Debian DSA-2187-1: Icedove - multiple vulnerabilities discovere
Reporter | Title | Published | Views | Family All 198 |
---|---|---|---|---|
OpenVAS | Debian Security Advisory DSA 2180-1 (iceape) | 9 Mar 201100:00 | – | openvas |
OpenVAS | Debian: Security Advisory (DSA-2187-1) | 12 May 201100:00 | – | openvas |
OpenVAS | Debian Security Advisory DSA 2187-1 (icedove) | 12 May 201100:00 | – | openvas |
OpenVAS | Debian Security Advisory DSA 2186-1 (iceweasel) | 12 May 201100:00 | – | openvas |
OpenVAS | Debian: Security Advisory (DSA-2186-1) | 12 May 201100:00 | – | openvas |
OpenVAS | Debian: Security Advisory (DSA-2180-1) | 9 Mar 201100:00 | – | openvas |
OpenVAS | Mozilla Products Multiple Vulnerabilities March-11 (Windows) | 10 Mar 201100:00 | – | openvas |
OpenVAS | Mozilla Products Multiple Vulnerabilities (MFSA2011-02, MFSA2011-03, MFSA2011-04, MFSA2011-05, MFSA2011-06, MFSA2011-07) - Windows | 10 Mar 201100:00 | – | openvas |
OpenVAS | Ubuntu: Security Advisory (USN-1049-2) | 15 Mar 201100:00 | – | openvas |
OpenVAS | Oracle: Security Advisory (ELSA-2011-0310) | 6 Oct 201500:00 | – | openvas |
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Debian Security Advisory DSA-2187. The text
# itself is copyright (C) Software in the Public Interest, Inc.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(52619);
script_version("1.18");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/04");
script_cve_id("CVE-2010-1585", "CVE-2011-0051", "CVE-2011-0053", "CVE-2011-0054", "CVE-2011-0055", "CVE-2011-0056", "CVE-2011-0057", "CVE-2011-0059");
script_bugtraq_id(46643, 46645, 46648, 46650, 46652, 46661, 46663);
script_xref(name:"DSA", value:"2187");
script_name(english:"Debian DSA-2187-1 : icedove - several vulnerabilities");
script_summary(english:"Checks dpkg output for the updated package");
script_set_attribute(
attribute:"synopsis",
value:"The remote Debian host is missing a security-related update."
);
script_set_attribute(
attribute:"description",
value:
"Several vulnerabilities have been discovered in Icedove, an unbranded
version of the Thunderbird mail/news client.
- CVE-2010-1585
Roberto Suggi Liverani discovered that the sanitising
performed by ParanoidFragmentSink was incomplete.
- CVE-2011-0051
Zach Hoffmann discovered that incorrect parsing of
recursive eval() calls could lead to attackers forcing
acceptance of a confirmation dialogue.
- CVE-2011-0053
Crashes in the layout engine may lead to the execution
of arbitrary code.
- CVE-2011-0054, CVE-2010-0056
Christian Holler discovered buffer overflows in the
JavaScript engine, which could allow the execution of
arbitrary code.
- CVE-2011-0055
'regenrecht' and Igor Bukanov discovered a
use-after-free error in the JSON-Implementation, which
could lead to the execution of arbitrary code.
- CVE-2011-0057
Daniel Kozlowski discovered that incorrect memory
handling the web workers implementation could lead to
the execution of arbitrary code.
- CVE-2011-0059
Peleus Uhley discovered a cross-site request forgery
risk in the plugin code.
As indicated in the Lenny (oldstable) release notes, security support
for the Icedove packages in the oldstable needed to be stopped before
the end of the regular Lenny security maintenance life cycle. You are
strongly encouraged to upgrade to stable or switch to a different mail
client."
);
script_set_attribute(
attribute:"see_also",
value:"https://security-tracker.debian.org/tracker/CVE-2010-1585"
);
script_set_attribute(
attribute:"see_also",
value:"https://security-tracker.debian.org/tracker/CVE-2011-0051"
);
script_set_attribute(
attribute:"see_also",
value:"https://security-tracker.debian.org/tracker/CVE-2011-0053"
);
script_set_attribute(
attribute:"see_also",
value:"https://security-tracker.debian.org/tracker/CVE-2011-0054"
);
script_set_attribute(
attribute:"see_also",
value:"https://security-tracker.debian.org/tracker/CVE-2010-0056"
);
script_set_attribute(
attribute:"see_also",
value:"https://security-tracker.debian.org/tracker/CVE-2011-0055"
);
script_set_attribute(
attribute:"see_also",
value:"https://security-tracker.debian.org/tracker/CVE-2011-0057"
);
script_set_attribute(
attribute:"see_also",
value:"https://security-tracker.debian.org/tracker/CVE-2011-0059"
);
script_set_attribute(
attribute:"see_also",
value:"https://packages.debian.org/source/squeeze/icedove"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.debian.org/security/2011/dsa-2187"
);
script_set_attribute(
attribute:"solution",
value:
"Upgrade the icedove packages.
For the stable distribution (squeeze), this problem has been fixed in
version 3.0.11-1+squeeze1."
);
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:ND/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:icedove");
script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:6.0");
script_set_attribute(attribute:"patch_publication_date", value:"2011/03/09");
script_set_attribute(attribute:"plugin_publication_date", value:"2011/03/11");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2011-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"Debian Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l");
exit(0);
}
include("audit.inc");
include("debian_package.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian");
if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING);
flag = 0;
if (deb_check(release:"6.0", prefix:"icedove", reference:"3.0.11-1+squeeze1")) flag++;
if (deb_check(release:"6.0", prefix:"icedove-dbg", reference:"3.0.11-1+squeeze1")) flag++;
if (deb_check(release:"6.0", prefix:"icedove-dev", reference:"3.0.11-1+squeeze1")) flag++;
if (flag)
{
if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());
else security_hole(0);
exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo