Lucene search

K
nessusThis script is Copyright (C) 2005-2021 and is owned by Tenable, Inc. or an Affiliate thereof.GENTOO_GLSA-200503-30.NASL
HistoryMar 25, 2005 - 12:00 a.m.

GLSA-200503-30 : Mozilla Suite: Multiple vulnerabilities

2005-03-2500:00:00
This script is Copyright (C) 2005-2021 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
11

The remote host is affected by the vulnerability described in GLSA-200503-30 (Mozilla Suite: Multiple vulnerabilities)

The following vulnerabilities were found and fixed in the Mozilla     Suite:
Mark Dowd from ISS X-Force reported an exploitable     heap overrun in the GIF processing of obsolete Netscape extension 2     (CAN-2005-0399)     Michael Krax reported that plugins can be used     to load privileged content and trick the user to interact with it     (CAN-2005-0232, CAN-2005-0527)     Michael Krax also reported     potential spoofing or cross-site-scripting issues through overlapping     windows, image or scrollbar drag-and-drop, and by dropping javascript:
links on tabs (CAN-2005-0230, CAN-2005-0231, CAN-2005-0401,     CAN-2005-0591)     Daniel de Wildt and Gael Delalleau discovered a     memory overwrite in a string library (CAN-2005-0255)     Wind Li     discovered a possible heap overflow in UTF8 to Unicode conversion     (CAN-2005-0592)     Eric Johanson reported that Internationalized     Domain Name (IDN) features allow homograph attacks (CAN-2005-0233)     Mook, Doug Turner, Kohei Yoshino and M. Deaudelin reported various     ways of spoofing the SSL 'secure site' indicator (CAN-2005-0593)     Georgi Guninski discovered that XSLT can include stylesheets from     arbitrary hosts (CAN-2005-0588)     Secunia discovered a way of     injecting content into a popup opened by another website     (CAN-2004-1156)     Phil Ringnalda reported a possible way to     spoof Install source with user:pass@host (CAN-2005-0590)     Jakob     Balle from Secunia discovered a possible way of spoofing the Download     dialog source (CAN-2005-0585)     Christian Schmidt reported a     potential spoofing issue in HTTP auth prompt tab (CAN-2005-0584)     Finally, Tavis Ormandy of the Gentoo Linux Security Audit Team     discovered that Mozilla insecurely creates temporary filenames in     /tmp/plugtmp (CAN-2005-0578)   Impact :

The GIF heap overflow could be triggered by a malicious GIF     image that would end up executing arbitrary code with the rights of the     user running Mozilla. The other overflow issues, while not thought to     be exploitable, would have the same impact     By setting up     malicious websites and convincing users to follow untrusted links or     obey very specific drag-and-drop or download instructions, attackers     may leverage the various spoofing issues to fake other websites to get     access to confidential information, push users to download malicious     files or make them interact with their browser preferences     The     temporary directory issue allows local attackers to overwrite arbitrary     files with the rights of another local user   Workaround :

There is no known workaround at this time.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Gentoo Linux Security Advisory GLSA 200503-30.
#
# The advisory text is Copyright (C) 2001-2018 Gentoo Foundation, Inc.
# and licensed under the Creative Commons - Attribution / Share Alike 
# license. See http://creativecommons.org/licenses/by-sa/3.0/
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(17619);
  script_version("1.19");
  script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/06");

  script_cve_id("CVE-2004-1156", "CVE-2005-0230", "CVE-2005-0231", "CVE-2005-0232", "CVE-2005-0233", "CVE-2005-0255", "CVE-2005-0399", "CVE-2005-0401", "CVE-2005-0527", "CVE-2005-0578", "CVE-2005-0584", "CVE-2005-0585", "CVE-2005-0588", "CVE-2005-0590", "CVE-2005-0591", "CVE-2005-0592", "CVE-2005-0593");
  script_xref(name:"GLSA", value:"200503-30");

  script_name(english:"GLSA-200503-30 : Mozilla Suite: Multiple vulnerabilities");
  script_summary(english:"Checks for updated package(s) in /var/db/pkg");

  script_set_attribute(
    attribute:"synopsis", 
    value:
"The remote Gentoo host is missing one or more security-related
patches."
  );
  script_set_attribute(
    attribute:"description", 
    value:
"The remote host is affected by the vulnerability described in GLSA-200503-30
(Mozilla Suite: Multiple vulnerabilities)

