/login/release=OracleLinux(5|6)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Eero Volotinen\");\n script_family(\"Oracle Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"OracleLinux5\")\n{\n if ((res = isrpmvuln(pkg:\"firefox\", rpm:\"firefox~10.0.11~1.0.1.el5_8\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"xulrunner\", rpm:\"xulrunner~10.0.11~1.0.1.el5_8\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"xulrunner-devel\", rpm:\"xulrunner-devel~10.0.11~1.0.1.el5_8\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif(release == \"OracleLinux6\")\n{\n if ((res = isrpmvuln(pkg:\"firefox\", rpm:\"firefox~10.0.11~1.0.1.el6_3\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"xulrunner\", rpm:\"xulrunner~10.0.11~1.0.1.el6_3\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"xulrunner-devel\", rpm:\"xulrunner-devel~10.0.11~1.0.1.el6_3\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif (__pkg_match) exit(99);\n exit(0);\n\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-06-25T14:53:09", "description": "The host is installed with Mozilla Thunderbird ESR and is prone to multiple\n vulnerabilities.", "cvss3": {}, "published": "2012-10-15T00:00:00", "type": "openvas", "title": "Mozilla Thunderbird ESR Multiple Vulnerabilities-01 (Mac OS X)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-3986", "CVE-2012-4185", "CVE-2012-3991", "CVE-2012-3993", "CVE-2012-3995", "CVE-2012-3988", "CVE-2012-3994", "CVE-2012-4183", "CVE-2012-4181", "CVE-2012-4186", "CVE-2012-4182", "CVE-2012-4187", "CVE-2012-3983", "CVE-2012-3982", "CVE-2012-4184", "CVE-2012-3992", "CVE-2012-4180", "CVE-2012-4188", "CVE-2012-3990", "CVE-2012-4179"], "modified": "2019-06-25T00:00:00", "id": "OPENVAS:1361412562310803644", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310803644", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mozilla Thunderbird ESR Multiple Vulnerabilities-01 (Mac OS X)\n#\n# Authors:\n# Arun Kallavi <karun@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.803644\");\n script_version(\"2019-06-25T08:25:15+0000\");\n script_cve_id(\"CVE-2012-4188\", \"CVE-2012-4187\", \"CVE-2012-4186\", \"CVE-2012-4185\",\n \"CVE-2012-4184\", \"CVE-2012-3982\", \"CVE-2012-3990\", \"CVE-2012-3988\",\n \"CVE-2012-3986\", \"CVE-2012-3991\", \"CVE-2012-3992\", \"CVE-2012-4183\",\n \"CVE-2012-4182\", \"CVE-2012-4181\", \"CVE-2012-4180\", \"CVE-2012-4179\",\n \"CVE-2012-3995\", \"CVE-2012-3994\", \"CVE-2012-3993\", \"CVE-2012-3983\");\n script_bugtraq_id(55856);\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-06-25 08:25:15 +0000 (Tue, 25 Jun 2019)\");\n script_tag(name:\"creation_date\", value:\"2012-10-15 17:43:07 +0530 (Mon, 15 Oct 2012)\");\n script_name(\"Mozilla Thunderbird ESR Multiple Vulnerabilities-01 (Mac OS X)\");\n script_xref(name:\"URL\", value:\"http://secunia.com/advisories/50856\");\n script_xref(name:\"URL\", value:\"http://secunia.com/advisories/50935\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-86.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-83.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-74.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-87.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-79.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-77.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-81.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-84.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-85.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-82.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-74.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-83.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2012 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_mozilla_prdts_detect_macosx.nasl\");\n script_mandatory_keys(\"Thunderbird-ESR/MacOSX/Version\");\n script_tag(name:\"impact\", value:\"Successful exploitation will let attackers to conduct cross site scripting\n attacks, cause a denial of service memory corruption and application crash\n or possibly execute arbitrary code via unspecified vectors.\");\n script_tag(name:\"affected\", value:\"Thunderbird ESR versions 10.x before 10.0.8 on Mac OS X\");\n script_tag(name:\"insight\", value:\"The flaws are due to\n\n - memory corruption issues\n\n - An error within Chrome Object Wrapper (COW) when handling the\n 'InstallTrigger' object can be exploited to access certain privileged\n functions and properties.\n\n - Use-after-free in the IME State Manager code.\n\n - combination of invoking full screen mode and navigating backwards in\n history could, in some circumstances, cause a hang or crash due to a\n timing dependent use-after-free pointer reference.\n\n - Several methods of a feature used for testing (DOMWindowUtils) are not\n protected by existing security checks, allowing these methods to be called\n through script by web pages.\n\n - An error when GetProperty function is invoked through JSAPI, security\n checking can be bypassed when getting cross-origin properties.\n\n - An issue with spoofing of the location property.\n\n - Use-after-free, buffer overflow, and out of bounds read issues.\n\n - The location property can be accessed by binary plugins through\n top.location and top can be shadowed by Object.define Property as well.\n This can allow for possible XSS attacks through plugins.\n\n - several memory safety bugs in the browser engine used in mozilla products.\");\n script_tag(name:\"solution\", value:\"Upgrade to Thunderbird ESR version 10.0.8 or later.\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/en-US/thunderbird\");\n script_tag(name:\"summary\", value:\"The host is installed with Mozilla Thunderbird ESR and is prone to multiple\n vulnerabilities.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\ntbVer = get_kb_item(\"Thunderbird-ESR/MacOSX/Version\");\nif(tbVer && tbVer =~ \"^10\\.0\")\n{\n if(version_in_range(version:tbVer, test_version:\"10.0\", test_version2:\"10.0.7\")){\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n exit(0);\n }\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-04-23T19:05:55", "description": "The host is installed with Mozilla Thunderbird and is prone to multiple\n vulnerabilities.", "cvss3": {}, "published": "2012-10-15T00:00:00", "type": "openvas", "title": "Mozilla Thunderbird Multiple Vulnerabilities-01 (Windows)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-3986", "CVE-2012-4185", "CVE-2012-3991", "CVE-2012-3993", "CVE-2012-3995", "CVE-2012-3988", "CVE-2012-3994", "CVE-2012-4183", "CVE-2012-4181", "CVE-2012-4186", "CVE-2012-4182", "CVE-2012-4187", "CVE-2012-3983", "CVE-2012-3982", "CVE-2012-4184", "CVE-2012-3992", "CVE-2012-4180", "CVE-2012-4188", "CVE-2012-3990", "CVE-2012-4179"], "modified": "2020-04-21T00:00:00", "id": "OPENVAS:1361412562310803639", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310803639", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mozilla Thunderbird Multiple Vulnerabilities-01 (Windows)\n#\n# Authors:\n# Arun Kallavi <karun@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.803639\");\n script_version(\"2020-04-21T11:03:03+0000\");\n script_cve_id(\"CVE-2012-4188\", \"CVE-2012-4187\", \"CVE-2012-4186\", \"CVE-2012-4185\",\n \"CVE-2012-4184\", \"CVE-2012-3982\", \"CVE-2012-3990\", \"CVE-2012-3988\",\n \"CVE-2012-3986\", \"CVE-2012-3991\", \"CVE-2012-3992\", \"CVE-2012-4183\",\n \"CVE-2012-4182\", \"CVE-2012-4181\", \"CVE-2012-4180\", \"CVE-2012-4179\",\n \"CVE-2012-3995\", \"CVE-2012-3994\", \"CVE-2012-3993\", \"CVE-2012-3983\");\n script_bugtraq_id(55856);\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-04-21 11:03:03 +0000 (Tue, 21 Apr 2020)\");\n script_tag(name:\"creation_date\", value:\"2012-10-15 17:43:07 +0530 (Mon, 15 Oct 2012)\");\n script_name(\"Mozilla Thunderbird Multiple Vulnerabilities-01 (Windows)\");\n script_xref(name:\"URL\", value:\"http://secunia.com/advisories/50856\");\n script_xref(name:\"URL\", value:\"http://secunia.com/advisories/50935\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-86.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-83.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-74.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-87.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-79.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-77.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-81.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-84.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-85.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-82.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-74.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-83.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2012 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_thunderbird_detect_portable_win.nasl\");\n script_mandatory_keys(\"Thunderbird/Win/Ver\");\n script_tag(name:\"impact\", value:\"Successful exploitation will let attackers to conduct cross site scripting\n attacks, cause a denial of service memory corruption and application crash\n or possibly execute arbitrary code via unspecified vectors.\");\n script_tag(name:\"affected\", value:\"Thunderbird versions before 16.0 on Windows\");\n script_tag(name:\"insight\", value:\"The flaws are due to\n\n - memory corruption issues\n\n - An error within Chrome Object Wrapper (COW) when handling the\n 'InstallTrigger' object can be exploited to access certain privileged\n functions and properties.\n\n - Use-after-free in the IME State Manager code.\n\n - combination of invoking full screen mode and navigating backwards in\n history could, in some circumstances, cause a hang or crash due to a\n timing dependent use-after-free pointer reference.\n\n - Several methods of a feature used for testing (DOMWindowUtils) are not\n protected by existing security checks, allowing these methods to be called\n through script by web pages.\n\n - An error when GetProperty function is invoked through JSAPI, security\n checking can be bypassed when getting cross-origin properties.\n\n - An issue with spoofing of the location property.\n\n - Use-after-free, buffer overflow, and out of bounds read issues.\n\n - The location property can be accessed by binary plugins through\n top.location and top can be shadowed by Object.define Property as well.\n This can allow for possible XSS attacks through plugins.\n\n - several memory safety bugs in the browser engine used in mozilla products.\");\n script_tag(name:\"solution\", value:\"Upgrade to Thunderbird version to 16.0 or later.\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/en-US/thunderbird\");\n script_tag(name:\"summary\", value:\"The host is installed with Mozilla Thunderbird and is prone to multiple\n vulnerabilities.\");\n script_tag(name:\"qod_type\", value:\"registry\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\ntbVer = get_kb_item(\"Thunderbird/Win/Ver\");\nif(tbVer)\n{\n if(version_is_less(version:tbVer, test_version:\"16.0\")){\n report = report_fixed_ver(installed_version:tbVer, fixed_version:\"16.0\");\n security_message(port: 0, data: report);\n exit(0);\n }\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2017-07-02T21:11:17", "description": "The host is installed with Mozilla firefox ESR and is prone to multiple\n vulnerabilities.", "cvss3": {}, "published": "2012-10-15T00:00:00", "type": "openvas", "title": "Mozilla Firefox ESR Multiple Vulnerabilities-01 (Windows)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-3986", "CVE-2012-4185", "CVE-2012-3991", "CVE-2012-3993", "CVE-2012-3995", "CVE-2012-3988", "CVE-2012-3994", "CVE-2012-4183", "CVE-2012-4181", "CVE-2012-4186", "CVE-2012-4182", "CVE-2012-4187", "CVE-2012-3983", "CVE-2012-3982", "CVE-2012-4184", "CVE-2012-3992", "CVE-2012-4180", "CVE-2012-4188", "CVE-2012-3990", "CVE-2012-4179"], "modified": "2017-05-12T00:00:00", "id": "OPENVAS:803638", "href": "http://plugins.openvas.org/nasl.php?oid=803638", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_mozilla_firefox_esr_mult_vuln01_oct12_win.nasl 6115 2017-05-12 09:03:25Z teissa $\n#\n# Mozilla Firefox ESR Multiple Vulnerabilities-01 (Windows)\n#\n# Authors:\n# Arun Kallavi <karun@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_impact = \"Successful exploitation will let attackers to conduct cross site scripting\n attacks, cause a denial of service memory corruption and application crash\n or possibly execute arbitrary code via unspecified vectors.\n Impact Level: System/Application\";\n\ntag_summary = \"The host is installed with Mozilla firefox ESR and is prone to multiple\n vulnerabilities.\";\ntag_solution = \"Upgrade to Mozilla Firefox ESR 10.0.8 or later,\n For updates refer to http://www.mozilla.com/en-US/firefox/all.html\";\ntag_insight = \"The flaws are due to\n - memory corruption issues\n - An error within Chrome Object Wrapper (COW) when handling the\n 'InstallTrigger' object can be exploited to access certain privileged\n functions and properties.\n - Use-after-free in the IME State Manager code.\n - combination of invoking full screen mode and navigating backwards in\n history could, in some circumstances, cause a hang or crash due to a\n timing dependent use-after-free pointer reference.\n - Several methods of a feature used for testing (DOMWindowUtils) are not\n protected by existing security checks, allowing these methods to be called\n through script by web pages.\n - An error when GetProperty function is invoked through JSAPI, security\n checking can be bypassed when getting cross-origin properties.\n - An issue with spoofing of the location property.\n - Use-after-free, buffer overflow, and out of bounds read issues.\n - The location property can be accessed by binary plugins through\n top.location and top can be shadowed by Object.define Property as well.\n This can allow for possible XSS attacks through plugins.\n - several memory safety bugs in the browser engine used in mozilla products.\";\ntag_affected = \"Firefox ESR versions 10.x before 10.0.8 on Windows\";\n\nif(description)\n{\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_id(803638);\n script_version(\"$Revision: 6115 $\");\n script_cve_id(\"CVE-2012-4188\", \"CVE-2012-4187\", \"CVE-2012-4186\", \"CVE-2012-4185\",\n \"CVE-2012-4184\", \"CVE-2012-3982\", \"CVE-2012-3990\", \"CVE-2012-3988\",\n \"CVE-2012-3986\", \"CVE-2012-3991\", \"CVE-2012-3992\", \"CVE-2012-4183\",\n \"CVE-2012-4182\", \"CVE-2012-4181\", \"CVE-2012-4180\", \"CVE-2012-4179\",\n \"CVE-2012-3995\", \"CVE-2012-3994\", \"CVE-2012-3993\", \"CVE-2012-3983\");\n script_bugtraq_id(55856);\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-05-12 11:03:25 +0200 (Fri, 12 May 2017) $\");\n script_tag(name:\"creation_date\", value:\"2012-10-15 17:43:07 +0530 (Mon, 15 Oct 2012)\");\n script_tag(name:\"qod_type\", value:\"registry\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_name(\"Mozilla Firefox ESR Multiple Vulnerabilities-01 (Windows)\");\n\n script_xref(name : \"URL\" , value : \"http://secunia.com/advisories/50856\");\n script_xref(name : \"URL\" , value : \"http://secunia.com/advisories/50935\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-86.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-83.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-74.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-87.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-79.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-77.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-81.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-84.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-85.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-82.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-74.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-83.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2012 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_firefox_detect_win.nasl\");\n script_mandatory_keys(\"Firefox-ESR/Win/Ver\");\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\n# Variable Initialization\nffVer = \"\";\n\n# Firefox Check\nffVer = get_kb_item(\"Firefox-ESR/Win/Ver\");\nif(ffVer && ffVer =~ \"^10.0\")\n{\n # Grep for Firefox version\n if(version_in_range(version:ffVer, test_version:\"10.0\", test_version2:\"10.0.7\"))\n {\n security_message(0);\n exit(0);\n }\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-02T21:11:22", "description": "The host is installed with Mozilla Thunderbird ESR and is prone to multiple\n vulnerabilities.", "cvss3": {}, "published": "2012-10-15T00:00:00", "type": "openvas", "title": "Mozilla Thunderbird ESR Multiple Vulnerabilities-01 (Windows)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-3986", "CVE-2012-4185", "CVE-2012-3991", "CVE-2012-3993", "CVE-2012-3995", "CVE-2012-3988", "CVE-2012-3994", "CVE-2012-4183", "CVE-2012-4181", "CVE-2012-4186", "CVE-2012-4182", "CVE-2012-4187", "CVE-2012-3983", "CVE-2012-3982", "CVE-2012-4184", "CVE-2012-3992", "CVE-2012-4180", "CVE-2012-4188", "CVE-2012-3990", "CVE-2012-4179"], "modified": "2017-05-15T00:00:00", "id": "OPENVAS:803640", "href": "http://plugins.openvas.org/nasl.php?oid=803640", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_mozilla_thunderbird_esr_mult_vuln01_oct12_win.nasl 6125 2017-05-15 09:03:42Z teissa $\n#\n# Mozilla Thunderbird ESR Multiple Vulnerabilities-01 (Windows)\n#\n# Authors:\n# Arun Kallavi <karun@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_impact = \"Successful exploitation will let attackers to conduct cross site scripting\n attacks, cause a denial of service memory corruption and application crash\n or possibly execute arbitrary code via unspecified vectors.\n Impact Level: System/Application\";\n\ntag_affected = \"Thunderbird ESR versions 10.x before 10.0.8 on Windows\";\ntag_insight = \"The flaws are due to\n - memory corruption issues\n - An error within Chrome Object Wrapper (COW) when handling the\n 'InstallTrigger' object can be exploited to access certain privileged\n functions and properties.\n - Use-after-free in the IME State Manager code.\n - combination of invoking full screen mode and navigating backwards in\n history could, in some circumstances, cause a hang or crash due to a\n timing dependent use-after-free pointer reference.\n - Several methods of a feature used for testing (DOMWindowUtils) are not\n protected by existing security checks, allowing these methods to be called\n through script by web pages.\n - An error when GetProperty function is invoked through JSAPI, security\n checking can be bypassed when getting cross-origin properties.\n - An issue with spoofing of the location property.\n - Use-after-free, buffer overflow, and out of bounds read issues.\n - The location property can be accessed by binary plugins through\n top.location and top can be shadowed by Object.define Property as well.\n This can allow for possible XSS attacks through plugins.\n - several memory safety bugs in the browser engine used in mozilla products.\";\ntag_solution = \"Upgrade to Thunderbird ESR version 10.0.8 or later,\n http://www.mozilla.org/en-US/thunderbird\";\ntag_summary = \"The host is installed with Mozilla Thunderbird ESR and is prone to multiple\n vulnerabilities.\";\n\nif(description)\n{\n script_id(803640);\n script_version(\"$Revision: 6125 $\");\n script_cve_id(\"CVE-2012-4188\", \"CVE-2012-4187\", \"CVE-2012-4186\", \"CVE-2012-4185\",\n \"CVE-2012-4184\", \"CVE-2012-3982\", \"CVE-2012-3990\", \"CVE-2012-3988\",\n \"CVE-2012-3986\", \"CVE-2012-3991\", \"CVE-2012-3992\", \"CVE-2012-4183\",\n \"CVE-2012-4182\", \"CVE-2012-4181\", \"CVE-2012-4180\", \"CVE-2012-4179\",\n \"CVE-2012-3995\", \"CVE-2012-3994\", \"CVE-2012-3993\", \"CVE-2012-3983\");\n script_bugtraq_id(55856);\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-05-15 11:03:42 +0200 (Mon, 15 May 2017) $\");\n script_tag(name:\"creation_date\", value:\"2012-10-15 17:43:07 +0530 (Mon, 15 Oct 2012)\");\n script_name(\"Mozilla Thunderbird ESR Multiple Vulnerabilities-01 (Windows)\");\n script_xref(name : \"URL\" , value : \"http://secunia.com/advisories/50856\");\n script_xref(name : \"URL\" , value : \"http://secunia.com/advisories/50935\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-86.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-83.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-74.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-87.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-79.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-77.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-81.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-84.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-85.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-82.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-74.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-83.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2012 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_thunderbird_detect_win.nasl\");\n script_mandatory_keys(\"Thunderbird-ESR/Win/Ver\");\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"registry\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\n# Variable Initialization\ntbVer = \"\";\n\n# Thunderbird Check\ntbVer = get_kb_item(\"Thunderbird-ESR/Win/Ver\");\nif(tbVer && tbVer =~ \"^10.0\")\n{\n # Grep for Thunderbird version\n if(version_in_range(version:tbVer, test_version:\"10.0\", test_version2:\"10.0.7\")){\n security_message(0);\n exit(0);\n }\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-07-19T22:14:56", "description": "The host is installed with Mozilla firefox ESR and is prone to multiple\n vulnerabilities.", "cvss3": {}, "published": "2012-10-15T00:00:00", "type": "openvas", "title": "Mozilla Firefox ESR Multiple Vulnerabilities-01 (Windows)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-3986", "CVE-2012-4185", "CVE-2012-3991", "CVE-2012-3993", "CVE-2012-3995", "CVE-2012-3988", "CVE-2012-3994", "CVE-2012-4183", "CVE-2012-4181", "CVE-2012-4186", "CVE-2012-4182", "CVE-2012-4187", "CVE-2012-3983", "CVE-2012-3982", "CVE-2012-4184", "CVE-2012-3992", "CVE-2012-4180", "CVE-2012-4188", "CVE-2012-3990", "CVE-2012-4179"], "modified": "2019-07-17T00:00:00", "id": "OPENVAS:1361412562310803638", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310803638", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mozilla Firefox ESR Multiple Vulnerabilities-01 (Windows)\n#\n# Authors:\n# Arun Kallavi <karun@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_tag(name:\"impact\", value:\"Successful exploitation will let attackers to conduct cross site scripting\n attacks, cause a denial of service memory corruption and application crash\n or possibly execute arbitrary code via unspecified vectors.\");\n script_tag(name:\"affected\", value:\"Firefox ESR versions 10.x before 10.0.8 on Windows\");\n script_tag(name:\"insight\", value:\"The flaws are due to\n\n - memory corruption issues\n\n - An error within Chrome Object Wrapper (COW) when handling the\n 'InstallTrigger' object can be exploited to access certain privileged\n functions and properties.\n\n - Use-after-free in the IME State Manager code.\n\n - combination of invoking full screen mode and navigating backwards in\n history could, in some circumstances, cause a hang or crash due to a\n timing dependent use-after-free pointer reference.\n\n - Several methods of a feature used for testing (DOMWindowUtils) are not\n protected by existing security checks, allowing these methods to be called\n through script by web pages.\n\n - An error when GetProperty function is invoked through JSAPI, security\n checking can be bypassed when getting cross-origin properties.\n\n - An issue with spoofing of the location property.\n\n - Use-after-free, buffer overflow, and out of bounds read issues.\n\n - The location property can be accessed by binary plugins through\n top.location and top can be shadowed by Object.define Property as well.\n This can allow for possible XSS attacks through plugins.\n\n - several memory safety bugs in the browser engine used in mozilla products.\");\n script_tag(name:\"solution\", value:\"Upgrade to Mozilla Firefox ESR 10.0.8 or later.\");\n script_tag(name:\"summary\", value:\"The host is installed with Mozilla firefox ESR and is prone to multiple\n vulnerabilities.\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.803638\");\n script_version(\"2019-07-17T11:14:11+0000\");\n script_cve_id(\"CVE-2012-4188\", \"CVE-2012-4187\", \"CVE-2012-4186\", \"CVE-2012-4185\",\n \"CVE-2012-4184\", \"CVE-2012-3982\", \"CVE-2012-3990\", \"CVE-2012-3988\",\n \"CVE-2012-3986\", \"CVE-2012-3991\", \"CVE-2012-3992\", \"CVE-2012-4183\",\n \"CVE-2012-4182\", \"CVE-2012-4181\", \"CVE-2012-4180\", \"CVE-2012-4179\",\n \"CVE-2012-3995\", \"CVE-2012-3994\", \"CVE-2012-3993\", \"CVE-2012-3983\");\n script_bugtraq_id(55856);\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-07-17 11:14:11 +0000 (Wed, 17 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2012-10-15 17:43:07 +0530 (Mon, 15 Oct 2012)\");\n script_tag(name:\"qod_type\", value:\"registry\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_name(\"Mozilla Firefox ESR Multiple Vulnerabilities-01 (Windows)\");\n\n script_xref(name:\"URL\", value:\"http://secunia.com/advisories/50856\");\n script_xref(name:\"URL\", value:\"http://secunia.com/advisories/50935\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-86.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-83.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-74.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-87.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-79.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-77.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-81.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-84.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-85.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-82.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-74.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-83.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2012 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_firefox_detect_portable_win.nasl\");\n script_mandatory_keys(\"Firefox-ESR/Win/Ver\");\n\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\n\nffVer = get_kb_item(\"Firefox-ESR/Win/Ver\");\nif(ffVer && ffVer =~ \"^10\\.0\")\n{\n if(version_in_range(version:ffVer, test_version:\"10.0\", test_version2:\"10.0.7\"))\n {\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n exit(0);\n }\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2017-07-02T21:11:22", "description": "The host is installed with Mozilla Seamonkey and is prone to multiple\n vulnerabilities.", "cvss3": {}, "published": "2012-10-15T00:00:00", "type": "openvas", "title": "Mozilla Seamonkey Multiple Vulnerabilities-01 (Mac OS X)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-3986", "CVE-2012-4185", "CVE-2012-3991", "CVE-2012-3993", "CVE-2012-3995", "CVE-2012-3988", "CVE-2012-3994", "CVE-2012-4183", "CVE-2012-4181", "CVE-2012-4186", "CVE-2012-4182", "CVE-2012-4187", "CVE-2012-3983", "CVE-2012-3982", "CVE-2012-4184", "CVE-2012-3992", "CVE-2012-4180", "CVE-2012-4188", "CVE-2012-3990", "CVE-2012-4179"], "modified": "2017-05-08T00:00:00", "id": "OPENVAS:803645", "href": "http://plugins.openvas.org/nasl.php?oid=803645", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_mozilla_seamonkey_mult_vuln01_oct12_macosx.nasl 6079 2017-05-08 09:03:33Z teissa $\n#\n# Mozilla Seamonkey Multiple Vulnerabilities-01 (Mac OS X)\n#\n# Authors:\n# Arun Kallavi <karun@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_impact = \"Successful exploitation will let attackers to conduct cross site scripting\n attacks, cause a denial of service memory corruption and application crash\n or possibly execute arbitrary code via unspecified vectors.\n Impact Level:System/Application\";\n\ntag_affected = \"SeaMonkey versions before 2.13 on Mac OS X\";\ntag_insight = \"The flaws are due to\n - memory corruption issues\n - An error within Chrome Object Wrapper (COW) when handling the\n 'InstallTrigger' object can be exploited to access certain privileged\n functions and properties.\n - Use-after-free in the IME State Manager code.\n - combination of invoking full screen mode and navigating backwards in\n history could, in some circumstances, cause a hang or crash due to a\n timing dependent use-after-free pointer reference.\n - Several methods of a feature used for testing (DOMWindowUtils) are not\n protected by existing security checks, allowing these methods to be called\n through script by web pages.\n - An error when GetProperty function is invoked through JSAPI, security\n checking can be bypassed when getting cross-origin properties.\n - An issue with spoofing of the location property.\n - Use-after-free, buffer overflow, and out of bounds read issues.\n - The location property can be accessed by binary plugins through\n top.location and top can be shadowed by Object.define Property as well.\n This can allow for possible XSS attacks through plugins.\n - several memory safety bugs in the browser engine used in mozilla products.\";\ntag_solution = \"Upgrade to SeaMonkey version to 2.13 or later,\n http://www.mozilla.org/projects/seamonkey\";\ntag_summary = \"The host is installed with Mozilla Seamonkey and is prone to multiple\n vulnerabilities.\";\n\nif(description)\n{\n script_id(803645);\n script_version(\"$Revision: 6079 $\");\n script_cve_id(\"CVE-2012-4188\", \"CVE-2012-4187\", \"CVE-2012-4186\", \"CVE-2012-4185\",\n \"CVE-2012-4184\", \"CVE-2012-3982\", \"CVE-2012-3990\", \"CVE-2012-3988\",\n \"CVE-2012-3986\", \"CVE-2012-3991\", \"CVE-2012-3992\", \"CVE-2012-4183\",\n \"CVE-2012-4182\", \"CVE-2012-4181\", \"CVE-2012-4180\", \"CVE-2012-4179\",\n \"CVE-2012-3995\", \"CVE-2012-3994\", \"CVE-2012-3993\", \"CVE-2012-3983\");\n script_bugtraq_id(55856);\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-05-08 11:03:33 +0200 (Mon, 08 May 2017) $\");\n script_tag(name:\"creation_date\", value:\"2012-10-15 17:43:07 +0530 (Mon, 15 Oct 2012)\");\n script_name(\"Mozilla Seamonkey Multiple Vulnerabilities-01 (Mac OS X)\");\n script_xref(name : \"URL\" , value : \"http://secunia.com/advisories/50856\");\n script_xref(name : \"URL\" , value : \"http://secunia.com/advisories/50935\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-86.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-83.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-74.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-87.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-79.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-77.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-81.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-84.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-85.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-82.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-74.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-83.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2012 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_mozilla_prdts_detect_macosx.nasl\");\n script_mandatory_keys(\"SeaMonkey/MacOSX/Version\");\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\n# Variable Initialization\nseaVer = \"\";\n\n# SeaMonkey Check\nseaVer = get_kb_item(\"SeaMonkey/MacOSX/Version\");\nif(seaVer)\n{\n # Grep for SeaMonkey version\n if(version_is_less(version:seaVer, test_version:\"2.13\"))\n {\n security_message(0);\n exit(0);\n }\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2020-04-23T19:06:07", "description": "The host is installed with Mozilla Thunderbird and is prone to multiple\n vulnerabilities.", "cvss3": {}, "published": "2012-10-15T00:00:00", "type": "openvas", "title": "Mozilla Thunderbird Multiple Vulnerabilities-01 (Mac OS X)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-3986", "CVE-2012-4185", "CVE-2012-3991", "CVE-2012-3993", "CVE-2012-3995", "CVE-2012-3988", "CVE-2012-3994", "CVE-2012-4183", "CVE-2012-4181", "CVE-2012-4186", "CVE-2012-4182", "CVE-2012-4187", "CVE-2012-3983", "CVE-2012-3982", "CVE-2012-4184", "CVE-2012-3992", "CVE-2012-4180", "CVE-2012-4188", "CVE-2012-3990", "CVE-2012-4179"], "modified": "2020-04-21T00:00:00", "id": "OPENVAS:1361412562310803643", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310803643", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mozilla Thunderbird Multiple Vulnerabilities-01 (Mac OS X)\n#\n# Authors:\n# Arun Kallavi <karun@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.803643\");\n script_version(\"2020-04-21T11:03:03+0000\");\n script_cve_id(\"CVE-2012-4188\", \"CVE-2012-4187\", \"CVE-2012-4186\", \"CVE-2012-4185\",\n \"CVE-2012-4184\", \"CVE-2012-3982\", \"CVE-2012-3990\", \"CVE-2012-3988\",\n \"CVE-2012-3986\", \"CVE-2012-3991\", \"CVE-2012-3992\", \"CVE-2012-4183\",\n \"CVE-2012-4182\", \"CVE-2012-4181\", \"CVE-2012-4180\", \"CVE-2012-4179\",\n \"CVE-2012-3995\", \"CVE-2012-3994\", \"CVE-2012-3993\", \"CVE-2012-3983\");\n script_bugtraq_id(55856);\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-04-21 11:03:03 +0000 (Tue, 21 Apr 2020)\");\n script_tag(name:\"creation_date\", value:\"2012-10-15 17:43:07 +0530 (Mon, 15 Oct 2012)\");\n script_name(\"Mozilla Thunderbird Multiple Vulnerabilities-01 (Mac OS X)\");\n script_xref(name:\"URL\", value:\"http://secunia.com/advisories/50856\");\n script_xref(name:\"URL\", value:\"http://secunia.com/advisories/50935\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-86.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-83.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-74.