ID OPENSUSE-2016-1019.NASL Type nessus Reporter Tenable Modified 2016-10-13T00:00:00
Description
This update includes Firefox 48.0.1 to fix a few regressions and a security issue :
Fix an audio regression impacting some major websites
Fix a top crash in the JavaScript engine
Fix a startup crash issue caused by Websense
Fix a different behavior with e10s / non-e10s on select and mouse events
Fix a top crash caused by plugin issues
Fix a shutdown issue
Fix a crash in WebRTC
added upstream patch so system plugins/extensions are correctly loaded again on x86-64
Fix for possible buffer overrun
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from openSUSE Security Update openSUSE-2016-1019.
#
# The text description of this plugin is (C) SUSE LLC.
#
include("compat.inc");
if (description)
{
script_id(93146);
script_version("$Revision: 2.3 $");
script_cvs_date("$Date: 2016/10/13 14:27:27 $");
script_cve_id("CVE-2016-6354");
script_name(english:"openSUSE Security Update : Firefox (openSUSE-2016-1019)");
script_summary(english:"Check for the openSUSE-2016-1019 patch");
script_set_attribute(
attribute:"synopsis",
value:"The remote openSUSE host is missing a security update."
);
script_set_attribute(
attribute:"description",
value:
"This update includes Firefox 48.0.1 to fix a few regressions and a
security issue :
- Fix an audio regression impacting some major websites
- Fix a top crash in the JavaScript engine
- Fix a startup crash issue caused by Websense
- Fix a different behavior with e10s / non-e10s on select
and mouse events
- Fix a top crash caused by plugin issues
- Fix a shutdown issue
- Fix a crash in WebRTC
- added upstream patch so system plugins/extensions are
correctly loaded again on x86-64
- Fix for possible buffer overrun"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.mozilla.org/show_bug.cgi?id=1264530"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.mozilla.org/show_bug.cgi?id=1276920"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.mozilla.org/show_bug.cgi?id=1282843"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.mozilla.org/show_bug.cgi?id=1290469"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.mozilla.org/show_bug.cgi?id=1291078"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.mozilla.org/show_bug.cgi?id=1291738"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.mozilla.org/show_bug.cgi?id=1292534"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.mozilla.org/show_bug.cgi?id=1295296"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.opensuse.org/show_bug.cgi?id=990856"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.opensuse.org/show_bug.cgi?id=992236"
);
script_set_attribute(
attribute:"solution",
value:"Update the affected Firefox packages."
);
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:MozillaFirefox");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:MozillaFirefox-branding-upstream");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:MozillaFirefox-buildsymbols");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:MozillaFirefox-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:MozillaFirefox-debugsource");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:MozillaFirefox-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:MozillaFirefox-translations-common");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:MozillaFirefox-translations-other");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libfreebl3");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libfreebl3-32bit");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libfreebl3-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libfreebl3-debuginfo-32bit");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libsoftokn3");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libsoftokn3-32bit");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libsoftokn3-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libsoftokn3-debuginfo-32bit");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:mozilla-nss");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:mozilla-nss-32bit");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:mozilla-nss-certs");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:mozilla-nss-certs-32bit");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:mozilla-nss-certs-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:mozilla-nss-certs-debuginfo-32bit");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:mozilla-nss-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:mozilla-nss-debuginfo-32bit");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:mozilla-nss-debugsource");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:mozilla-nss-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:mozilla-nss-sysinit");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:mozilla-nss-sysinit-32bit");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:mozilla-nss-sysinit-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:mozilla-nss-sysinit-debuginfo-32bit");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:mozilla-nss-tools");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:mozilla-nss-tools-debuginfo");
script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:13.1");
script_set_attribute(attribute:"patch_publication_date", value:"2016/08/27");
script_set_attribute(attribute:"plugin_publication_date", value:"2016/08/29");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2016 Tenable Network Security, Inc.");
script_family(english:"SuSE Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/SuSE/release");
if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE");
if (release !~ "^(SUSE13\.1)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "13.1", release);
if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
ourarch = get_kb_item("Host/cpu");
if (!ourarch) audit(AUDIT_UNKNOWN_ARCH);
if (ourarch !~ "^(i586|i686|x86_64)$") audit(AUDIT_ARCH_NOT, "i586 / i686 / x86_64", ourarch);
flag = 0;
if ( rpm_check(release:"SUSE13.1", reference:"MozillaFirefox-48.0.1-122.3") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"MozillaFirefox-branding-upstream-48.0.1-122.3") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"MozillaFirefox-buildsymbols-48.0.1-122.3") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"MozillaFirefox-debuginfo-48.0.1-122.3") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"MozillaFirefox-debugsource-48.0.1-122.3") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"MozillaFirefox-devel-48.0.1-122.3") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"MozillaFirefox-translations-common-48.0.1-122.3") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"MozillaFirefox-translations-other-48.0.1-122.3") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"libfreebl3-3.24-88.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"libfreebl3-debuginfo-3.24-88.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"libsoftokn3-3.24-88.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"libsoftokn3-debuginfo-3.24-88.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"mozilla-nss-3.24-88.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"mozilla-nss-certs-3.24-88.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"mozilla-nss-certs-debuginfo-3.24-88.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"mozilla-nss-debuginfo-3.24-88.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"mozilla-nss-debugsource-3.24-88.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"mozilla-nss-devel-3.24-88.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"mozilla-nss-sysinit-3.24-88.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"mozilla-nss-sysinit-debuginfo-3.24-88.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"mozilla-nss-tools-3.24-88.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"mozilla-nss-tools-debuginfo-3.24-88.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", cpu:"x86_64", reference:"libfreebl3-32bit-3.24-88.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", cpu:"x86_64", reference:"libfreebl3-debuginfo-32bit-3.24-88.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", cpu:"x86_64", reference:"libsoftokn3-32bit-3.24-88.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", cpu:"x86_64", reference:"libsoftokn3-debuginfo-32bit-3.24-88.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", cpu:"x86_64", reference:"mozilla-nss-32bit-3.24-88.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", cpu:"x86_64", reference:"mozilla-nss-certs-32bit-3.24-88.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", cpu:"x86_64", reference:"mozilla-nss-certs-debuginfo-32bit-3.24-88.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", cpu:"x86_64", reference:"mozilla-nss-debuginfo-32bit-3.24-88.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", cpu:"x86_64", reference:"mozilla-nss-sysinit-32bit-3.24-88.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", cpu:"x86_64", reference:"mozilla-nss-sysinit-debuginfo-32bit-3.24-88.1") ) flag++;
if (flag)
{
if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
else security_hole(0);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "MozillaFirefox / MozillaFirefox-branding-upstream / etc");
}
{"id": "OPENSUSE-2016-1019.NASL", "bulletinFamily": "scanner", "title": "openSUSE Security Update : Firefox (openSUSE-2016-1019)", "description": "This update includes Firefox 48.0.1 to fix a few regressions and a security issue :\n\n - Fix an audio regression impacting some major websites\n\n - Fix a top crash in the JavaScript engine\n\n - Fix a startup crash issue caused by Websense\n\n - Fix a different behavior with e10s / non-e10s on select and mouse events\n\n - Fix a top crash caused by plugin issues\n\n - Fix a shutdown issue\n\n - Fix a crash in WebRTC\n\n - added upstream patch so system plugins/extensions are correctly loaded again on x86-64\n\n - Fix for possible buffer overrun", "published": "2016-08-29T00:00:00", "modified": "2016-10-13T00:00:00", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=93146", "reporter": "Tenable", "references": ["https://bugzilla.opensuse.org/show_bug.cgi?id=990856", "https://bugzilla.opensuse.org/show_bug.cgi?id=992236", "https://bugzilla.mozilla.org/show_bug.cgi?id=1290469", "https://bugzilla.mozilla.org/show_bug.cgi?id=1276920", "https://bugzilla.mozilla.org/show_bug.cgi?id=1292534", "https://bugzilla.mozilla.org/show_bug.cgi?id=1291078", "https://bugzilla.mozilla.org/show_bug.cgi?id=1282843", "https://bugzilla.mozilla.org/show_bug.cgi?id=1264530", "https://bugzilla.mozilla.org/show_bug.cgi?id=1291738", "https://bugzilla.mozilla.org/show_bug.cgi?id=1295296"], "cvelist": ["CVE-2016-6354"], "type": "nessus", "lastseen": "2017-10-29T13:46:15", "history": [{"bulletin": {"bulletinFamily": "scanner", "cpe": [], "cvelist": ["CVE-2016-6354"], "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "description": "This update includes Firefox 48.0.1 to fix a few regressions and a security issue :\n\n - Fix an audio regression impacting some major websites\n\n - Fix a top crash in the JavaScript engine\n\n - Fix a startup crash issue caused by Websense\n\n - Fix a different behavior with e10s / non-e10s on select and mouse events\n\n - Fix a top crash caused by plugin issues\n\n - Fix a shutdown issue\n\n - Fix a crash in WebRTC\n\n - added upstream patch so system plugins/extensions are correctly loaded again on x86-64\n\n - Fix for possible buffer overrun", "edition": 2, "enchantments": {}, "hash": "ff44d32e96080a0d134c10648237d99176258bf8f65201dd0ac64d8f45724045", "hashmap": [{"hash": "9cf00d658b687f030ebe173a0528c567", "key": "reporter"}, {"hash": "e5d275b3ebd62646b78320753699e02e", "key": "cvss"}, {"hash": "242ea0d9bdb93075d900c9e634a85934", "key": "cvelist"}, {"hash": "283228ac439e342e9a3248592b9624f9", "key": "title"}, {"hash": "24e0e8faefe8d79072cf6468f38e2501", "key": "pluginID"}, {"hash": "bcd8abde7f060a8789d08ba0ba73d345", "key": "modified"}, {"hash": "29a18f0d6d56de5be5ca6823a5d536fc", "key": "references"}, {"hash": "81879cbcf07eac8413d123a0e7a2da56", "key": "href"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "5e0bd03bec244039678f2b955a2595aa", "key": "type"}, {"hash": "b4e11b5577f800625f5beab0967f3d07", "key": "description"}, {"hash": "71a40666da62ba38d22539c8277870c7", "key": "naslFamily"}, {"hash": "ea310e0135f4808d2b91389f24cabe5b", "key": "sourceData"}, {"hash": "40eb3e68151f3dd36224c1fe46479904", "key": "published"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "cpe"}], "history": [], "href": "https://www.tenable.com/plugins/index.php?view=single&id=93146", "id": "OPENSUSE-2016-1019.NASL", "lastseen": "2016-10-13T21:27:20", "modified": "2016-10-13T00:00:00", "naslFamily": "SuSE Local Security Checks", "objectVersion": "1.2", "pluginID": "93146", "published": "2016-08-29T00:00:00", "references": ["https://bugzilla.opensuse.org/show_bug.cgi?id=990856", "https://bugzilla.opensuse.org/show_bug.cgi?id=992236", "https://bugzilla.mozilla.org/show_bug.cgi?id=1290469", "https://bugzilla.mozilla.org/show_bug.cgi?id=1276920", "https://bugzilla.mozilla.org/show_bug.cgi?id=1292534", "https://bugzilla.mozilla.org/show_bug.cgi?id=1291078", "https://bugzilla.mozilla.org/show_bug.cgi?id=1282843", "https://bugzilla.mozilla.org/show_bug.cgi?id=1264530", "https://bugzilla.mozilla.org/show_bug.cgi?id=1291738", "https://bugzilla.mozilla.org/show_bug.cgi?id=1295296"], "reporter": "Tenable", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2016-1019.