    The following vulnerabilities were found and fixed in the Mozilla
    Suite:
    Mark Dowd from ISS X-Force reported an exploitable
    heap overrun in the GIF processing of obsolete Netscape extension 2
    (CAN-2005-0399)
    Michael Krax reported that plugins can be used
    to load privileged content and trick the user to interact with it
    (CAN-2005-0232, CAN-2005-0527)
    Michael Krax also reported
    potential spoofing or cross-site-scripting issues through overlapping
    windows, image or scrollbar drag-and-drop, and by dropping javascript:
    links on tabs (CAN-2005-0230, CAN-2005-0231, CAN-2005-0401,
    CAN-2005-0591)
    Daniel de Wildt and Gael Delalleau discovered a
    memory overwrite in a string library (CAN-2005-0255)
    Wind Li
    discovered a possible heap overflow in UTF8 to Unicode conversion
    (CAN-2005-0592)
    Eric Johanson reported that Internationalized
    Domain Name (IDN) features allow homograph attacks (CAN-2005-0233)
    Mook, Doug Turner, Kohei Yoshino and M. Deaudelin reported various
    ways of spoofing the SSL 'secure site' indicator (CAN-2005-0593)
    Georgi Guninski discovered that XSLT can include stylesheets from
    arbitrary hosts (CAN-2005-0588)
    Secunia discovered a way of
    injecting content into a popup opened by another website
    (CAN-2004-1156)
    Phil Ringnalda reported a possible way to
    spoof Install source with user:pass@host (CAN-2005-0590)
    Jakob
    Balle from Secunia discovered a possible way of spoofing the Download
    dialog source (CAN-2005-0585)
    Christian Schmidt reported a
    potential spoofing issue in HTTP auth prompt tab (CAN-2005-0584)
    Finally, Tavis Ormandy of the Gentoo Linux Security Audit Team
    discovered that Mozilla insecurely creates temporary filenames in
    /tmp/plugtmp (CAN-2005-0578)
  
Impact :

    The GIF heap overflow could be triggered by a malicious GIF
    image that would end up executing arbitrary code with the rights of the
    user running Mozilla. The other overflow issues, while not thought to
    be exploitable, would have the same impact
    By setting up
    malicious websites and convincing users to follow untrusted links or
    obey very specific drag-and-drop or download instructions, attackers
    may leverage the various spoofing issues to fake other websites to get
    access to confidential information, push users to download malicious
    files or make them interact with their browser preferences
    The
    temporary directory issue allows local attackers to overwrite arbitrary
    files with the rights of another local user
  
Workaround :

    There is no known workaround at this time."
  );
  # http://www.mozilla.org/projects/security/known-vulnerabilities.html
  script_set_attribute(
    attribute:"see_also",
    value:"https://www.mozilla.org/en-US/security/known-vulnerabilities/"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://security.gentoo.org/glsa/200503-30"
  );
  script_set_attribute(
    attribute:"solution", 
    value:
"All Mozilla Suite users should upgrade to the latest version:
    # emerge --sync
    # emerge --ask --oneshot --verbose '>=www-client/mozilla-1.7.6'
    All Mozilla Suite binary users should upgrade to the latest
    version:
    # emerge --sync
    # emerge --ask --oneshot --verbose '>=www-client/mozilla-bin-1.7.6'"
  );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:mozilla");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:mozilla-bin");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:gentoo:linux");

  script_set_attribute(attribute:"patch_publication_date", value:"2005/03/25");
  script_set_attribute(attribute:"plugin_publication_date", value:"2005/03/25");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2005-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
  script_family(english:"Gentoo Local Security Checks");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/Gentoo/release", "Host/Gentoo/qpkg-list");

  exit(0);
}


include("audit.inc");
include("global_settings.inc");
include("qpkg.inc");

if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/Gentoo/release")) audit(AUDIT_OS_NOT, "Gentoo");
if (!get_kb_item("Host/Gentoo/qpkg-list")) audit(AUDIT_PACKAGE_LIST_MISSING);


flag = 0;

if (qpkg_check(package:"www-client/mozilla", unaffected:make_list("ge 1.7.6"), vulnerable:make_list("lt 1.7.6"))) flag++;
if (qpkg_check(package:"www-client/mozilla-bin", unaffected:make_list("ge 1.7.6"), vulnerable:make_list("lt 1.7.6"))) flag++;

if (flag)
{
  if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());
  else security_hole(0);
  exit(0);
}
else
{
  tested = qpkg_tests_get();
  if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
  else audit(AUDIT_PACKAGE_NOT_INSTALLED, "Mozilla Suite");
}
VendorProductVersionCPE
gentoolinuxmozillap-cpe:/a:gentoo:linux:mozilla
gentoolinuxmozilla-binp-cpe:/a:gentoo:linux:mozilla-bin
gentoolinuxcpe:/o:gentoo:linux

References