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-87.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-79.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-77.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-81.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-84.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-85.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-82.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-74.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-83.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2012 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_mozilla_prdts_detect_macosx.nasl\");\n script_mandatory_keys(\"Thunderbird/MacOSX/Version\");\n script_tag(name:\"impact\", value:\"Successful exploitation will let attackers to conduct cross site scripting\n attacks, cause a denial of service memory corruption and application crash\n or possibly execute arbitrary code via unspecified vectors.\");\n script_tag(name:\"affected\", value:\"Thunderbird versions before 16.0 on Mac OS X\");\n script_tag(name:\"insight\", value:\"The flaws are due to\n\n - memory corruption issues\n\n - An error within Chrome Object Wrapper (COW) when handling the\n 'InstallTrigger' object can be exploited to access certain privileged\n functions and properties.\n\n - Use-after-free in the IME State Manager code.\n\n - combination of invoking full screen mode and navigating backwards in\n history could, in some circumstances, cause a hang or crash due to a\n timing dependent use-after-free pointer reference.\n\n - Several methods of a feature used for testing (DOMWindowUtils) are not\n protected by existing security checks, allowing these methods to be called\n through script by web pages.\n\n - An error when GetProperty function is invoked through JSAPI, security\n checking can be bypassed when getting cross-origin properties.\n\n - An issue with spoofing of the location property.\n\n - Use-after-free, buffer overflow, and out of bounds read issues.\n\n - The location property can be accessed by binary plugins through\n top.location and top can be shadowed by Object.define Property as well.\n This can allow for possible XSS attacks through plugins.\n\n - several memory safety bugs in the browser engine used in mozilla products.\");\n script_tag(name:\"solution\", value:\"Upgrade to Thunderbird version to 16.0 or later.\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/en-US/thunderbird\");\n script_tag(name:\"summary\", value:\"The host is installed with Mozilla Thunderbird and is prone to multiple\n vulnerabilities.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\ntbVer = get_kb_item(\"Thunderbird/MacOSX/Version\");\nif(tbVer)\n{\n if(version_is_less(version:tbVer, test_version:\"16.0\")){\n report = report_fixed_ver(installed_version:tbVer, fixed_version:\"16.0\");\n security_message(port: 0, data: report);\n exit(0);\n }\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2017-07-02T21:11:07", "description": "The host is installed with Mozilla Thunderbird and is prone to multiple\n vulnerabilities.", "cvss3": {}, "published": "2012-10-15T00:00:00", "type": "openvas", "title": "Mozilla Thunderbird Multiple Vulnerabilities-01 (Windows)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-3986", "CVE-2012-4185", "CVE-2012-3991", "CVE-2012-3993", "CVE-2012-3995", "CVE-2012-3988", "CVE-2012-3994", "CVE-2012-4183", "CVE-2012-4181", "CVE-2012-4186", "CVE-2012-4182", "CVE-2012-4187", "CVE-2012-3983", "CVE-2012-3982", "CVE-2012-4184", "CVE-2012-3992", "CVE-2012-4180", "CVE-2012-4188", "CVE-2012-3990", "CVE-2012-4179"], "modified": "2017-05-09T00:00:00", "id": "OPENVAS:803639", "href": "http://plugins.openvas.org/nasl.php?oid=803639", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_mozilla_thunderbird_mult_vuln01_oct12_win.nasl 6086 2017-05-09 09:03:30Z teissa $\n#\n# Mozilla Thunderbird Multiple Vulnerabilities-01 (Windows)\n#\n# Authors:\n# Arun Kallavi <karun@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_impact = \"Successful exploitation will let attackers to conduct cross site scripting\n attacks, cause a denial of service memory corruption and application crash\n or possibly execute arbitrary code via unspecified vectors.\n Impact Level: System/Application\";\n\ntag_affected = \"Thunderbird versions before 16.0 on Windows\";\ntag_insight = \"The flaws are due to\n - memory corruption issues\n - An error within Chrome Object Wrapper (COW) when handling the\n 'InstallTrigger' object can be exploited to access certain privileged\n functions and properties.\n - Use-after-free in the IME State Manager code.\n - combination of invoking full screen mode and navigating backwards in\n history could, in some circumstances, cause a hang or crash due to a\n timing dependent use-after-free pointer reference.\n - Several methods of a feature used for testing (DOMWindowUtils) are not\n protected by existing security checks, allowing these methods to be called\n through script by web pages.\n - An error when GetProperty function is invoked through JSAPI, security\n checking can be bypassed when getting cross-origin properties.\n - An issue with spoofing of the location property.\n - Use-after-free, buffer overflow, and out of bounds read issues.\n - The location property can be accessed by binary plugins through\n top.location and top can be shadowed by Object.define Property as well.\n This can allow for possible XSS attacks through plugins.\n - several memory safety bugs in the browser engine used in mozilla products.\";\ntag_solution = \"Upgrade to Thunderbird version to 16.0 or later,\n http://www.mozilla.org/en-US/thunderbird\";\ntag_summary = \"The host is installed with Mozilla Thunderbird and is prone to multiple\n vulnerabilities.\";\n\nif(description)\n{\n script_id(803639);\n script_version(\"$Revision: 6086 $\");\n script_cve_id(\"CVE-2012-4188\", \"CVE-2012-4187\", \"CVE-2012-4186\", \"CVE-2012-4185\",\n \"CVE-2012-4184\", \"CVE-2012-3982\", \"CVE-2012-3990\", \"CVE-2012-3988\",\n \"CVE-2012-3986\", \"CVE-2012-3991\", \"CVE-2012-3992\", \"CVE-2012-4183\",\n \"CVE-2012-4182\", \"CVE-2012-4181\", \"CVE-2012-4180\", \"CVE-2012-4179\",\n \"CVE-2012-3995\", \"CVE-2012-3994\", \"CVE-2012-3993\", \"CVE-2012-3983\");\n script_bugtraq_id(55856);\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-05-09 11:03:30 +0200 (Tue, 09 May 2017) $\");\n script_tag(name:\"creation_date\", value:\"2012-10-15 17:43:07 +0530 (Mon, 15 Oct 2012)\");\n script_name(\"Mozilla Thunderbird Multiple Vulnerabilities-01 (Windows)\");\n script_xref(name : \"URL\" , value : \"http://secunia.com/advisories/50856\");\n script_xref(name : \"URL\" , value : \"http://secunia.com/advisories/50935\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-86.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-83.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-74.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-87.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-79.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-77.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-81.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-84.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-85.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-82.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-74.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-83.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2012 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_thunderbird_detect_win.nasl\");\n script_mandatory_keys(\"Thunderbird/Win/Ver\");\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"registry\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\n# Variable Initialization\ntbVer = \"\";\n\n# Thunderbird Check\ntbVer = get_kb_item(\"Thunderbird/Win/Ver\");\nif(tbVer)\n{\n # Grep for Thunderbird version\n if(version_is_less(version:tbVer, test_version:\"16.0\")){\n security_message(0);\n exit(0);\n }\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-02T21:11:07", "description": "The host is installed with Mozilla Thunderbird ESR and is prone to multiple\n vulnerabilities.", "cvss3": {}, "published": "2012-10-15T00:00:00", "type": "openvas", "title": "Mozilla Thunderbird ESR Multiple Vulnerabilities-01 (Mac OS X)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-3986", "CVE-2012-4185", "CVE-2012-3991", "CVE-2012-3993", "CVE-2012-3995", "CVE-2012-3988", "CVE-2012-3994", "CVE-2012-4183", "CVE-2012-4181", "CVE-2012-4186", "CVE-2012-4182", "CVE-2012-4187", "CVE-2012-3983", "CVE-2012-3982", "CVE-2012-4184", "CVE-2012-3992", "CVE-2012-4180", "CVE-2012-4188", "CVE-2012-3990", "CVE-2012-4179"], "modified": "2017-05-10T00:00:00", "id": "OPENVAS:803644", "href": "http://plugins.openvas.org/nasl.php?oid=803644", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_mozilla_thunderbird_esr_mult_vuln01_oct12_macosx.nasl 6093 2017-05-10 09:03:18Z teissa $\n#\n# Mozilla Thunderbird ESR Multiple Vulnerabilities-01 (Mac OS X)\n#\n# Authors:\n# Arun Kallavi <karun@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_impact = \"Successful exploitation will let attackers to conduct cross site scripting\n attacks, cause a denial of service memory corruption and application crash\n or possibly execute arbitrary code via unspecified vectors.\n Impact Level:System/Application\";\n\ntag_affected = \"Thunderbird ESR versions 10.x before 10.0.8 on Mac OS X\";\ntag_insight = \"The flaws are due to\n - memory corruption issues\n - An error within Chrome Object Wrapper (COW) when handling the\n 'InstallTrigger' object can be exploited to access certain privileged\n functions and properties.\n - Use-after-free in the IME State Manager code.\n - combination of invoking full screen mode and navigating backwards in\n history could, in some circumstances, cause a hang or crash due to a\n timing dependent use-after-free pointer reference.\n - Several methods of a feature used for testing (DOMWindowUtils) are not\n protected by existing security checks, allowing these methods to be called\n through script by web pages.\n - An error when GetProperty function is invoked through JSAPI, security\n checking can be bypassed when getting cross-origin properties.\n - An issue with spoofing of the location property.\n - Use-after-free, buffer overflow, and out of bounds read issues.\n - The location property can be accessed by binary plugins through\n top.location and top can be shadowed by Object.define Property as well.\n This can allow for possible XSS attacks through plugins.\n - several memory safety bugs in the browser engine used in mozilla products.\";\ntag_solution = \"Upgrade to Thunderbird ESR version 10.0.8 or later,\n http://www.mozilla.org/en-US/thunderbird\";\ntag_summary = \"The host is installed with Mozilla Thunderbird ESR and is prone to multiple\n vulnerabilities.\";\n\nif(description)\n{\n script_id(803644);\n script_version(\"$Revision: 6093 $\");\n script_cve_id(\"CVE-2012-4188\", \"CVE-2012-4187\", \"CVE-2012-4186\", \"CVE-2012-4185\",\n \"CVE-2012-4184\", \"CVE-2012-3982\", \"CVE-2012-3990\", \"CVE-2012-3988\",\n \"CVE-2012-3986\", \"CVE-2012-3991\", \"CVE-2012-3992\", \"CVE-2012-4183\",\n \"CVE-2012-4182\", \"CVE-2012-4181\", \"CVE-2012-4180\", \"CVE-2012-4179\",\n \"CVE-2012-3995\", \"CVE-2012-3994\", \"CVE-2012-3993\", \"CVE-2012-3983\");\n script_bugtraq_id(55856);\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-05-10 11:03:18 +0200 (Wed, 10 May 2017) $\");\n script_tag(name:\"creation_date\", value:\"2012-10-15 17:43:07 +0530 (Mon, 15 Oct 2012)\");\n script_name(\"Mozilla Thunderbird ESR Multiple Vulnerabilities-01 (Mac OS X)\");\n script_xref(name : \"URL\" , value : \"http://secunia.com/advisories/50856\");\n script_xref(name : \"URL\" , value : \"http://secunia.com/advisories/50935\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-86.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-83.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-74.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-87.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-79.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-77.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-81.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-84.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-85.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-82.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-74.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-83.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2012 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_mozilla_prdts_detect_macosx.nasl\");\n script_mandatory_keys(\"ThunderBird-ESR/MacOSX/Version\");\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\n# Variable Initialization\ntbVer = \"\";\n\n# Thunderbird Check\ntbVer = get_kb_item(\"ThunderBird-ESR/MacOSX/Version\");\nif(tbVer && tbVer =~ \"^10.0\")\n{\n # Grep for Thunderbird version\n if(version_in_range(version:tbVer, test_version:\"10.0\", test_version2:\"10.0.7\")){\n security_message(0);\n exit(0);\n }\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2020-04-26T15:07:46", "description": "The host is installed with Mozilla firefox and is prone to multiple\n vulnerabilities.", "cvss3": {}, "published": "2012-10-15T00:00:00", "type": "openvas", "title": "Mozilla Firefox Multiple Vulnerabilities-01 (Mac OS X)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-3986", "CVE-2012-4185", "CVE-2012-3991", "CVE-2012-3993", "CVE-2012-3995", "CVE-2012-3988", "CVE-2012-3994", "CVE-2012-4183", "CVE-2012-4181", "CVE-2012-4186", "CVE-2012-4182", "CVE-2012-4187", "CVE-2012-3983", "CVE-2012-3982", "CVE-2012-4184", "CVE-2012-3992", "CVE-2012-4180", "CVE-2012-4188", "CVE-2012-3990", "CVE-2012-4179"], "modified": "2020-04-22T00:00:00", "id": "OPENVAS:1361412562310802995", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310802995", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mozilla Firefox Multiple Vulnerabilities-01 (Mac OS X)\n#\n# Authors:\n# Madhuri D <dmadhuri@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.802995\");\n script_version(\"2020-04-22T10:27:30+0000\");\n script_cve_id(\"CVE-2012-4188\", \"CVE-2012-4187\", \"CVE-2012-4186\", \"CVE-2012-4185\",\n \"CVE-2012-4184\", \"CVE-2012-3982\", \"CVE-2012-3990\", \"CVE-2012-3988\",\n \"CVE-2012-3986\", \"CVE-2012-3991\", \"CVE-2012-3992\", \"CVE-2012-4183\",\n \"CVE-2012-4182\", \"CVE-2012-4181\", \"CVE-2012-4180\", \"CVE-2012-4179\",\n \"CVE-2012-3995\", \"CVE-2012-3994\", \"CVE-2012-3993\", \"CVE-2012-3983\");\n script_bugtraq_id(55856);\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-04-22 10:27:30 +0000 (Wed, 22 Apr 2020)\");\n script_tag(name:\"creation_date\", value:\"2012-10-15 17:43:07 +0530 (Mon, 15 Oct 2012)\");\n script_name(\"Mozilla Firefox Multiple Vulnerabilities-01 (Mac OS X)\");\n script_xref(name:\"URL\", value:\"http://secunia.com/advisories/50856\");\n script_xref(name:\"URL\", value:\"http://secunia.com/advisories/50935\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-86.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-83.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-74.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-87.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-79.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-77.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-81.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-84.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-85.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-82.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-74.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-83.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2012 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_mozilla_prdts_detect_macosx.nasl\");\n script_mandatory_keys(\"Mozilla/Firefox/MacOSX/Version\");\n script_tag(name:\"impact\", value:\"Successful exploitation will let attackers to conduct cross site scripting\n attacks, cause a denial of service memory corruption and application crash\n or possibly execute arbitrary code via unspecified vectors.\");\n script_tag(name:\"affected\", value:\"Mozilla Firefox versions before 16.0 on Mac OS X\");\n script_tag(name:\"insight\", value:\"The flaws are due to\n\n - memory corruption issues\n\n - An error within Chrome Object Wrapper (COW) when handling the\n 'InstallTrigger' object can be exploited to access certain privileged\n functions and properties.\n\n - Use-after-free in the IME State Manager code.\n\n - combination of invoking full screen mode and navigating backwards in\n history could, in some circumstances, cause a hang or crash due to a\n timing dependent use-after-free pointer reference.\n\n - Several methods of a feature used for testing (DOMWindowUtils) are not\n protected by existing security checks, allowing these methods to be called\n through script by web pages.\n\n - An error when GetProperty function is invoked through JSAPI, security\n checking can be bypassed when getting cross-origin properties.\n\n - An issue with spoofing of the location property.\n\n - Use-after-free, buffer overflow, and out of bounds read issues.\n\n - The location property can be accessed by binary plugins through\n top.location and top can be shadowed by Object.define Property as well.\n This can allow for possible XSS attacks through plugins.\n\n - several memory safety bugs in the browser engine used in mozilla products.\");\n script_tag(name:\"solution\", value:\"Upgrade to Mozilla Firefox version 16.0 or later.\");\n script_tag(name:\"summary\", value:\"The host is installed with Mozilla firefox and is prone to multiple\n vulnerabilities.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\nffVer = get_kb_item(\"Mozilla/Firefox/MacOSX/Version\");\nif(ffVer)\n{\n if(version_is_less(version:ffVer, test_version:\"16.0\"))\n {\n report = report_fixed_ver(installed_version:ffVer, fixed_version:\"16.0\");\n security_message(port:0, data:report);\n exit(0);\n }\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-04-26T15:07:10", "description": "This host is installed with Mozilla Firefox and is prone to multiple\n vulnerabilities.", "cvss3": {}, "published": "2012-11-26T00:00:00", "type": "openvas", "title": "Mozilla Firefox Multiple Vulnerabilities-01 November12 (Windows)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-5842", "CVE-2012-4214", "CVE-2012-5829", "CVE-2012-4201", "CVE-2012-5840", "CVE-2012-4202", "CVE-2012-5839", "CVE-2012-4216", "CVE-2012-5835", "CVE-2012-4207", "CVE-2012-5833", "CVE-2012-5841", "CVE-2012-4215", "CVE-2012-4209"], "modified": "2020-04-22T00:00:00", "id": "OPENVAS:1361412562310803055", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310803055", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mozilla Firefox Multiple Vulnerabilities-01 November12 (Windows)\n#\n# Authors:\n# Rachana Shetty <srachana@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.803055\");\n script_version(\"2020-04-22T10:27:30+0000\");\n script_cve_id(\"CVE-2012-4209\", \"CVE-2012-4214\", \"CVE-2012-4215\", \"CVE-2012-4216\",\n \"CVE-2012-4201\", \"CVE-2012-4202\", \"CVE-2012-4207\", \"CVE-2012-5842\",\n \"CVE-2012-5841\", \"CVE-2012-5829\", \"CVE-2012-5840\", \"CVE-2012-5833\",\n \"CVE-2012-5835\", \"CVE-2012-5839\");\n script_bugtraq_id(56629, 56628, 56633, 56634, 56618, 56614, 56632, 56611,\n 56631, 56636, 56642, 56637, 56635);\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-04-22 10:27:30 +0000 (Wed, 22 Apr 2020)\");\n script_tag(name:\"creation_date\", value:\"2012-11-26 12:10:03 +0530 (Mon, 26 Nov 2012)\");\n script_name(\"Mozilla Firefox Multiple Vulnerabilities-01 November12 (Windows)\");\n script_xref(name:\"URL\", value:\"http://secunia.com/advisories/51358\");\n script_xref(name:\"URL\", value:\"http://securitytracker.com/id?1027791\");\n script_xref(name:\"URL\", value:\"http://securitytracker.com/id?1027792\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-91.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-92.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-93.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-100.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-101.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-103.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-105.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-106.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2012 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_firefox_detect_portable_win.nasl\");\n script_mandatory_keys(\"Firefox/Win/Ver\");\n script_tag(name:\"impact\", value:\"Successful exploitation could allow attackers to inject scripts, bypass\n certain security restrictions, execute arbitrary code in the context of the\n browser.\");\n script_tag(name:\"affected\", value:\"Mozilla Firefox version before 17.0 on Windows\");\n script_tag(name:\"insight\", value:\"- The 'location' property can be accessed through 'top.location' with a\n frame whose name attributes value is set to 'top'.\n\n - Use-after-free error exists within the functions\n 'nsTextEditorState::PrepareEditor', 'gfxFont::GetFontEntry',\n 'nsWindow::OnExposeEvent' and 'nsPlaintextEditor::FireClipboardEvent'.\n\n - An error within the 'evalInSandbox()' when handling the 'location.href'\n property.\n\n - Error when rendering GIF images.\");\n script_tag(name:\"solution\", value:\"Upgrade to Mozilla Firefox version 17.0 or later.\");\n script_tag(name:\"summary\", value:\"This host is installed with Mozilla Firefox and is prone to multiple\n vulnerabilities.\");\n script_tag(name:\"qod_type\", value:\"registry\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\nffVer = get_kb_item(\"Firefox/Win/Ver\");\n\nif(ffVer)\n{\n if(version_is_less(version:ffVer, test_version:\"17.0\"))\n {\n report = report_fixed_ver(installed_version:ffVer, fixed_version:\"17.0\");\n security_message(port:0, data:report);\n exit(0);\n }\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2017-07-02T21:10:37", "description": "This host is installed with Mozilla Firefox ESR and is prone to multiple\n vulnerabilities.", "cvss3": {}, "published": "2012-11-26T00:00:00", "type": "openvas", "title": "Mozilla Firefox ESR Multiple Vulnerabilities-01 November12 (Windows)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-5842", "CVE-2012-4214", "CVE-2012-5829", "CVE-2012-4201", "CVE-2012-5840", "CVE-2012-4202", "CVE-2012-5839", "CVE-2012-4216", "CVE-2012-5835", "CVE-2012-4207", "CVE-2012-5833", "CVE-2012-5841", "CVE-2012-4215", "CVE-2012-4209"], "modified": "2017-04-21T00:00:00", "id": "OPENVAS:803349", "href": "http://plugins.openvas.org/nasl.php?oid=803349", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_mozilla_firefox_esr_mult_vuln01_nov12_win.nasl 5999 2017-04-21 09:02:32Z teissa $\n#\n# Mozilla Firefox ESR Multiple Vulnerabilities-01 November12 (Windows)\n#\n# Authors:\n# Arun Kallavi <karun@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_impact = \"Successful exploitation could allow attackers to inject scripts, bypass\n certain security restrictions, execute arbitrary code in the context of the\n browser.\n Impact Level: System/Application\";\ntag_affected = \"Mozilla Firefox ESR version 10.x before 10.0.11 on Windows\";\ntag_insight = \"- The 'location' property can be accessed through 'top.location' with a\n frame whose name attributes value is set to 'top'.\n - Use-after-free error exists within the functions\n 'nsTextEditorState::PrepareEditor', 'gfxFont::GetFontEntry',\n 'nsWindow::OnExposeEvent' and 'nsPlaintextEditor::FireClipboardEvent'.\n - An error within the 'evalInSandbox()' when handling the 'location.href'\n property.\n - Error when rendering GIF images.\";\ntag_solution = \"Upgrade to Mozilla Firefox ESR version 10.0.11 or later,\n For updates refer to http://www.mozilla.com/en-US/firefox/all.html\";\ntag_summary = \"This host is installed with Mozilla Firefox ESR and is prone to multiple\n vulnerabilities.\";\n\nif(description)\n{\n script_id(803349);\n script_version(\"$Revision: 5999 $\");\n script_cve_id(\"CVE-2012-4209\", \"CVE-2012-4214\", \"CVE-2012-4215\", \"CVE-2012-4216\",\n \"CVE-2012-4201\", \"CVE-2012-4202\", \"CVE-2012-4207\", \"CVE-2012-5842\",\n \"CVE-2012-5841\", \"CVE-2012-5829\", \"CVE-2012-5840\", \"CVE-2012-5833\",\n \"CVE-2012-5835\", \"CVE-2012-5839\");\n script_bugtraq_id(56629, 56628, 56633, 56634, 56618, 56614, 56632, 56611,\n 56631, 56636, 56642, 56637, 56635);\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-04-21 11:02:32 +0200 (Fri, 21 Apr 2017) $\");\n script_tag(name:\"creation_date\", value:\"2012-11-26 12:10:03 +0530 (Mon, 26 Nov 2012)\");\n script_name(\"Mozilla Firefox ESR Multiple Vulnerabilities-01 November12 (Windows)\");\n script_xref(name : \"URL\" , value : \"http://secunia.com/advisories/51358\");\n script_xref(name : \"URL\" , value : \"http://securitytracker.com/id?1027791\");\n script_xref(name : \"URL\" , value : \"http://securitytracker.com/id?1027792\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-91.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-92.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-93.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-100.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-101.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-103.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-105.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-106.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2013 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_firefox_detect_win.nasl\");\n script_mandatory_keys(\"Firefox-ESR/Win/Ver\");\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"registry\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\n# Variable Initialization\nfesrVer = \"\";\n\n# Get version from KB\nfesrVer = get_kb_item(\"Firefox-ESR/Win/Ver\");\n\nif(fesrVer && fesrVer =~ \"^10.0\")\n{\n # Grep for Firefox version\n if(version_in_range(version:fesrVer, test_version:\"10.0\", test_version2:\"10.0.10\"))\n {\n security_message(0);\n exit(0);\n }\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2020-04-26T15:08:27", "description": "This host is installed with Mozilla Thunderbird and is prone to multiple\n vulnerabilities.", "cvss3": {}, "published": "2012-11-26T00:00:00", "type": "openvas", "title": "Mozilla Thunderbird Multiple Vulnerabilities-01 November12 (Windows)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-5842", "CVE-2012-4214", "CVE-2012-5829", "CVE-2012-4201", "CVE-2012-5840", "CVE-2012-4202", "CVE-2012-5839", "CVE-2012-4216", "CVE-2012-5835", "CVE-2012-4207", "CVE-2012-5833", "CVE-2012-5841", "CVE-2012-4215", "CVE-2012-4209"], "modified": "2020-04-22T00:00:00", "id": "OPENVAS:1361412562310803351", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310803351", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mozilla Thunderbird Multiple Vulnerabilities-01 November12 (Windows)\n#\n# Authors:\n# Arun Kallavi <karun@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.803351\");\n script_version(\"2020-04-22T10:27:30+0000\");\n script_cve_id(\"CVE-2012-4209\", \"CVE-2012-4214\", \"CVE-2012-4215\", \"CVE-2012-4216\",\n \"CVE-2012-4201\", \"CVE-2012-4202\", \"CVE-2012-4207\", \"CVE-2012-5842\",\n \"CVE-2012-5841\", \"CVE-2012-5829\", \"CVE-2012-5840\", \"CVE-2012-5833\",\n \"CVE-2012-5835\", \"CVE-2012-5839\");\n script_bugtraq_id(56629, 56628, 56633, 56634, 56618, 56614, 56632, 56611,\n 56631, 56636, 56642, 56637, 56635);\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-04-22 10:27:30 +0000 (Wed, 22 Apr 2020)\");\n script_tag(name:\"creation_date\", value:\"2012-11-26 12:10:03 +0530 (Mon, 26 Nov 2012)\");\n script_name(\"Mozilla Thunderbird Multiple Vulnerabilities-01 November12 (Windows)\");\n script_xref(name:\"URL\", value:\"http://secunia.com/advisories/51358\");\n script_xref(name:\"URL\", value:\"http://securitytracker.com/id?1027791\");\n script_xref(name:\"URL\", value:\"http://securitytracker.com/id?1027792\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-91.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-92.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-93.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-100.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-101.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-103.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-105.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-106.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2012 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_thunderbird_detect_portable_win.nasl\");\n script_mandatory_keys(\"Thunderbird/Win/Ver\");\n script_tag(name:\"impact\", value:\"Successful exploitation could allow attackers to inject scripts, bypass\n certain security restrictions, execute arbitrary code in the context of the\n browser.\");\n script_tag(name:\"affected\", value:\"Thunderbird version before 17.0 on Windows\");\n script_tag(name:\"insight\", value:\"The flaws are due to:\n\n - The 'location' property can be accessed through 'top.location' with a\n frame whose name attributes value is set to 'top'.\n\n - Use-after-free error exists within the functions\n 'nsTextEditorState::PrepareEditor', 'gfxFont::GetFontEntry',\n 'nsWindow::OnExposeEvent' and 'nsPlaintextEditor::FireClipboardEvent'.\n\n - An error within the 'evalInSandbox()' when handling the 'location.href'\n property.\n\n - Error when rendering GIF images.\");\n script_tag(name:\"solution\", value:\"Upgrade to Thunderbird version to 17.0 or later.\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Mozilla Thunderbird and is prone to multiple\n vulnerabilities.\");\n script_tag(name:\"qod_type\", value:\"registry\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\ntbVer = get_kb_item(\"Thunderbird/Win/Ver\");\n\nif(tbVer)\n{\n if(version_is_less(version:tbVer, test_version:\"17.0\"))\n {\n report = report_fixed_ver(installed_version:tbVer, fixed_version:\"17.0\");\n security_message(port:0, data:report);\n exit(0);\n }\n}\n\nexit(99);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2017-07-02T21:10:46", "description": "This host is installed with Mozilla Seamonkey and is prone to multiple\n vulnerabilities.", "cvss3": {}, "published": "2012-11-26T00:00:00", "type": "openvas", "title": "Mozilla SeaMonkey Multiple Vulnerabilities-01 November12 (Windows)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-5842", "CVE-2012-4214", "CVE-2012-5829", "CVE-2012-4201", "CVE-2012-5840", "CVE-2012-4202", "CVE-2012-5839", "CVE-2012-4216", "CVE-2012-5835", "CVE-2012-4207", "CVE-2012-5833", "CVE-2012-5841", "CVE-2012-4215", "CVE-2012-4209"], "modified": "2017-04-25T00:00:00", "id": "OPENVAS:803350", "href": "http://plugins.openvas.org/nasl.php?oid=803350", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_mozilla_seamonkey_mult_vuln01_nov12_win.nasl 6022 2017-04-25 12:51:04Z teissa $\n#\n# Mozilla SeaMonkey Multiple Vulnerabilities-01 November12 (Windows)\n#\n# Authors:\n# Arun Kallavi <karun@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_impact = \"Successful exploitation could allow attackers to inject scripts, bypass\n certain security restrictions, execute arbitrary code in the context of the\n browser.\n Impact Level: System/Application\";\ntag_affected = \"SeaMonkey version before 2.14 on Windows\";\ntag_insight = \"- The 'location' property can be accessed through 'top.location' with a\n frame whose name attributes value is set to 'top'.\n - Use-after-free error exists within the functions\n 'nsTextEditorState::PrepareEditor', 'gfxFont::GetFontEntry',\n 'nsWindow::OnExposeEvent' and 'nsPlaintextEditor::FireClipboardEvent'.\n - An error within the 'evalInSandbox()' when handling the 'location.href'\n property.\n - Error when rendering GIF images.\";\ntag_solution = \"Upgrade to SeaMonkey version to 2.14 or later,\n http://www.mozilla.org/projects/seamonkey\";\ntag_summary = \"This host is installed with Mozilla Seamonkey and is prone to multiple\n vulnerabilities.\";\n\nif(description)\n{\n script_id(803350);\n script_version(\"$Revision: 6022 $\");\n script_cve_id(\"CVE-2012-4209\", \"CVE-2012-4214\", \"CVE-2012-4215\", \"CVE-2012-4216\",\n \"CVE-2012-4201\", \"CVE-2012-4202\", \"CVE-2012-4207\", \"CVE-2012-5842\",\n \"CVE-2012-5841\", \"CVE-2012-5829\", \"CVE-2012-5840\", \"CVE-2012-5833\",\n \"CVE-2012-5835\", \"CVE-2012-5839\");\n script_bugtraq_id(56629, 56628, 56633, 56634, 56618, 56614, 56632, 56611,\n 56631, 56636, 56642, 56637, 56635);\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-04-25 14:51:04 +0200 (Tue, 25 Apr 2017) $\");\n script_tag(name:\"creation_date\", value:\"2012-11-26 12:10:03 +0530 (Mon, 26 Nov 2012)\");\n script_name(\"Mozilla SeaMonkey Multiple Vulnerabilities-01 November12 (Windows)\");\n script_xref(name : \"URL\" , value : \"http://secunia.com/advisories/51358\");\n script_xref(name : \"URL\" , value : \"http://securitytracker.com/id?1027791\");\n script_xref(name : \"URL\" , value : \"http://securitytracker.com/id?1027792\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-91.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-92.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-93.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-100.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-101.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-103.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-105.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-106.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2013 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_seamonkey_detect_win.nasl\");\n script_mandatory_keys(\"Seamonkey/Win/Ver\");\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"registry\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\n# Variable Initialization\nseaVer = \"\";\n\n# Get version from KB\nseaVer = get_kb_item(\"Seamonkey/Win/Ver\");\n\nif(seaVer)\n{\n # Grep for SeaMonkey version\n if(version_is_less(version:seaVer, test_version:\"2.14\"))\n {\n security_message(0);\n exit(0);\n }\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-02T21:10:53", "description": "This host is installed with Mozilla Thunderbird and is prone to multiple\n vulnerabilities.", "cvss3": {}, "published": "2012-11-26T00:00:00", "type": "openvas", "title": "Mozilla Thunderbird Multiple Vulnerabilities-01 November12 (Windows)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-5842", "CVE-2012-4214", "CVE-2012-5829", "CVE-2012-4201", "CVE-2012-5840", "CVE-2012-4202", "CVE-2012-5839", "CVE-2012-4216", "CVE-2012-5835", "CVE-2012-4207", "CVE-2012-5833", "CVE-2012-5841", "CVE-2012-4215", "CVE-2012-4209"], "modified": "2017-04-13T00:00:00", "id": "OPENVAS:803351", "href": "http://plugins.openvas.org/nasl.php?oid=803351", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_mozilla_thunderbird_mult_vuln01_nov12_win.nasl 5950 2017-04-13 09:02:06Z teissa $\n#\n# Mozilla Thunderbird Multiple Vulnerabilities-01 November12 (Windows)\n#\n# Authors:\n# Arun Kallavi <karun@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_impact = \"Successful exploitation could allow attackers to inject scripts, bypass\n certain security restrictions, execute arbitrary code in the context of the\n browser.\n Impact Level: System/Application\";\ntag_affected = \"Thunderbird version before 17.0 on Windows\";\ntag_insight = \"- The 'location' property can be accessed through 'top.location' with a\n frame whose name attributes value is set to 'top'.\n - Use-after-free error exists within the functions\n 'nsTextEditorState::PrepareEditor', 'gfxFont::GetFontEntry',\n 'nsWindow::OnExposeEvent' and 'nsPlaintextEditor::FireClipboardEvent'.\n - An error within the 'evalInSandbox()' when handling the 'location.href'\n property.\n - Error when rendering GIF images.\";\ntag_solution = \"Upgrade to Thunderbird version to 17.0 or later,\n http://www.mozilla.org/en-US/thunderbird\";\ntag_summary = \"This host is installed with Mozilla Thunderbird and is prone to multiple\n vulnerabilities.\";\n\nif(description)\n{\n script_id(803351);\n script_version(\"$Revision: 5950 $\");\n script_cve_id(\"CVE-2012-4209\", \"CVE-2012-4214\", \"CVE-2012-4215\", \"CVE-2012-4216\",\n \"CVE-2012-4201\", \"CVE-2012-4202\", \"CVE-2012-4207\", \"CVE-2012-5842\",\n \"CVE-2012-5841\", \"CVE-2012-5829\", \"CVE-2012-5840\", \"CVE-2012-5833\",\n \"CVE-2012-5835\", \"CVE-2012-5839\");\n script_bugtraq_id(56629, 56628, 56633, 56634, 56618, 56614, 56632, 56611,\n 56631, 56636, 56642, 56637, 56635);\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-04-13 11:02:06 +0200 (Thu, 13 Apr 2017) $\");\n script_tag(name:\"creation_date\", value:\"2012-11-26 12:10:03 +0530 (Mon, 26 Nov 2012)\");\n script_name(\"Mozilla Thunderbird Multiple Vulnerabilities-01 November12 (Windows)\");\n script_xref(name : \"URL\" , value : \"http://secunia.com/advisories/51358\");\n script_xref(name : \"URL\" , value : \"http://securitytracker.com/id?1027791\");\n script_xref(name : \"URL\" , value : \"http://securitytracker.com/id?1027792\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-91.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-92.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-93.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-100.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-101.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-103.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-105.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-106.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2013 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_thunderbird_detect_win.nasl\");\n script_mandatory_keys(\"Thunderbird/Win/Ver\");\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"registry\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\n# Variable Initialization\ntbVer = \"\";\n\n# Get version from KB\ntbVer = get_kb_item(\"Thunderbird/Win/Ver\");\n\nif(tbVer)\n{\n # Grep for Thunderbird version\n if(version_is_less(version:tbVer, test_version:\"17.0\"))\n {\n security_message(0);\n exit(0);\n }\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-05-29T18:39:17", "description": "Ubuntu Update for Linux kernel vulnerabilities USN-1551-2", "cvss3": {}, "published": "2012-10-03T00:00:00", "type": "openvas", "title": "Ubuntu Update for thunderbird USN-1551-2", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-1970", "CVE-2012-1973", "CVE-2012-1974", "CVE-2012-3968", "CVE-2012-3963", "CVE-2012-1956", "CVE-2012-3978", "CVE-2012-1972", "CVE-2012-3962", "CVE-2012-3969", "CVE-2012-3970", "CVE-2012-3957", "CVE-2012-3958", "CVE-2012-1975", "CVE-2012-3956", "CVE-2012-3966", "CVE-2012-3967", "CVE-2012-3959", "CVE-2012-3975", "CVE-2012-3980", "CVE-2012-3960", "CVE-2012-1971", "CVE-2012-1976", "CVE-2012-3972", "CVE-2012-3964", "CVE-2012-3961", "CVE-2012-3971"], "modified": "2019-03-13T00:00:00", "id": "OPENVAS:1361412562310841165", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310841165", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_1551_2.nasl 14132 2019-03-13 09:25:59Z cfischer $\n#\n# Ubuntu Update for thunderbird USN-1551-2\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-1551-2/\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.841165\");\n script_version(\"$Revision: 14132 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-13 10:25:59 +0100 (Wed, 13 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2012-10-03 09:22:19 +0530 (Wed, 03 Oct 2012)\");\n script_cve_id(\"CVE-2012-1970\", \"CVE-2012-1971\", \"CVE-2012-1972\", \"CVE-2012-1973\",\n \"CVE-2012-1974\", \"CVE-2012-1975\", \"CVE-2012-1976\", \"CVE-2012-3956\",\n \"CVE-2012-3957\", \"CVE-2012-3958\", \"CVE-2012-3959\", \"CVE-2012-3960\",\n \"CVE-2012-3961\", \"CVE-2012-3962\", \"CVE-2012-3963\", \"CVE-2012-3964\",\n \"CVE-2012-1956\", \"CVE-2012-3966\", \"CVE-2012-3967\", \"CVE-2012-3968\",\n \"CVE-2012-3969\", \"CVE-2012-3970\", \"CVE-2012-3971\", \"CVE-2012-3972\",\n \"CVE-2012-3975\", \"CVE-2012-3978\", \"CVE-2012-3980\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name:\"USN\", value:\"1551-2\");\n script_name(\"Ubuntu Update for thunderbird USN-1551-2\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU(10\\.04 LTS|12\\.04 LTS|11\\.10|11\\.04)\");\n script_tag(name:\"summary\", value:\"Ubuntu Update for Linux kernel vulnerabilities USN-1551-2\");\n script_tag(name:\"affected\", value:\"thunderbird on Ubuntu 12.04 LTS,\n Ubuntu 11.10,\n Ubuntu 11.04,\n Ubuntu 10.04 LTS\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"insight\", value:\"USN-1551-1 fixed vulnerabilities in Thunderbird. The new package caused a\n regression in the message editor and certain performance regressions as\n well. This update fixes the problems.\n\n Original advisory details:\n\n Gary Kwong, Christian Holler, Jesse Ruderman, Steve Fink, Bob Clary, Andrew\n Sutherland, Jason Smith, John Schoenick, Vladimir Vukicevic and Daniel\n Holbert discovered memory safety issues affecting Thunderbird. If the user\n were tricked into opening a specially crafted E-Mail, an attacker could\n exploit these to cause a denial of service via application crash, or\n potentially execute code with the privileges of the user invoking\n Thunderbird. (CVE-2012-1970, CVE-2012-1971)\n\n Abhishek Arya discovered multiple use-after-free vulnerabilities. If the\n user were tricked into opening a specially crafted E-Mail, an attacker\n could exploit these to cause a denial of service via application crash, or\n potentially execute code with the privileges of the user invoking\n Thunderbird. (CVE-2012-1972, CVE-2012-1973, CVE-2012-1974, CVE-2012-1975,\n CVE-2012-1976, CVE-2012-3956, CVE-2012-3957, CVE-2012-3958, CVE-2012-3959,\n CVE-2012-3960, CVE-2012-3961, CVE-2012-3962, CVE-2012-3963, CVE-2012-3964)\n\n Mariusz Mlynsk discovered that it is possible to shadow the location object\n using Object.defineProperty. This could potentially result in a cross-site\n scripting (XSS) attack against plugins. With cross-site scripting\n vulnerabilities, if a user were tricked into viewing a specially crafted\n E-Mail, a remote attacker could exploit this to modify the contents or\n steal confidential data within the same domain. (CVE-2012-1956)\n\n Frederic Hoguin discovered that bitmap format images with a negative height\n could potentially result in memory corruption. If the user were tricked\n into opening a specially crafted image, an attacker could exploit this to\n cause a denial of service via application crash, or potentially execute\n code with the privileges of the user invoking Thunderbird. (CVE-2012-3966)\n\n It was discovered that Thunderbird's WebGL implementation was vulnerable to\n multiple memory safety issues. If the user were tricked into opening a\n specially crafted E-Mail, an attacker could exploit these to cause a denial\n of service via application crash, or potentially execute code with the\n privileges of the user invoking Thunderbird. (CVE-2012-3967, CVE-2012-3968)\n\n Arthur Gerkis discovered multiple memory safety issues in Thunderbird's\n Scalable Vector Graphics (SVG) implementation. ...\n\n Description truncated, please see the referenced URL(s) for more information.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU10.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"thunderbird\", ver:\"15.0.1+build1-0ubuntu0.10.04.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU12.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"thunderbird\", ver:\"15.0.1+build1-0ubuntu0.12.04.1\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"thunderbird-globalmenu\", ver:\"15.0.1+build1-0ubuntu0.12.04.1\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU11.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"thunderbird\", ver:\"15.0.1+build1-0ubuntu0.11.10.1\", rls:\"UBUNTU11.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"thunderbird-globalmenu\", ver:\"15.0.1+build1-0ubuntu0.11.10.1\", rls:\"UBUNTU11.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU11.04\")\n{\n\n if ((res = isdpkgvuln(pkg:\"thunderbird\", ver:\"15.0.1+build1-0ubuntu0.11.04.1\", rls:\"UBUNTU11.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"thunderbird-globalmenu\", ver:\"15.0.1+build1-0ubuntu0.11.04.1\", rls:\"UBUNTU11.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2017-07-12T10:51:54", "description": "This host is installed with Mozilla firefox/thunderbird/seamonkey and is\n prone to multiple vulnerabilities.", "cvss3": {}, "published": "2012-08-30T00:00:00", "type": "openvas", "title": "Mozilla Products Multiple Vulnerabilities - August12 (Mac OS X)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-1970", "CVE-2012-1973", "CVE-2012-1974", "CVE-2012-3968", "CVE-2012-3963", "CVE-2012-3978", "CVE-2012-3962", "CVE-2012-3969", "CVE-2012-3970", "CVE-2012-3957", "CVE-2012-3958", "CVE-2012-1975", "CVE-2012-3956", "CVE-2012-3966", "CVE-2012-3967", "CVE-2012-3959", "CVE-2012-1976", "CVE-2012-3972", "CVE-2012-3964", "CVE-2012-3971"], "modified": "2017-06-27T00:00:00", "id": "OPENVAS:803012", "href": "http://plugins.openvas.org/nasl.php?oid=803012", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_mozilla_prdts_mult_vuln_aug12_macosx.nasl 6445 2017-06-27 12:31:06Z santu $\n#\n# Mozilla Products Multiple Vulnerabilities - August12 (Mac OS X)\n#\n# Authors:\n# Rachana Shetty <srachana@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_solution = \"Upgrade to Mozilla Firefox version 15.0 or ESR version 10.0.7 or later,\n For updates refer to http://www.mozilla.com/en-US/firefox/all.html\n\n Upgrade to SeaMonkey version to 2.12 or later,\n http://www.mozilla.org/projects/seamonkey/\n\n Upgrade to Thunderbird version to 15.0 or ESR 10.0.7 or later,\n http://www.mozilla.org/en-US/thunderbird/\";\n\ntag_impact = \"Successful exploitation could allow attackers to inject scripts, bypass\n certain security restrictions, execute arbitrary code in the context of the\n browser or cause a denial of service.\n Impact Level: System/Application\";\ntag_affected = \"SeaMonkey version before 2.12 on Mac OS X\n Thunderbird version before 15.0 on Mac OS X\n Mozilla Firefox version before 15.0 on Mac OS X\n Thunderbird ESR version 10.x before 10.0.7 on Mac OS X\n Mozilla Firefox ESR version 10.x before 10.0.7 on Mac OS X\";\ntag_insight = \"- Use-after-free error exists within the functions\n 'nsRangeUpdater::SelAdjDeleteNode', 'nsHTMLEditRules::DeleteNonTableElements',\n 'MediaStreamGraphThreadRunnable::Run', 'nsTArray_base::Length',\n 'nsHTMLSelectElement::SubmitNamesValues', 'PresShell::CompleteMove',\n 'gfxTextRun::GetUserData' and 'gfxTextRun::CanBreakLineBefore'.\n - Multiple unspecified errors within funcions 'nsBlockFrame::MarkLineDirty'\n and the browser engine can be exploited to\n corrupt memory.\n - Errors in 'Silf::readClassMap' and 'Pass::readPass' functions within\n Graphite 2 library.\n - Use-after-free error exists within the WebGL implementation.\";\ntag_summary = \"This host is installed with Mozilla firefox/thunderbird/seamonkey and is\n prone to multiple vulnerabilities.\";\n\nif(description)\n{\n script_id(803012);\n script_version(\"$Revision: 6445 $\");\n script_cve_id(\"CVE-2012-3959\", \"CVE-2012-3958\", \"CVE-2012-3957\", \"CVE-2012-3972\",\n \"CVE-2012-3956\", \"CVE-2012-3971\", \"CVE-2012-1976\", \"CVE-2012-3970\",\n \"CVE-2012-1975\", \"CVE-2012-3969\", \"CVE-2012-1974\", \"CVE-2012-3968\",\n \"CVE-2012-1973\", \"CVE-2012-3967\", \"CVE-2012-3966\", \"CVE-2012-1970\",\n \"CVE-2012-3964\", \"CVE-2012-3963\", \"CVE-2012-3962\", \"CVE-2012-3978\");\n script_bugtraq_id(55249);\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-06-27 14:31:06 +0200 (Tue, 27 Jun 2017) $\");\n script_tag(name:\"creation_date\", value:\"2012-08-30 12:20:04 +0530 (Thu, 30 Aug 2012)\");\n script_name(\"Mozilla Products Multiple Vulnerabilities - August12 (Mac OS X)\");\n\n script_xref(name : \"URL\" , value : \"http://secunia.com/advisories/50088\");\n script_xref(name : \"URL\" , value : \"http://securitytracker.com/id/1027450\");\n script_xref(name : \"URL\" , value : \"http://securitytracker.com/id/1027451\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-57.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-58.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-62.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-63.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-64.