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(93146);\n script_version(\"$Revision: 2.3 $\");\n script_cvs_date(\"$Date: 2016/10/13 14:27:27 $\");\n\n script_cve_id(\"CVE-2016-6354\");\n\n script_name(english:\"openSUSE Security Update : Firefox (openSUSE-2016-1019)\");\n script_summary(english:\"Check for the openSUSE-2016-1019 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update includes Firefox 48.0.1 to fix a few regressions and a\nsecurity issue :\n\n - Fix an audio regression impacting some major websites\n\n - Fix a top crash in the JavaScript engine\n\n - Fix a startup crash issue caused by Websense\n\n - Fix a different behavior with e10s / non-e10s on select\n and mouse events\n\n - Fix a top crash caused by plugin issues\n\n - Fix a shutdown issue\n\n - Fix a crash in WebRTC\n\n - added upstream patch so system plugins/extensions are\n correctly loaded again on x86-64\n\n - Fix for possible buffer overrun\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.mozilla.org/show_bug.cgi?id=1264530\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.mozilla.org/show_bug.cgi?id=1276920\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.mozilla.org/show_bug.cgi?id=1282843\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.mozilla.org/show_bug.cgi?id=1290469\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.mozilla.org/show_bug.cgi?id=1291078\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.mozilla.org/show_bug.cgi?id=1291738\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.mozilla.org/show_bug.cgi?id=1292534\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.mozilla.org/show_bug.cgi?id=1295296\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=990856\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=992236\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected Firefox packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:MozillaFirefox\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:MozillaFirefox-branding-upstream\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:MozillaFirefox-buildsymbols\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:MozillaFirefox-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:MozillaFirefox-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:MozillaFirefox-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:MozillaFirefox-translations-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:MozillaFirefox-translations-other\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libfreebl3\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libfreebl3-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libfreebl3-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libfreebl3-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libsoftokn3\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libsoftokn3-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libsoftokn3-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libsoftokn3-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-nss\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-nss-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-nss-certs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-nss-certs-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-nss-certs-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-nss-certs-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-nss-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-nss-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-nss-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-nss-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-nss-sysinit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-nss-sysinit-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-nss-sysinit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-nss-sysinit-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-nss-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-nss-tools-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:13.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/08/27\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/08/29\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE13\\.1)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"13.1\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE13.1\", reference:\"MozillaFirefox-48.0.1-122.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"MozillaFirefox-branding-upstream-48.0.1-122.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"MozillaFirefox-buildsymbols-48.0.1-122.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"MozillaFirefox-debuginfo-48.0.1-122.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"MozillaFirefox-debugsource-48.0.1-122.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"MozillaFirefox-devel-48.0.1-122.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"MozillaFirefox-translations-common-48.0.1-122.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"MozillaFirefox-translations-other-48.0.1-122.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libfreebl3-3.24-88.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libfreebl3-debuginfo-3.24-88.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libsoftokn3-3.24-88.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libsoftokn3-debuginfo-3.24-88.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"mozilla-nss-3.24-88.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"mozilla-nss-certs-3.24-88.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"mozilla-nss-certs-debuginfo-3.24-88.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"mozilla-nss-debuginfo-3.24-88.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"mozilla-nss-debugsource-3.24-88.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"mozilla-nss-devel-3.24-88.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"mozilla-nss-sysinit-3.24-88.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"mozilla-nss-sysinit-debuginfo-3.24-88.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"mozilla-nss-tools-3.24-88.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"mozilla-nss-tools-debuginfo-3.24-88.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"libfreebl3-32bit-3.24-88.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"libfreebl3-debuginfo-32bit-3.24-88.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"libsoftokn3-32bit-3.24-88.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"libsoftokn3-debuginfo-32bit-3.24-88.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"mozilla-nss-32bit-3.24-88.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"mozilla-nss-certs-32bit-3.24-88.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"mozilla-nss-certs-debuginfo-32bit-3.24-88.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"mozilla-nss-debuginfo-32bit-3.24-88.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"mozilla-nss-sysinit-32bit-3.24-88.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"mozilla-nss-sysinit-debuginfo-32bit-3.24-88.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"MozillaFirefox / MozillaFirefox-branding-upstream / etc\");\n}\n", "title": "openSUSE Security Update : Firefox (openSUSE-2016-1019)", "type": "nessus", "viewCount": 0}, "differentElements": ["cpe"], "edition": 2, "lastseen": "2016-10-13T21:27:20"}, {"bulletin": {"bulletinFamily": "exploit", "cvelist": ["CVE-2016-6354"], "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "description": "This update includes Firefox 48.0.1 to fix a few regressions and a security issue :\n\n - Fix an audio regression impacting some major websites\n\n - Fix a top crash in the JavaScript engine\n\n - Fix a startup crash issue caused by Websense\n\n - Fix a different behavior with e10s / non-e10s on select and mouse events\n\n - Fix a top crash caused by plugin issues\n\n - Fix a shutdown issue\n\n - Fix a crash in WebRTC\n\n - added upstream patch so system plugins/extensions are correctly loaded again on x86-64\n\n - Fix for possible buffer overrun", "edition": 1, "hash": "26669628757e0157b35614bb053e3222af464fc5b38e654a7f4142127bb5262a", "hashmap": [{"hash": "d46bb28fb3bae06a51633aba015cf526", "key": "modified"}, {"hash": "708697c63f7eb369319c6523380bdf7a", "key": "bulletinFamily"}, {"hash": "56765472680401499c79732468ba4340", "key": "objectVersion"}, {"hash": "9cf00d658b687f030ebe173a0528c567", "key": "reporter"}, {"hash": "e5d275b3ebd62646b78320753699e02e", "key": "cvss"}, {"hash": "242ea0d9bdb93075d900c9e634a85934", "key": "cvelist"}, {"hash": "283228ac439e342e9a3248592b9624f9", "key": "title"}, {"hash": "24e0e8faefe8d79072cf6468f38e2501", "key": "pluginID"}, {"hash": "29a18f0d6d56de5be5ca6823a5d536fc", "key": "references"}, {"hash": "81879cbcf07eac8413d123a0e7a2da56", "key": "href"}, {"hash": "019e03852f97f7680f9210a2df32be50", "key": "sourceData"}, {"hash": "5e0bd03bec244039678f2b955a2595aa", "key": "type"}, {"hash": "b4e11b5577f800625f5beab0967f3d07", "key": "description"}, {"hash": "71a40666da62ba38d22539c8277870c7", "key": "naslFamily"}, {"hash": "40eb3e68151f3dd36224c1fe46479904", "key": "published"}], "history": [], "href": "https://www.tenable.com/plugins/index.php?view=single&id=93146", "id": "OPENSUSE-2016-1019.NASL", "lastseen": "2016-09-26T17:26:49", "modified": "2016-09-23T00:00:00", "naslFamily": "SuSE Local Security Checks", "objectVersion": "1.2", "pluginID": "93146", "published": "2016-08-29T00:00:00", "references": ["https://bugzilla.opensuse.org/show_bug.cgi?id=990856", "https://bugzilla.opensuse.org/show_bug.cgi?id=992236", "https://bugzilla.mozilla.org/show_bug.cgi?id=1290469", "https://bugzilla.mozilla.org/show_bug.cgi?id=1276920", "https://bugzilla.mozilla.org/show_bug.cgi?id=1292534", "https://bugzilla.mozilla.org/show_bug.cgi?id=1291078", "https://bugzilla.mozilla.org/show_bug.cgi?id=1282843", "https://bugzilla.mozilla.org/show_bug.cgi?id=1264530", "https://bugzilla.mozilla.org/show_bug.cgi?id=1291738", "https://bugzilla.mozilla.org/show_bug.cgi?id=1295296"], "reporter": "Tenable", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2016-1019.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(93146);\n script_version(\"$Revision: 2.2 $\");\n script_cvs_date(\"$Date: 2016/09/23 13:29:16 $\");\n\n script_cve_id(\"CVE-2016-6354\");\n\n script_name(english:\"openSUSE Security Update : Firefox (openSUSE-2016-1019)\");\n script_summary(english:\"Check for the openSUSE-2016-1019 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update includes Firefox 48.0.1 to fix a few regressions and a\nsecurity issue :\n\n - Fix an audio regression impacting some major websites\n\n - Fix a top crash in the JavaScript engine\n\n - Fix a startup crash issue caused by Websense\n\n - Fix a different behavior with e10s / non-e10s on select\n and mouse events\n\n - Fix a top crash caused by plugin issues\n\n - Fix a shutdown issue\n\n - Fix a crash in WebRTC\n\n - added upstream patch so system plugins/extensions are\n correctly loaded again on x86-64\n\n - Fix for possible buffer overrun\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.mozilla.org/show_bug.cgi?id=1264530\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.mozilla.org/show_bug.cgi?id=1276920\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.mozilla.org/show_bug.cgi?id=1282843\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.mozilla.org/show_bug.cgi?id=1290469\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.mozilla.org/show_bug.cgi?id=1291078\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.mozilla.org/show_bug.cgi?id=1291738\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.mozilla.org/show_bug.cgi?id=1292534\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.mozilla.org/show_bug.cgi?id=1295296\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=990856\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=992236\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected Firefox packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:MozillaFirefox\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:MozillaFirefox-branding-upstream\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:MozillaFirefox-buildsymbols\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:MozillaFirefox-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:MozillaFirefox-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:MozillaFirefox-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:MozillaFirefox-translations-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:MozillaFirefox-translations-other\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libfreebl3\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libfreebl3-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libfreebl3-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libfreebl3-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libsoftokn3\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libsoftokn3-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libsoftokn3-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libsoftokn3-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-nss\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-nss-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-nss-certs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-nss-certs-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-nss-certs-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-nss-certs-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-nss-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-nss-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-nss-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-nss-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-nss-sysinit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-nss-sysinit-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-nss-sysinit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-nss-sysinit-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-nss-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-nss-tools-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:13.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/08/27\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/08/29\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE13\\.1)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"13.1\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE13.1\", reference:\"MozillaFirefox-48.0.1-122.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"MozillaFirefox-branding-upstream-48.0.1-122.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"MozillaFirefox-buildsymbols-48.0.1-122.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"MozillaFirefox-debuginfo-48.0.1-122.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"MozillaFirefox-debugsource-48.0.1-122.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"MozillaFirefox-devel-48.0.1-122.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"MozillaFirefox-translations-common-48.0.1-122.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"MozillaFirefox-translations-other-48.0.1-122.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libfreebl3-3.24-88.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libfreebl3-debuginfo-3.24-88.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libsoftokn3-3.24-88.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libsoftokn3-debuginfo-3.24-88.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"mozilla-nss-3.24-88.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"mozilla-nss-certs-3.24-88.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"mozilla-nss-certs-debuginfo-3.24-88.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"mozilla-nss-debuginfo-3.24-88.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"mozilla-nss-debugsource-3.24-88.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"mozilla-nss-devel-3.24-88.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"mozilla-nss-sysinit-3.24-88.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"mozilla-nss-sysinit-debuginfo-3.24-88.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"mozilla-nss-tools-3.24-88.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"mozilla-nss-tools-debuginfo-3.24-88.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"libfreebl3-32bit-3.24-88.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"libfreebl3-debuginfo-32bit-3.24-88.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"libsoftokn3-32bit-3.24-88.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"libsoftokn3-debuginfo-32bit-3.24-88.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"mozilla-nss-32bit-3.24-88.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"mozilla-nss-certs-32bit-3.24-88.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"mozilla-nss-certs-debuginfo-32bit-3.24-88.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"mozilla-nss-debuginfo-32bit-3.24-88.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"mozilla-nss-sysinit-32bit-3.24-88.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"mozilla-nss-sysinit-debuginfo-32bit-3.24-88.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"MozillaFirefox / MozillaFirefox-branding-upstream / etc\");\n}\n", "title": "openSUSE Security Update : Firefox (openSUSE-2016-1019)", "type": "nessus", "viewCount": 0}, "differentElements": ["modified", "sourceData"], "edition": 1, "lastseen": "2016-09-26T17:26:49"}], "edition": 3, "hashmap": [{"key": "bulletinFamily", "hash": "bbdaea376f500d25f6b0c1050311dd07"}, {"key": "cpe", "hash": "25dd94c730e8997bdb70968e8b72364f"}, {"key": "cvelist", "hash": "242ea0d9bdb93075d900c9e634a85934"}, {"key": "cvss", "hash": "e5d275b3ebd62646b78320753699e02e"}, {"key": "description", "hash": "b4e11b5577f800625f5beab0967f3d07"}, {"key": "href", "hash": "81879cbcf07eac8413d123a0e7a2da56"}, {"key": "modified", "hash": "bcd8abde7f060a8789d08ba0ba73d345"}, {"key": "naslFamily", "hash": "71a40666da62ba38d22539c8277870c7"}, {"key": "pluginID", "hash": "24e0e8faefe8d79072cf6468f38e2501"}, {"key": "published", "hash": "40eb3e68151f3dd36224c1fe46479904"}, {"key": "references", "hash": "29a18f0d6d56de5be5ca6823a5d536fc"}, {"key": "reporter", "hash": "9cf00d658b687f030ebe173a0528c567"}, {"key": "sourceData", "hash": "ea310e0135f4808d2b91389f24cabe5b"}, {"key": "title", "hash": "283228ac439e342e9a3248592b9624f9"}, {"key": "type", "hash": "5e0bd03bec244039678f2b955a2595aa"}], "hash": "14b54b19d788aa3fb28c64e76f8107d7c9146b79c816dcfcab2b11bddd261bf8", "viewCount": 0, "enchantments": {"vulnersScore": 4.0}, "objectVersion": "1.3", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2016-1019.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(93146);\n script_version(\"$Revision: 2.3 $\");\n script_cvs_date(\"$Date: 2016/10/13 14:27:27 $\");\n\n script_cve_id(\"CVE-2016-6354\");\n\n script_name(english:\"openSUSE Security Update : Firefox (openSUSE-2016-1019)\");\n script_summary(english:\"Check for the openSUSE-2016-1019 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update includes Firefox 48.0.1 to fix a few regressions and a\nsecurity issue :\n\n - Fix an audio regression impacting some major websites\n\n - Fix a top crash in the JavaScript engine\n\n - Fix a startup crash issue caused by Websense\n\n - Fix a different behavior with e10s / non-e10s on select\n and mouse events\n\n - Fix a top crash caused by plugin issues\n\n - Fix a shutdown issue\n\n - Fix a crash in WebRTC\n\n - added upstream patch so system plugins/extensions are\n correctly loaded again on x86-64\n\n - Fix for possible buffer overrun\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.mozilla.org/show_bug.cgi?id=1264530\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.mozilla.org/show_bug.cgi?id=1276920\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.mozilla.org/show_bug.cgi?id=1282843\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.mozilla.org/show_bug.cgi?id=1290469\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.mozilla.org/show_bug.cgi?id=1291078\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.mozilla.org/show_bug.cgi?id=1291738\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.mozilla.org/show_bug.cgi?id=1292534\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.mozilla.org/show_bug.cgi?id=1295296\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=990856\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=992236\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected Firefox packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:MozillaFirefox\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:MozillaFirefox-branding-upstream\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:MozillaFirefox-buildsymbols\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:MozillaFirefox-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:MozillaFirefox-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:MozillaFirefox-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:MozillaFirefox-translations-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:MozillaFirefox-translations-other\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libfreebl3\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libfreebl3-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libfreebl3-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libfreebl3-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libsoftokn3\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libsoftokn3-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libsoftokn3-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libsoftokn3-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-nss\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-nss-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-nss-certs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-nss-certs-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-nss-certs-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-nss-certs-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-nss-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-nss-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-nss-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-nss-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-nss-sysinit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-nss-sysinit-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-nss-sysinit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-nss-sysinit-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-nss-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-nss-tools-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:13.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/08/27\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/08/29\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE13\\.1)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"13.1\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE13.1\", reference:\"MozillaFirefox-48.0.1-122.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"MozillaFirefox-branding-upstream-48.0.1-122.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"MozillaFirefox-buildsymbols-48.0.1-122.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"MozillaFirefox-debuginfo-48.0.1-122.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"MozillaFirefox-debugsource-48.0.1-122.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"MozillaFirefox-devel-48.0.1-122.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"MozillaFirefox-translations-common-48.0.1-122.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"MozillaFirefox-translations-other-48.0.1-122.3\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libfreebl3-3.24-88.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libfreebl3-debuginfo-3.24-88.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libsoftokn3-3.24-88.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"libsoftokn3-debuginfo-3.24-88.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"mozilla-nss-3.24-88.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"mozilla-nss-certs-3.24-88.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"mozilla-nss-certs-debuginfo-3.24-88.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"mozilla-nss-debuginfo-3.24-88.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"mozilla-nss-debugsource-3.24-88.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"mozilla-nss-devel-3.24-88.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"mozilla-nss-sysinit-3.24-88.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"mozilla-nss-sysinit-debuginfo-3.24-88.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"mozilla-nss-tools-3.24-88.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"mozilla-nss-tools-debuginfo-3.24-88.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"libfreebl3-32bit-3.24-88.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"libfreebl3-debuginfo-32bit-3.24-88.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"libsoftokn3-32bit-3.24-88.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"libsoftokn3-debuginfo-32bit-3.24-88.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"mozilla-nss-32bit-3.24-88.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"mozilla-nss-certs-32bit-3.24-88.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"mozilla-nss-certs-debuginfo-32bit-3.24-88.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"mozilla-nss-debuginfo-32bit-3.24-88.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"mozilla-nss-sysinit-32bit-3.24-88.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", cpu:\"x86_64\", reference:\"mozilla-nss-sysinit-debuginfo-32bit-3.24-88.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"MozillaFirefox / MozillaFirefox-branding-upstream / etc\");\n}\n", "naslFamily": "SuSE Local Security Checks", "pluginID": "93146", "cpe": ["p-cpe:/a:novell:opensuse:MozillaFirefox-translations-common", "p-cpe:/a:novell:opensuse:MozillaFirefox-buildsymbols", "p-cpe:/a:novell:opensuse:libfreebl3-debuginfo", "p-cpe:/a:novell:opensuse:mozilla-nss-tools-debuginfo", "p-cpe:/a:novell:opensuse:libfreebl3", "p-cpe:/a:novell:opensuse:libsoftokn3-32bit", "p-cpe:/a:novell:opensuse:mozilla-nss-certs", "p-cpe:/a:novell:opensuse:mozilla-nss-32bit", "p-cpe:/a:novell:opensuse:MozillaFirefox-debuginfo", "p-cpe:/a:novell:opensuse:libsoftokn3-debuginfo-32bit", "p-cpe:/a:novell:opensuse:MozillaFirefox-devel", "p-cpe:/a:novell:opensuse:mozilla-nss-debugsource", "p-cpe:/a:novell:opensuse:mozilla-nss-tools", "p-cpe:/a:novell:opensuse:mozilla-nss-sysinit-debuginfo-32bit", "p-cpe:/a:novell:opensuse:libsoftokn3", "p-cpe:/a:novell:opensuse:mozilla-nss", "p-cpe:/a:novell:opensuse:mozilla-nss-sysinit-debuginfo", "p-cpe:/a:novell:opensuse:mozilla-nss-certs-debuginfo", "p-cpe:/a:novell:opensuse:mozilla-nss-certs-32bit", "p-cpe:/a:novell:opensuse:mozilla-nss-debuginfo", "p-cpe:/a:novell:opensuse:MozillaFirefox-branding-upstream", "p-cpe:/a:novell:opensuse:mozilla-nss-sysinit-32bit", "p-cpe:/a:novell:opensuse:mozilla-nss-certs-debuginfo-32bit", "p-cpe:/a:novell:opensuse:libsoftokn3-debuginfo", "p-cpe:/a:novell:opensuse:mozilla-nss-debuginfo-32bit", "p-cpe:/a:novell:opensuse:mozilla-nss-sysinit", "p-cpe:/a:novell:opensuse:MozillaFirefox-translations-other", "p-cpe:/a:novell:opensuse:MozillaFirefox-debugsource", "p-cpe:/a:novell:opensuse:libfreebl3-debuginfo-32bit", "p-cpe:/a:novell:opensuse:MozillaFirefox", "p-cpe:/a:novell:opensuse:libfreebl3-32bit", "p-cpe:/a:novell:opensuse:mozilla-nss-devel", "cpe:/o:novell:opensuse:13.1"]}
{"result": {"cve": [{"id": "CVE-2016-6354", "type": "cve", "title": "CVE-2016-6354", "description": "Heap-based buffer overflow in the yy_get_next_buffer function in Flex before 2.6.1 might allow context-dependent attackers to cause a denial of service or possibly execute arbitrary code via vectors involving num_to_read.", "published": "2016-09-21T10:25:20", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-6354", "cvelist": ["CVE-2016-6354"], "lastseen": "2017-04-18T15:59:58"}], "nessus": [{"id": "OPENSUSE-2016-1155.NASL", "type": "nessus", "title": "openSUSE Security Update : flex / at / libbonobo / etc (openSUSE-2016-1155)", "description": "Various packages included vulnerable parsers generated by 'flex'.\n\nThis update provides a fixed 'flex' package and also rebuilds of packages that might have security issues caused by the auto generated code.\n\nFlex itself was updated to fix a buffer overflow in the generated scanner (bsc#990856, CVE-2016-6354)\n\nPackages that were rebuilt with the fixed flex :\n\n - at\n\n - libbonobo\n\n - netpbm\n\n - openslp\n\n - sgmltool\n\n - virtuoso\n\nSome more packages might also need to be rebuild to receive a new flex parser, but will be released later.\n\nThis update was imported from the SUSE:SLE-12:Update update project.", "published": "2016-10-05T00:00:00", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=93855", "cvelist": ["CVE-2016-6354"], "lastseen": "2017-10-29T13:40:16"}, {"id": "OPENSUSE-2017-189.NASL", "type": "nessus", "title": "openSUSE Security Update : seamonkey (openSUSE-2017-189)", "description": "This update for SeaMonkey to version 2.46 fixes security issues and bugs.\n\nThe following vulnerabilities were fixed :\n\n - Fix all Gecko related security issues between 43.0.1 and 49.0.2\n\n - CVE-2016-6354: buffer overrun in flex (boo#990856)\n\nThe following non-security changes are included :\n\n - improve recognition of LANGUAGE env variable (boo#1017174)\n\n - improve TLS compatibility with certain websites (boo#1021636)\n\n - SeaMonkey now requires NSPR 4.12 and NSS 3.25\n\n - based on Gecko 49.0.2\n\n - Chatzilla and DOM Inspector were disabled", "published": "2017-02-02T00:00:00", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=96942", "cvelist": ["CVE-2016-6354"], "lastseen": "2017-10-29T13:34:19"}, {"id": "FEDORA_2016-C9AD9582F7.NASL", "type": "nessus", "title": "Fedora 24 : flex (2016-c9ad9582f7)", "description": "Change type for num_to_read from yy_size_t to int.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "published": "2016-08-09T00:00:00", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=92808", "cvelist": ["CVE-2016-6354"], "lastseen": "2017-10-29T13:45:15"}, {"id": "DEBIAN_DSA-3653.NASL", "type": "nessus", "title": "Debian DSA-3653-1 : flex - security update", "description": "Alexander Sulfrian discovered a buffer overflow in the yy_get_next_buffer() function generated by Flex, which may result in denial of service and potentially the execution of code if operating on data from untrusted sources.\n\nAffected applications need to be rebuild. bogofilter will be rebuild against the updated flex in a followup update. Further affected applications should be reported at the bug referenced above.", "published": "2016-08-26T00:00:00", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=93116", "cvelist": ["CVE-2016-6354"], "lastseen": "2017-10-29T13:42:50"}, {"id": "GENTOO_GLSA-201701-31.NASL", "type": "nessus", "title": "GLSA-201701-31 : flex: Potential insecure code generation", "description": "The remote host is affected by the vulnerability described in GLSA-201701-31 (flex: Potential insecure code generation)\n\n A heap-based buffer overflow in the yy_get_next_buffer function in Flex might allow context-dependent attackers to cause a denial of service or possibly execute arbitrary code via vectors involving num_to_read.\n Impact :\n\n Context-dependent attackers could cause a Denial of Service condition or possibly execute arbitrary code with the privileges of the process.\n Workaround :\n\n There is no known workaround at this time.", "published": "2017-01-12T00:00:00", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=96425", "cvelist": ["CVE-2016-6354"], "lastseen": "2017-10-29T13:42:33"}, {"id": "FEDORA_2016-8D79ADE826.NASL", "type": "nessus", "title": "Fedora 23 : flex (2016-8d79ade826)", "description": "Change type for num_to_read from yy_size_t to int.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "published": "2016-12-12T00:00:00", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=95679", "cvelist": ["CVE-2016-6354"], "lastseen": "2017-10-29T13:33:50"}, {"id": "OPENSUSE-2016-1028.NASL", "type": "nessus", "title": "openSUSE Security Update : MozillaFirefox / mozilla-nss (openSUSE-2016-1028)", "description": "This update for MozillaFirefox, mozilla-nss fixes the following issues :\n\nChanges in MozillaFirefox :\n\n - Mozilla Firefox 48.0.1 :\n\n - Fixed an audio regression impacting some major websites (bmo#1295296)\n\n - Fix a top crash in the JavaScript engine (bmo#1290469)\n\n - Fix a startup crash issue caused by Websense (bmo#1291738)\n\n - Fix a different behavior with e10s / non-e10s on <select> and mouse events (bmo#1291078)\n\n - Fix a top crash caused by plugin issues (bmo#1264530)\n\n - Fix a shutdown issue (bmo#1276920)\n\n - Fix a crash in WebRTC\n\n - added upstream patch so system plugins/extensions are correctly loaded again on x86-64 (bmo#1282843)\n\n - CVE-2016-6354: Fix for possible buffer overrun (boo#990856)\n\nChanges in mozilla-nss :\n\n - also sign libfreeblpriv3.so to allow FIPS mode again (boo#992236)", "published": "2016-08-30T00:00:00", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=93215", "cvelist": ["CVE-2016-6354"], "lastseen": "2017-10-29T13:35:40"}, {"id": "SUSE_SU-2016-2397-1.NASL", "type": "nessus", "title": "SUSE SLED12 / SLES12 Security Update : flex, at, bogofilter, cyrus-imapd, kdelibs4, libQtWebKit4, libbonobo, mdbtools, netpbm, openslp, sgmltool, virtuoso, libqt5-qtwebkit (SUSE-SU-2016:2397-1)", "description": "Various packages included vulnerable parsers generated by 'flex'. This update provides a fixed 'flex' package and also rebuilds of packages that might have security issues caused by the auto generated code.\nFlex itself was updated to fix a buffer overflow in the generated scanner (bsc#990856, CVE-2016-6354) Packages that were rebuilt with the fixed flex :\n\n - at\n\n - bogofilter\n\n - cyrus-imapd\n\n - kdelibs4\n\n - libQtWebKit4\n\n - libbonobo\n\n - mdbtools\n\n - netpbm\n\n - openslp\n\n - sgmltool\n\n - virtuoso Also libqt5-qtwebkit received an additional security fix :\n\n - CVE-2015-8079: QtWebKit logs visited URLs to WebpageIcons.db in private browsing mode (bsc#954210).\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "published": "2016-09-28T00:00:00", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=93768", "cvelist": ["CVE-2016-6354", "CVE-2015-8079"], "lastseen": "2017-10-29T13:33:51"}, {"id": "OPENSUSE-2016-1057.NASL", "type": "nessus", "title": "openSUSE Security Update : MozillaThunderbird (openSUSE-2016-1057)", "description": "This update for MozillaThunderbird fixes the following issues :\n\n - update to Thunderbird 45.3.0 (boo#991809)\n\n - Disposition-Notification-To could not be used in mail.compose.other.header\n\n - 'edit as new message' on a received message pre-filled the sender as the composing identity.\n\n - Certain messages caused corruption of the drafts summary database. security fixes :\n\n - MFSA 2016-62/CVE-2016-2836 Miscellaneous memory safety hazards\n\n - MFSA 2016-63/CVE-2016-2830 (bmo#1255270) Favicon network connection can persist when page is closed\n\n - MFSA 2016-64/CVE-2016-2838 (bmo#1279814) Buffer overflow rendering SVG with bidirectional content\n\n - MFSA 2016-65/CVE-2016-2839 (bmo#1275339) Cairo rendering crash due to memory allocation issue with FFmpeg 0.10\n\n - MFSA 2016-67/CVE-2016-5252 (bmo#1268854) Stack underflow during 2D graphics rendering\n\n - MFSA 2016-70/CVE-2016-5254 (bmo#1266963) Use-after-free when using alt key and toplevel menus\n\n - MFSA 2016-72/CVE-2016-5258 (bmo#1279146) Use-after-free in DTLS during WebRTC session shutdown\n\n - MFSA 2016-73/CVE-2016-5259 (bmo#1282992) Use-after-free in service workers with nested sync events\n\n - MFSA 2016-76/CVE-2016-5262 (bmo#1277475) Scripts on marquee tag can execute in sandboxed iframes\n\n - MFSA 2016-77/CVE-2016-2837 (bmo#1274637) Buffer overflow in ClearKey Content Decryption Module (CDM) during video playback\n\n - MFSA 2016-78/CVE-2016-5263 (bmo#1276897) Type confusion in display transformation\n\n - MFSA 2016-79/CVE-2016-5264 (bmo#1286183) Use-after-free when applying SVG effects\n\n - MFSA 2016-80/CVE-2016-5265 (bmo#1278013) Same-origin policy violation using local HTML file and saved shortcut file\n\n - Fix for possible buffer overrun (boo#990856) CVE-2016-6354 (bmo#1292534) [mozilla-flex_buffer_overrun.patch]\n\n - add a screenshot to appdata.xml", "published": "2016-09-08T00:00:00", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=93363", "cvelist": ["CVE-2016-5252", "CVE-2016-5259", "CVE-2016-5254", "CVE-2016-6354", "CVE-2016-5265", "CVE-2016-5264", "CVE-2016-5258", "CVE-2016-2839", "CVE-2016-5263", "CVE-2016-2838", "CVE-2016-2836", "CVE-2016-2837", "CVE-2016-5262", "CVE-2016-2830"], "lastseen": "2017-10-29T13:35:27"}, {"id": "SUSE_SU-2016-2131-1.NASL", "type": "nessus", "title": "SUSE SLED12 / SLES12 Security Update : MozillaFirefox (SUSE-SU-2016:2131-1)", "description": "Mozilla Firefox was updated to 45.3.0 ESR to fix the following issues (bsc#991809) :\n\n - MFSA 2016-62/CVE-2016-2835/CVE-2016-2836 Miscellaneous memory safety hazards (rv:48.0 / rv:45.3)\n\n - MFSA 2016-63/CVE-2016-2830 Favicon network connection can persist when page is closed\n\n - MFSA 2016-64/CVE-2016-2838 Buffer overflow rendering SVG with bidirectional content\n\n - MFSA 2016-65/CVE-2016-2839 Cairo rendering crash due to memory allocation issue with FFmpeg 0.10\n\n - MFSA 2016-67/CVE-2016-5252 Stack underflow during 2D graphics rendering\n\n - MFSA 2016-70/CVE-2016-5254 Use-after-free when using alt key and toplevel menus\n\n - MFSA 2016-72/CVE-2016-5258 Use-after-free in DTLS during WebRTC session shutdown\n\n - MFSA 2016-73/CVE-2016-5259 Use-after-free in service workers with nested sync events\n\n - MFSA 2016-76/CVE-2016-5262 Scripts on marquee tag can execute in sandboxed iframes\n\n - MFSA 2016-77/CVE-2016-2837 Buffer overflow in ClearKey Content Decryption Module (CDM) during video playback\n\n - MFSA 2016-78/CVE-2016-5263 Type confusion in display transformation\n\n - MFSA 2016-79/CVE-2016-5264 Use-after-free when applying SVG effects\n\n - MFSA 2016-80/CVE-2016-5265 Same-origin policy violation using local HTML file and saved shortcut file\n\n - CVE-2016-6354: Fix for possible buffer overrun (bsc#990856) Also a temporary workaround was added :\n\n - Temporarily bind Firefox to the first CPU as a hotfix for an apparent race condition (bsc#989196, bsc#990628)\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "published": "2016-09-02T00:00:00", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=93302", "cvelist": ["CVE-2016-5252", "CVE-2016-5259", "CVE-2016-5254", "CVE-2016-6354", "CVE-2016-5265", "CVE-2016-5264", "CVE-2016-5258", "CVE-2016-2839", "CVE-2016-5263", "CVE-2016-2838", "CVE-2016-2835", "CVE-2016-2836", "CVE-2016-2837", "CVE-2016-5262", "CVE-2016-2830"], "lastseen": "2017-10-29T13:37:56"}], "openvas": [{"id": "OPENVAS:1361412562310808770", "type": "openvas", "title": "Fedora Update for flex FEDORA-2016-c9ad9582f7", "description": "Check the version of flex", "published": "2016-08-09T00:00:00", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310808770", "cvelist": ["CVE-2016-6354"], "lastseen": "2017-07-25T10:55:00"}, {"id": "OPENVAS:703653", "type": "openvas", "title": "Debian Security Advisory DSA 3653-1 (flex - security update)", "description": "Alexander Sulfrian discovered a buffer\noverflow in the yy_get_next_buffer() function generated by Flex, which may result\nin denial of service and potentially the execution of code if operating on\ndata from untrusted sources.\n\nAffected applications need to be rebuild. bogofilter will be rebuild\nagainst the updated flex in a followup update. Further affected\napplications should be reported at the bug referenced above.", "published": "2016-08-25T00:00:00", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "http://plugins.openvas.org/nasl.php?oid=703653", "cvelist": ["CVE-2016-6354"], "lastseen": "2017-07-24T12:54:56"}, {"id": "OPENVAS:1361412562310851483", "type": "openvas", "title": "SuSE Update for seamonkey openSUSE-SU-2017:0356-1 (seamonkey)", "description": "Check the version of seamonkey", "published": "2017-02-03T00:00:00", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310851483", "cvelist": ["CVE-2016-6354"], "lastseen": "2017-12-12T11:21:46"}, {"id": "OPENVAS:1361412562310703653", "type": "openvas", "title": "Debian Security Advisory DSA 3653-1 (flex - security update)", "description": "Alexander Sulfrian discovered a buffer\noverflow in the yy_get_next_buffer() function generated by Flex, which may result\nin denial of service and potentially the execution of code if operating on\ndata from untrusted sources.\n\nAffected applications need to be rebuild. bogofilter will be rebuild\nagainst the updated flex in a followup update. Further affected\napplications should be reported at the bug referenced above.", "published": "2016-08-25T00:00:00", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310703653", "cvelist": ["CVE-2016-6354"], "lastseen": "2017-12-18T11:06:00"}, {"id": "OPENVAS:1361412562310872106", "type": "openvas", "title": "Fedora Update for flex FEDORA-2016-8d79ade826", "description": "Check the version of flex", "published": "2016-12-10T00:00:00", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310872106", "cvelist": ["CVE-2016-6354"], "lastseen": "2017-07-25T10:54:32"}, {"id": "OPENVAS:1361412562310810752", "type": "openvas", "title": "Mozilla Firefox Security Updates(mfsa_2017-10_2017-12)-MAC OS X", "description": "This host is installed with Mozilla Firefox\n and is prone to multiple vulnerabilities.", "published": "2017-04-20T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310810752", "cvelist": ["CVE-2017-5451", "CVE-2017-5462", "CVE-2017-5436", "CVE-2016-1019", "CVE-2017-5441", "CVE-2017-5442", "CVE-2017-5446", "CVE-2017-5434", "CVE-2017-5465", "CVE-2016-6354", "CVE-2017-5429", "CVE-2017-5440", "CVE-2017-5458", "CVE-2017-5435", "CVE-2017-5432", "CVE-2017-5469", "CVE-2017-5455", "CVE-2017-5438", "CVE-2017-5439", "CVE-2017-5445", "CVE-2017-5450", "CVE-2017-5433", "CVE-2017-5447", "CVE-2017-5466", "CVE-2017-5444", "CVE-2017-5467", "CVE-2017-5460", "CVE-2017-5449", "CVE-2017-5454", "CVE-2017-5461", "CVE-2017-5437", "CVE-2017-5456", "CVE-2017-5453", "CVE-2017-5468", "CVE-2017-5430", "CVE-2017-5463", "CVE-2017-5452", "CVE-2017-5448", "CVE-2017-5459", "CVE-2017-5443", "CVE-2017-5464"], "lastseen": "2018-04-06T11:41:30"}, {"id": "OPENVAS:1361412562310810751", "type": "openvas", "title": "Mozilla Firefox Security Updates(mfsa_2017-10_2017-12)-Windows", "description": "This host is installed with Mozilla Firefox\n and is prone to multiple vulnerabilities.", "published": "2017-04-20T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310810751", "cvelist": ["CVE-2017-5451", "CVE-2017-5462", "CVE-2017-5436", "CVE-2016-1019", "CVE-2017-5441", "CVE-2017-5442", "CVE-2017-5446", "CVE-2017-5434", "CVE-2017-5465", "CVE-2016-6354", "CVE-2017-5429", "CVE-2017-5440", "CVE-2017-5458", "CVE-2017-5435", "CVE-2017-5432", "CVE-2017-5469", "CVE-2017-5455", "CVE-2017-5438", "CVE-2017-5439", "CVE-2017-5445", "CVE-2017-5450", "CVE-2017-5433", "CVE-2017-5447", "CVE-2017-5466", "CVE-2017-5444", "CVE-2017-5467", "CVE-2017-5460", "CVE-2017-5449", "CVE-2017-5454", "CVE-2017-5461", "CVE-2017-5437", "CVE-2017-5456", "CVE-2017-5453", "CVE-2017-5468", "CVE-2017-5430", "CVE-2017-5463", "CVE-2017-5452", "CVE-2017-5448", "CVE-2017-5459", "CVE-2017-5443", "CVE-2017-5464"], "lastseen": "2018-04-06T11:41:11"}], "gentoo": [{"id": "GLSA-201701-31", "type": "gentoo", "title": "flex: Potential insecure code generation", "description": "### Background\n\nflex is a programming tool used to generate scanners (programs which recognize lexical patterns in text). \n\n### Description\n\nA heap-based buffer overflow in the yy_get_next_buffer function in Flex might allow context-dependent attackers to cause a denial of service or possibly execute arbitrary code via vectors involving num_to_read. \n\n### Impact\n\nContext-dependent attackers could cause a Denial of Service condition or possibly execute arbitrary code with the privileges of the process. \n\n### Workaround\n\nThere is no known workaround at this time.\n\n### Resolution\n\nAll flex users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=sys-devel/flex-2.6.1\"\n \n\nPackages which depend on flex may need to be recompiled. Tools such as qdepends (included in app-portage/portage-utils) may assist in identifying these packages: \n \n \n # emerge --oneshot --ask --verbose $(qdepends -CQ sys-devel/flex | sed\n 's/^/=/')", "published": "2017-01-11T00:00:00", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://security.gentoo.org/glsa/201701-31", "cvelist": ["CVE-2016-6354"], "lastseen": "2017-01-11T14:15:25"}, {"id": "GLSA-201802-03", "type": "gentoo", "title": "Mozilla Firefox: Multiple vulnerabilities", "description": "### Background\n\nMozilla Firefox is a popular open-source web browser from the Mozilla Project. \n\n### Description\n\nMultiple vulnerabilities have been discovered in Mozilla Firefox. Please review the referenced CVE identifiers for details. \n\n### Impact\n\nA remote attacker could entice a user to view a specially crafted web page, possibly resulting in the execution of arbitrary code with the privileges of the process or a Denial of Service condition. Furthermore, a remote attacker may be able to perform Man-in-the-Middle attacks, obtain sensitive information, spoof the address bar, conduct clickjacking attacks, bypass security restrictions and protection mechanisms, or have other unspecified impact. \n\n### Workaround\n\nThere is no known workaround at this time.\n\n### Resolution\n\nAll Mozilla Firefox users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=www-client/firefox-52.6.0\"\n \n\nAll Mozilla Firefox binary users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=www-client/firefox-bin-52.6.0\"", "published": "2018-02-20T00:00:00", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://security.gentoo.org/glsa/201802-03", "cvelist": ["CVE-2017-7772", "CVE-2017-7757", "CVE-2017-7754", "CVE-2017-7758", "CVE-2017-7773", "CVE-2017-7752", "CVE-2017-7791", "CVE-2017-7784", "CVE-2017-7824", "CVE-2017-5462", "CVE-2017-7800", "CVE-2017-7753", "CVE-2017-5436", "CVE-2017-7801", "CVE-2017-7810", "CVE-2018-5097", "CVE-2017-7778", "CVE-2017-5441", "CVE-2017-5472", "CVE-2016-10197", "CVE-2017-5442", "CVE-2017-5446", "CVE-2018-5089", "CVE-2017-5434", "CVE-2018-5091", "CVE-2017-7756", "CVE-2018-5096", "CVE-2017-5465", "CVE-2018-5095", "CVE-2017-7843", "CVE-2016-6354", "CVE-2017-7764", "CVE-2017-7771", "CVE-2018-5098", "CVE-2017-5429", "CVE-2018-5102", "CVE-2017-5440", "CVE-2017-5435", "CVE-2017-7802", "CVE-2017-7787", "CVE-2017-5432", "CVE-2017-5469", "CVE-2017-7749", "CVE-2017-7805", "CVE-2017-5470", "CVE-2017-5438", "CVE-2017-5439", "CVE-2017-7779", "CVE-2017-5445", "CVE-2016-10196", "CVE-2017-7785", "CVE-2017-5433", "CVE-2017-7751", "CVE-2017-7823", "CVE-2018-5117", "CVE-2017-7807", "CVE-2017-5447", "CVE-2017-5444", "CVE-2017-7750", "CVE-2017-5460", "CVE-2017-7777", "CVE-2018-5104", "CVE-2017-7809", "CVE-2017-7775", "CVE-2018-5103", "CVE-2017-7798", "CVE-2017-7786", "CVE-2017-7774", "CVE-2017-7776", "CVE-2017-7844", "CVE-2017-7819", "CVE-2017-5461", "CVE-2017-5437", "CVE-2017-7803", "CVE-2017-7792", "CVE-2018-5099", "CVE-2017-7793", "CVE-2017-7818", "CVE-2017-5448", "CVE-2017-5459", "CVE-2016-10195", "CVE-2017-5443", "CVE-2017-7814", "CVE-2017-5464"], "lastseen": "2018-02-20T04:07:02"}], "debian": [{"id": "DSA-3653", "type": "debian", "title": "flex -- security update", "description": "Alexander Sulfrian discovered a buffer overflow in the yy_get_next_buffer() function generated by Flex, which may result in denial of service and potentially the execution of code if operating on data from untrusted sources.\n\nAffected applications need to be rebuild. bogofilter will be rebuild against the updated flex in a followup update. Further affected applications should be reported at the bug referenced above.\n\nFor the stable distribution (jessie), this problem has been fixed in version 2.5.39-8+deb8u1.\n\nFor the testing distribution (stretch), this problem has been fixed in version 2.6.1-1.\n\nFor the unstable distribution (sid), this problem has been fixed in version 2.6.1-1.\n\nWe recommend that you upgrade your flex packages.", "published": "2016-08-25T00:00:00", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "http://www.debian.org/security/dsa-3653", "cvelist": ["CVE-2016-6354"], "lastseen": "2017-10-05T13:14:55"}], "suse": [{"id": "OPENSUSE-SU-2017:0356-1", "type": "suse", "title": "Security update for seamonkey (important)", "description": "This update for Seamonkey to version 2.46 fixes security issues and bugs.\n\n The following vulnerabilities were fixed:\n\n - Fix all Gecko related security issues between 43.0.1 and 49.0.2\n - CVE-2016-6354: buffer overrun in flex (boo#990856)\n\n The following non-security changes are included:\n\n - improve recognition of LANGUAGE env variable (boo#1017174)\n - improve TLS compatibility with certain websites (boo#1021636)\n - Seamonkey now requires NSPR 4.12 and NSS 3.25\n - based on Gecko 49.0.2\n - Chatzilla and DOM Inspector were disabled\n\n", "published": "2017-02-02T00:10:33", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00001.html", "cvelist": ["CVE-2016-6354"], "lastseen": "2017-02-02T00:59:49"}, {"id": "SUSE-SU-2016:2195-1", "type": "suse", "title": "Security update for MozillaFirefox (important)", "description": "MozillaFirefox was updated to 45.3.0 ESR to fix the following issues\n (bsc#991809):\n\n * MFSA 2016-62/CVE-2016-2835/CVE-2016-2836 Miscellaneous memory safety\n hazards (rv:48.0 / rv:45.3)\n * MFSA 2016-63/CVE-2016-2830 Favicon network connection can persist when\n page is closed\n * MFSA 2016-64/CVE-2016-2838 Buffer overflow rendering SVG with\n bidirectional content\n * MFSA 2016-65/CVE-2016-2839 Cairo rendering crash due to memory\n allocation issue with FFmpeg 0.10\n * MFSA 2016-67/CVE-2016-5252 Stack underflow during 2D graphics rendering\n * MFSA 2016-70/CVE-2016-5254 Use-after-free when using alt key and\n toplevel menus\n * MFSA 2016-72/CVE-2016-5258 Use-after-free in DTLS during WebRTC session\n shutdown\n * MFSA 2016-73/CVE-2016-5259 Use-after-free in service workers with nested\n sync events\n * MFSA 2016-76/CVE-2016-5262 Scripts on marquee tag can execute in\n sandboxed iframes\n * MFSA 2016-77/CVE-2016-2837 Buffer overflow in ClearKey Content\n Decryption Module (CDM) during video playback\n * MFSA 2016-78/CVE-2016-5263 Type confusion in display transformation\n * MFSA 2016-79/CVE-2016-5264 Use-after-free when applying SVG effects\n * MFSA 2016-80/CVE-2016-5265 Same-origin policy violation using local HTML\n file and saved shortcut file\n * CVE-2016-6354: Fix for possible buffer overrun (bsc#990856)\n\n Also a temporary workaround was added:\n - Temporarily bind Firefox to the first CPU as a hotfix for an apparent\n race condition (bsc#989196, bsc#990628)\n\n", "published": "2016-08-30T19:09:51", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00056.html", "cvelist": ["CVE-2016-5252", "CVE-2016-5259", "CVE-2016-5254", "CVE-2016-6354", "CVE-2016-5265", "CVE-2016-5264", "CVE-2016-5258", "CVE-2016-2839", "CVE-2016-5263", "CVE-2016-2838", "CVE-2016-2835", "CVE-2016-2836", "CVE-2016-2837", "CVE-2016-5262", "CVE-2016-2830"], "lastseen": "2016-09-04T12:13:39"}, {"id": "SUSE-SU-2016:2131-1", "type": "suse", "title": "Security update for MozillaFirefox (important)", "description": "MozillaFirefox was updated to 45.3.0 ESR to fix the following issues\n (bsc#991809):\n\n * MFSA 2016-62/CVE-2016-2835/CVE-2016-2836 Miscellaneous memory safety\n hazards (rv:48.0 / rv:45.3)\n * MFSA 2016-63/CVE-2016-2830 Favicon network connection can persist when\n page is closed\n * MFSA 2016-64/CVE-2016-2838 Buffer overflow rendering SVG with\n bidirectional content\n * MFSA 2016-65/CVE-2016-2839 Cairo rendering crash due to memory\n allocation issue with FFmpeg 0.10\n * MFSA 2016-67/CVE-2016-5252 Stack underflow during 2D graphics rendering\n * MFSA 2016-70/CVE-2016-5254 Use-after-free when using alt key and\n toplevel menus\n * MFSA 2016-72/CVE-2016-5258 Use-after-free in DTLS during WebRTC session\n shutdown\n * MFSA 2016-73/CVE-2016-5259 Use-after-free in service workers with nested\n sync events\n * MFSA 2016-76/CVE-2016-5262 Scripts on marquee tag can execute in\n sandboxed iframes\n * MFSA 2016-77/CVE-2016-2837 Buffer overflow in ClearKey Content\n Decryption Module (CDM) during video playback\n * MFSA 2016-78/CVE-2016-5263 Type confusion in display transformation\n * MFSA 2016-79/CVE-2016-5264 Use-after-free when applying SVG effects\n * MFSA 2016-80/CVE-2016-5265 Same-origin policy violation using local HTML\n file and saved shortcut file\n * CVE-2016-6354: Fix for possible buffer overrun (bsc#990856)\n\n Also a temporary workaround was added:\n - Temporarily bind Firefox to the first CPU as a hotfix for an apparent\n race condition (bsc#989196, bsc#990628)\n\n", "published": "2016-08-22T20:09:28", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00045.html", "cvelist": ["CVE-2016-5252", "CVE-2016-5259", "CVE-2016-5254", "CVE-2016-6354", "CVE-2016-5265", "CVE-2016-5264", "CVE-2016-5258", "CVE-2016-2839", "CVE-2016-5263", "CVE-2016-2838", "CVE-2016-2835", "CVE-2016-2836", "CVE-2016-2837", "CVE-2016-5262", "CVE-2016-2830"], "lastseen": "2016-09-04T12:29:54"}, {"id": "SUSE-SU-2016:2061-1", "type": "suse", "title": "Security update for MozillaFirefox, MozillaFirefox-branding-SLED, mozilla-nspr and mozilla-nss (important)", "description": "MozillaFirefox, MozillaFirefox-branding-SLE, mozilla-nspr and mozilla-nss\n were updated to fix nine security issues.