Mozilla Firefox update to version 1.5.0.8 fixes flaws in JavaScript processing and web page rendering
Reporter | Title | Published | Views | Family All 111 |
---|---|---|---|---|
Tenable Nessus | Fedora Core 5 : firefox-1.5.0.8-1.fc5 (2006-1199) | 17 Jan 200700:00 | – | nessus |
Tenable Nessus | Fedora Core 6 : thunderbird-1.5.0.8-1.fc6 (2006-1192) | 17 Jan 200700:00 | – | nessus |
Tenable Nessus | SeaMonkey < 1.0.6 Multiple Vulnerabilities | 8 Nov 200600:00 | – | nessus |
Tenable Nessus | Mozilla Thunderbird < 1.5.0.8 Multiple Vulnerabilities | 8 Nov 200600:00 | – | nessus |
Tenable Nessus | openSUSE 10 Security Update : MozillaFirefox (MozillaFirefox-2251) | 17 Oct 200700:00 | – | nessus |
Tenable Nessus | GLSA-200612-06 : Mozilla Thunderbird: Multiple vulnerabilities | 14 Dec 200600:00 | – | nessus |
Tenable Nessus | Fedora Core 5 : thunderbird-1.5.0.8-1.fc5 (2006-1194) | 17 Jan 200700:00 | – | nessus |
Tenable Nessus | Firefox < 1.5.0.8 Multiple Vulnerabilities | 8 Nov 200600:00 | – | nessus |
Tenable Nessus | openSUSE 10 Security Update : seamonkey (seamonkey-2250) | 17 Oct 200700:00 | – | nessus |
Tenable Nessus | CentOS 3 / 4 : seamonkey (CESA-2006:0734) | 23 Apr 200900:00 | – | nessus |
Source | Link |
---|---|
nessus | www.nessus.org/u |
nessus | www.nessus.org/u |
nessus | www.nessus.org/u |
nessus | www.nessus.org/u |
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Fedora Security Advisory 2006-1191.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(24044);
script_version("1.17");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/11");
script_xref(name:"FEDORA", value:"2006-1191");
script_name(english:"Fedora Core 6 : devhelp-0.12-8.fc6 / epiphany-2.16.0-5.fc6 / firefox-1.5.0.8-1.fc6 / etc (2006-1191)");
script_summary(english:"Checks rpm output for the updated packages.");
script_set_attribute(
attribute:"synopsis",
value:"The remote Fedora Core host is missing one or more security updates."
);
script_set_attribute(
attribute:"description",
value:
"Mozilla Firefox is an open source Web browser.
Several flaws were found in the way Firefox processes certain
malformed JavaScript code. A malicious web page could cause the
execution of JavaScript code in such a way that could cause Firefox to
crash or execute arbitrary code as the user running Firefox.
(CVE-2006-5463, CVE-2006-5747, CVE-2006-5748)
Several flaws were found in the way Firefox renders web pages. A
malicious web page could cause the browser to crash or possibly
execute arbitrary code as the user running Firefox. (CVE-2006-5464)
Users of Firefox are advised to upgrade to these erratum packages,
which contain Firefox version 1.5.0.8 that corrects these issues.
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues."
);
# https://lists.fedoraproject.org/pipermail/package-announce/2006-November/000834.html
script_set_attribute(
attribute:"see_also",
value:"http://www.nessus.org/u?fd357d17"
);
# https://lists.fedoraproject.org/pipermail/package-announce/2006-November/000835.html
script_set_attribute(
attribute:"see_also",
value:"http://www.nessus.org/u?066471eb"
);
# https://lists.fedoraproject.org/pipermail/package-announce/2006-November/000836.html
script_set_attribute(
attribute:"see_also",
value:"http://www.nessus.org/u?6be94064"
);
# https://lists.fedoraproject.org/pipermail/package-announce/2006-November/000837.html
script_set_attribute(
attribute:"see_also",
value:"http://www.nessus.org/u?8e733cca"
);
script_set_attribute(attribute:"solution", value:"Update the affected packages.");
script_set_attribute(attribute:"risk_factor", value:"High");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:devhelp");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:devhelp-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:devhelp-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:epiphany");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:epiphany-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:epiphany-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:firefox");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:firefox-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:firefox-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:yelp");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:yelp-debuginfo");
script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora_core:6");
script_set_attribute(attribute:"patch_publication_date", value:"2006/11/08");
script_set_attribute(attribute:"plugin_publication_date", value:"2007/01/17");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2007-2021 Tenable Network Security, Inc.");
script_family(english:"Fedora Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/RedHat/release");
if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
os_ver = os_ver[1];
if (! ereg(pattern:"^6([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 6.x", "Fedora " + os_ver);
if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
flag = 0;
if (rpm_check(release:"FC6", reference:"devhelp-0.12-8.fc6")) flag++;
if (rpm_check(release:"FC6", reference:"devhelp-debuginfo-0.12-8.fc6")) flag++;
if (rpm_check(release:"FC6", reference:"devhelp-devel-0.12-8.fc6")) flag++;
if (rpm_check(release:"FC6", reference:"epiphany-2.16.0-5.fc6")) flag++;
if (rpm_check(release:"FC6", reference:"epiphany-debuginfo-2.16.0-5.fc6")) flag++;
if (rpm_check(release:"FC6", reference:"epiphany-devel-2.16.0-5.fc6")) flag++;
if (rpm_check(release:"FC6", reference:"firefox-1.5.0.8-1.fc6")) flag++;
if (rpm_check(release:"FC6", reference:"firefox-debuginfo-1.5.0.8-1.fc6")) flag++;
if (rpm_check(release:"FC6", reference:"firefox-devel-1.5.0.8-1.fc6")) flag++;
if (rpm_check(release:"FC6", reference:"yelp-2.16.0-10.fc6")) flag++;
if (rpm_check(release:"FC6", reference:"yelp-debuginfo-2.16.0-10.fc6")) flag++;
if (flag)
{
if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
else security_hole(0);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "devhelp / devhelp-debuginfo / devhelp-devel / epiphany / etc");
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo