The installed version of Firefox ESR 17.x is earlier than 17.0.5, and thus, is potentially affected by the following vulnerabilities :
Various memory safety issue exist. (CVE-2013-0788)
An out-of-bounds memory read error exists related to ‘CERT_DecodeCertPackage’ and certificate decoding.
(CVE-2013-0791)
An error exists related to navigation, history and improper ‘baseURI’ property values that could allow cross-site scripting attacks. (CVE-2013-0793)
A error exists related to ‘cloneNode’ that can allow ‘System Only Wrapper’ (SOW) to be bypassed thus violating the same origin policy and possibly leading to privilege escalation and code execution.
(CVE-2013-0795)
A DLL loading vulnerability exists that could lead to code execution.(CVE-2013-0797)
A buffer overflow error exists related to the Mozilla Maintenance Service. (CVE-2013-0799)
An out-of-bounds write error exists related to the Cairo graphics library. (CVE-2013-0800)
#
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(65805);
script_version("1.9");
script_cvs_date("Date: 2019/11/27");
script_cve_id(
"CVE-2013-0788",
"CVE-2013-0791",
"CVE-2013-0793",
"CVE-2013-0795",
"CVE-2013-0797",
"CVE-2013-0799",
"CVE-2013-0800"
);
script_bugtraq_id(
58819,
58824,
58825,
58826,
58827,
58836,
58837
);
script_name(english:"Firefox ESR 17.x < 17.0.5 Multiple Vulnerabilities");
script_summary(english:"Checks version of Firefox");
script_set_attribute(attribute:"synopsis", value:
"The remote Windows host contains a web browser that is potentially
affected by multiple vulnerabilities.");
script_set_attribute(attribute:"description", value:
"The installed version of Firefox ESR 17.x is earlier than 17.0.5, and
thus, is potentially affected by the following vulnerabilities :
- Various memory safety issue exist. (CVE-2013-0788)
- An out-of-bounds memory read error exists related to
'CERT_DecodeCertPackage' and certificate decoding.
(CVE-2013-0791)
- An error exists related to navigation, history and
improper 'baseURI' property values that could allow
cross-site scripting attacks. (CVE-2013-0793)
- A error exists related to 'cloneNode' that can allow
'System Only Wrapper' (SOW) to be bypassed thus
violating the same origin policy and possibly leading
to privilege escalation and code execution.
(CVE-2013-0795)
- A DLL loading vulnerability exists that could lead to
code execution.(CVE-2013-0797)
- A buffer overflow error exists related to the Mozilla
Maintenance Service. (CVE-2013-0799)
- An out-of-bounds write error exists related to the
Cairo graphics library. (CVE-2013-0800)");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2013-30/");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2013-31/");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2013-32/");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2013-34/");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2013-36/");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2013-38/");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2013-40/");
script_set_attribute(attribute:"solution", value:
"Upgrade to Firefox 17.0.5 ESR or later.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2013-0795");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"vuln_publication_date", value:"2013/04/02");
script_set_attribute(attribute:"patch_publication_date", value:"2013/04/02");
script_set_attribute(attribute:"plugin_publication_date", value:"2013/04/04");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/a:mozilla:firefox_esr");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Windows");
script_copyright(english:"This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("mozilla_org_installed.nasl");
script_require_keys("Mozilla/Firefox/Version");
exit(0);
}
include("mozilla_version.inc");
port = get_kb_item_or_exit("SMB/transport");
installs = get_kb_list("SMB/Mozilla/Firefox/*");
if (isnull(installs)) audit(AUDIT_NOT_INST, "Firefox");
mozilla_check_version(installs:installs, product:'firefox', esr:TRUE, fix:'17.0.5', min:'17.0', severity:SECURITY_HOLE);
Vendor | Product | Version | CPE |
---|---|---|---|
mozilla | firefox_esr | cpe:/a:mozilla:firefox_esr |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0788
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0791
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0793
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0795
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0797
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0799
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0800
www.mozilla.org/en-US/security/advisories/mfsa2013-30/
www.mozilla.org/en-US/security/advisories/mfsa2013-31/
www.mozilla.org/en-US/security/advisories/mfsa2013-32/
www.mozilla.org/en-US/security/advisories/mfsa2013-34/
www.mozilla.org/en-US/security/advisories/mfsa2013-36/
www.mozilla.org/en-US/security/advisories/mfsa2013-38/
www.mozilla.org/en-US/security/advisories/mfsa2013-40/