Mozilla Firefox Multiple Memory Corruption Vulnerabilities Aug-09 (Linux)
2009-08-07T00:00:00
ID OPENVAS:1361412562310800856 Type openvas Reporter Copyright (C) 2009 Greenbone Networks GmbH Modified 2019-04-29T00:00:00
Description
This host is installed with Mozilla Firefox and is prone to multiple
Memory Corruption vulnerabilities.
###############################################################################
# OpenVAS Vulnerability Test
#
# Mozilla Firefox Multiple Memory Corruption Vulnerabilities Aug-09 (Linux)
#
# Authors:
# Sharath S <sharaths@secpod.com>
#
# Copyright:
# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.800856");
script_version("2019-04-29T15:08:03+0000");
script_tag(name:"last_modification", value:"2019-04-29 15:08:03 +0000 (Mon, 29 Apr 2019)");
script_tag(name:"creation_date", value:"2009-08-07 07:29:21 +0200 (Fri, 07 Aug 2009)");
script_tag(name:"cvss_base", value:"10.0");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_cve_id("CVE-2009-2662", "CVE-2009-2663", "CVE-2009-2664", "CVE-2009-2654");
script_bugtraq_id(35927, 35803);
script_name("Mozilla Firefox Multiple Memory Corruption Vulnerabilities Aug-09 (Linux)");
script_xref(name:"URL", value:"http://secunia.com/advisories/36001/");
script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2009/mfsa2009-44.html");
script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2009/mfsa2009-45.html");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2009 Greenbone Networks GmbH");
script_family("General");
script_dependencies("gb_firefox_detect_lin.nasl");
script_mandatory_keys("Firefox/Linux/Ver");
script_tag(name:"impact", value:"Successful exploitation will let attackers to execute arbitrary code,
phishing attack, and can cause Denial of Service.");
script_tag(name:"affected", value:"Firefox version before 3.0.13 or 3.5 before 3.5.2 on Linux.");
script_tag(name:"insight", value:"Multiple memory corruption due to:
- Error in 'js_watch_set()' function in js/src/jsdbgapi.cpp in the JavaScript
engine which can be exploited via a crafted '.js' file.
- Error in 'libvorbis()' which is used in the application can be exploited
via a crafted '.ogg' file.
- Error in 'TraceRecorder::snapshot()' function in js/src/jstracer.cpp and
other unspecified vectors.
- Error in 'window.open()' which fails to sanitise the invalid character in
the crafted URL. This allows remote attackers to spoof the address bar,
and possibly conduct phishing attacks, via a crafted web page that calls
window.open with an invalid character in the URL, makes document.write
calls to the resulting object, and then calls the stop method during the
loading of the error page.");
script_tag(name:"solution", value:"Upgrade to Firefox version 3.0.13/3.5.2.");
script_tag(name:"summary", value:"This host is installed with Mozilla Firefox and is prone to multiple
Memory Corruption vulnerabilities.");
script_tag(name:"qod_type", value:"executable_version_unreliable");
script_tag(name:"solution_type", value:"VendorFix");
exit(0);
}
include("version_func.inc");
ffVer = get_kb_item("Firefox/Linux/Ver");
if(!ffVer)
exit(0);
if(version_is_less(version:ffVer, test_version:"3.0.13")||
version_in_range(version:ffVer, test_version:"3.5",
test_version2:"3.5.1")){
security_message( port: 0, data: "The target host was found to be vulnerable" );
}
{"id": "OPENVAS:1361412562310800856", "type": "openvas", "bulletinFamily": "scanner", "title": "Mozilla Firefox Multiple Memory Corruption Vulnerabilities Aug-09 (Linux)", "description": "This host is installed with Mozilla Firefox and is prone to multiple\n Memory Corruption vulnerabilities.", "published": "2009-08-07T00:00:00", "modified": "2019-04-29T00:00:00", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310800856", "reporter": "Copyright (C) 2009 Greenbone Networks GmbH", "references": ["http://www.mozilla.org/security/announce/2009/mfsa2009-44.html", "http://www.mozilla.org/security/announce/2009/mfsa2009-45.html", "http://secunia.com/advisories/36001/"], "cvelist": ["CVE-2009-2663", "CVE-2009-2662", "CVE-2009-2654", "CVE-2009-2664"], "lastseen": "2019-05-29T18:40:17", "viewCount": 0, "enchantments": {"dependencies": {"references": [{"type": "nessus", "idList": ["FEDORA_2009-8279.NASL", "ORACLELINUX_ELSA-2009-1430.NASL", "SUSE_11_MOZILLAFIREFOX-090812.NASL", "FEDORA_2009-8288.NASL", "MOZILLA_FIREFOX_3013.NASL", "SUSE_11_0_MOZILLAFIREFOX-090812.NASL", "SUSE_11_1_MOZILLAFIREFOX-090812.NASL", "SUSE_MOZILLAFIREFOX-6433.NASL", "SUSE_MOZILLAFIREFOX-6495.NASL", "MOZILLA_FIREFOX_352.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:65706", "OPENVAS:136141256231064552", "OPENVAS:65792", "OPENVAS:800856", "OPENVAS:64554", "OPENVAS:1361412562310800855", "OPENVAS:136141256231065706", "OPENVAS:64552", "OPENVAS:136141256231065792", "OPENVAS:800855"]}, {"type": "cve", "idList": ["CVE-2009-2662", "CVE-2009-2654", "CVE-2009-2664", "CVE-2009-2663"]}, {"type": "suse", "idList": ["SUSE-SA:2009:048"]}, {"type": "centos", "idList": ["CESA-2009:1219", "CESA-2009:1431"]}, {"type": "redhat", "idList": ["RHSA-2009:1431", "RHSA-2009:1219"]}, {"type": "oraclelinux", "idList": ["ELSA-2009-1431", "ELSA-2009-1219"]}, {"type": "gentoo", "idList": ["GLSA-200909-02"]}, {"type": "fedora", "idList": ["FEDORA:EB12810F899", "FEDORA:2E2DE10F90F", "FEDORA:C218010F8BF", "FEDORA:DF86B10F8A5"]}, {"type": "exploitdb", "idList": ["EDB-ID:33103"]}, {"type": "debian", "idList": ["DEBIAN:DSA-1939-1:4E1D6", "DEBIAN:DSA-1873-1:F50AD"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:DOC:22256", "SECURITYVULNS:VULN:9045", "SECURITYVULNS:VULN:10121", "SECURITYVULNS:DOC:22365"]}, {"type": "ubuntu", "idList": ["USN-811-1", "USN-825-1"]}], "modified": "2019-05-29T18:40:17", "rev": 2}, "score": {"value": 8.4, "vector": "NONE", "modified": "2019-05-29T18:40:17", "rev": 2}, "vulnersScore": 8.4}, "pluginID": "1361412562310800856", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mozilla Firefox Multiple Memory Corruption Vulnerabilities Aug-09 (Linux)\n#\n# Authors:\n# Sharath S <sharaths@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.800856\");\n script_version(\"2019-04-29T15:08:03+0000\");\n script_tag(name:\"last_modification\", value:\"2019-04-29 15:08:03 +0000 (Mon, 29 Apr 2019)\");\n script_tag(name:\"creation_date\", value:\"2009-08-07 07:29:21 +0200 (Fri, 07 Aug 2009)\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_cve_id(\"CVE-2009-2662\", \"CVE-2009-2663\", \"CVE-2009-2664\", \"CVE-2009-2654\");\n script_bugtraq_id(35927, 35803);\n script_name(\"Mozilla Firefox Multiple Memory Corruption Vulnerabilities Aug-09 (Linux)\");\n script_xref(name:\"URL\", value:\"http://secunia.com/advisories/36001/\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2009/mfsa2009-44.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2009/mfsa2009-45.html\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_firefox_detect_lin.nasl\");\n script_mandatory_keys(\"Firefox/Linux/Ver\");\n script_tag(name:\"impact\", value:\"Successful exploitation will let attackers to execute arbitrary code,\n phishing attack, and can cause Denial of Service.\");\n script_tag(name:\"affected\", value:\"Firefox version before 3.0.13 or 3.5 before 3.5.2 on Linux.\");\n script_tag(name:\"insight\", value:\"Multiple memory corruption due to:\n\n - Error in 'js_watch_set()' function in js/src/jsdbgapi.cpp in the JavaScript\n engine which can be exploited via a crafted '.js' file.\n\n - Error in 'libvorbis()' which is used in the application can be exploited\n via a crafted '.ogg' file.\n\n - Error in 'TraceRecorder::snapshot()' function in js/src/jstracer.cpp and\n other unspecified vectors.\n\n - Error in 'window.open()' which fails to sanitise the invalid character in\n the crafted URL. This allows remote attackers to spoof the address bar,\n and possibly conduct phishing attacks, via a crafted web page that calls\n window.open with an invalid character in the URL, makes document.write\n calls to the resulting object, and then calls the stop method during the\n loading of the error page.\");\n script_tag(name:\"solution\", value:\"Upgrade to Firefox version 3.0.13/3.5.2.\");\n script_tag(name:\"summary\", value:\"This host is installed with Mozilla Firefox and is prone to multiple\n Memory Corruption vulnerabilities.\");\n script_tag(name:\"qod_type\", value:\"executable_version_unreliable\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\ninclude(\"version_func.inc\");\n\nffVer = get_kb_item(\"Firefox/Linux/Ver\");\nif(!ffVer)\n exit(0);\n\nif(version_is_less(version:ffVer, test_version:\"3.0.13\")||\n version_in_range(version:ffVer, test_version:\"3.5\",\n test_version2:\"3.5.1\")){\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n}\n", "naslFamily": "General"}
{"cve": [{"lastseen": "2021-02-02T05:40:03", "description": "The browser engine in Mozilla Firefox 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the TraceRecorder::snapshot function in js/src/jstracer.cpp, and unspecified other vectors.", "edition": 6, "cvss3": {}, "published": "2009-08-04T16:30:00", "title": "CVE-2009-2662", "type": "cve", "cwe": ["CWE-119"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2009-2662"], "modified": "2009-09-04T05:28:00", "cpe": ["cpe:/a:mozilla:firefox:3.0.2", "cpe:/a:mozilla:firefox:3.0.12", "cpe:/a:mozilla:firefox:3.0.4", "cpe:/a:mozilla:firefox:3.0.5", "cpe:/a:mozilla:firefox:3.5.1", "cpe:/a:mozilla:firefox:3.0.11", "cpe:/a:mozilla:firefox:3.0.3", "cpe:/a:mozilla:firefox:3.0.6", "cpe:/a:mozilla:firefox:3.0.7", "cpe:/a:mozilla:firefox:3.0.10", "cpe:/a:mozilla:firefox:3.0.1"], "id": "CVE-2009-2662", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-2662", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:mozilla:firefox:3.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T05:40:03", "description": "The js_watch_set function in js/src/jsdbgapi.cpp in the JavaScript engine in Mozilla Firefox before 3.0.12 allows remote attackers to cause a denial of service (assertion failure and application exit) or possibly execute arbitrary code via a crafted .js file, related to a \"memory safety bug.\" NOTE: this was originally reported as affecting versions before 3.0.13.", "edition": 6, "cvss3": {}, "published": "2009-08-04T16:30:00", "title": "CVE-2009-2664", "type": "cve", "cwe": ["CWE-399"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2009-2664"], "modified": "2017-09-19T01:29:00", "cpe": ["cpe:/a:mozilla:firefox:2.0.0.9", "cpe:/a:mozilla:firefox:3.0.2", "cpe:/a:mozilla:firefox:1.5.0.3", "cpe:/a:mozilla:firefox:1.5.0.2", "cpe:/a:mozilla:firefox:2.0.0.14", "cpe:/a:mozilla:firefox:2.0.0.18", "cpe:/a:mozilla:firefox:2.0.0.8", "cpe:/a:mozilla:firefox:3.0.12", "cpe:/a:mozilla:firefox:0.4", "cpe:/a:mozilla:firefox:1.5.1", "cpe:/a:mozilla:firefox:1.5.4", "cpe:/a:mozilla:firefox:2.0.0.13", "cpe:/a:mozilla:firefox:2.0_.10", "cpe:/a:mozilla:firefox:0.5", "cpe:/a:mozilla:firefox:2.0.0.3", "cpe:/a:mozilla:firefox:2.0.0.2", "cpe:/a:mozilla:firefox:1.5.0.1", "cpe:/a:mozilla:firefox:2.0.0.12", "cpe:/a:mozilla:firefox:3.0.4", "cpe:/a:mozilla:firefox:0.8", "cpe:/a:mozilla:firefox:1.5.7", "cpe:/a:mozilla:firefox:1.0.5", "cpe:/a:mozilla:firefox:2.0.0.21", "cpe:/a:mozilla:firefox:2.0.0.17", "cpe:/a:mozilla:firefox:2.0_.4", "cpe:/a:mozilla:firefox:0.10.1", "cpe:/a:mozilla:firefox:2.0", "cpe:/a:mozilla:firefox:1.0", "cpe:/a:mozilla:firefox:2.0.0.20", "cpe:/a:mozilla:firefox:1.0.3", "cpe:/a:mozilla:firefox:2.0.0.10", "cpe:/a:mozilla:firefox:1.8", "cpe:/a:mozilla:firefox:1.5.0.5", "cpe:/a:mozilla:firefox:1.5.0.12", "cpe:/a:mozilla:firefox:3.0.5", "cpe:/a:mozilla:firefox:0.9.2", "cpe:/a:mozilla:firefox:1.5.6", "cpe:/a:mozilla:firefox:2.0_.6", "cpe:/a:mozilla:firefox:1.0.4", "cpe:/a:mozilla:firefox:2.0.0.7", "cpe:/a:mozilla:firefox:3.5.1", "cpe:/a:mozilla:firefox:1.0.7", "cpe:/a:mozilla:firefox:1.0.6", "cpe:/a:mozilla:firefox:3.0.9", "cpe:/a:mozilla:firefox:1.0.1", "cpe:/a:mozilla:firefox:2.0.0.15", "cpe:/a:mozilla:firefox:3.5", "cpe:/a:mozilla:firefox:1.5.0.10", "cpe:/a:mozilla:firefox:1.0.2", "cpe:/a:mozilla:firefox:1.5.8", "cpe:/a:mozilla:firefox:0.10", "cpe:/a:mozilla:firefox:0.9.1", "cpe:/a:mozilla:firefox:0.6", "cpe:/a:mozilla:firefox:1.5.5", "cpe:/a:mozilla:firefox:3.0.11", "cpe:/a:mozilla:firefox:1.5.0.4", "cpe:/a:mozilla:firefox:2.0.0.1", "cpe:/a:mozilla:firefox:1.5.0.9", "cpe:/a:mozilla:firefox:1.5.2", "cpe:/a:mozilla:firefox:1.5.0.11", "cpe:/a:mozilla:firefox:2.0_8", "cpe:/a:mozilla:firefox:2.0_.7", "cpe:/a:mozilla:firefox:3.0.3", "cpe:/a:mozilla:firefox:1.5.0.6", "cpe:/a:mozilla:firefox:2.0.0.6", "cpe:/a:mozilla:firefox:2.0.0.5", "cpe:/a:mozilla:firefox:1.5", "cpe:/a:mozilla:firefox:3.0.6", "cpe:/a:mozilla:firefox:1.5.0.7", "cpe:/a:mozilla:firefox:2.0_.1", "cpe:/a:mozilla:firefox:3.0.7", "cpe:/a:mozilla:firefox:0.1", "cpe:/a:mozilla:firefox:0.9_rc", "cpe:/a:mozilla:firefox:3.0", "cpe:/a:mozilla:firefox:1.5.3", "cpe:/a:mozilla:firefox:3.0.10", "cpe:/a:mozilla:firefox:3.0.8", "cpe:/a:mozilla:firefox:1.0.8", "cpe:/a:mozilla:firefox:1.5.0.8", "cpe:/a:mozilla:firefox:3.0.1", "cpe:/a:mozilla:firefox:0.9", "cpe:/a:mozilla:firefox:2.0.0.16", "cpe:/a:mozilla:firefox:0.2", "cpe:/a:mozilla:firefox:0.7", "cpe:/a:mozilla:firefox:1.4.1", "cpe:/a:mozilla:firefox:2.0.0.19", "cpe:/a:mozilla:firefox:0.7.1", "cpe:/a:mozilla:firefox:2.0_.9", "cpe:/a:mozilla:firefox:2.0.0.11", "cpe:/a:mozilla:firefox:2.0.0.4", "cpe:/a:mozilla:firefox:2.0_.5", "cpe:/a:mozilla:firefox:0.6.1", "cpe:/a:mozilla:firefox:0.9.3", "cpe:/a:mozilla:firefox:0.3"], "id": "CVE-2009-2664", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-2664", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:a:mozilla:firefox:3.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.18:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.6:*:linux:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.21:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0:beta_1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.9_rc:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0_.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0_.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.9:rc:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0_.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0_.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0_.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0_.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.19:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.20:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0:preview_release:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.9.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0_8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0_.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.9.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0:rc3:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T05:40:03", "description": "libvorbis before r16182, as used in Mozilla Firefox 3.5.x before 3.5.2 and other products, allows context-dependent attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted .ogg file.", "edition": 6, "cvss3": {}, "published": "2009-08-04T16:30:00", "title": "CVE-2009-2663", "type": "cve", "cwe": ["CWE-399"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2009-2663"], "modified": "2018-10-03T22:00:00", "cpe": ["cpe:/a:mozilla:firefox:2.0.0.9", "cpe:/a:mozilla:firefox:3.0.2", "cpe:/a:mozilla:firefox:1.5.0.3", "cpe:/a:mozilla:firefox:1.5.0.2", "cpe:/a:mozilla:firefox:2.0.0.14", "cpe:/a:mozilla:firefox:2.0.0.18", "cpe:/a:mozilla:firefox:2.0.0.8", "cpe:/a:mozilla:firefox:3.0.12", "cpe:/a:mozilla:firefox:0.4", "cpe:/a:mozilla:firefox:1.5.1", "cpe:/a:mozilla:firefox:1.5.4", "cpe:/a:mozilla:firefox:2.0.0.13", "cpe:/a:mozilla:firefox:2.0_.10", "cpe:/a:mozilla:firefox:0.5", "cpe:/a:mozilla:firefox:2.0.0.3", "cpe:/a:mozilla:firefox:2.0.0.2", "cpe:/a:mozilla:firefox:1.5.0.1", "cpe:/a:mozilla:firefox:2.0.0.12", "cpe:/a:mozilla:firefox:3.0.4", "cpe:/a:mozilla:firefox:0.8", "cpe:/a:mozilla:firefox:1.5.7", "cpe:/a:mozilla:firefox:1.0.5", "cpe:/a:mozilla:firefox:2.0.0.21", "cpe:/a:mozilla:firefox:2.0.0.17", "cpe:/a:mozilla:firefox:2.0_.4", "cpe:/a:mozilla:firefox:0.10.1", "cpe:/a:mozilla:firefox:2.0", "cpe:/a:mozilla:firefox:1.0", "cpe:/a:mozilla:firefox:2.0.0.20", "cpe:/a:mozilla:firefox:1.0.3", "cpe:/a:mozilla:firefox:2.0.0.10", "cpe:/a:mozilla:firefox:1.8", "cpe:/a:mozilla:firefox:1.5.0.5", "cpe:/a:mozilla:firefox:1.5.0.12", "cpe:/a:mozilla:firefox:3.0.5", "cpe:/a:mozilla:firefox:0.9.2", "cpe:/a:mozilla:firefox:1.5.6", "cpe:/a:mozilla:firefox:2.0_.6", "cpe:/a:mozilla:firefox:1.0.4", "cpe:/a:mozilla:firefox:2.0.0.7", "cpe:/a:mozilla:firefox:3.5.1", "cpe:/a:mozilla:firefox:1.0.7", "cpe:/a:mozilla:firefox:1.0.6", "cpe:/a:mozilla:firefox:3.0.9", "cpe:/a:mozilla:firefox:1.0.1", "cpe:/a:mozilla:firefox:2.0.0.15", "cpe:/a:mozilla:firefox:3.5", "cpe:/a:mozilla:firefox:1.5.0.10", "cpe:/a:mozilla:firefox:1.0.2", "cpe:/a:mozilla:firefox:1.5.8", "cpe:/a:mozilla:firefox:0.10", "cpe:/a:mozilla:firefox:0.9.1", "cpe:/a:mozilla:firefox:0.6", "cpe:/a:mozilla:firefox:1.5.5", "cpe:/a:mozilla:firefox:3.0.11", "cpe:/a:mozilla:firefox:1.5.0.4", "cpe:/a:mozilla:firefox:2.0.0.1", "cpe:/a:mozilla:firefox:1.5.0.9", "cpe:/a:mozilla:firefox:1.5.2", "cpe:/a:mozilla:firefox:1.5.0.11", "cpe:/a:mozilla:firefox:2.0_8", "cpe:/a:mozilla:firefox:2.0_.7", "cpe:/a:mozilla:firefox:3.0.3", "cpe:/a:mozilla:firefox:1.5.0.6", "cpe:/a:mozilla:firefox:2.0.0.6", "cpe:/a:mozilla:firefox:2.0.0.5", "cpe:/a:mozilla:firefox:1.5", "cpe:/a:mozilla:firefox:3.0.6", "cpe:/a:mozilla:firefox:1.5.0.7", "cpe:/a:mozilla:firefox:2.0_.1", "cpe:/a:mozilla:firefox:3.0.7", "cpe:/a:mozilla:firefox:0.1", "cpe:/a:mozilla:firefox:0.9_rc", "cpe:/a:mozilla:firefox:3.0", "cpe:/a:mozilla:firefox:1.5.3", "cpe:/a:mozilla:firefox:3.0.10", "cpe:/a:mozilla:firefox:3.0.8", "cpe:/a:mozilla:firefox:1.0.8", "cpe:/a:mozilla:firefox:1.5.0.8", "cpe:/a:mozilla:firefox:3.0.1", "cpe:/a:mozilla:firefox:0.9", "cpe:/a:mozilla:firefox:2.0.0.16", "cpe:/a:mozilla:firefox:0.2", "cpe:/a:mozilla:firefox:0.7", "cpe:/a:mozilla:firefox:1.4.1", "cpe:/a:mozilla:firefox:2.0.0.19", "cpe:/a:mozilla:firefox:0.7.1", "cpe:/a:mozilla:firefox:2.0_.9", "cpe:/a:mozilla:firefox:2.0.0.11", "cpe:/a:mozilla:firefox:2.0.0.4", "cpe:/a:mozilla:firefox:2.0_.5", "cpe:/a:mozilla:firefox:0.6.1", "cpe:/a:mozilla:firefox:0.9.3", "cpe:/a:mozilla:firefox:0.3"], "id": "CVE-2009-2663", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-2663", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:mozilla:firefox:3.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.18:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.6:*:linux:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.21:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0:beta_1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.9_rc:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0_.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0_.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.9:rc:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0_.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0_.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0_.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0_.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.19:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.20:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0:preview_release:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.9.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0_8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0_.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.9.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0:rc3:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T05:40:03", "description": "Mozilla Firefox before 3.0.13, and 3.5.x before 3.5.2, allows remote attackers to spoof the address bar, and possibly conduct phishing attacks, via a crafted web page that calls window.open with an invalid character in the URL, makes document.write calls to the resulting object, and then calls the stop method during the loading of the error page.", "edition": 6, "cvss3": {}, "published": "2009-08-03T14:30:00", "title": "CVE-2009-2654", "type": "cve", "cwe": ["CWE-20"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2009-2654"], "modified": "2018-10-03T22:00:00", "cpe": ["cpe:/a:mozilla:firefox:2.0.0.9", "cpe:/a:mozilla:firefox:3.0.2", "cpe:/a:mozilla:firefox:1.5.0.3", "cpe:/a:mozilla:firefox:1.5.0.2", "cpe:/a:mozilla:firefox:2.0.0.14", "cpe:/a:mozilla:firefox:2.0.0.18", "cpe:/a:mozilla:firefox:2.0.0.8", "cpe:/a:mozilla:firefox:3.0.12", "cpe:/a:mozilla:firefox:0.4", "cpe:/a:mozilla:firefox:1.5.1", "cpe:/a:mozilla:firefox:1.5.4", "cpe:/a:mozilla:firefox:2.0.0.13", "cpe:/a:mozilla:firefox:2.0_.10", "cpe:/a:mozilla:firefox:0.5", "cpe:/a:mozilla:firefox:2.0.0.3", "cpe:/a:mozilla:firefox:2.0.0.2", "cpe:/a:mozilla:firefox:1.5.0.1", "cpe:/a:mozilla:firefox:2.0.0.12", "cpe:/a:mozilla:firefox:3.0.4", "cpe:/a:mozilla:firefox:0.8", "cpe:/a:mozilla:firefox:1.5.7", "cpe:/a:mozilla:firefox:1.0.5", "cpe:/a:mozilla:firefox:2.0.0.21", "cpe:/a:mozilla:firefox:2.0.0.17", "cpe:/a:mozilla:firefox:2.0_.4", "cpe:/a:mozilla:firefox:0.10.1", "cpe:/a:mozilla:firefox:2.0", "cpe:/a:mozilla:firefox:1.0", "cpe:/a:mozilla:firefox:2.0.0.20", "cpe:/a:mozilla:firefox:1.0.3", "cpe:/a:mozilla:firefox:2.0.0.10", "cpe:/a:mozilla:firefox:1.8", "cpe:/a:mozilla:firefox:1.5.0.5", "cpe:/a:mozilla:firefox:1.5.0.12", "cpe:/a:mozilla:firefox:3.0.5", "cpe:/a:mozilla:firefox:0.9.2", "cpe:/a:mozilla:firefox:1.5.6", "cpe:/a:mozilla:firefox:2.0_.6", "cpe:/a:mozilla:firefox:1.0.4", "cpe:/a:mozilla:firefox:2.0.0.7", "cpe:/a:mozilla:firefox:3.5.1", "cpe:/a:mozilla:firefox:1.0.7", "cpe:/a:mozilla:firefox:1.0.6", "cpe:/a:mozilla:firefox:3.1", "cpe:/a:mozilla:firefox:3.0.9", "cpe:/a:mozilla:firefox:1.0.1", "cpe:/a:mozilla:firefox:2.0.0.15", "cpe:/a:mozilla:firefox:3.5", "cpe:/a:mozilla:firefox:1.5.0.10", "cpe:/a:mozilla:firefox:1.0.2", "cpe:/a:mozilla:firefox:1.5.8", "cpe:/a:mozilla:firefox:0.10", "cpe:/a:mozilla:firefox:3.2", "cpe:/a:mozilla:firefox:0.9.1", "cpe:/a:mozilla:firefox:0.6", "cpe:/a:mozilla:firefox:1.5.5", "cpe:/a:mozilla:firefox:3.0.11", "cpe:/a:mozilla:firefox:1.5.0.4", "cpe:/a:mozilla:firefox:2.0.0.1", "cpe:/a:mozilla:firefox:1.5.0.9", "cpe:/a:mozilla:firefox:1.5.2", "cpe:/a:mozilla:firefox:1.5.0.11", "cpe:/a:mozilla:firefox:2.0_8", "cpe:/a:mozilla:firefox:2.0_.7", "cpe:/a:mozilla:firefox:3.0.3", "cpe:/a:mozilla:firefox:1.5.0.6", "cpe:/a:mozilla:firefox:2.0.0.6", "cpe:/a:mozilla:firefox:2.0.0.5", "cpe:/a:mozilla:firefox:1.5", "cpe:/a:mozilla:firefox:3.0.6", "cpe:/a:mozilla:firefox:1.5.0.7", "cpe:/a:mozilla:firefox:2.0_.1", "cpe:/a:mozilla:firefox:3.0.7", "cpe:/a:mozilla:firefox:0.1", "cpe:/a:mozilla:firefox:0.9_rc", "cpe:/a:mozilla:firefox:3.0", "cpe:/a:mozilla:firefox:1.5.3", "cpe:/a:mozilla:firefox:3.0.10", "cpe:/a:mozilla:firefox:3.0.8", "cpe:/a:mozilla:firefox:1.0.8", "cpe:/a:mozilla:firefox:1.5.0.8", "cpe:/a:mozilla:firefox:3.0.1", "cpe:/a:mozilla:firefox:0.9", "cpe:/a:mozilla:firefox:2.0.0.16", "cpe:/a:mozilla:firefox:0.2", "cpe:/a:mozilla:firefox:0.7", "cpe:/a:mozilla:firefox:1.4.1", "cpe:/a:mozilla:firefox:2.0.0.19", "cpe:/a:mozilla:firefox:0.7.1", "cpe:/a:mozilla:firefox:2.0_.9", "cpe:/a:mozilla:firefox:2.0.0.11", "cpe:/a:mozilla:firefox:2.0.0.4", "cpe:/a:mozilla:firefox:2.0_.5", "cpe:/a:mozilla:firefox:0.6.1", "cpe:/a:mozilla:firefox:0.9.3", "cpe:/a:mozilla:firefox:0.3"], "id": "CVE-2009-2654", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-2654", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:P"}, "cpe23": ["cpe:2.3:a:mozilla:firefox:3.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.18:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.1:beta1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.21:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0:beta_1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.9_rc:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0_.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.2:beta3:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0_.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.9:rc:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0_.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0_.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0_.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.2:beta2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0_.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.19:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.20:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.2:beta1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0:beta5:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0:preview_release:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.9.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0_8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0_.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.9.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0:rc3:*:*:*:*:*:*"]}], "nessus": [{"lastseen": "2021-01-17T14:03:50", "description": "MozillaFirefox was updated to the 3.0.13 release, fixing some security\nissues and bugs :\n\nMFSA 2009-44 / CVE-2009-2654: Security researcher Juan Pablo Lopez\nYacubian reported that an attacker could call window.open() on an\ninvalid URL which looks similar to a legitimate URL and then use\ndocument.write() to place content within the new document, appearing\nto have come from the spoofed location. Additionally, if the spoofed\ndocument was created by a document with a valid SSL certificate, the\nSSL indicators would be carried over into the spoofed document. An\nattacker could use these issues to display misleading location and SSL\ninformation for a malicious web page.\n\nMFSA 2009-45 / CVE-2009-2662:The browser engine in Mozilla Firefox\nbefore 3.0.13, and 3.5.x before 3.5.2, allows remote attackers to\ncause a denial of service (memory corruption and application crash) or\npossibly execute arbitrary code via vectors related to the\nTraceRecorder::snapshot function in js/src/jstracer.cpp, and\nunspecified other vectors.\n\nCVE-2009-2663 / MFSA 2009-45: libvorbis before r16182, as used in\nMozilla Firefox before 3.0.13 and 3.5.x before 3.5.2 and other\nproducts, allows context-dependent attackers to cause a denial of\nservice (memory corruption and application crash) or possibly execute\narbitrary code via a crafted .ogg file.\n\nCVE-2009-2664 / MFSA 2009-45: The js_watch_set function in\njs/src/jsdbgapi.cpp in the JavaScript engine in Mozilla Firefox before\n3.0.13, and 3.5.x before 3.5.2, allows remote attackers to cause a\ndenial of service (assertion failure and application exit) or possibly\nexecute arbitrary code via a crafted .js file, related to a 'memory\nsafety bug.'", "edition": 25, "published": "2009-08-20T00:00:00", "title": "openSUSE Security Update : MozillaFirefox (MozillaFirefox-1202)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-2663", "CVE-2009-2662", "CVE-2009-2654", "CVE-2009-2664"], "modified": "2009-08-20T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:libidl-32bit", "p-cpe:/a:novell:opensuse:orbit2", "p-cpe:/a:novell:opensuse:mozilla-xulrunner190-gnomevfs-32bit", "p-cpe:/a:novell:opensuse:MozillaFirefox-translations", "p-cpe:/a:novell:opensuse:orbit2-32bit", "p-cpe:/a:novell:opensuse:python-xpcom190", "cpe:/o:novell:opensuse:11.1", "p-cpe:/a:novell:opensuse:mozilla-xulrunner190-32bit", "p-cpe:/a:novell:opensuse:mozilla-xulrunner190-translations-32bit", "p-cpe:/a:novell:opensuse:MozillaFirefox-branding-upstream", "p-cpe:/a:novell:opensuse:libidl", "p-cpe:/a:novell:opensuse:mozilla-xulrunner190-devel", "p-cpe:/a:novell:opensuse:gconf2-32bit", "p-cpe:/a:novell:opensuse:mozilla-xulrunner190-translations", "p-cpe:/a:novell:opensuse:gconf2", "p-cpe:/a:novell:opensuse:MozillaFirefox", "p-cpe:/a:novell:opensuse:mozilla-xulrunner190", "p-cpe:/a:novell:opensuse:mozilla-xulrunner190-gnomevfs"], "id": "SUSE_11_1_MOZILLAFIREFOX-090812.NASL", "href": "https://www.tenable.com/plugins/nessus/40648", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update MozillaFirefox-1202.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(40648);\n script_version(\"1.12\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2009-2654\", \"CVE-2009-2662\", \"CVE-2009-2663\", \"CVE-2009-2664\");\n\n script_name(english:\"openSUSE Security Update : MozillaFirefox (MozillaFirefox-1202)\");\n script_summary(english:\"Check for the MozillaFirefox-1202 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"MozillaFirefox was updated to the 3.0.13 release, fixing some security\nissues and bugs :\n\nMFSA 2009-44 / CVE-2009-2654: Security researcher Juan Pablo Lopez\nYacubian reported that an attacker could call window.open() on an\ninvalid URL which looks similar to a legitimate URL and then use\ndocument.write() to place content within the new document, appearing\nto have come from the spoofed location. Additionally, if the spoofed\ndocument was created by a document with a valid SSL certificate, the\nSSL indicators would be carried over into the spoofed document. An\nattacker could use these issues to display misleading location and SSL\ninformation for a malicious web page.\n\nMFSA 2009-45 / CVE-2009-2662:The browser engine in Mozilla Firefox\nbefore 3.0.13, and 3.5.x before 3.5.2, allows remote attackers to\ncause a denial of service (memory corruption and application crash) or\npossibly execute arbitrary code via vectors related to the\nTraceRecorder::snapshot function in js/src/jstracer.cpp, and\nunspecified other vectors.\n\nCVE-2009-2663 / MFSA 2009-45: libvorbis before r16182, as used in\nMozilla Firefox before 3.0.13 and 3.5.x before 3.5.2 and other\nproducts, allows context-dependent attackers to cause a denial of\nservice (memory corruption and application crash) or possibly execute\narbitrary code via a crafted .ogg file.\n\nCVE-2009-2664 / MFSA 2009-45: The js_watch_set function in\njs/src/jsdbgapi.cpp in the JavaScript engine in Mozilla Firefox before\n3.0.13, and 3.5.x before 3.5.2, allows remote attackers to cause a\ndenial of service (assertion failure and application exit) or possibly\nexecute arbitrary code via a crafted .js file, related to a 'memory\nsafety bug.'\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=527489\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected MozillaFirefox packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_cwe_id(20, 119, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:MozillaFirefox\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:MozillaFirefox-branding-upstream\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:MozillaFirefox-translations\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gconf2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gconf2-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libidl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libidl-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-xulrunner190\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-xulrunner190-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-xulrunner190-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-xulrunner190-gnomevfs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-xulrunner190-gnomevfs-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-xulrunner190-translations\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-xulrunner190-translations-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:orbit2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:orbit2-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:python-xpcom190\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:11.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/08/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/08/20\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE11\\.1)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"11.1\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE11.1\", reference:\"MozillaFirefox-3.0.13-0.1.2\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", reference:\"MozillaFirefox-branding-upstream-3.0.13-0.1.2\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", reference:\"MozillaFirefox-translations-3.0.13-0.1.2\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", reference:\"gconf2-2.24.0-2.15\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", reference:\"libidl-0.8.11-1.27\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", reference:\"mozilla-xulrunner190-1.9.0.13-1.1.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", reference:\"mozilla-xulrunner190-devel-1.9.0.13-1.1.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", reference:\"mozilla-xulrunner190-gnomevfs-1.9.0.13-1.1.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", reference:\"mozilla-xulrunner190-translations-1.9.0.13-1.1.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", reference:\"orbit2-2.14.16-1.23\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", reference:\"python-xpcom190-1.9.0.13-1.1.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", cpu:\"x86_64\", reference:\"gconf2-2.24.0-2.17\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", cpu:\"x86_64\", reference:\"gconf2-32bit-2.24.0-2.15\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", cpu:\"x86_64\", reference:\"libidl-0.8.11-1.33\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", cpu:\"x86_64\", reference:\"libidl-32bit-0.8.11-1.27\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", cpu:\"x86_64\", reference:\"mozilla-xulrunner190-32bit-1.9.0.13-1.1.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", cpu:\"x86_64\", reference:\"mozilla-xulrunner190-gnomevfs-32bit-1.9.0.13-1.1.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", cpu:\"x86_64\", reference:\"mozilla-xulrunner190-translations-32bit-1.9.0.13-1.1.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", cpu:\"x86_64\", reference:\"orbit2-2.14.16-1.28\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", cpu:\"x86_64\", reference:\"orbit2-32bit-2.14.16-1.23\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"MozillaFirefox\");\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-17T14:14:14", "description": "MozillaFirefox was updated to the 3.0.13 release, fixing some security\nissues and bugs :\n\n - Security researcher Juan Pablo Lopez Yacubian reported\n that an attacker could call window.open() on an invalid\n URL which looks similar to a legitimate URL and then use\n document.write() to place content within the new\n document, appearing to have come from the spoofed\n location. Additionally, if the spoofed document was\n created by a document with a valid SSL certificate, the\n SSL indicators would be carried over into the spoofed\n document. An attacker could use these issues to display\n misleading location and SSL information for a malicious\n web page. (MFSA 2009-44 / CVE-2009-2654)\n\n - The browser engine in Mozilla Firefox before 3.0.13, and\n 3.5.x before 3.5.2, allows remote attackers to cause a\n denial of service (memory corruption and application\n crash) or possibly execute arbitrary code via vectors\n related to the TraceRecorder::snapshot function in\n js/src/jstracer.cpp, and unspecified other vectors.\n (MFSA 2009-45 / CVE-2009-2662)\n\n - libvorbis before r16182, as used in Mozilla Firefox\n before 3.0.13 and 3.5.x before 3.5.2 and other products,\n allows context-dependent attackers to cause a denial of\n service (memory corruption and application crash) or\n possibly execute arbitrary code via a crafted .ogg file.\n (CVE-2009-2663 / MFSA 2009-45)\n\n - The js_watch_set function in js/src/jsdbgapi.cpp in the\n JavaScript engine in Mozilla Firefox before 3.0.13, and\n 3.5.x before 3.5.2, allows remote attackers to cause a\n denial of service (assertion failure and application\n exit) or possibly execute arbitrary code via a crafted\n .js file, related to a 'memory safety bug.'.\n (CVE-2009-2664 / MFSA 2009-45)", "edition": 25, "published": "2009-09-24T00:00:00", "title": "SuSE 10 Security Update : Mozilla Firefox (ZYPP Patch Number 6433)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-2663", "CVE-2009-2662", "CVE-2009-2654", "CVE-2009-2664"], "modified": "2009-09-24T00:00:00", "cpe": ["cpe:/o:suse:suse_linux"], "id": "SUSE_MOZILLAFIREFOX-6433.NASL", "href": "https://www.tenable.com/plugins/nessus/41468", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The text description of this plugin is (C) Novell, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(41468);\n script_version(\"1.16\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2009-2654\", \"CVE-2009-2662\", \"CVE-2009-2663\", \"CVE-2009-2664\");\n\n script_name(english:\"SuSE 10 Security Update : Mozilla Firefox (ZYPP Patch Number 6433)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SuSE 10 host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"MozillaFirefox was updated to the 3.0.13 release, fixing some security\nissues and bugs :\n\n - Security researcher Juan Pablo Lopez Yacubian reported\n that an attacker could call window.open() on an invalid\n URL which looks similar to a legitimate URL and then use\n document.write() to place content within the new\n document, appearing to have come from the spoofed\n location. Additionally, if the spoofed document was\n created by a document with a valid SSL certificate, the\n SSL indicators would be carried over into the spoofed\n document. An attacker could use these issues to display\n misleading location and SSL information for a malicious\n web page. (MFSA 2009-44 / CVE-2009-2654)\n\n - The browser engine in Mozilla Firefox before 3.0.13, and\n 3.5.x before 3.5.2, allows remote attackers to cause a\n denial of service (memory corruption and application\n crash) or possibly execute arbitrary code via vectors\n related to the TraceRecorder::snapshot function in\n js/src/jstracer.cpp, and unspecified other vectors.\n (MFSA 2009-45 / CVE-2009-2662)\n\n - libvorbis before r16182, as used in Mozilla Firefox\n before 3.0.13 and 3.5.x before 3.5.2 and other products,\n allows context-dependent attackers to cause a denial of\n service (memory corruption and application crash) or\n possibly execute arbitrary code via a crafted .ogg file.\n (CVE-2009-2663 / MFSA 2009-45)\n\n - The js_watch_set function in js/src/jsdbgapi.cpp in the\n JavaScript engine in Mozilla Firefox before 3.0.13, and\n 3.5.x before 3.5.2, allows remote attackers to cause a\n denial of service (assertion failure and application\n exit) or possibly execute arbitrary code via a crafted\n .js file, related to a 'memory safety bug.'.\n (CVE-2009-2664 / MFSA 2009-45)\"\n );\n # http://www.mozilla.org/security/announce/2009/mfsa2009-44.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2009-44/\"\n );\n # http://www.mozilla.org/security/announce/2009/mfsa2009-45.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2009-45/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2009-2654.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2009-2662.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2009-2663.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2009-2664.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Apply ZYPP patch number 6433.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_cwe_id(20, 119, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:suse:suse_linux\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2009/08/03\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/08/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/09/24\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) exit(0, \"Local checks are not enabled.\");\nif (!get_kb_item(\"Host/SuSE/release\")) exit(0, \"The host is not running SuSE.\");\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) exit(1, \"Could not obtain the list of installed packages.\");\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) exit(1, \"Failed to determine the architecture type.\");\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") exit(1, \"Local checks for SuSE 10 on the '\"+cpu+\"' architecture have not been implemented.