Basic search

K
nessusThis script is Copyright (C) 2008-2021 Tenable Network Security, Inc.SUSE_MOZILLA-XULRUNNER-5123.NASL
HistoryMar 28, 2008 - 12:00 a.m.

openSUSE 10 Security Update : mozilla-xulrunner (mozilla-xulrunner-5123)

2008-03-2800:00:00
This script is Copyright (C) 2008-2021 Tenable Network Security, Inc.
www.tenable.com
29

This update of the Mozilla XULRunner engine catches up on all previous security problems found in the XULRunner engine.

Following security problems were fixed :

  • MFSA 2008-11/CVE-2008-0594 Web forgery overwrite with div overlay

  • MFSA 2008-10/CVE-2008-0593 URL token stealing via stylesheet redirect

  • MFSA 2008-09/CVE-2008-0592 Mishandling of locally-saved plain text files

  • MFSA 2008-08/CVE-2008-0591 File action dialog tampering

  • MFSA 2008-06/CVE-2008-0419 Web browsing history and forward navigation stealing

  • MFSA 2008-05/CVE-2008-0418 Directory traversal via chrome: URI

  • MFSA 2008-04/CVE-2008-0417 Stored password corruption

  • MFSA 2008-03/CVE-2008-0415 Privilege escalation, XSS, Remote Code Execution

  • MFSA 2008-02/CVE-2008-0414 Multiple file input focus stealing vulnerabilities

  • MFSA 2008-01/CVE-2008-0412 Crashes with evidence of memory corruption (rv:1.8.1.12)

#%NASL_MIN_LEVEL 70300

#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from openSUSE Security Update mozilla-xulrunner-5123.
#
# The text description of this plugin is (C) SUSE LLC.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(31697);
  script_version("1.12");
  script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/14");

  script_cve_id("CVE-2008-0412", "CVE-2008-0414", "CVE-2008-0415", "CVE-2008-0417", "CVE-2008-0418", "CVE-2008-0419", "CVE-2008-0591", "CVE-2008-0592", "CVE-2008-0593", "CVE-2008-0594");

  script_name(english:"openSUSE 10 Security Update : mozilla-xulrunner (mozilla-xulrunner-5123)");
  script_summary(english:"Check for the mozilla-xulrunner-5123 patch");

  script_set_attribute(
    attribute:"synopsis", 
    value:"The remote openSUSE host is missing a security update."
  );
  script_set_attribute(
    attribute:"description", 
    value:
"This update of the Mozilla XULRunner engine catches up on all previous
security problems found in the XULRunner engine.

Following security problems were fixed :

  - MFSA 2008-11/CVE-2008-0594 Web forgery overwrite with
    div overlay

  - MFSA 2008-10/CVE-2008-0593 URL token stealing via
    stylesheet redirect

  - MFSA 2008-09/CVE-2008-0592 Mishandling of locally-saved
    plain text files

  - MFSA 2008-08/CVE-2008-0591 File action dialog tampering

  - MFSA 2008-06/CVE-2008-0419 Web browsing history and
    forward navigation stealing

  - MFSA 2008-05/CVE-2008-0418 Directory traversal via
    chrome: URI

  - MFSA 2008-04/CVE-2008-0417 Stored password corruption

  - MFSA 2008-03/CVE-2008-0415 Privilege escalation, XSS,
    Remote Code Execution

  - MFSA 2008-02/CVE-2008-0414 Multiple file input focus
    stealing vulnerabilities

  - MFSA 2008-01/CVE-2008-0412 Crashes with evidence of
    memory corruption (rv:1.8.1.12)"
  );
  script_set_attribute(
    attribute:"solution", 
    value:"Update the affected mozilla-xulrunner packages."
  );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
  script_cwe_id(20, 22, 79, 94, 200, 399);

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:epiphany");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:epiphany-devel");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:gecko-sdk");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:mozilla-xulrunner");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:mozilla-xulrunner-32bit");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:10.1");

  script_set_attribute(attribute:"patch_publication_date", value:"2008/03/22");
  script_set_attribute(attribute:"plugin_publication_date", value:"2008/03/28");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2008-2021 Tenable Network Security, Inc.");
  script_family(english:"SuSE Local Security Checks");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu");

  exit(0);
}


include("audit.inc");
include("global_settings.inc");
include("rpm.inc");

if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/SuSE/release");
if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE");
if (release !~ "^(SUSE10\.1)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "10.1", release);
if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);

ourarch = get_kb_item("Host/cpu");
if (!ourarch) audit(AUDIT_UNKNOWN_ARCH);
if (ourarch !~ "^(i586|i686|x86_64)$") audit(AUDIT_ARCH_NOT, "i586 / i686 / x86_64", ourarch);

flag = 0;

if ( rpm_check(release:"SUSE10.1", reference:"epiphany-1.8.5-14.5") ) flag++;
if ( rpm_check(release:"SUSE10.1", reference:"epiphany-devel-1.8.5-14.5") ) flag++;
if ( rpm_check(release:"SUSE10.1", reference:"gecko-sdk-1.8.0.14eol-0.2") ) flag++;
if ( rpm_check(release:"SUSE10.1", reference:"mozilla-xulrunner-1.8.0.14eol-0.2") ) flag++;
if ( rpm_check(release:"SUSE10.1", cpu:"x86_64", reference:"mozilla-xulrunner-32bit-1.8.0.14eol-0.2") ) flag++;

if (flag)
{
  if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
  else security_hole(0);
  exit(0);
}
else
{
  tested = pkg_tests_get();
  if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
  else audit(AUDIT_PACKAGE_NOT_INSTALLED, "epiphany / epiphany-devel / gecko-sdk / mozilla-xulrunner / etc");
}
Related for SUSE_MOZILLA-XULRUNNER-5123.NASL