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2012/mfsa2012-70.html\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2012 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_mozilla_prdts_detect_macosx.nasl\");\n script_mandatory_keys(\"Mozilla/Firefox_or_Seamonkey_or_Thunderbird/Mac/Installed\");\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\n# Firefox Check\nffVer = \"\";\nffVer = get_kb_item(\"Mozilla/Firefox/MacOSX/Version\");\n\nif(ffVer)\n{\n # Grep for Firefox version\n if(version_is_less(version:ffVer, test_version:\"10.0.7\")||\n version_in_range(version:ffVer, test_version:\"11.0\", test_version2:\"14.0\"))\n {\n security_message(0);\n exit(0);\n }\n}\n\n# SeaMonkey Check\nseaVer = \"\";\nseaVer = get_kb_item(\"SeaMonkey/MacOSX/Version\");\n\nif(seaVer)\n{\n # Grep for SeaMonkey version\n if(version_is_less(version:seaVer, test_version:\"2.12\"))\n {\n security_message(0);\n exit(0);\n }\n}\n\n# Thunderbird Check\ntbVer = \"\";\ntbVer = get_kb_item(\"ThunderBird/MacOSX/Version\");\n\nif(tbVer)\n{\n # Grep for Thunderbird version\n if(version_is_less(version:tbVer, test_version:\"10.0.7\")||\n version_in_range(version:tbVer, test_version:\"11.0\", test_version2:\"14.0\"))\n {\n security_message(0);\n exit(0);\n }\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-12-04T11:19:41", "description": "Ubuntu Update for Linux kernel vulnerabilities USN-1551-1", "cvss3": {}, "published": "2012-09-04T00:00:00", "type": "openvas", "title": "Ubuntu Update for thunderbird USN-1551-1", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-1970", "CVE-2012-1973", "CVE-2012-1974", "CVE-2012-3968", "CVE-2012-3963", "CVE-2012-1956", "CVE-2012-3978", "CVE-2012-1972", "CVE-2012-3962", "CVE-2012-3969", "CVE-2012-3970", "CVE-2012-3957", "CVE-2012-3958", "CVE-2012-1975", "CVE-2012-3956", "CVE-2012-3966", "CVE-2012-3967", "CVE-2012-3959", "CVE-2012-3975", "CVE-2012-3980", "CVE-2012-3960", "CVE-2012-1971", "CVE-2012-1976", "CVE-2012-3972", "CVE-2012-3964", "CVE-2012-3961", "CVE-2012-3971"], "modified": "2017-12-01T00:00:00", "id": "OPENVAS:841128", "href": "http://plugins.openvas.org/nasl.php?oid=841128", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_1551_1.nasl 7960 2017-12-01 06:58:16Z santu $\n#\n# Ubuntu Update for thunderbird USN-1551-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Gary Kwong, Christian Holler, Jesse Ruderman, Steve Fink, Bob Clary, Andrew\n Sutherland, Jason Smith, John Schoenick, Vladimir Vukicevic and Daniel\n Holbert discovered memory safety issues affecting Thunderbird. If the user\n were tricked into opening a specially crafted E-Mail, an attacker could\n exploit these to cause a denial of service via application crash, or\n potentially execute code with the privileges of the user invoking\n Thunderbird. (CVE-2012-1970, CVE-2012-1971)\n\n Abhishek Arya discovered multiple use-after-free vulnerabilities. If the\n user were tricked into opening a specially crafted E-Mail, an attacker\n could exploit these to cause a denial of service via application crash, or\n potentially execute code with the privileges of the user invoking\n Thunderbird. (CVE-2012-1972, CVE-2012-1973, CVE-2012-1974, CVE-2012-1975,\n CVE-2012-1976, CVE-2012-3956, CVE-2012-3957, CVE-2012-3958, CVE-2012-3959,\n CVE-2012-3960, CVE-2012-3961, CVE-2012-3962, CVE-2012-3963, CVE-2012-3964)\n \n Mariusz Mlynsk discovered that it is possible to shadow the location object\n using Object.defineProperty. This could potentially result in a cross-site\n scripting (XSS) attack against plugins. With cross-site scripting\n vulnerabilities, if a user were tricked into viewing a specially crafted\n E-Mail, a remote attacker could exploit this to modify the contents or\n steal confidential data within the same domain. (CVE-2012-1956)\n \n Frédéric Hoguin discovered that bitmap format images with a negative height\n could potentially result in memory corruption. If the user were tricked\n into opening a specially crafted image, an attacker could exploit this to\n cause a denial of service via application crash, or potentially execute\n code with the privileges of the user invoking Thunderbird. (CVE-2012-3966)\n \n It was discovered that Thunderbird's WebGL implementation was vulnerable to\n multiple memory safety issues. If the user were tricked into opening a\n specially crafted E-Mail, an attacker could exploit these to cause a denial\n of service via application crash, or potentially execute code with the\n privileges of the user invoking Thunderbird. (CVE-2012-3967, CVE-2012-3968)\n \n Arthur Gerkis discovered multiple memory safety issues in Thunderbird's\n Scalable Vector Graphics (SVG) implementation. If the user were tricked\n into opening a specially crafted image, an attacker could exploit these to\n cause a denial of service via application crash, or potentially execute\n code with the privileges of the user invoking ... \n\n Description truncated, for more information please check the Reference URL\";\n\ntag_summary = \"Ubuntu Update for Linux kernel vulnerabilities USN-1551-1\";\ntag_affected = \"thunderbird on Ubuntu 12.04 LTS ,\n Ubuntu 11.10 ,\n Ubuntu 11.04 ,\n Ubuntu 10.04 LTS\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name: \"URL\" , value: \"http://www.ubuntu.com/usn/usn-1551-1/\");\n script_id(841128);\n script_version(\"$Revision: 7960 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-01 07:58:16 +0100 (Fri, 01 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2012-09-04 11:36:38 +0530 (Tue, 04 Sep 2012)\");\n script_cve_id(\"CVE-2012-1970\", \"CVE-2012-1971\", \"CVE-2012-1972\", \"CVE-2012-1973\",\n \"CVE-2012-1974\", \"CVE-2012-1975\", \"CVE-2012-1976\", \"CVE-2012-3956\",\n \"CVE-2012-3957\", \"CVE-2012-3958\", \"CVE-2012-3959\", \"CVE-2012-3960\",\n \"CVE-2012-3961\", \"CVE-2012-3962\", \"CVE-2012-3963\", \"CVE-2012-3964\",\n \"CVE-2012-1956\", \"CVE-2012-3966\", \"CVE-2012-3967\", \"CVE-2012-3968\",\n \"CVE-2012-3969\", \"CVE-2012-3970\", \"CVE-2012-3971\", \"CVE-2012-3972\",\n \"CVE-2012-3975\", \"CVE-2012-3978\", \"CVE-2012-3980\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"USN\", value: \"1551-1\");\n script_name(\"Ubuntu Update for thunderbird USN-1551-1\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\");\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"UBUNTU10.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"thunderbird\", ver:\"15.0+build1-0ubuntu0.10.04.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU12.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"thunderbird\", ver:\"15.0+build1-0ubuntu0.12.04.1\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU11.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"thunderbird\", ver:\"15.0+build1-0ubuntu0.11.10.1\", rls:\"UBUNTU11.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU11.04\")\n{\n\n if ((res = isdpkgvuln(pkg:\"thunderbird\", ver:\"15.0+build1-0ubuntu0.11.04.1\", rls:\"UBUNTU11.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2020-01-31T18:40:03", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2013-03-11T00:00:00", "type": "openvas", "title": "openSUSE: Security Advisory for MozillaFirefox (openSUSE-SU-2012:1065-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-1970", "CVE-2012-1973", "CVE-2012-1974", "CVE-2012-3968", "CVE-2012-3963", "CVE-2012-1956", "CVE-2012-3978", "CVE-2012-3976", "CVE-2012-1972", "CVE-2012-3962", "CVE-2012-3969", "CVE-2012-3970", "CVE-2012-3957", "CVE-2012-3958", "CVE-2012-3973", "CVE-2012-1975", "CVE-2012-3956", "CVE-2012-3966", "CVE-2012-3967", "CVE-2012-3965", "CVE-2012-3959", "CVE-2012-3975", "CVE-2012-3980", "CVE-2012-3960", "CVE-2012-1976", "CVE-2012-3972", "CVE-2012-3964", "CVE-2012-3961", "CVE-2012-3971"], "modified": "2020-01-31T00:00:00", "id": "OPENVAS:1361412562310850431", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310850431", "sourceData": "# Copyright (C) 2013 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) of their respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.850431\");\n script_version(\"2020-01-31T08:23:39+0000\");\n script_tag(name:\"last_modification\", value:\"2020-01-31 08:23:39 +0000 (Fri, 31 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2013-03-11 18:29:26 +0530 (Mon, 11 Mar 2013)\");\n script_cve_id(\"CVE-2012-1956\", \"CVE-2012-1970\", \"CVE-2012-1972\", \"CVE-2012-1973\",\n \"CVE-2012-1974\", \"CVE-2012-1975\", \"CVE-2012-1976\", \"CVE-2012-3956\",\n \"CVE-2012-3957\", \"CVE-2012-3958\", \"CVE-2012-3959\", \"CVE-2012-3960\",\n \"CVE-2012-3961\", \"CVE-2012-3962\", \"CVE-2012-3963\", \"CVE-2012-3964\",\n \"CVE-2012-3965\", \"CVE-2012-3966\", \"CVE-2012-3967\", \"CVE-2012-3968\",\n \"CVE-2012-3969\", \"CVE-2012-3970\", \"CVE-2012-3971\", \"CVE-2012-3972\",\n \"CVE-2012-3973\", \"CVE-2012-3975\", \"CVE-2012-3976\", \"CVE-2012-3978\",\n \"CVE-2012-3980\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name:\"openSUSE-SU\", value:\"2012:1065-1\");\n script_name(\"openSUSE: Security Advisory for MozillaFirefox (openSUSE-SU-2012:1065-1)\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'MozillaFirefox'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2013 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse\", \"ssh/login/rpms\", re:\"ssh/login/release=openSUSE12\\.2\");\n\n script_tag(name:\"affected\", value:\"MozillaFirefox on openSUSE 12.2\");\n\n script_tag(name:\"insight\", value:\"Mozilla Firefox, Thunderbird, xulrunner, seamonkey 15.0\n update (bnc#777588)\n\n * MFSA 2012-57/CVE-2012-1970 Miscellaneous memory safety\n hazards\n\n * MFSA\n 2012-58/CVE-2012-1972/CVE-2012-1973/CVE-2012-1974/CVE-2012-1\n 975\n CVE-2012-1976/CVE-2012-3956/CVE-2012-3957/CVE-2012-3958/CVE-\n 2012-3959\n CVE-2012-3960/CVE-2012-3961/CVE-2012-3962/CVE-2012-3963/CVE-\n 2012-3964 Use-after-free issues found using Address\n Sanitizer\n\n * MFSA 2012-59/CVE-2012-1956 (bmo#756719) Location object\n can be shadowed using Object.defineProperty\n\n * MFSA 2012-60/CVE-2012-3965 (bmo#769108) Escalation of\n privilege through about:newtab\n\n * MFSA 2012-61/CVE-2012-3966 (bmo#775794, bmo#775793)\n Memory corruption with bitmap format images with\n negative height\n\n * MFSA 2012-62/CVE-2012-3967/CVE-2012-3968 WebGL\n use-after-free and memory corruption\n\n * MFSA 2012-63/CVE-2012-3969/CVE-2012-3970 SVG buffer\n overflow and use-after-free issues\n\n * MFSA 2012-64/CVE-2012-3971 Graphite 2 memory corruption\n\n * MFSA 2012-65/CVE-2012-3972 (bmo#746855) Out-of-bounds\n read in format-number in XSLT\n\n * MFSA 2012-66/CVE-2012-3973 (bmo#757128) HTTPMonitor\n extension allows for remote debugging without explicit\n activation\n\n * MFSA 2012-68/CVE-2012-3975 (bmo#770684) DOMParser loads\n linked resources in extensions when parsing text/html\n\n * MFSA 2012-69/CVE-2012-3976 (bmo#768568) Incorrect site\n SSL certificate data display\n\n * MFSA 2012-70/CVE-2012-3978 (bmo#770429) Location object\n security checks bypassed by chrome code\n\n * MFSA 2012-72/CVE-2012-3980 (bmo#771859) Web console\n eval capable of executing chrome-privileged code\n\n - fix HTML5 video crash with GStreamer enabled (bmo#761030)\n\n - GStreamer is only used for MP4 (no WebM, OGG)\n\n - updated filelist\n\n - moved browser specific preferences to correct location\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"openSUSE12.2\") {\n if(!isnull(res = isrpmvuln(pkg:\"MozillaFirefox\", rpm:\"MozillaFirefox~15.0~2.7.1\", rls:\"openSUSE12.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"MozillaFirefox-branding-upstream\", rpm:\"MozillaFirefox-branding-upstream~15.0~2.7.1\", rls:\"openSUSE12.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"MozillaFirefox-buildsymbols\", rpm:\"MozillaFirefox-buildsymbols~15.0~2.7.1\", rls:\"openSUSE12.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"MozillaFirefox-debuginfo\", rpm:\"MozillaFirefox-debuginfo~15.0~2.7.1\", rls:\"openSUSE12.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"MozillaFirefox-debugsource\", rpm:\"MozillaFirefox-debugsource~15.0~2.7.1\", rls:\"openSUSE12.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"MozillaFirefox-devel\", rpm:\"MozillaFirefox-devel~15.0~2.7.1\", rls:\"openSUSE12.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"MozillaFirefox-translations-common\", rpm:\"MozillaFirefox-translations-common~15.0~2.7.1\", rls:\"openSUSE12.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"MozillaFirefox-translations-other\", rpm:\"MozillaFirefox-translations-other~15.0~2.7.1\", rls:\"openSUSE12.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"MozillaThunderbird\", rpm:\"MozillaThunderbird~15.0~49.9.1\", rls:\"openSUSE12.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"MozillaThunderbird-buildsymbols\", rpm:\"MozillaThunderbird-buildsymbols~15.0~49.9.1\", rls:\"openSUSE12.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"MozillaThunderbird-debuginfo\", rpm:\"MozillaThunderbird-debuginfo~15.0~49.9.1\", rls:\"openSUSE12.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"MozillaThunderbird-debugsource\", rpm:\"MozillaThunderbird-debugsource~15.0~49.9.1\", rls:\"openSUSE12.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"MozillaThunderbird-devel\", rpm:\"MozillaThunderbird-devel~15.0~49.9.1\", rls:\"openSUSE12.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"MozillaThunderbird-devel-debuginfo\", rpm:\"MozillaThunderbird-devel-debuginfo~15.0~49.9.1\", rls:\"openSUSE12.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"MozillaThunderbird-translations-common\", rpm:\"MozillaThunderbird-translations-common~15.0~49.9.1\", rls:\"openSUSE12.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"MozillaThunderbird-translations-other\", rpm:\"MozillaThunderbird-translations-other~15.0~49.9.1\", rls:\"openSUSE12.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"enigmail\", rpm:\"enigmail~1.4.4+15.0~49.9.1\", rls:\"openSUSE12.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"enigmail-debuginfo\", rpm:\"enigmail-debuginfo~1.4.4+15.0~49.9.1\", rls:\"openSUSE12.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libfreebl3\", rpm:\"libfreebl3~3.13.6~2.7.1\", rls:\"openSUSE12.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libfreebl3-debuginfo\", rpm:\"libfreebl3-debuginfo~3.13.6~2.7.1\", rls:\"openSUSE12.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libsoftokn3\", rpm:\"libsoftokn3~3.13.6~2.7.1\", rls:\"openSUSE12.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libsoftokn3-debuginfo\", rpm:\"libsoftokn3-debuginfo~3.13.6~2.7.1\", rls:\"openSUSE12.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"mozilla-js\", rpm:\"mozilla-js~15.0~2.8.1\", rls:\"openSUSE12.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"mozilla-js-debuginfo\", rpm:\"mozilla-js-debuginfo~15.0~2.8.1\", rls:\"openSUSE12.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"mozilla-nss\", rpm:\"mozilla-nss~3.13.6~2.7.1\", rls:\"openSUSE12.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"mozilla-nss-certs\", rpm:\"mozilla-nss-certs~3.13.6~2.7.1\", rls:\"openSUSE12.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"mozilla-nss-certs-debuginfo\", rpm:\"mozilla-nss-certs-debuginfo~3.13.6~2.7.1\", rls:\"openSUSE12.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"mozilla-nss-debuginfo\", rpm:\"mozilla-nss-debuginfo~3.13.6~2.7.1\", rls:\"openSUSE12.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"mozilla-nss-debugsource\", rpm:\"mozilla-nss-debugsource~3.13.6~2.7.1\", rls:\"openSUSE12.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"mozilla-nss-devel\", rpm:\"mozilla-nss-devel~3.13.6~2.7.1\", rls:\"openSUSE12.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"mozilla-nss-sysinit\", rpm:\"mozilla-nss-sysinit~3.13.6~2.7.1\", rls:\"openSUSE12.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"mozilla-nss-sysinit-debuginfo\", rpm:\"mozilla-nss-sysinit-debuginfo~3.13.6~2.7.1\", rls:\"openSUSE12.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"mozilla-nss-tools\", rpm:\"mozilla-nss-tools~3.13.6~2.7.1\", rls:\"openSUSE12.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"mozilla-nss-tools-debuginfo\", rpm:\"mozilla-nss-tools-debuginfo~3.13.6~2.7.1\", rls:\"openSUSE12.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"seamonkey\", rpm:\"seamonkey~2.12~2.8.1\", rls:\"openSUSE12.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"seamonkey-debuginfo\", rpm:\"seamonkey-debuginfo~2.12~2.8.1\", rls:\"openSUSE12.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"seamonkey-debugsource\", rpm:\"seamonkey-debugsource~2.12~2.8.1\", rls:\"openSUSE12.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"seamonkey-dom-inspector\", rpm:\"seamonkey-dom-inspector~2.12~2.8.1\", rls:\"openSUSE12.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"seamonkey-irc\", rpm:\"seamonkey-irc~2.12~2.8.1\", rls:\"openSUSE12.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"seamonkey-translations-common\", rpm:\"seamonkey-translations-common~2.12~2.8.1\", rls:\"openSUSE12.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"seamonkey-translations-other\", rpm:\"seamonkey-translations-other~2.12~2.8.1\", rls:\"openSUSE12.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"seamonkey-venkman\", rpm:\"seamonkey-venkman~2.12~2.8.1\", rls:\"openSUSE12.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"xulrunner\", rpm:\"xulrunner~15.0~2.8.1\", rls:\"openSUSE12.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"xulrunner-buildsymbols\", rpm:\"xulrunner-buildsymbols~15.0~2.8.1\", rls:\"openSUSE12.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"xulrunner-debuginfo\", rpm:\"xulrunner-debuginfo~15.0~2.8.1\", rls:\"openSUSE12.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"xulrunner-debugsource\", rpm:\"xulrunner-debugsource~15.0~2.8.1\", rls:\"openSUSE12.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"xulrunner-devel\", rpm:\"xulrunner-devel~15.0~2.8.1\", rls:\"openSUSE12.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"xulrunner-devel-debuginfo\", rpm:\"xulrunner-devel-debuginfo~15.0~2.8.1\", rls:\"openSUSE12.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libfreebl3-32bit\", rpm:\"libfreebl3-32bit~3.13.6~2.7.1\", rls:\"openSUSE12.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libfreebl3-debuginfo-32bit\", rpm:\"libfreebl3-debuginfo-32bit~3.13.6~2.7.1\", rls:\"openSUSE12.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libsoftokn3-32bit\", rpm:\"libsoftokn3-32bit~3.13.6~2.7.1\", rls:\"openSUSE12.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libsoftokn3-debuginfo-32bit\", rpm:\"libsoftokn3-debuginfo-32bit~3.13.6~2.7.1\", rls:\"openSUSE12.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"mozilla-js-32bit\", rpm:\"mozilla-js-32bit~15.0~2.8.1\", rls:\"openSUSE12.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"mozilla-js-debuginfo-32bit\", rpm:\"mozilla-js-debuginfo-32bit~15.0~2.8.1\", rls:\"openSUSE12.