\");\n\n\nflag = 0;\nif (rpm_check(release:\"SLED10\", sp:2, reference:\"MozillaFirefox-3.0.13-0.4\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:2, reference:\"MozillaFirefox-branding-SLED-3.0.3-7.4.3\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:2, reference:\"MozillaFirefox-translations-3.0.13-0.4\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:2, reference:\"firefox3-atk-1.12.3-0.4.3\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:2, reference:\"firefox3-cairo-1.2.4-0.4.3\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:2, reference:\"firefox3-glib2-2.12.4-0.4.3\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:2, reference:\"firefox3-gtk2-2.10.6-0.4.3\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:2, reference:\"firefox3-pango-1.14.5-0.4.3\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:2, reference:\"mozilla-xulrunner190-1.9.0.13-1.4\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:2, reference:\"mozilla-xulrunner190-gnomevfs-1.9.0.13-1.4\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:2, reference:\"mozilla-xulrunner190-translations-1.9.0.13-1.4\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:2, cpu:\"x86_64\", reference:\"firefox3-atk-32bit-1.12.3-0.4.3\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:2, cpu:\"x86_64\", reference:\"firefox3-cairo-32bit-1.2.4-0.4.3\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:2, cpu:\"x86_64\", reference:\"firefox3-glib2-32bit-2.12.4-0.4.3\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:2, cpu:\"x86_64\", reference:\"firefox3-gtk2-32bit-2.10.6-0.4.3\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:2, cpu:\"x86_64\", reference:\"firefox3-pango-32bit-1.14.5-0.4.3\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:2, cpu:\"x86_64\", reference:\"mozilla-xulrunner190-32bit-1.9.0.13-1.4\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:2, cpu:\"x86_64\", reference:\"mozilla-xulrunner190-gnomevfs-32bit-1.9.0.13-1.4\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:2, cpu:\"x86_64\", reference:\"mozilla-xulrunner190-translations-32bit-1.9.0.13-1.4\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, reference:\"MozillaFirefox-3.0.13-0.4\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, reference:\"MozillaFirefox-branding-SLED-3.0.3-7.4.3\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, reference:\"MozillaFirefox-translations-3.0.13-0.4\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, reference:\"firefox3-atk-1.12.3-0.4.3\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, reference:\"firefox3-cairo-1.2.4-0.4.3\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, reference:\"firefox3-glib2-2.12.4-0.4.3\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, reference:\"firefox3-gtk2-2.10.6-0.4.3\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, reference:\"firefox3-pango-1.14.5-0.4.3\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, reference:\"mozilla-xulrunner190-1.9.0.13-1.4\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, reference:\"mozilla-xulrunner190-gnomevfs-1.9.0.13-1.4\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, reference:\"mozilla-xulrunner190-translations-1.9.0.13-1.4\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"x86_64\", reference:\"firefox3-atk-32bit-1.12.3-0.4.3\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"x86_64\", reference:\"firefox3-cairo-32bit-1.2.4-0.4.3\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"x86_64\", reference:\"firefox3-glib2-32bit-2.12.4-0.4.3\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"x86_64\", reference:\"firefox3-gtk2-32bit-2.10.6-0.4.3\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"x86_64\", reference:\"firefox3-pango-32bit-1.14.5-0.4.3\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"x86_64\", reference:\"mozilla-xulrunner190-32bit-1.9.0.13-1.4\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"x86_64\", reference:\"mozilla-xulrunner190-gnomevfs-32bit-1.9.0.13-1.4\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"x86_64\", reference:\"mozilla-xulrunner190-translations-32bit-1.9.0.13-1.4\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse exit(0, \"The host is not affected.\");\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-17T14:02:51", "description": "MozillaFirefox was updated to the 3.0.13 release, fixing some security\nissues and bugs :\n\nMFSA 2009-44 / CVE-2009-2654: Security researcher Juan Pablo Lopez\nYacubian reported that an attacker could call window.open() on an\ninvalid URL which looks similar to a legitimate URL and then use\ndocument.write() to place content within the new document, appearing\nto have come from the spoofed location. Additionally, if the spoofed\ndocument was created by a document with a valid SSL certificate, the\nSSL indicators would be carried over into the spoofed document. An\nattacker could use these issues to display misleading location and SSL\ninformation for a malicious web page.\n\nMFSA 2009-45 / CVE-2009-2662:The browser engine in Mozilla Firefox\nbefore 3.0.13, and 3.5.x before 3.5.2, allows remote attackers to\ncause a denial of service (memory corruption and application crash) or\npossibly execute arbitrary code via vectors related to the\nTraceRecorder::snapshot function in js/src/jstracer.cpp, and\nunspecified other vectors.\n\nCVE-2009-2663 / MFSA 2009-45: libvorbis before r16182, as used in\nMozilla Firefox before 3.0.13 and 3.5.x before 3.5.2 and other\nproducts, allows context-dependent attackers to cause a denial of\nservice (memory corruption and application crash) or possibly execute\narbitrary code via a crafted .ogg file.\n\nCVE-2009-2664 / MFSA 2009-45: The js_watch_set function in\njs/src/jsdbgapi.cpp in the JavaScript engine in Mozilla Firefox before\n3.0.13, and 3.5.x before 3.5.2, allows remote attackers to cause a\ndenial of service (assertion failure and application exit) or possibly\nexecute arbitrary code via a crafted .js file, related to a 'memory\nsafety bug.'", "edition": 25, "published": "2009-08-20T00:00:00", "title": "openSUSE Security Update : MozillaFirefox (MozillaFirefox-1202)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-2663", "CVE-2009-2662", "CVE-2009-2654", "CVE-2009-2664"], "modified": "2009-08-20T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:libidl-32bit", "cpe:/o:novell:opensuse:11.0", "p-cpe:/a:novell:opensuse:orbit2", "p-cpe:/a:novell:opensuse:mozilla-xulrunner190-gnomevfs-32bit", "p-cpe:/a:novell:opensuse:MozillaFirefox-translations", "p-cpe:/a:novell:opensuse:orbit2-32bit", "p-cpe:/a:novell:opensuse:mozilla-xulrunner190-32bit", "p-cpe:/a:novell:opensuse:mozilla-xulrunner190-translations-32bit", "p-cpe:/a:novell:opensuse:libidl", "p-cpe:/a:novell:opensuse:mozilla-xulrunner190-devel", "p-cpe:/a:novell:opensuse:gconf2-32bit", "p-cpe:/a:novell:opensuse:mozilla-xulrunner190-translations", "p-cpe:/a:novell:opensuse:gconf2", "p-cpe:/a:novell:opensuse:MozillaFirefox", "p-cpe:/a:novell:opensuse:mozilla-xulrunner190", "p-cpe:/a:novell:opensuse:mozilla-xulrunner190-gnomevfs"], "id": "SUSE_11_0_MOZILLAFIREFOX-090812.NASL", "href": "https://www.tenable.com/plugins/nessus/40641", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update MozillaFirefox-1202.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(40641);\n script_version(\"1.12\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2009-2654\", \"CVE-2009-2662\", \"CVE-2009-2663\", \"CVE-2009-2664\");\n\n script_name(english:\"openSUSE Security Update : MozillaFirefox (MozillaFirefox-1202)\");\n script_summary(english:\"Check for the MozillaFirefox-1202 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"MozillaFirefox was updated to the 3.0.13 release, fixing some security\nissues and bugs :\n\nMFSA 2009-44 / CVE-2009-2654: Security researcher Juan Pablo Lopez\nYacubian reported that an attacker could call window.open() on an\ninvalid URL which looks similar to a legitimate URL and then use\ndocument.write() to place content within the new document, appearing\nto have come from the spoofed location. Additionally, if the spoofed\ndocument was created by a document with a valid SSL certificate, the\nSSL indicators would be carried over into the spoofed document. An\nattacker could use these issues to display misleading location and SSL\ninformation for a malicious web page.\n\nMFSA 2009-45 / CVE-2009-2662:The browser engine in Mozilla Firefox\nbefore 3.0.13, and 3.5.x before 3.5.2, allows remote attackers to\ncause a denial of service (memory corruption and application crash) or\npossibly execute arbitrary code via vectors related to the\nTraceRecorder::snapshot function in js/src/jstracer.cpp, and\nunspecified other vectors.\n\nCVE-2009-2663 / MFSA 2009-45: libvorbis before r16182, as used in\nMozilla Firefox before 3.0.13 and 3.5.x before 3.5.2 and other\nproducts, allows context-dependent attackers to cause a denial of\nservice (memory corruption and application crash) or possibly execute\narbitrary code via a crafted .ogg file.\n\nCVE-2009-2664 / MFSA 2009-45: The js_watch_set function in\njs/src/jsdbgapi.cpp in the JavaScript engine in Mozilla Firefox before\n3.0.13, and 3.5.x before 3.5.2, allows remote attackers to cause a\ndenial of service (assertion failure and application exit) or possibly\nexecute arbitrary code via a crafted .js file, related to a 'memory\nsafety bug.'\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=527489\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected MozillaFirefox packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_cwe_id(20, 119, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:MozillaFirefox\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:MozillaFirefox-translations\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gconf2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gconf2-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libidl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libidl-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-xulrunner190\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-xulrunner190-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-xulrunner190-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-xulrunner190-gnomevfs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-xulrunner190-gnomevfs-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-xulrunner190-translations\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-xulrunner190-translations-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:orbit2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:orbit2-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:11.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/08/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/08/20\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE11\\.0)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"11.0\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE11.0\", reference:\"MozillaFirefox-3.0.13-0.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.0\", reference:\"MozillaFirefox-translations-3.0.13-0.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.0\", reference:\"gconf2-2.22.0-28.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.0\", reference:\"libidl-0.8.10-27.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.0\", reference:\"mozilla-xulrunner190-1.9.0.13-1.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.0\", reference:\"mozilla-xulrunner190-devel-1.9.0.13-1.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.0\", reference:\"mozilla-xulrunner190-gnomevfs-1.9.0.13-1.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.0\", reference:\"mozilla-xulrunner190-translations-1.9.0.13-1.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.0\", reference:\"orbit2-2.14.12-32.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.0\", cpu:\"x86_64\", reference:\"gconf2-32bit-2.22.0-28.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.0\", cpu:\"x86_64\", reference:\"libidl-32bit-0.8.10-27.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.0\", cpu:\"x86_64\", reference:\"mozilla-xulrunner190-32bit-1.9.0.13-1.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.0\", cpu:\"x86_64\", reference:\"mozilla-xulrunner190-gnomevfs-32bit-1.9.0.13-1.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.0\", cpu:\"x86_64\", reference:\"mozilla-xulrunner190-translations-32bit-1.9.0.13-1.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.0\", cpu:\"x86_64\", reference:\"orbit2-32bit-2.14.12-32.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"MozillaFirefox\");\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-17T14:09:17", "description": "Mozilla Firefox was updated to the 3.0.13 release, fixing some\nsecurity issues and bugs :\n\n - Security researcher Juan Pablo Lopez Yacubian reported\n that an attacker could call window.open() on an invalid\n URL which looks similar to a legitimate URL and then use\n document.write() to place content within the new\n document, appearing to have come from the spoofed\n location. Additionally, if the spoofed document was\n created by a document with a valid SSL certificate, the\n SSL indicators would be carried over into the spoofed\n document. An attacker could use these issues to display\n misleading location and SSL information for a malicious\n web page. (MFSA 2009-44 / CVE-2009-2654)\n\n - The browser engine in Mozilla Firefox before 3.0.13, and\n 3.5.x before 3.5.2, allows remote attackers to cause a\n denial of service (memory corruption and application\n crash) or possibly execute arbitrary code via vectors\n related to the TraceRecorder::snapshot function in\n js/src/jstracer.cpp, and unspecified other vectors.\n (MFSA 2009-45 / CVE-2009-2662)\n\n - libvorbis before r16182, as used in Mozilla Firefox\n before 3.0.13 and 3.5.x before 3.5.2 and other products,\n allows context-dependent attackers to cause a denial of\n service (memory corruption and application crash) or\n possibly execute arbitrary code via a crafted .ogg file.\n (CVE-2009-2663 / MFSA 2009-45)\n\n - The js_watch_set function in js/src/jsdbgapi.cpp in the\n JavaScript engine in Mozilla Firefox before 3.0.13, and\n 3.5.x before 3.5.2, allows remote attackers to cause a\n denial of service (assertion failure and application\n exit) or possibly execute arbitrary code via a crafted\n .js file, related to a 'memory safety bug.'.\n (CVE-2009-2664 / MFSA 2009-45)", "edition": 25, "published": "2009-09-24T00:00:00", "title": "SuSE 11 Security Update : Mozilla Firefox (SAT Patch Number 1200)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-2663", "CVE-2009-2662", "CVE-2009-2654", "CVE-2009-2664"], "modified": "2009-09-24T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:11:mozilla-xulrunner190-translations-32bit", "p-cpe:/a:novell:suse_linux:11:gconf2", "p-cpe:/a:novell:suse_linux:11:orbit2-32bit", "p-cpe:/a:novell:suse_linux:11:libidl-32bit", "p-cpe:/a:novell:suse_linux:11:orbit2", "cpe:/o:novell:suse_linux:11", "p-cpe:/a:novell:suse_linux:11:gconf2-32bit", "p-cpe:/a:novell:suse_linux:11:mozilla-xulrunner190", "p-cpe:/a:novell:suse_linux:11:mozilla-xulrunner190-32bit", "p-cpe:/a:novell:suse_linux:11:MozillaFirefox-translations", "p-cpe:/a:novell:suse_linux:11:mozilla-xulrunner190-translations", "p-cpe:/a:novell:suse_linux:11:libidl", "p-cpe:/a:novell:suse_linux:11:MozillaFirefox", "p-cpe:/a:novell:suse_linux:11:mozilla-xulrunner190-gnomevfs", "p-cpe:/a:novell:suse_linux:11:mozilla-xulrunner190-gnomevfs-32bit"], "id": "SUSE_11_MOZILLAFIREFOX-090812.NASL", "href": "https://www.tenable.com/plugins/nessus/41358", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from SuSE 11 update information. The text itself is\n# copyright (C) Novell, Inc.\n#\n\nif (NASL_LEVEL < 3000) exit(0);\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(41358);\n script_version(\"1.14\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2009-2654\", \"CVE-2009-2662\", \"CVE-2009-2663\", \"CVE-2009-2664\");\n\n script_name(english:\"SuSE 11 Security Update : Mozilla Firefox (SAT Patch Number 1200)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SuSE 11 host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Mozilla Firefox was updated to the 3.0.13 release, fixing some\nsecurity issues and bugs :\n\n - Security researcher Juan Pablo Lopez Yacubian reported\n that an attacker could call window.open() on an invalid\n URL which looks similar to a legitimate URL and then use\n document.write() to place content within the new\n document, appearing to have come from the spoofed\n location. Additionally, if the spoofed document was\n created by a document with a valid SSL certificate, the\n SSL indicators would be carried over into the spoofed\n document. An attacker could use these issues to display\n misleading location and SSL information for a malicious\n web page. (MFSA 2009-44 / CVE-2009-2654)\n\n - The browser engine in Mozilla Firefox before 3.0.13, and\n 3.5.x before 3.5.2, allows remote attackers to cause a\n denial of service (memory corruption and application\n crash) or possibly execute arbitrary code via vectors\n related to the TraceRecorder::snapshot function in\n js/src/jstracer.cpp, and unspecified other vectors.\n (MFSA 2009-45 / CVE-2009-2662)\n\n - libvorbis before r16182, as used in Mozilla Firefox\n before 3.0.13 and 3.5.x before 3.5.2 and other products,\n allows context-dependent attackers to cause a denial of\n service (memory corruption and application crash) or\n possibly execute arbitrary code via a crafted .ogg file.