Lucene search

K
nessusThis script is Copyright (C) 2005-2018 Tenable Network Security, Inc.MOZILLA_FIREFOX_106.NASL
HistorySep 17, 2005 - 12:00 a.m.

Firefox < 1.0.7 Multiple Vulnerabilities

2005-09-1700:00:00
This script is Copyright (C) 2005-2018 Tenable Network Security, Inc.
www.tenable.com
8

The remote host is using Firefox, an alternative web browser.

The installed version of Firefox contains various security issues, several of which are critical as they can be easily exploited to execute arbitrary shell code on the remote host.

#
# (C) Tenable Network Security, Inc.
#



include("compat.inc");

if (description) {
  script_id(19719);
  script_version("1.31");

  script_cve_id(
    "CVE-2005-2602", 
    "CVE-2005-2701", 
    "CVE-2005-2702", 
    "CVE-2005-2703", 
    "CVE-2005-2704",
    "CVE-2005-2705", 
    "CVE-2005-2706", 
    "CVE-2005-2707", 
    "CVE-2005-2871", 
    "CVE-2005-3089"
  );
  script_bugtraq_id(
    14526, 
    14784, 
    14916, 
    14917, 
    14918, 
    14919, 
    14920, 
    14921, 
    14923, 
    14924
  );

  script_name(english:"Firefox < 1.0.7 Multiple Vulnerabilities");

 script_set_attribute(attribute:"synopsis", value:
"A web browser on the remote host is prone to multiple flaws, including
arbitrary code execution." );
 script_set_attribute(attribute:"description", value:
"The remote host is using Firefox, an alternative web browser. 

The installed version of Firefox contains various security issues,
several of which are critical as they can be easily exploited to
execute arbitrary shell code on the remote host." );
 script_set_attribute(attribute:"see_also", value:"https://www.securityfocus.com/archive/1/407704");
 script_set_attribute(attribute:"see_also", value:"http://security-protocols.com/advisory/sp-x17-advisory.txt");
 # http://web.archive.org/web/20100329062735/http://www.mozilla.org/security/idn.html
 script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?11c09cbe");
 script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2005-58/");
 script_set_attribute(attribute:"solution", value:
"Upgrade to Firefox 1.0.7 or later." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
 script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"true");
 script_cwe_id(94);

 script_set_attribute(attribute:"plugin_publication_date", value: "2005/09/17");
 script_set_attribute(attribute:"vuln_publication_date", value: "2005/08/09");
 script_set_attribute(attribute:"patch_publication_date", value: "2005/09/09");
 script_cvs_date("Date: 2018/11/15 20:50:27");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/a:mozilla:firefox");
script_end_attributes();

  script_summary(english:"Determines the version of Firefox");
  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");
  script_copyright(english:"This script is Copyright (C) 2005-2018 Tenable Network Security, Inc.");
  script_dependencies("mozilla_org_installed.nasl");
  script_require_keys("Mozilla/Firefox/Version");
  exit(0);
}

include("mozilla_version.inc");
port = get_kb_item_or_exit("SMB/transport"); 

installs = get_kb_list("SMB/Mozilla/Firefox/*");
if (isnull(installs)) audit(AUDIT_NOT_INST, "Firefox");

mozilla_check_version(installs:installs, product:'firefox', esr:FALSE, fix:'1.0.7', severity:SECURITY_HOLE);
VendorProductVersionCPE
mozillafirefoxcpe:/a:mozilla:firefox