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"mozilla-nss-32bit\", rpm:\"mozilla-nss-32bit~3.13.6~2.7.1\", rls:\"openSUSE12.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"mozilla-nss-certs-32bit\", rpm:\"mozilla-nss-certs-32bit~3.13.6~2.7.1\", rls:\"openSUSE12.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"mozilla-nss-certs-debuginfo-32bit\", rpm:\"mozilla-nss-certs-debuginfo-32bit~3.13.6~2.7.1\", rls:\"openSUSE12.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"mozilla-nss-debuginfo-32bit\", rpm:\"mozilla-nss-debuginfo-32bit~3.13.6~2.7.1\", rls:\"openSUSE12.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"mozilla-nss-sysinit-32bit\", rpm:\"mozilla-nss-sysinit-32bit~3.13.6~2.7.1\", rls:\"openSUSE12.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"mozilla-nss-sysinit-debuginfo-32bit\", rpm:\"mozilla-nss-sysinit-debuginfo-32bit~3.13.6~2.7.1\", rls:\"openSUSE12.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"xulrunner-32bit\", rpm:\"xulrunner-32bit~15.0~2.8.1\", rls:\"openSUSE12.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"xulrunner-debuginfo-32bit\", rpm:\"xulrunner-debuginfo-32bit~15.0~2.8.1\", rls:\"openSUSE12.2\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-07-19T22:15:45", "description": "This host is installed with Mozilla Firefox ESR and is prone to multiple\n vulnerabilities.", "cvss3": {}, "published": "2012-11-26T00:00:00", "type": "openvas", "title": "Mozilla Firefox ESR Multiple Vulnerabilities-01 November12 (Windows)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-5842", "CVE-2012-4214", "CVE-2012-5829", "CVE-2012-4201", "CVE-2012-5840", "CVE-2012-4202", "CVE-2012-5839", "CVE-2012-4216", "CVE-2012-5835", "CVE-2012-4207", "CVE-2012-5833", "CVE-2012-5841", "CVE-2012-4215", "CVE-2012-4209"], "modified": "2019-07-17T00:00:00", "id": "OPENVAS:1361412562310803349", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310803349", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mozilla Firefox ESR Multiple Vulnerabilities-01 November12 (Windows)\n#\n# Authors:\n# Arun Kallavi <karun@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.803349\");\n script_version(\"2019-07-17T11:14:11+0000\");\n script_cve_id(\"CVE-2012-4209\", \"CVE-2012-4214\", \"CVE-2012-4215\", \"CVE-2012-4216\",\n \"CVE-2012-4201\", \"CVE-2012-4202\", \"CVE-2012-4207\", \"CVE-2012-5842\",\n \"CVE-2012-5841\", \"CVE-2012-5829\", \"CVE-2012-5840\", \"CVE-2012-5833\",\n \"CVE-2012-5835\", \"CVE-2012-5839\");\n script_bugtraq_id(56629, 56628, 56633, 56634, 56618, 56614, 56632, 56611,\n 56631, 56636, 56642, 56637, 56635);\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-07-17 11:14:11 +0000 (Wed, 17 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2012-11-26 12:10:03 +0530 (Mon, 26 Nov 2012)\");\n script_name(\"Mozilla Firefox ESR Multiple Vulnerabilities-01 November12 (Windows)\");\n script_xref(name:\"URL\", value:\"http://secunia.com/advisories/51358\");\n script_xref(name:\"URL\", value:\"http://securitytracker.com/id?1027791\");\n script_xref(name:\"URL\", value:\"http://securitytracker.com/id?1027792\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-91.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-92.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-93.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-100.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-101.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-103.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-105.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2012/mfsa2012-106.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2012 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_firefox_detect_portable_win.nasl\");\n script_mandatory_keys(\"Firefox-ESR/Win/Ver\");\n script_tag(name:\"impact\", value:\"Successful exploitation could allow attackers to inject scripts, bypass\n certain security restrictions, execute arbitrary code in the context of the\n browser.\");\n script_tag(name:\"affected\", value:\"Mozilla Firefox ESR version 10.x before 10.0.11 on Windows\");\n script_tag(name:\"insight\", value:\"- The 'location' property can be accessed through 'top.location' with a\n frame whose name attributes value is set to 'top'.\n\n - Use-after-free error exists within the functions\n 'nsTextEditorState::PrepareEditor', 'gfxFont::GetFontEntry',\n 'nsWindow::OnExposeEvent' and 'nsPlaintextEditor::FireClipboardEvent'.\n\n - An error within the 'evalInSandbox()' when handling the 'location.href'\n property.\n\n - Error when rendering GIF images.\");\n script_tag(name:\"solution\", value:\"Upgrade to Mozilla Firefox ESR version 10.0.11 or later.\");\n script_tag(name:\"summary\", value:\"This host is installed with Mozilla Firefox ESR and is prone to multiple\n vulnerabilities.\");\n script_tag(name:\"qod_type\", value:\"registry\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\nfesrVer = get_kb_item(\"Firefox-ESR/Win/Ver\");\n\nif(fesrVer && fesrVer =~ \"^10\\.0\")\n{\n if(version_in_range(version:fesrVer, test_version:\"10.0\", test_version2:\"10.0.10\"))\n {\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n exit(0);\n }\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2018-01-06T13:07:54", "description": "Check for the Version of MozillaFirefox", "cvss3": {}, "published": "2012-12-13T00:00:00", "type": "openvas", "title": "SuSE Update for MozillaFirefox openSUSE-SU-2012:1064-1 (MozillaFirefox)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-1970", "CVE-2012-1973", "CVE-2012-1974", "CVE-2012-3968", "CVE-2012-3963", "CVE-2012-1956", "CVE-2012-3978", "CVE-2012-3976", "CVE-2012-1972", "CVE-2012-3962", "CVE-2012-3969", "CVE-2012-3970", "CVE-2012-3957", "CVE-2012-3958", "CVE-2012-3973", "CVE-2012-1975", "CVE-2012-3956", "CVE-2012-3966", "CVE-2012-3967", "CVE-2012-3965", "CVE-2012-3959", "CVE-2012-3975", "CVE-2012-3980", "CVE-2012-3960", "CVE-2012-1976", "CVE-2012-3972", "CVE-2012-3964", "CVE-2012-3961", "CVE-2012-3971"], "modified": "2018-01-04T00:00:00", "id": "OPENVAS:850319", "href": "http://plugins.openvas.org/nasl.php?oid=850319", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_suse_2012_1064_1.nasl 8285 2018-01-04 06:29:16Z teissa $\n#\n# SuSE Update for MozillaFirefox openSUSE-SU-2012:1064-1 (MozillaFirefox)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"MozillaFirefox on openSUSE 12.1, openSUSE 11.4\";\ntag_insight = \"Mozilla Firefox, Thunderbird, xulrunner, seamonkey 15.0\n update (bnc#777588)\n * MFSA 2012-57/CVE-2012-1970 Miscellaneous memory safety\n hazards\n * MFSA\n 2012-58/CVE-2012-1972/CVE-2012-1973/CVE-2012-1974/CVE-2012-1\n 975\n CVE-2012-1976/CVE-2012-3956/CVE-2012-3957/CVE-2012-3958/CVE-\n 2012-3959\n CVE-2012-3960/CVE-2012-3961/CVE-2012-3962/CVE-2012-3963/CVE-\n 2012-3964 Use-after-free issues found using Address\n Sanitizer\n * MFSA 2012-59/CVE-2012-1956 (bmo#756719) Location object\n can be shadowed using Object.defineProperty\n * MFSA 2012-60/CVE-2012-3965 (bmo#769108) Escalation of\n privilege through about:newtab\n * MFSA 2012-61/CVE-2012-3966 (bmo#775794, bmo#775793)\n Memory corruption with bitmap format images with\n negative height\n * MFSA 2012-62/CVE-2012-3967/CVE-2012-3968 WebGL\n use-after-free and memory corruption\n * MFSA 2012-63/CVE-2012-3969/CVE-2012-3970 SVG buffer\n overflow and use-after-free issues\n * MFSA 2012-64/CVE-2012-3971 Graphite 2 memory corruption\n * MFSA 2012-65/CVE-2012-3972 (bmo#746855) Out-of-bounds\n read in format-number in XSLT\n * MFSA 2012-66/CVE-2012-3973 (bmo#757128) HTTPMonitor\n extension allows for remote debugging without explicit\n activation\n * MFSA 2012-68/CVE-2012-3975 (bmo#770684) DOMParser loads\n linked resources in extensions when parsing text/html\n * MFSA 2012-69/CVE-2012-3976 (bmo#768568) Incorrect site\n SSL certificate data display\n * MFSA 2012-70/CVE-2012-3978 (bmo#770429) Location object\n security checks bypassed by chrome code\n * MFSA 2012-72/CVE-2012-3980 (bmo#771859) Web console\n eval capable of executing chrome-privileged code\n - fix HTML5 video crash with GStreamer enabled (bmo#761030)\n - GStreamer is only used for MP4 (no WebM, OGG)\n - updated filelist\n - moved browser specific preferences to correct location\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_id(850319);\n script_version(\"$Revision: 8285 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-04 07:29:16 +0100 (Thu, 04 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2012-12-13 17:01:43 +0530 (Thu, 13 Dec 2012)\");\n script_cve_id(\"CVE-2012-1956\", \"CVE-2012-1970\", \"CVE-2012-1972\", \"CVE-2012-1973\",\n \"CVE-2012-1974\", \"CVE-2012-1975\", \"CVE-2012-1976\", \"CVE-2012-3956\",\n \"CVE-2012-3957\", \"CVE-2012-3958\", \"CVE-2012-3959\", \"CVE-2012-3960\",\n \"CVE-2012-3961\", \"CVE-2012-3962\", \"CVE-2012-3963\", \"CVE-2012-3964\",\n \"CVE-2012-3965\", \"CVE-2012-3966\", \"CVE-2012-3967\", \"CVE-2012-3968\",\n \"CVE-2012-3969\", \"CVE-2012-3970\", \"CVE-2012-3971\", \"CVE-2012-3972\",\n \"CVE-2012-3973\", \"CVE-2012-3975\", \"CVE-2012-3976\", \"CVE-2012-3978\",\n \"CVE-2012-3980\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"openSUSE-SU\", value: \"2012:1064_1\");\n script_name(\"SuSE Update for MozillaFirefox openSUSE-SU-2012:1064-1 (MozillaFirefox)\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of MozillaFirefox\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"openSUSE11.4\")\n{\n\n if ((res = isrpmvuln(pkg:\"MozillaFirefox\", rpm:\"MozillaFirefox~15.0~31.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaFirefox-branding-upstream\", rpm:\"MozillaFirefox-branding-upstream~15.0~31.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaFirefox-buildsymbols\", rpm:\"MozillaFirefox-buildsymbols~15.0~31.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaFirefox-debuginfo\", rpm:\"MozillaFirefox-debuginfo~15.0~31.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaFirefox-debugsource\", rpm:\"MozillaFirefox-debugsource~15.0~31.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaFirefox-devel\", rpm:\"MozillaFirefox-devel~15.0~31.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaFirefox-translations-common\", rpm:\"MozillaFirefox-translations-common~15.0~31.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaFirefox-translations-other\", rpm:\"MozillaFirefox-translations-other~15.0~31.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaThunderbird\", rpm:\"MozillaThunderbird~15.0~27.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaThunderbird-buildsymbols\", rpm:\"MozillaThunderbird-buildsymbols~15.0~27.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaThunderbird-debuginfo\", rpm:\"MozillaThunderbird-debuginfo~15.0~27.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaThunderbird-debugsource\", rpm:\"MozillaThunderbird-debugsource~15.0~27.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaThunderbird-devel\", rpm:\"MozillaThunderbird-devel~15.0~27.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaThunderbird-devel-debuginfo\", rpm:\"MozillaThunderbird-devel-debuginfo~15.0~27.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaThunderbird-translations-common\", rpm:\"MozillaThunderbird-translations-common~15.0~27.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaThunderbird-translations-other\", rpm:\"MozillaThunderbird-translations-other~15.0~27.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"enigmail\", rpm:\"enigmail~1.4.4+15.0~27.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"enigmail-debuginfo\", rpm:\"enigmail-debuginfo~1.4.4+15.0~27.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libfreebl3\", rpm:\"libfreebl3~3.13.6~47.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libfreebl3-debuginfo\", rpm:\"libfreebl3-debuginfo~3.13.6~47.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libsoftokn3\", rpm:\"libsoftokn3~3.13.6~47.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libsoftokn3-debuginfo\", rpm:\"libsoftokn3-debuginfo~3.13.6~47.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nspr\", rpm:\"mozilla-nspr~4.9.2~16.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nspr-debuginfo\", rpm:\"mozilla-nspr-debuginfo~4.9.2~16.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nspr-debugsource\", rpm:\"mozilla-nspr-debugsource~4.9.2~16.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nspr-devel\", rpm:\"mozilla-nspr-devel~4.9.2~16.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss\", rpm:\"mozilla-nss~3.13.6~47.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-certs\", rpm:\"mozilla-nss-certs~3.13.6~47.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-certs-debuginfo\", rpm:\"mozilla-nss-certs-debuginfo~3.13.6~47.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-debuginfo\", rpm:\"mozilla-nss-debuginfo~3.13.6~47.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-debugsource\", rpm:\"mozilla-nss-debugsource~3.13.6~47.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-devel\", rpm:\"mozilla-nss-devel~3.13.6~47.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-sysinit\", rpm:\"mozilla-nss-sysinit~3.13.6~47.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-sysinit-debuginfo\", rpm:\"mozilla-nss-sysinit-debuginfo~3.13.6~47.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-tools\", rpm:\"mozilla-nss-tools~3.13.6~47.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-tools-debuginfo\", rpm:\"mozilla-nss-tools-debuginfo~3.13.6~47.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"seamonkey\", rpm:\"seamonkey~2.12~27.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"seamonkey-debuginfo\", rpm:\"seamonkey-debuginfo~2.12~27.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"seamonkey-debugsource\", rpm:\"seamonkey-debugsource~2.12~27.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"seamonkey-dom-inspector\", rpm:\"seamonkey-dom-inspector~2.12~27.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"seamonkey-irc\", rpm:\"seamonkey-irc~2.12~27.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"seamonkey-translations-common\", rpm:\"seamonkey-translations-common~2.12~27.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"seamonkey-translations-other\", rpm:\"seamonkey-translations-other~2.12~27.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"seamonkey-venkman\", rpm:\"seamonkey-venkman~2.12~27.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libfreebl3-32bit\", rpm:\"libfreebl3-32bit~3.13.6~47.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libfreebl3-debuginfo-32bit\", rpm:\"libfreebl3-debuginfo-32bit~3.13.6~47.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libsoftokn3-32bit\", rpm:\"libsoftokn3-32bit~3.13.6~47.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libsoftokn3-debuginfo-32bit\", rpm:\"libsoftokn3-debuginfo-32bit~3.13.6~47.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nspr-32bit\", rpm:\"mozilla-nspr-32bit~4.9.2~16.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nspr-debuginfo-32bit\", rpm:\"mozilla-nspr-debuginfo-32bit~4.9.2~16.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-32bit\", rpm:\"mozilla-nss-32bit~3.13.6~47.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-certs-32bit\", rpm:\"mozilla-nss-certs-32bit~3.13.6~47.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-certs-debuginfo-32bit\", rpm:\"mozilla-nss-certs-debuginfo-32bit~3.13.6~47.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-debuginfo-32bit\", rpm:\"mozilla-nss-debuginfo-32bit~3.13.6~47.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-sysinit-32bit\", rpm:\"mozilla-nss-sysinit-32bit~3.13.6~47.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-sysinit-debuginfo-32bit\", rpm:\"mozilla-nss-sysinit-debuginfo-32bit~3.13.6~47.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libfreebl3-debuginfo-x86\", rpm:\"libfreebl3-debuginfo-x86~3.13.6~47.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libfreebl3-x86\", rpm:\"libfreebl3-x86~3.13.6~47.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libsoftokn3-debuginfo-x86\", rpm:\"libsoftokn3-debuginfo-x86~3.13.6~47.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libsoftokn3-x86\", rpm:\"libsoftokn3-x86~3.13.6~47.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nspr-debuginfo-x86\", rpm:\"mozilla-nspr-debuginfo-x86~4.9.2~16.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nspr-x86\", rpm:\"mozilla-nspr-x86~4.9.2~16.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-certs-debuginfo-x86\", rpm:\"mozilla-nss-certs-debuginfo-x86~3.13.6~47.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-certs-x86\", rpm:\"mozilla-nss-certs-x86~3.13.6~47.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-debuginfo-x86\", rpm:\"mozilla-nss-debuginfo-x86~3.13.6~47.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-sysinit-debuginfo-x86\", rpm:\"mozilla-nss-sysinit-debuginfo-x86~3.13.6~47.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-sysinit-x86\", rpm:\"mozilla-nss-sysinit-x86~3.13.6~47.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-x86\", rpm:\"mozilla-nss-x86~3.13.6~47.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"openSUSE12.1\")\n{\n\n if ((res = isrpmvuln(pkg:\"MozillaFirefox\", rpm:\"MozillaFirefox~15.0~2.36.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaFirefox-branding-upstream\", rpm:\"MozillaFirefox-branding-upstream~15.0~2.36.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaFirefox-buildsymbols\", rpm:\"MozillaFirefox-buildsymbols~15.0~2.36.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaFirefox-debuginfo\", rpm:\"MozillaFirefox-debuginfo~15.0~2.36.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaFirefox-debugsource\", rpm:\"MozillaFirefox-debugsource~15.0~2.36.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaFirefox-devel\", rpm:\"MozillaFirefox-devel~15.0~2.36.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaFirefox-translations-common\", rpm:\"MozillaFirefox-translations-common~15.0~2.36.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaFirefox-translations-other\", rpm:\"MozillaFirefox-translations-other~15.0~2.36.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaThunderbird\", rpm:\"MozillaThunderbird~15.0~33.29.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaThunderbird-buildsymbols\", rpm:\"MozillaThunderbird-buildsymbols~15.0~33.29.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaThunderbird-debuginfo\", rpm:\"MozillaThunderbird-debuginfo~15.0~33.29.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaThunderbird-debugsource\", rpm:\"MozillaThunderbird-debugsource~15.0~33.29.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaThunderbird-devel\", rpm:\"MozillaThunderbird-devel~15.0~33.29.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaThunderbird-devel-debuginfo\", rpm:\"MozillaThunderbird-devel-debuginfo~15.0~33.29.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaThunderbird-translations-common\", rpm:\"MozillaThunderbird-translations-common~15.0~33.29.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaThunderbird-translations-other\", rpm:\"MozillaThunderbird-translations-other~15.0~33.29.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"enigmail\", rpm:\"enigmail~1.4.4+15.0~33.29.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"enigmail-debuginfo\", rpm:\"enigmail-debuginfo~1.4.4+15.0~33.29.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libfreebl3\", rpm:\"libfreebl3~3.13.6~9.17.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libfreebl3-debuginfo\", rpm:\"libfreebl3-debuginfo~3.13.6~9.17.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libsoftokn3\", rpm:\"libsoftokn3~3.13.6~9.17.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libsoftokn3-debuginfo\", rpm:\"libsoftokn3-debuginfo~3.13.6~9.17.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-js\", rpm:\"mozilla-js~15.0~2.35.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-js-debuginfo\", rpm:\"mozilla-js-debuginfo~15.0~2.35.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nspr\", rpm:\"mozilla-nspr~4.9.2~3.6.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nspr-debuginfo\", rpm:\"mozilla-nspr-debuginfo~4.9.2~3.6.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nspr-debugsource\", rpm:\"mozilla-nspr-debugsource~4.9.2~3.6.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nspr-devel\", rpm:\"mozilla-nspr-devel~4.9.2~3.6.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss\", rpm:\"mozilla-nss~3.13.6~9.17.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-certs\", rpm:\"mozilla-nss-certs~3.13.6~9.17.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-certs-debuginfo\", rpm:\"mozilla-nss-certs-debuginfo~3.13.6~9.17.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-debuginfo\", rpm:\"mozilla-nss-debuginfo~3.13.6~9.17.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-debugsource\", rpm:\"mozilla-nss-debugsource~3.13.6~9.17.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-devel\", rpm:\"mozilla-nss-devel~3.13.6~9.17.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-sysinit\", rpm:\"mozilla-nss-sysinit~3.13.6~9.17.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-sysinit-debuginfo\", rpm:\"mozilla-nss-sysinit-debuginfo~3.13.6~9.17.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-tools\", rpm:\"mozilla-nss-tools~3.13.6~9.17.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-tools-debuginfo\", rpm:\"mozilla-nss-tools-debuginfo~3.13.6~9.17.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"seamonkey\", rpm:\"seamonkey~2.12~2.27.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"seamonkey-debuginfo\", rpm:\"seamonkey-debuginfo~2.12~2.27.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"seamonkey-debugsource\", rpm:\"seamonkey-debugsource~2.12~2.27.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"seamonkey-dom-inspector\", rpm:\"seamonkey-dom-inspector~2.12~2.27.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"seamonkey-irc\", rpm:\"seamonkey-irc~2.12~2.27.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"seamonkey-translations-common\", rpm:\"seamonkey-translations-common~2.12~2.27.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"seamonkey-translations-other\", rpm:\"seamonkey-translations-other~2.12~2.27.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"seamonkey-venkman\", rpm:\"seamonkey-venkman~2.12~2.27.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner\", rpm:\"xulrunner~15.0~2.35.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner-buildsymbols\", rpm:\"xulrunner-buildsymbols~15.0~2.35.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner-debuginfo\", rpm:\"xulrunner-debuginfo~15.0~2.35.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner-debugsource\", rpm:\"xulrunner-debugsource~15.0~2.35.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner-devel\", rpm:\"xulrunner-devel~15.0~2.35.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner-devel-debuginfo\", rpm:\"xulrunner-devel-debuginfo~15.0~2.35.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libfreebl3-32bit\", rpm:\"libfreebl3-32bit~3.13.6~9.17.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libfreebl3-debuginfo-32bit\", rpm:\"libfreebl3-debuginfo-32bit~3.13.6~9.17.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libsoftokn3-32bit\", rpm:\"libsoftokn3-32bit~3.13.6~9.17.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libsoftokn3-debuginfo-32bit\", rpm:\"libsoftokn3-debuginfo-32bit~3.13.6~9.17.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-js-32bit\", rpm:\"mozilla-js-32bit~15.0~2.35.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-js-debuginfo-32bit\", rpm:\"mozilla-js-debuginfo-32bit~15.0~2.35.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nspr-32bit\", rpm:\"mozilla-nspr-32bit~4.9.2~3.6.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nspr-debuginfo-32bit\", rpm:\"mozilla-nspr-debuginfo-32bit~4.9.2~3.6.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-32bit\", rpm:\"mozilla-nss-32bit~3.13.6~9.17.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-certs-32bit\", rpm:\"mozilla-nss-certs-32bit~3.13.6~9.17.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-certs-debuginfo-32bit\", rpm:\"mozilla-nss-certs-debuginfo-32bit~3.13.6~9.17.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-debuginfo-32bit\", rpm:\"mozilla-nss-debuginfo-32bit~3.13.6~9.17.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-sysinit-32bit\", rpm:\"mozilla-nss-sysinit-32bit~3.13.6~9.17.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-sysinit-debuginfo-32bit\", rpm:\"mozilla-nss-sysinit-debuginfo-32bit~3.13.6~9.17.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner-32bit\", rpm:\"xulrunner-32bit~15.0~2.35.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner-debuginfo-32bit\", rpm:\"xulrunner-debuginfo-32bit~15.0~2.35.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libfreebl3-debuginfo-x86\", rpm:\"libfreebl3-debuginfo-x86~3.13.6~9.17.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libfreebl3-x86\", rpm:\"libfreebl3-x86~3.13.6~9.17.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libsoftokn3-debuginfo-x86\", rpm:\"libsoftokn3-debuginfo-x86~3.13.6~9.17.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libsoftokn3-x86\", rpm:\"libsoftokn3-x86~3.13.6~9.17.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-js-debuginfo-x86\", rpm:\"mozilla-js-debuginfo-x86~15.0~2.35.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-js-x86\", rpm:\"mozilla-js-x86~15.0~2.35.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nspr-debuginfo-x86\", rpm:\"mozilla-nspr-debuginfo-x86~4.9.2~3.6.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nspr-x86\", rpm:\"mozilla-nspr-x86~4.9.2~3.6.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-certs-debuginfo-x86\", rpm:\"mozilla-nss-certs-debuginfo-x86~3.13.6~9.17.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-certs-x86\", rpm:\"mozilla-nss-certs-x86~3.13.6~9.17.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-debuginfo-x86\", rpm:\"mozilla-nss-debuginfo-x86~3.13.6~9.17.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-sysinit-debuginfo-x86\", rpm:\"mozilla-nss-sysinit-debuginfo-x86~3.13.6~9.17.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-sysinit-x86\", rpm:\"mozilla-nss-sysinit-x86~3.13.6~9.17.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-x86\", rpm:\"mozilla-nss-x86~3.13.6~9.17.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner-debuginfo-x86\", rpm:\"xulrunner-debuginfo-x86~15.0~2.35.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner-x86\", rpm:\"xulrunner-x86~15.0~2.35.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-12-04T11:21:01", "description": "Ubuntu Update for Linux kernel vulnerabilities USN-1551-2", "cvss3": {}, "published": "2012-10-03T00:00:00", "type": "openvas", "title": "Ubuntu Update for thunderbird USN-1551-2", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-1970", "CVE-2012-1973", "CVE-2012-1974", "CVE-2012-3968", "CVE-2012-3963", "CVE-2012-1956", "CVE-2012-3978", "CVE-2012-1972", "CVE-2012-3962", "CVE-2012-3969", "CVE-2012-3970", "CVE-2012-3957", "CVE-2012-3958", "CVE-2012-1975", "CVE-2012-3956", "CVE-2012-3966", "CVE-2012-3967", "CVE-2012-3959", "CVE-2012-3975", "CVE-2012-3980", "CVE-2012-3960", "CVE-2012-1971", "CVE-2012-1976", "CVE-2012-3972", "CVE-2012-3964", "CVE-2012-3961", "CVE-2012-3971"], "modified": "2017-12-01T00:00:00", "id": "OPENVAS:841165", "href": "http://plugins.openvas.org/nasl.php?oid=841165", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_1551_2.nasl 7960 2017-12-01 06:58:16Z santu $\n#\n# Ubuntu Update for thunderbird USN-1551-2\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"USN-1551-1 fixed vulnerabilities in Thunderbird. The new package caused a\n regression in the message editor and certain performance regressions as\n well. This update fixes the problems.\n\n Original advisory details:\n \n Gary Kwong, Christian Holler, Jesse Ruderman, Steve Fink, Bob Clary, Andrew\n Sutherland, Jason Smith, John Schoenick, Vladimir Vukicevic and Daniel\n Holbert discovered memory safety issues affecting Thunderbird. If the user\n were tricked into opening a specially crafted E-Mail, an attacker could\n exploit these to cause a denial of service via application crash, or\n potentially execute code with the privileges of the user invoking\n Thunderbird. (CVE-2012-1970, CVE-2012-1971)\n \n Abhishek Arya discovered multiple use-after-free vulnerabilities. If the\n user were tricked into opening a specially crafted E-Mail, an attacker\n could exploit these to cause a denial of service via application crash, or\n potentially execute code with the privileges of the user invoking\n Thunderbird. (CVE-2012-1972, CVE-2012-1973, CVE-2012-1974, CVE-2012-1975,\n CVE-2012-1976, CVE-2012-3956, CVE-2012-3957, CVE-2012-3958, CVE-2012-3959,\n CVE-2012-3960, CVE-2012-3961, CVE-2012-3962, CVE-2012-3963, CVE-2012-3964)\n \n Mariusz Mlynsk discovered that it is possible to shadow the location object\n using Object.defineProperty. This could potentially result in a cross-site\n scripting (XSS) attack against plugins. With cross-site scripting\n vulnerabilities, if a user were tricked into viewing a specially crafted\n E-Mail, a remote attacker could exploit this to modify the contents or\n steal confidential data within the same domain. (CVE-2012-1956)\n \n Frédéric Hoguin discovered that bitmap format images with a negative height\n could potentially result in memory corruption. If the user were tricked\n into opening a specially crafted image, an attacker could exploit this to\n cause a denial of service via application crash, or potentially execute\n code with the privileges of the user invoking Thunderbird. (CVE-2012-3966)\n \n It was discovered that Thunderbird's WebGL implementation was vulnerable to\n multiple memory safety issues. If the user were tricked into opening a\n specially crafted E-Mail, an attacker could exploit these to cause a denial\n of service via application crash, or potentially execute code with the\n privileges of the user invoking Thunderbird. (CVE-2012-3967, CVE-2012-3968)\n \n Arthur Gerkis discovered multiple memory safety issues in Thunderbird's\n Scalable Vector Graphics (SVG) implementation. ... \n\n Description truncated, for more information please check the Reference URL\";\n\ntag_summary = \"Ubuntu Update for Linux kernel vulnerabilities USN-1551-2\";\ntag_affected = \"thunderbird on Ubuntu 12.04 LTS ,\n Ubuntu 11.10 ,\n Ubuntu 11.04 ,\n Ubuntu 10.04 LTS\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name: \"URL\" , value: \"http://www.ubuntu.com/usn/usn-1551-2/\");\n script_id(841165);\n script_version(\"$Revision: 7960 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-01 07:58:16 +0100 (Fri, 01 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2012-10-03 09:22:19 +0530 (Wed, 03 Oct 2012)\");\n script_cve_id(\"CVE-2012-1970\", \"CVE-2012-1971\", \"CVE-2012-1972\", \"CVE-2012-1973\",\n \"CVE-2012-1974\", \"CVE-2012-1975\", \"CVE-2012-1976\", \"CVE-2012-3956\",\n \"CVE-2012-3957\", \"CVE-2012-3958\", \"CVE-2012-3959\", \"CVE-2012-3960\",\n \"CVE-2012-3961\", \"CVE-2012-3962\", \"CVE-2012-3963\", \"CVE-2012-3964\",\n \"CVE-2012-1956\", \"CVE-2012-3966\", \"CVE-2012-3967\", \"CVE-2012-3968\",\n \"CVE-2012-3969\", \"CVE-2012-3970\", \"CVE-2012-3971\", \"CVE-2012-3972\",\n \"CVE-2012-3975\", \"CVE-2012-3978\", \"CVE-2012-3980\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"USN\", value: \"1551-2\");\n script_name(\"Ubuntu Update for thunderbird USN-1551-2\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\");\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"UBUNTU10.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"thunderbird\", ver:\"15.0.1+build1-0ubuntu0.10.04.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU12.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"thunderbird\", ver:\"15.0.1+build1-0ubuntu0.12.04.1\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"thunderbird-globalmenu\", ver:\"15.0.1+build1-0ubuntu0.12.04.1\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU11.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"thunderbird\", ver:\"15.0.1+build1-0ubuntu0.11.10.1\", rls:\"UBUNTU11.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"thunderbird-globalmenu\", ver:\"15.0.1+build1-0ubuntu0.11.10.1\", rls:\"UBUNTU11.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU11.04\")\n{\n\n if ((res = isdpkgvuln(pkg:\"thunderbird\", ver:\"15.0.1+build1-0ubuntu0.11.04.1\", rls:\"UBUNTU11.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"thunderbird-globalmenu\", ver:\"15.0.1+build1-0ubuntu0.11.04.1\", rls:\"UBUNTU11.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2020-01-31T18:41:34", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2012-12-13T00:00:00", "type": "openvas", "title": "openSUSE: Security Advisory for MozillaFirefox (openSUSE-SU-2012:1064-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-1970", "CVE-2012-1973", "CVE-2012-1974", "CVE-2012-3968", "CVE-2012-3963", "CVE-2012-1956", "CVE-2012-3978", "CVE-2012-3976", "CVE-2012-1972", "CVE-2012-3962", "CVE-2012-3969", "CVE-2012-3970", "CVE-2012-3957", "CVE-2012-3958", "CVE-2012-3973", "CVE-2012-1975", "CVE-2012-3956", "CVE-2012-3966", "CVE-2012-3967", "CVE-2012-3965", "CVE-2012-3959", "CVE-2012-3975", "CVE-2012-3980", "CVE-2012-3960", "CVE-2012-1976", "CVE-2012-3972", "CVE-2012-3964", "CVE-2012-3961", "CVE-2012-3971"], "modified": "2020-01-31T00:00:00", "id": "OPENVAS:1361412562310850319", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310850319", "sourceData": "# Copyright (C) 2012 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) of their respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along wi