\n\n MozillaFirefox was updated to version 45.3.0 ESR. mozilla-nss was updated\n to version 3.21.1, mozilla-nspr to version 4.12.\n\n These security issues were fixed in 45.3.0ESR:\n - CVE-2016-2835/CVE-2016-2836: Miscellaneous memory safety hazards\n (rv:48.0 / rv:45.3) (MFSA 2016-62)\n - CVE-2016-2830: Favicon network connection can persist when page is\n closed (MFSA 2016-63)\n - CVE-2016-2838: Buffer overflow rendering SVG with bidirectional content\n (MFSA 2016-64)\n - CVE-2016-2839: Cairo rendering crash due to memory allocation issue with\n FFmpeg 0.10 (MFSA 2016-65)\n - CVE-2016-5252: Stack underflow during 2D graphics rendering (MFSA\n 2016-67)\n - CVE-2016-5254: Use-after-free when using alt key and toplevel menus\n (MFSA 2016-70)\n - CVE-2016-5258: Use-after-free in DTLS during WebRTC session shutdown\n (MFSA 2016-72)\n - CVE-2016-5259: Use-after-free in service workers with nested sync events\n (MFSA 2016-73)\n - CVE-2016-5262: Scripts on marquee tag can execute in sandboxed iframes\n (MFSA 2016-76)\n - CVE-2016-2837: Buffer overflow in ClearKey Content Decryption Module\n (CDM) during video playback (MFSA 2016-77)\n - CVE-2016-5263: Type confusion in display transformation (MFSA 2016-78)\n - CVE-2016-5264: Use-after-free when applying SVG effects (MFSA 2016-79)\n - CVE-2016-5265: Same-origin policy violation using local HTML file and\n saved shortcut file (MFSA 2016-80)\n - CVE-2016-6354: Fix for possible buffer overrun (bsc#990856)\n\n Security issues fixed in 45.2.0.ESR:\n - CVE-2016-2834: Memory safety bugs in NSS (MFSA 2016-61) (bsc#983639).\n - CVE-2016-2824: Out-of-bounds write with WebGL shader (MFSA 2016-53)\n (bsc#983651).\n - CVE-2016-2822: Addressbar spoofing though the SELECT element (MFSA\n 2016-52) (bsc#983652).\n - CVE-2016-2821: Use-after-free deleting tables from a contenteditable\n document (MFSA 2016-51) (bsc#983653).\n - CVE-2016-2819: Buffer overflow parsing HTML5 fragments (MFSA 2016-50)\n (bsc#983655).\n - CVE-2016-2828: Use-after-free when textures are used in WebGL operations\n after recycle pool destruction (MFSA 2016-56) (bsc#983646).\n - CVE-2016-2831: Entering fullscreen and persistent pointerlock without\n user permission (MFSA 2016-58) (bsc#983643).\n - CVE-2016-2815, CVE-2016-2818: Miscellaneous memory safety hazards (MFSA\n 2016-49) (bsc#983638)\n\n These non-security issues were fixed:\n - Fix crashes on aarch64\n * Determine page size at runtime (bsc#984006)\n * Allow aarch64 to work in safe mode (bsc#985659)\n - Fix crashes on mainframes\n - Temporarily bind Firefox to the first CPU as a hotfix for an apparent\n race condition (bsc#989196, bsc#990628)\n\n All extensions must now be signed by addons.mozilla.org. Please read\n README.SUSE for more details.\n\n", "published": "2016-08-12T21:10:19", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00036.html", "cvelist": ["CVE-2016-2824", "CVE-2016-5252", "CVE-2016-5259", "CVE-2016-2828", "CVE-2016-5254", "CVE-2016-6354", "CVE-2016-2815", "CVE-2016-5265", "CVE-2016-2834", "CVE-2016-5264", "CVE-2016-5258", "CVE-2016-2822", "CVE-2016-2818", "CVE-2016-2839", "CVE-2016-5263", "CVE-2016-2819", "CVE-2016-2838", "CVE-2016-2835", "CVE-2016-2836", "CVE-2016-2837", "CVE-2016-5262", "CVE-2016-2821", "CVE-2016-2830", "CVE-2016-2831"], "lastseen": "2016-09-04T12:15:08"}], "mozilla": [{"id": "MFSA2017-13", "type": "mozilla", "title": "Security vulnerabilities fixed in Thunderbird 52.1MenuClose", "description": "A use-after-free vulnerability in SMIL animation functions occurs when pointers to animation elements in an array are dropped from the animation controller while still in use. This results in a potentially exploitable crash.\nA use-after-free vulnerability occurs during transaction processing in the editor during design mode interactions. This results in a potentially exploitable crash.\nAn out-of-bounds write in the Graphite 2 library triggered with a maliciously crafted Graphite font. This results in a potentially exploitable crash. This issue was fixed in the Graphite 2 library as well as Mozilla products.\nAn out-of-bounds write during Base64 decoding operation in the Network Security Services (NSS) library due to insufficient memory being allocated to the buffer. This results in a potentially exploitable crash. The NSS library has been updated to fix this issue to address this issue and Firefox ESR 52.1 has been updated with NSS version 3.28.4.\nA buffer overflow in WebGL triggerable by web content, resulting in a potentially exploitable crash.\nIf a page is loaded from an original site through a hyperlink and contains a redirect to a data:text/html URL, triggering a reload will run the reloaded data:text/html page with its origin set incorrectly. This allows for a cross-site scripting (XSS) attack.\nA use-after-free vulnerability occurs when redirecting focus handling which results in a potentially exploitable crash.\nA use-after-free vulnerability occurs during certain text input selection resulting in a potentially exploitable crash.\nA use-after-free vulnerability in frame selection triggered by a combination of malicious script content and key presses by a user. This results in a potentially exploitable crash.\nA use-after-free vulnerability during XSLT processing due to the result handler being held by a freed handler during handling. This results in a potentially exploitable crash.\nA use-after-free vulnerability during XSLT processing due to poor handling of template parameters. This results in a potentially exploitable crash.\nA use-after-free vulnerability during XSLT processing due to a failure to propagate error conditions during matching while evaluating context, leading to objects being used when they no longer exist. This results in a potentially exploitable crash.\nA use-after-free vulnerability when holding a selection during scroll events. This results in a potentially exploitable crash.\nA use-after-free vulnerability during changes in style when manipulating DOM elements. This results in a potentially exploitable crash.\nDuring DOM manipulations of the accessibility tree through script, the DOM tree can become out of sync with the accessibility tree, leading to memory corruption and a potentially exploitable crash. \nAn out-of-bounds write vulnerability while decoding improperly formed BinHex format archives.\nA buffer overflow vulnerability while parsing application/http-index-format format content when the header contains improperly formatted data. This allows for an out-of-bounds read of data from memory.\nAn out-of-bounds read when an HTTP/2 connection to a servers sends DATA frames with incorrect data content. This leads to a potentially exploitable crash. \nAn out-of-bounds read during the processing of glyph widths during text layout. This results in a potentially exploitable crash and could allow an attacker to read otherwise inaccessible memory. \nAn out-of-bounds read while processing SVG content in ConvolvePixel. This results in a crash and also allows for otherwise inaccessible memory being copied into SVG graphic content, which could then displayed.\nThree vulnerabilities were reported in the Libevent library that allow for out-of-bounds reads and denial of service (DoS) attacks. These were fixed in the Libevent library and these changes were ported to Mozilla code.\nA mechanism to bypass file system access protections in the sandbox to use the file picker to access different files than those selected in the file picker through the use of relative paths. This allows for read only access to the local file system.\nFixed potential buffer overflows in generated Firefox code due to CVE-2016-6354 issue in Flex.\nA vulnerability while parsing application/http-index-format format content where uninitialized values are used to create an array. This could allow the reading of uninitialized memory into the arrays affected.\nA possibly exploitable crash triggered during layout and manipulation of bidirectional unicode text in concert with CSS animations.\nA mechanism to spoof the addressbar through the user interaction on the addressbar and the onblur event. The event could be used by script to affect text display to make the loaded site appear to be different from the one actually loaded within the addressbar.\nA flaw in DRBG number generation within the Network Security Services (NSS) library where the internal state V does not correctly carry bits over. The NSS library has been updated to fix this issue to address this issue and Firefox ESR 52.1 has been updated with NSS version 3.28.4.\nA potential memory corruption and crash when using Skia content when drawing content outside of the bounds of a clipping region.\nMozilla developers and community members Christian Holler, Jon Coppeard, Milan Sreckovic, Tyson Smith, Ronald Crane, Randell Jesup, Philipp, Tooru Fujisawa, and Kan-Ru Chen reported memory safety bugs present in Firefox 52, Firefox ESR 52, and Thunderbird 52. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code.\nMozilla developers and community members Christian Holler, Jon Coppeard, Marcia Knous, David Baron, Mats Palmgren, Ronald Crane, Bob Clary, and Chris Peterson reported memory safety bugs present in Firefox 52, Firefox ESR 45.8, Firefox ESR 52, and Thunderbird 52. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code.", "published": "2017-04-30T00:00:00", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "http://www.mozilla.org/en-US/security/advisories/mfsa2017-13/", "cvelist": ["CVE-2016-10197", "CVE-2016-6354", "CVE-2016-10195"], "lastseen": "2017-05-01T21:18:53"}, {"id": "MFSA2017-12", "type": "mozilla", "title": "Security vulnerabilities fixed in Firefox ESR 52.1MenuMozilla", "description": "A use-after-free vulnerability in SMIL animation functions occurs when pointers to animation elements in an array are dropped from the animation controller while still in use. This results in a potentially exploitable crash.\nA use-after-free vulnerability occurs during transaction processing in the editor during design mode interactions. This results in a potentially exploitable crash.\nAn out-of-bounds write in the Graphite 2 library triggered with a maliciously crafted Graphite font. This results in a potentially exploitable crash. This issue was fixed in the Graphite 2 library as well as Mozilla products.\nAn out-of-bounds write during Base64 decoding operation in the Network Security Services (NSS) library due to insufficient memory being allocated to the buffer. This results in a potentially exploitable crash. The NSS library has been updated to fix this issue to address this issue and Firefox 53 has been updated with NSS version 3.28.4.\nA buffer overflow in WebGL triggerable by web content, resulting in a potentially exploitable crash.\nIf a page is loaded from an original site through a hyperlink and contains a redirect to a data:text/html URL, triggering a reload will run the reloaded data:text/html page with its origin set incorrectly. This allows for a cross-site scripting (XSS) attack.\nA use-after-free vulnerability occurs when redirecting focus handling which results in a potentially exploitable crash.\nA use-after-free vulnerability occurs during certain text input selection resulting in a potentially exploitable crash.\nA use-after-free vulnerability in frame selection triggered by a combination of malicious script content and key presses by a user. This results in a potentially exploitable crash.\nA use-after-free vulnerability during XSLT processing due to the result handler being held by a freed handler during handling. This results in a potentially exploitable crash.\nA use-after-free vulnerability during XSLT processing due to poor handling of template parameters. This results in a potentially exploitable crash.\nA use-after-free vulnerability during XSLT processing due to a failure to propagate error conditions during matching while evaluating context, leading to objects being used when they no longer exist. This results in a potentially exploitable crash.\nA use-after-free vulnerability when holding a selection during scroll events. This results in a potentially exploitable crash.\nA use-after-free vulnerability during changes in style when manipulating DOM elements. This results in a potentially exploitable crash.\nDuring DOM manipulations of the accessibility tree through script, the DOM tree can become out of sync with the accessibility tree, leading to memory corruption and a potentially exploitable crash. \nAn out-of-bounds write vulnerability while decoding improperly formed BinHex format archives.\nA buffer overflow vulnerability while parsing application/http-index-format format content when the header contains improperly formatted data. This allows for an out-of-bounds read of data from memory.\nAn out-of-bounds read when an HTTP/2 connection to a servers sends DATA frames with incorrect data content. This leads to a potentially exploitable crash. \nAn out-of-bounds read during the processing of glyph widths during text layout. This results in a potentially exploitable crash and could allow an attacker to read otherwise inaccessible memory. \nAn out-of-bounds read while processing SVG content in ConvolvePixel. This results in a crash and also allows for otherwise inaccessible memory being copied into SVG graphic content, which could then displayed.\nAn out-of-bounds write in ClearKeyDecryptor while decrypting some Clearkey-encrypted media content. The ClearKeyDecryptor code runs within the Gecko Media Plugin (GMP) sandbox. If a second mechanism is found to escape the sandbox, this vulnerability allows for the writing of arbitrary data within memory, resulting in a potentially exploitable crash.\nThree vulnerabilities were reported in the Libevent library that allow for out-of-bounds reads and denial of service (DoS) attacks: CVE-2016-10195, CVE-2016-10196, and CVE-2016-10197. These were fixed in the Libevent library and these changes were ported to Mozilla code.\nA mechanism to bypass file system access protections in the sandbox to use the file picker to access different files than those selected in the file picker through the use of relative paths. This allows for read only access to the local file system.\nThe internal feed reader APIs that crossed the sandbox barrier allowed for a sandbox escape and escalation of privilege if combined with another vulnerability that resulted in remote code execution inside the sandboxed process. \nA mechanism to bypass file system access protections in the sandbox using the file system request constructor through an IPC message. This allows for read and write access to the local file system.\nFixed potential buffer overflows in generated Firefox code due to CVE-2016-6354 issue in Flex.\nA vulnerability while parsing application/http-index-format format content where uninitialized values are used to create an array. This could allow the reading of uninitialized memory into the arrays affected.\nA possibly exploitable crash triggered during layout and manipulation of bidirectional unicode text in concert with CSS animations.\nA mechanism to spoof the addressbar through the user interaction on the addressbar and the onblur event. The event could be used by script to affect text display to make the loaded site appear to be different from the one actually loaded within the addressbar.\nA flaw in DRBG number generation within the Network Security Services (NSS) library where the internal state V does not correctly carry bits over. The NSS library has been updated to fix this issue to address this issue and Firefox 53 has been updated with NSS version 3.28.4.\nA potential memory corruption and crash when using Skia content when drawing content outside of the bounds of a clipping region.\nMozilla developers and community members Christian Holler, Jon Coppeard, Milan Sreckovic, Tyson Smith, Ronald Crane, Randell Jesup, Philipp, Tooru Fujisawa, and Kan-Ru Chen reported memory safety bugs present in Firefox 52 and Firefox ESR 52. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code.\nMozilla developers and community members Christian Holler, Jon Coppeard, Marcia Knous, David Baron, Mats Palmgren, Ronald Crane, Bob Clary, and Chris Peterson reported memory safety bugs present in Firefox 52, Firefox ESR 45.8, and Firefox ESR 52. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code.", "published": "2017-04-19T00:00:00", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "http://www.mozilla.org/en-US/security/advisories/mfsa2017-12/", "cvelist": ["CVE-2016-10197", "CVE-2016-6354", "CVE-2016-10196", "CVE-2016-10195"], "lastseen": "2017-04-19T17:18:12"}, {"id": "MFSA2017-10", "type": "mozilla", "title": "Security vulnerabilities fixed in Firefox 53MenuMozilla", "description": "A use-after-free vulnerability in SMIL animation functions occurs when pointers to animation elements in an array are dropped from the animation controller while still in use. This results in a potentially exploitable crash.\nA use-after-free vulnerability occurs during transaction processing in the editor during design mode interactions. This results in a potentially exploitable crash.\nAn out-of-bounds write in the Graphite 2 library triggered with a maliciously crafted Graphite font. This results in a potentially exploitable crash. This issue was fixed in the Graphite 2 library as well as Mozilla products.\nAn out-of-bounds write during Base64 decoding operation in the Network Security Services (NSS) library due to insufficient memory being allocated to the buffer. This results in a potentially exploitable crash. The NSS library has been updated to fix this issue to address this issue and Firefox 53 has been updated with NSS version 3.29.5.\nA buffer overflow in WebGL triggerable by web content, resulting in a potentially exploitable crash.\nIf a page is loaded from an original site through a hyperlink and contains a redirect to a data:text/html URL, triggering a reload will run the reloaded data:text/html page with its origin set incorrectly. This allows for a cross-site scripting (XSS) attack.\nA use-after-free vulnerability occurs when redirecting focus handling which results in a potentially exploitable crash.\nA use-after-free vulnerability occurs during certain text input selection resulting in a potentially exploitable crash.\nA use-after-free vulnerability in frame selection triggered by a combination of malicious script content and key presses by a user. This results in a potentially exploitable crash.\nA use-after-free vulnerability during XSLT processing due to the result handler being held by a freed handler during handling. This results in a potentially exploitable crash.\nA use-after-free vulnerability during XSLT processing due to poor handling of template parameters. This results in a potentially exploitable crash.\nA use-after-free vulnerability during XSLT processing due to a failure to propagate error conditions during matching while evaluating context, leading to objects being used when they no longer exist. This results in a potentially exploitable crash.\nA use-after-free vulnerability when holding a selection during scroll events. This results in a potentially exploitable crash.\nA use-after-free vulnerability during changes in style when manipulating DOM elements. This results in a potentially exploitable crash.\nDuring DOM manipulations of the accessibility tree through script, the DOM tree can become out of sync with the accessibility tree, leading to memory corruption and a potentially exploitable crash. \nAn out-of-bounds write vulnerability while decoding improperly formed BinHex format archives.\nA buffer overflow vulnerability while parsing application/http-index-format format content when the header contains improperly formatted data. This allows for an out-of-bounds read of data from memory.\nAn out-of-bounds read when an HTTP/2 connection to a servers sends DATA frames with incorrect data content. This leads to a potentially exploitable crash. \nAn out-of-bounds read during the processing of glyph widths during text layout. This results in a potentially exploitable crash and could allow an attacker to read otherwise inaccessible memory. \nAn out-of-bounds read while processing SVG content in ConvolvePixel. This results in a crash and also allows for otherwise inaccessible memory being copied into SVG graphic content, which could then displayed.\nAn out-of-bounds write in ClearKeyDecryptor while decrypting some Clearkey-encrypted media content. The ClearKeyDecryptor code runs within the Gecko Media Plugin (GMP) sandbox. If a second mechanism is found to escape the sandbox, this vulnerability allows for the writing of arbitrary data within memory, resulting in a potentially exploitable crash.\nThree vulnerabilities were reported in the Libevent library that allow for out-of-bounds reads and denial of service (DoS) attacks: CVE-2016-10195, CVE-2016-10196, and CVE-2016-10197. These were fixed in the Libevent library and these changes were ported to Mozilla code.\nA mechanism to bypass file system access protections in the sandbox to use the file picker to access different files than those selected in the file picker through the use of relative paths. This allows for read only access to the local file system.\nThe internal feed reader APIs that crossed the sandbox barrier allowed for a sandbox escape and escalation of privilege if combined with another vulnerability that resulted in remote code execution inside the sandboxed process. \nA mechanism to bypass file system access protections in the sandbox using the file system request constructor through an IPC message. This allows for read and write access to the local file system.\nFixed potential buffer overflows in generated Firefox code due to CVE-2016-6354 issue in Flex.\nA vulnerability while parsing application/http-index-format format content where uninitialized values are used to create an array. This could allow the reading of uninitialized memory into the arrays affected.\nA possibly exploitable crash triggered during layout and manipulation of bidirectional unicode text in concert with CSS animations.\nA mechanism to spoof the Firefox for Android addressbar using a javascript: URI. On Firefox for Android, the base domain is parsed incorrectly, making the resulting location less visibly a spoofed site and showing an incorrect domain in appended notifications.\nA mechanism to spoof the addressbar through the user interaction on the addressbar and the onblur event. The event could be used by script to affect text display to make the loaded site appear to be different from the one actually loaded within the addressbar.\nA flaw in DRBG number generation within the Network Security Services (NSS) library where the internal state V does not correctly carry bits over. The NSS library has been updated to fix this issue to address this issue and Firefox 53 has been updated with NSS version 3.29.5.\nAndroid intents can be used to launch Firefox for Android in reader mode with a user specified URL. This allows an attacker to spoof the contents of the addressbar as displayed to users. Note: This attack only affects Firefox for Android. Other operating systems are not affected.\nA potential memory corruption and crash when using Skia content when drawing content outside of the bounds of a clipping region.\nMalicious sites can display a spoofed addressbar on a page when the existing location bar on the new page is scrolled out of view if an HTML editable page element is user selected. Note: This attack only affects Firefox for Android. Other operating systems are not affected.\nA mechanism to inject static HTML into the RSS reader preview page due to a failure to escape characters sent as URL parameters for a feed's TITLE element. This vulnerability allows for spoofing but no scripted content can be run.\nWhen a javascript: URL is drag and dropped by a user into the addressbar, the URL will be processed and executed. This allows for users to be socially engineered to execute an XSS attack on themselves.\nAn issue with incorrect ownership model of privateBrowsing information exposed through developer tools. This can result in a non-exploitable crash when manually triggered during debugging. \nMozilla developers and community members Christian Holler, Jon Coppeard, Milan Sreckovic, Tyson Smith, Ronald Crane, Randell Jesup, Philipp, Tooru Fujisawa, and Kan-Ru Chen reported memory safety bugs present in Firefox 52 and Firefox ESR 52. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code.\nMozilla developers and community members Christian Holler, Jon Coppeard, Marcia Knous, David Baron, Mats Palmgren, Ronald Crane, Bob Clary, and Chris Peterson reported memory safety bugs present in Firefox 52, Firefox ESR 45.8, and Firefox ESR 52. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code.", "published": "2017-04-19T00:00:00", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "http://www.mozilla.org/en-US/security/advisories/mfsa2017-10/", "cvelist": ["CVE-2016-10197", "CVE-2016-6354", "CVE-2016-10196", "CVE-2016-10195"], "lastseen": "2017-04-19T17:18:12"}, {"id": "MFSA2017-11", "type": "mozilla", "title": "Security vulnerabilities fixed in Firefox ESR 45.9MenuMozilla", "description": "A use-after-free vulnerability in SMIL animation functions occurs when pointers to animation elements in an array are dropped from the animation controller while still in use. This results in a potentially exploitable crash.\nA use-after-free vulnerability occurs during transaction processing in the editor during design mode interactions. This results in a potentially exploitable crash.\nAn out-of-bounds write in the Graphite 2 library triggered with a maliciously crafted Graphite font. This results in a potentially exploitable crash. This issue was fixed in the Graphite 2 library as well as Mozilla products.\nAn out-of-bounds write during Base64 decoding operation in the Network Security Services (NSS) library due to insufficient memory being allocated to the buffer. This results in a potentially exploitable crash. The NSS library has been updated to fix this issue to address this issue and Firefox 53 has been updated with NSS version 3.21.4.\nA buffer overflow in WebGL triggerable by web content, resulting in a potentially exploitable crash.\nA use-after-free vulnerability occurs when redirecting focus handling which results in a potentially exploitable crash.\nA use-after-free vulnerability occurs during certain text input selection resulting in a potentially exploitable crash.\nA use-after-free vulnerability in frame selection triggered by a combination of malicious script content and key presses by a user. This results in a potentially exploitable crash.