Lucene search

K
nessusThis script is Copyright (C) 2009-2021 Tenable Network Security, Inc.SUSE_FIREFOX35UPGRADE-6562.NASL
HistoryOct 20, 2009 - 12:00 a.m.

SuSE Security Update: Security update for Mozilla Firefox (firefox35upgrade-6562)

2009-10-2000:00:00
This script is Copyright (C) 2009-2021 Tenable Network Security, Inc.
www.tenable.com
25

This update brings the Mozilla Firefox 3.5 webbrowser to version 3.5.3, the Mozilla XULRunner 1.9.0 engine to the 1.9.0.14 stable release, and the Mozilla XULRunner 1.9.1 engine to the 1.9.1.3 stable release.

It also fixes various security issues: MFSA 2009-47 / CVE-2009-3069 / CVE-2009-3070 / CVE-2009-3071 / CVE-2009-3072 / CVE-2009-3073 / CVE-2009-30 / CVE-2009-3075: Mozilla developers and community members identified and fixed several stability bugs in the browser engine used in Firefox and other Mozilla-based products.
Some of these crashes showed evidence of memory corruption under certain circumstances and we presume that with enough effort at least some of these could be exploited to run arbitrary code.

MFSA 2009-48 / CVE-2009-3076: Mozilla security researcher Jesse Rudermanreported that when security modules were added or removed via pkcs11.addmodule or pkcs11.deletemodule, the resulting dialog was not sufficiently informative. Without sufficient warning, an attacker could entice a victim to install a malicious PKCS11 module and affect the cryptographic integrity of the victim’s browser. Security researcher Dan Kaminsky reported that this issue had not been fixed in Firefox 3.0 and that under certain circumstances pkcs11 modules could be installed from a remote location. Firefox 3.5 releases are not affected.

MFSA 2009-49 / CVE-2009-3077: An anonymous security researcher, via TippingPoint’s Zero Day Initiative, reported that the columns of a XUL tree element could be manipulated in a particular way which would leave a pointer owned by the column pointing to freed memory. An attacker could potentially use this vulnerability to crash a victim’s browser and run arbitrary code on the victim’s computer.

MFSA 2009-50 / CVE-2009-3078: Security researcher Juan Pablo Lopez Yacubian reported that the default Windows font used to render the locationbar and other text fields was improperly displaying certain Unicode characters with tall line-height. In such cases the tall line-height would cause the rest of the text in the input field to be scrolled vertically out of view. An attacker could use this vulnerability to prevent a user from seeing the URL of a malicious site. Corrie Sloot also independently reported this issue to Mozilla.

MFSA 2009-51 / CVE-2009-3079: Mozilla security researcher moz_bug_r_a4 reported that the BrowserFeedWriter could be leveraged to run JavaScript code from web content with elevated privileges. Using this vulnerability, an attacker could construct an object containing malicious JavaScript and cause the FeedWriter to process the object, running the malicious code with chrome privileges. Thunderbird does not support the BrowserFeedWriter object and is not vulnerable in its default configuration. Thunderbird might be vulnerable if the user has installed any add-on which adds a similarly implemented feature and then enables JavaScript in mail messages. This is not the default setting and we strongly discourage users from running JavaScript in mail.

#%NASL_MIN_LEVEL 70300

#
# (C) Tenable Network Security, Inc.
#
# The text description of this plugin is (C) Novell, Inc.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if ( ! defined_func("bn_random") ) exit(0);
if (NASL_LEVEL < 3000 ) exit(0);

if(description)
{
 script_id(42189);
 script_version("1.12");
 script_name(english: "SuSE Security Update:  Security update for Mozilla Firefox (firefox35upgrade-6562)");
 script_set_attribute(attribute: "synopsis", value: 
"The remote SuSE system is missing the security patch firefox35upgrade-6562");
 script_set_attribute(attribute: "description", value: "This update brings the Mozilla Firefox 3.5 webbrowser to
version 3.5.3, the Mozilla XULRunner 1.9.0 engine to the
1.9.0.14 stable release, and the Mozilla XULRunner 1.9.1
engine to the 1.9.1.3 stable release.

It also fixes various security issues: MFSA 2009-47 /
CVE-2009-3069 / CVE-2009-3070 / CVE-2009-3071 /
CVE-2009-3072 / CVE-2009-3073 / CVE-2009-30 /
CVE-2009-3075: Mozilla developers and community members
identified and fixed several stability bugs in the browser
engine used in Firefox and other Mozilla-based products.
Some of these crashes showed evidence of memory corruption
under certain circumstances and we presume that with enough
effort at least some of these could be exploited to run
arbitrary code.

MFSA 2009-48 / CVE-2009-3076: Mozilla security researcher
Jesse Rudermanreported that when security modules were
added or removed via pkcs11.addmodule or
pkcs11.deletemodule, the resulting dialog was not
sufficiently informative. Without sufficient warning, an
attacker could entice a victim to install a malicious
PKCS11 module and affect the cryptographic integrity of the
victim's browser. Security researcher Dan Kaminsky reported
that this issue had not been fixed in Firefox 3.0 and that
under certain circumstances pkcs11 modules could be
installed from a remote location. Firefox 3.5 releases are
not affected.

MFSA 2009-49 / CVE-2009-3077: An anonymous security
researcher, via TippingPoint's Zero Day Initiative,
reported that the columns of a XUL tree element could be
manipulated in a particular way which would leave a pointer
owned by the column pointing to freed memory. An attacker
could potentially use this vulnerability to crash a
victim's browser and run arbitrary code on the victim's
computer.

MFSA 2009-50 / CVE-2009-3078: Security researcher Juan
Pablo Lopez Yacubian reported that the default Windows font
used to render the locationbar and other text fields was
improperly displaying certain Unicode characters with tall
line-height. In such cases the tall line-height would cause
the rest of the text in the input field to be scrolled
vertically out of view. An attacker could use this
vulnerability to prevent a user from seeing the URL of a
malicious site. Corrie Sloot also independently reported
this issue to Mozilla.

MFSA 2009-51 / CVE-2009-3079: Mozilla security researcher
moz_bug_r_a4 reported that the BrowserFeedWriter could be
leveraged to run JavaScript code from web content with
elevated privileges. Using this vulnerability, an attacker
could construct an object containing malicious JavaScript
and cause the FeedWriter to process the object, running the
malicious code with chrome privileges. Thunderbird does not
support the BrowserFeedWriter object and is not vulnerable
in its default configuration. Thunderbird might be
vulnerable if the user has installed any add-on which adds
a similarly implemented feature and then enables JavaScript
in mail messages. This is not the default setting and we
strongly discourage users from running JavaScript in mail.
");
 script_set_attribute(attribute: "solution", value: "Install the security patch firefox35upgrade-6562");
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
 script_cwe_id(20, 94, 287);
 script_set_attribute(attribute:"plugin_publication_date", value: "2009/10/20");
 script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/14");
script_end_attributes();

script_cve_id("CVE-2009-0030", "CVE-2009-3069", "CVE-2009-3070", "CVE-2009-3071", "CVE-2009-3072", "CVE-2009-3073", "CVE-2009-3075", "CVE-2009-3076", "CVE-2009-3077", "CVE-2009-3078", "CVE-2009-3079");
script_summary(english: "Check for the firefox35upgrade-6562 package");
 
 script_category(ACT_GATHER_INFO);
 
 script_copyright(english:"This script is Copyright (C) 2009-2021 Tenable Network Security, Inc.");
 script_family(english: "SuSE Local Security Checks");
 script_dependencies("ssh_get_info.nasl");
 script_require_keys("Host/SuSE/rpm-list");
 exit(0);
}

include("rpm.inc");

if ( ! get_kb_item("Host/SuSE/rpm-list") ) exit(1, "Could not gather the list of packages");

if ( rpm_check( reference:"MozillaFirefox-3.5.3-1.4.2", release:"SLES10") )
{
	security_hole(port:0, extra:rpm_report_get());
	exit(0);
}
if ( rpm_check( reference:"MozillaFirefox-branding-SLED-3.5-1.4.2", release:"SLES10") )
{
	security_hole(port:0, extra:rpm_report_get());
	exit(0);
}
if ( rpm_check( reference:"MozillaFirefox-translations-3.5.3-1.4.2", release:"SLES10") )
{
	security_hole(port:0, extra:rpm_report_get());
	exit(0);
}
if ( rpm_check( reference:"mozilla-xulrunner190-1.9.0.14-0.5.2", release:"SLES10") )
{
	security_hole(port:0, extra:rpm_report_get());
	exit(0);
}
if ( rpm_check( reference:"mozilla-xulrunner190-gnomevfs-1.9.0.14-0.5.2", release:"SLES10") )
{
	security_hole(port:0, extra:rpm_report_get());
	exit(0);
}
if ( rpm_check( reference:"mozilla-xulrunner190-translations-1.9.0.14-0.5.2", release:"SLES10") )
{
	security_hole(port:0, extra:rpm_report_get());
	exit(0);
}
if ( rpm_check( reference:"mozilla-xulrunner191-1.9.1.3-1.4.2", release:"SLES10") )
{
	security_hole(port:0, extra:rpm_report_get());
	exit(0);
}
if ( rpm_check( reference:"mozilla-xulrunner191-gnomevfs-1.9.1.3-1.4.2", release:"SLES10") )
{
	security_hole(port:0, extra:rpm_report_get());
	exit(0);
}
if ( rpm_check( reference:"mozilla-xulrunner191-translations-1.9.1.3-1.4.2", release:"SLES10") )
{
	security_hole(port:0, extra:rpm_report_get());
	exit(0);
}
# END OF TEST
exit(0,"Host is not affected");