New upstream.
Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Fedora Security Advisory 2013-23519.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(71505);
script_version("1.5");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/11");
script_cve_id("CVE-2013-5609", "CVE-2013-5610", "CVE-2013-5611", "CVE-2013-5612", "CVE-2013-5613", "CVE-2013-5614", "CVE-2013-5615", "CVE-2013-5616", "CVE-2013-5618", "CVE-2013-5619", "CVE-2013-6629", "CVE-2013-6630", "CVE-2013-6671", "CVE-2013-6672", "CVE-2013-6673");
script_xref(name:"FEDORA", value:"2013-23519");
script_name(english:"Fedora 20 : firefox-26.0-3.fc20 / thunderbird-24.2.0-3.fc20 / xulrunner-26.0-2.fc20 (2013-23519)");
script_summary(english:"Checks rpm output for the updated packages.");
script_set_attribute(
attribute:"synopsis",
value:"The remote Fedora host is missing one or more security updates."
);
script_set_attribute(
attribute:"description",
value:
"New upstream.
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues."
);
# https://lists.fedoraproject.org/pipermail/package-announce/2013-December/124255.html
script_set_attribute(
attribute:"see_also",
value:"http://www.nessus.org/u?4eabafc3"
);
# https://lists.fedoraproject.org/pipermail/package-announce/2013-December/124256.html
script_set_attribute(
attribute:"see_also",
value:"http://www.nessus.org/u?9e57c332"
);
# https://lists.fedoraproject.org/pipermail/package-announce/2013-December/124257.html
script_set_attribute(
attribute:"see_also",
value:"http://www.nessus.org/u?776a9916"
);
script_set_attribute(
attribute:"solution",
value:"Update the affected firefox, thunderbird and / or xulrunner packages."
);
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:firefox");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:thunderbird");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:xulrunner");
script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:20");
script_set_attribute(attribute:"patch_publication_date", value:"2013/12/17");
script_set_attribute(attribute:"plugin_publication_date", value:"2013/12/18");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2013-2021 Tenable Network Security, Inc.");
script_family(english:"Fedora Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/RedHat/release");
if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
os_ver = os_ver[1];
if (! ereg(pattern:"^20([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 20.x", "Fedora " + os_ver);
if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
flag = 0;
if (rpm_check(release:"FC20", reference:"firefox-26.0-3.fc20")) flag++;
if (rpm_check(release:"FC20", reference:"thunderbird-24.2.0-3.fc20")) flag++;
if (rpm_check(release:"FC20", reference:"xulrunner-26.0-2.fc20")) flag++;
if (flag)
{
if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
else security_hole(0);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "firefox / thunderbird / xulrunner");
}
Vendor | Product | Version | CPE |
---|---|---|---|
fedoraproject | fedora | firefox | p-cpe:/a:fedoraproject:fedora:firefox |
fedoraproject | fedora | thunderbird | p-cpe:/a:fedoraproject:fedora:thunderbird |
fedoraproject | fedora | xulrunner | p-cpe:/a:fedoraproject:fedora:xulrunner |
fedoraproject | fedora | 20 | cpe:/o:fedoraproject:fedora:20 |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5609
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5610
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5611
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5612
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5613
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5614
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5615
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5616
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5618
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5619
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6629
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6630
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6671
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6672
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6673
www.nessus.org/u?4eabafc3
www.nessus.org/u?776a9916
www.nessus.org/u?9e57c332