\nA use-after-free vulnerability during XSLT processing due to the result handler being held by a freed handler during handling. This results in a potentially exploitable crash.\nA use-after-free vulnerability during XSLT processing due to poor handling of template parameters. This results in a potentially exploitable crash.\nA use-after-free vulnerability during XSLT processing due to a failure to propagate error conditions during matching while evaluating context, leading to objects being used when they no longer exist. This results in a potentially exploitable crash.\nA use-after-free vulnerability when holding a selection during scroll events. This results in a potentially exploitable crash.\nA use-after-free vulnerability during changes in style when manipulating DOM elements. This results in a potentially exploitable crash.\nDuring DOM manipulations of the accessibility tree through script, the DOM tree can become out of sync with the accessibility tree, leading to memory corruption and a potentially exploitable crash. \nAn out-of-bounds write vulnerability while decoding improperly formed BinHex format archives.\nA buffer overflow vulnerability while parsing application/http-index-format format content when the header contains improperly formatted data. This allows for an out-of-bounds read of data from memory.\nAn out-of-bounds read when an HTTP/2 connection to a servers sends DATA frames with incorrect data content. This leads to a potentially exploitable crash. \nAn out-of-bounds read during the processing of glyph widths during text layout. This results in a potentially exploitable crash and could allow an attacker to read otherwise inaccessible memory. \nAn out-of-bounds read while processing SVG content in ConvolvePixel. This results in a crash and also allows for otherwise inaccessible memory being copied into SVG graphic content, which could then displayed.\nAn out-of-bounds write in ClearKeyDecryptor while decrypting some Clearkey-encrypted media content. The ClearKeyDecryptor code runs within the Gecko Media Plugin (GMP) sandbox. If a second mechanism is found to escape the sandbox, this vulnerability allows for the writing of arbitrary data within memory, resulting in a potentially exploitable crash.\nThree vulnerabilities were reported in the Libevent library that allow for out-of-bounds reads and denial of service (DoS) attacks: CVE-2016-10195, CVE-2016-10196, and CVE-2016-10197. These were fixed in the Libevent library and these changes were ported to Mozilla code.\nFixed potential buffer overflows in generated Firefox code due to CVE-2016-6354 issue in Flex.\nA vulnerability while parsing application/http-index-format format content where uninitialized values are used to create an array. This could allow the reading of uninitialized memory into the arrays affected.\nA flaw in DRBG number generation within the Network Security Services (NSS) library where the internal state V does not correctly carry bits over. The NSS library has been updated to fix this issue to address this issue and Firefox 53 has been updated with NSS version 3.21.4.\nMozilla developers and community members Christian Holler, Jon Coppeard, Marcia Knous, David Baron, Mats Palmgren, Ronald Crane, Bob Clary, and Chris Peterson reported memory safety bugs present in Firefox 52, Firefox ESR 45.8, and Firefox ESR 52. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code.", "published": "2017-04-19T00:00:00", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "http://www.mozilla.org/en-US/security/advisories/mfsa2017-11/", "cvelist": ["CVE-2016-10197", "CVE-2016-6354", "CVE-2016-10196", "CVE-2016-10195"], "lastseen": "2017-04-19T17:18:12"}], "kaspersky": [{"id": "KLA11007", "type": "kaspersky", "title": "\r KLA11007Multiple vulnerabilities in Mozilla Thunderbird\t\t\t ", "description": "### *CVSS*:\n7.5\n\n### *Detect date*:\n04/30/2017\n\n### *Severity*:\nCritical\n\n### *Description*:\nMultiple serious vulnerabilities have been found in Mozilla Thunderbird. Malicious users can exploit these vulnerabilities to cause denial of service, gain privileges, execute arbitrary code, read and write local files.\n\n### *Affected products*:\nMozilla Thunderbird before 52.1\n\n### *Solution*:\nUpdate to latest version \n[Download Mozilla Thunderbird](<https://www.mozilla.org/en-US/thunderbird/>)\n\n### *Original advisories*:\n[MFSA 2017-13](<https://www.mozilla.org/en-US/security/advisories/mfsa2017-13/>) \n\n\n### *Impacts*:\nWLF \n\n### *Related products*:\n[Mozilla Thunderbird](<https://threats.kaspersky.com/en/product/Mozilla-Thunderbird/>)\n\n### *CVE-IDS*:\n[CVE-2017-5429](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5429>) \n[CVE-2017-5430](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5430>) \n[CVE-2017-5467](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5467>) \n[CVE-2017-5462](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5462>) \n[CVE-2017-5451](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5451>) \n[CVE-2017-5449](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5449>) \n[CVE-2017-5445](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5445>) \n[CVE-2017-5469](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5469>) \n[CVE-2017-5454](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5454>) \n[CVE-2017-5465](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5465>) \n[CVE-2017-5447](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5447>) \n[CVE-2017-5446](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5446>) \n[CVE-2017-5444](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5444>) \n[CVE-2017-5443](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5443>) \n[CVE-2017-5464](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5464>) \n[CVE-2017-5442](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5442>) \n[CVE-2017-5441](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5441>) \n[CVE-2017-5440](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5440>) \n[CVE-2017-5439](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5439>) \n[CVE-2017-5438](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5438>) \n[CVE-2017-5460](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5460>) \n[CVE-2017-5432](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5432>) \n[CVE-2017-5434](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5434>) \n[CVE-2017-5466](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5466>) \n[CVE-2017-5459](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5459>) \n[CVE-2017-5436](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5436>) \n[CVE-2017-5435](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5435>) \n[CVE-2017-5433](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5433>) \n[CVE-2017-5461](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5461>) \n[CVE-2016-10197](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10197>) \n[CVE-2016-10196](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10196>) \n[CVE-2016-10195](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10195>) \n[CVE-2016-6354](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6354>)", "published": "2017-04-30T00:00:00", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://threats.kaspersky.com/en/vulnerability/KLA11007", "cvelist": ["CVE-2017-5451", "CVE-2017-5462", "CVE-2017-5436", "CVE-2017-5441", "CVE-2016-10197", "CVE-2017-5442", "CVE-2017-5446", "CVE-2017-5434", "CVE-2017-5465", "CVE-2016-6354", "CVE-2017-5429", "CVE-2017-5440", "CVE-2017-5435", "CVE-2017-5432", "CVE-2017-5469", "CVE-2017-5438", "CVE-2017-5439", "CVE-2017-5445", "CVE-2016-10196", "CVE-2017-5433", "CVE-2017-5447", "CVE-2017-5466", "CVE-2017-5444", "CVE-2017-5467", "CVE-2017-5460", "CVE-2017-5449", "CVE-2017-5454", "CVE-2017-5461", "CVE-2017-5430", "CVE-2017-5459", "CVE-2016-10195", "CVE-2017-5443", "CVE-2017-5464"], "lastseen": "2018-03-30T14:11:23"}, {"id": "KLA11004", "type": "kaspersky", "title": "\r KLA11004Multiple vulnerabilities in Mozilla Firefox and Mozilla Firefox ESR\t\t\t ", "description": "### *CVSS*:\n7.5\n\n### *Detect date*:\n04/19/2017\n\n### *Severity*:\nCritical\n\n### *Description*:\nMultiple serious vulnerabilities have been found in Mozilla Firefox and Mozilla Firefox ESR. Malicious users can exploit these vulnerabilities to cause a denial of service, spoof user interface, obtain sensitive information, execute arbitrary code, perform cross-site scripting attacks, bypass security restrictions, gain privileges and read/write local files.\n\n### *Affected products*:\nMozilla Firefox versions earlier than 53 \nMozilla Firefox ESR versions earlier than 45.9 \nMozilla Firefox ESR versions earlier than 52.1 \n\n\n### *Solution*:\nUpdate to the latest version \n[Download Mozilla Firefox ESR](<https://www.mozilla.org/en-US/firefox/organizations/all/>) \n[Download Mozilla Firefox](<https://www.mozilla.org/en-US/firefox/new/>)\n\n### *Original advisories*:\n[MFSA-2017-10](<https://www.mozilla.org/en-US/security/advisories/mfsa2017-10/>) \n[MFSA-2017-11](<https://www.mozilla.org/en-US/security/advisories/mfsa2017-11/>) \n[MFSA-2017-12](<https://www.mozilla.org/en-US/security/advisories/mfsa2017-12/>) \n\n\n### *Impacts*:\nWLF \n\n### *Related products*:\n[Mozilla Firefox](<https://threats.kaspersky.com/en/product/Mozilla-Firefox/>)\n\n### *CVE-IDS*:\n[CVE-2017-5468](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5468>) \n[CVE-2017-5458](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5458>) \n[CVE-2017-5453](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5453>) \n[CVE-2017-5452](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5452>) \n[CVE-2017-5463](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5463>) \n[CVE-2017-5450](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5450>) \n[CVE-2017-5456](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5456>) \n[CVE-2017-5455](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5455>) \n[CVE-2017-5448](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5448>) \n[CVE-2017-5429](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5429>) \n[CVE-2017-5430](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5430>) \n[CVE-2017-5467](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5467>) \n[CVE-2017-5462](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5462>) \n[CVE-2017-5451](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5451>) \n[CVE-2017-5449](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5449>) \n[CVE-2017-5445](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5445>) \n[CVE-2017-5469](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5469>) \n[CVE-2017-5454](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5454>) \n[CVE-2017-5465](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5465>) \n[CVE-2017-5447](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5447>) \n[CVE-2017-5446](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5446>) \n[CVE-2017-5444](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5444>) \n[CVE-2017-5443](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5443>) \n[CVE-2017-5464](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5464>) \n[CVE-2017-5442](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5442>) \n[CVE-2017-5441](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5441>) \n[CVE-2017-5440](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5440>) \n[CVE-2017-5439](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5439>) \n[CVE-2017-5438](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5438>) \n[CVE-2017-5460](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5460>) \n[CVE-2017-5432](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5432>) \n[CVE-2017-5434](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5434>) \n[CVE-2017-5466](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5466>) \n[CVE-2017-5459](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5459>) \n[CVE-2017-5436](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5436>) \n[CVE-2017-5435](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5435>) \n[CVE-2017-5433](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5433>) \n[CVE-2017-5461](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5461>) \n[CVE-2016-10197](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10197>) \n[CVE-2016-10196](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10196>) \n[CVE-2016-10195](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10195>) \n[CVE-2016-6354](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6354>)", "published": "2017-04-19T00:00:00", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://threats.kaspersky.com/en/vulnerability/KLA11004", "cvelist": ["CVE-2017-5451", "CVE-2017-5462", "CVE-2017-5436", "CVE-2017-5441", "CVE-2016-10197", "CVE-2017-5442", "CVE-2017-5446", "CVE-2017-5434", "CVE-2017-5465", "CVE-2016-6354", "CVE-2017-5429", "CVE-2017-5440", "CVE-2017-5458", "CVE-2017-5435", "CVE-2017-5432", "CVE-2017-5469", "CVE-2017-5455", "CVE-2017-5438", "CVE-2017-5439", "CVE-2017-5445", "CVE-2016-10196", "CVE-2017-5450", "CVE-2017-5433", "CVE-2017-5447", "CVE-2017-5466", "CVE-2017-5444", "CVE-2017-5467", "CVE-2017-5460", "CVE-2017-5449", "CVE-2017-5454", "CVE-2017-5461", "CVE-2017-5456", "CVE-2017-5453", "CVE-2017-5468", "CVE-2017-5430", "CVE-2017-5463", "CVE-2017-5452", "CVE-2017-5448", "CVE-2017-5459", "CVE-2016-10195", "CVE-2017-5443", "CVE-2017-5464"], "lastseen": "2018-03-30T14:11:47"}]}}