The remote host is using Firefox, an alternative web browser.
The installed version of Firefox contains various security issues, several of which are critical as they can be easily exploited to execute arbitrary shell code on the remote host.
#
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description) {
script_id(19719);
script_version("1.31");
script_cve_id(
"CVE-2005-2602",
"CVE-2005-2701",
"CVE-2005-2702",
"CVE-2005-2703",
"CVE-2005-2704",
"CVE-2005-2705",
"CVE-2005-2706",
"CVE-2005-2707",
"CVE-2005-2871",
"CVE-2005-3089"
);
script_bugtraq_id(
14526,
14784,
14916,
14917,
14918,
14919,
14920,
14921,
14923,
14924
);
script_name(english:"Firefox < 1.0.7 Multiple Vulnerabilities");
script_set_attribute(attribute:"synopsis", value:
"A web browser on the remote host is prone to multiple flaws, including
arbitrary code execution." );
script_set_attribute(attribute:"description", value:
"The remote host is using Firefox, an alternative web browser.
The installed version of Firefox contains various security issues,
several of which are critical as they can be easily exploited to
execute arbitrary shell code on the remote host." );
script_set_attribute(attribute:"see_also", value:"https://www.securityfocus.com/archive/1/407704");
script_set_attribute(attribute:"see_also", value:"http://security-protocols.com/advisory/sp-x17-advisory.txt");
# http://web.archive.org/web/20100329062735/http://www.mozilla.org/security/idn.html
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?11c09cbe");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2005-58/");
script_set_attribute(attribute:"solution", value:
"Upgrade to Firefox 1.0.7 or later." );
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_cwe_id(94);
script_set_attribute(attribute:"plugin_publication_date", value: "2005/09/17");
script_set_attribute(attribute:"vuln_publication_date", value: "2005/08/09");
script_set_attribute(attribute:"patch_publication_date", value: "2005/09/09");
script_cvs_date("Date: 2018/11/15 20:50:27");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/a:mozilla:firefox");
script_end_attributes();
script_summary(english:"Determines the version of Firefox");
script_category(ACT_GATHER_INFO);
script_family(english:"Windows");
script_copyright(english:"This script is Copyright (C) 2005-2018 Tenable Network Security, Inc.");
script_dependencies("mozilla_org_installed.nasl");
script_require_keys("Mozilla/Firefox/Version");
exit(0);
}
include("mozilla_version.inc");
port = get_kb_item_or_exit("SMB/transport");
installs = get_kb_list("SMB/Mozilla/Firefox/*");
if (isnull(installs)) audit(AUDIT_NOT_INST, "Firefox");
mozilla_check_version(installs:installs, product:'firefox', esr:FALSE, fix:'1.0.7', severity:SECURITY_HOLE);
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2602
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2701
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2702
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2703
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2704
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2705
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2706
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2707
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2871
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3089
security-protocols.com/advisory/sp-x17-advisory.txt
www.nessus.org/u?11c09cbe
www.mozilla.org/en-US/security/advisories/mfsa2005-58/
www.securityfocus.com/archive/1/407704