\n (CVE-2009-2663 / MFSA 2009-45)\n\n - The js_watch_set function in js/src/jsdbgapi.cpp in the\n JavaScript engine in Mozilla Firefox before 3.0.13, and\n 3.5.x before 3.5.2, allows remote attackers to cause a\n denial of service (assertion failure and application\n exit) or possibly execute arbitrary code via a crafted\n .js file, related to a 'memory safety bug.'.\n (CVE-2009-2664 / MFSA 2009-45)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.mozilla.org/security/announce/2009/mfsa2009-44.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.mozilla.org/security/announce/2009/mfsa2009-45.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=527489\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2009-2654.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2009-2662.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2009-2663.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2009-2664.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Apply SAT patch number 1200.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_cwe_id(20, 119, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:MozillaFirefox\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:MozillaFirefox-translations\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:gconf2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:gconf2-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:libidl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:libidl-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:mozilla-xulrunner190\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:mozilla-xulrunner190-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:mozilla-xulrunner190-gnomevfs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:mozilla-xulrunner190-gnomevfs-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:mozilla-xulrunner190-translations\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:mozilla-xulrunner190-translations-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:orbit2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:orbit2-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:11\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/08/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/09/24\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)11\") audit(AUDIT_OS_NOT, \"SuSE 11\");\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SuSE 11\", cpu);\n\npl = get_kb_item(\"Host/SuSE/patchlevel\");\nif (pl) audit(AUDIT_OS_NOT, \"SuSE 11.0\");\n\n\nflag = 0;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"i586\", reference:\"MozillaFirefox-3.0.13-0.1.2\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"i586\", reference:\"MozillaFirefox-translations-3.0.13-0.1.2\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"i586\", reference:\"gconf2-2.24.0-7.5\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"i586\", reference:\"libidl-0.8.11-2.14\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"i586\", reference:\"mozilla-xulrunner190-1.9.0.13-1.1.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"i586\", reference:\"mozilla-xulrunner190-gnomevfs-1.9.0.13-1.1.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"i586\", reference:\"mozilla-xulrunner190-translations-1.9.0.13-1.1.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"i586\", reference:\"orbit2-2.14.16-2.16\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"x86_64\", reference:\"MozillaFirefox-3.0.13-0.1.2\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"x86_64\", reference:\"MozillaFirefox-translations-3.0.13-0.1.2\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"x86_64\", reference:\"gconf2-2.24.0-7.5\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"x86_64\", reference:\"gconf2-32bit-2.24.0-7.5\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"x86_64\", reference:\"libidl-0.8.11-2.14\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"x86_64\", reference:\"libidl-32bit-0.8.11-2.14\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"x86_64\", reference:\"mozilla-xulrunner190-1.9.0.13-1.1.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"x86_64\", reference:\"mozilla-xulrunner190-32bit-1.9.0.13-1.1.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"x86_64\", reference:\"mozilla-xulrunner190-gnomevfs-1.9.0.13-1.1.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"x86_64\", reference:\"mozilla-xulrunner190-gnomevfs-32bit-1.9.0.13-1.1.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"x86_64\", reference:\"mozilla-xulrunner190-translations-1.9.0.13-1.1.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"x86_64\", reference:\"mozilla-xulrunner190-translations-32bit-1.9.0.13-1.1.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"x86_64\", reference:\"orbit2-2.14.16-2.16\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"x86_64\", reference:\"orbit2-32bit-2.14.16-2.16\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:0, reference:\"MozillaFirefox-3.0.13-0.1.2\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:0, reference:\"MozillaFirefox-translations-3.0.13-0.1.2\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:0, reference:\"gconf2-2.24.0-7.5\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:0, reference:\"libidl-0.8.11-2.14\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:0, reference:\"mozilla-xulrunner190-1.9.0.13-1.1.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:0, reference:\"mozilla-xulrunner190-gnomevfs-1.9.0.13-1.1.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:0, reference:\"mozilla-xulrunner190-translations-1.9.0.13-1.1.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:0, reference:\"orbit2-2.14.16-2.16\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:0, cpu:\"s390x\", reference:\"gconf2-32bit-2.24.0-7.5\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:0, cpu:\"s390x\", reference:\"libidl-32bit-0.8.11-2.14\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:0, cpu:\"s390x\", reference:\"mozilla-xulrunner190-32bit-1.9.0.13-1.1.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:0, cpu:\"s390x\", reference:\"orbit2-32bit-2.14.16-2.16\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:0, cpu:\"x86_64\", reference:\"gconf2-32bit-2.24.0-7.5\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:0, cpu:\"x86_64\", reference:\"libidl-32bit-0.8.11-2.14\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:0, cpu:\"x86_64\", reference:\"mozilla-xulrunner190-32bit-1.9.0.13-1.1.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:0, cpu:\"x86_64\", reference:\"orbit2-32bit-2.14.16-2.16\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-12T10:07:34", "description": "Update to new upstream Firefox version 3.0.13, fixing multiple\nsecurity issues detailed in the upstream advisories:\nhttp://www.mozilla.org/security/known-vulnerabilities/firefox30.html#f\nirefox3.0.13 Update also includes all packages depending on gecko-libs\nrebuilt against new version of Firefox / XULRunner. Note: Issues\ndescribed in MFSA 2009-42 and MFSA 2009-43 were previously addressed\nvia rebase of the NSS packages.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 25, "published": "2009-08-05T00:00:00", "title": "Fedora 10 : Miro-2.0.5-3.fc10 / blam-1.8.5-13.fc10 / epiphany-2.24.3-9.fc10 / etc (2009-8288)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-2470", "CVE-2009-2663", "CVE-2009-2662", "CVE-2009-2665", "CVE-2009-2654", "CVE-2009-2664"], "modified": "2009-08-05T00:00:00", "cpe": ["cpe:/o:fedoraproject:fedora:10", "p-cpe:/a:fedoraproject:fedora:google-gadgets", "p-cpe:/a:fedoraproject:fedora:xulrunner", "p-cpe:/a:fedoraproject:fedora:pcmanx-gtk2", "p-cpe:/a:fedoraproject:fedora:firefox", "p-cpe:/a:fedoraproject:fedora:perl-Gtk2-MozEmbed", "p-cpe:/a:fedoraproject:fedora:epiphany", "p-cpe:/a:fedoraproject:fedora:gecko-sharp2", "p-cpe:/a:fedoraproject:fedora:ruby-gnome2", "p-cpe:/a:fedoraproject:fedora:evolution-rss", "p-cpe:/a:fedoraproject:fedora:mugshot", "p-cpe:/a:fedoraproject:fedora:kazehakase", "p-cpe:/a:fedoraproject:fedora:gnome-python2-extras", "p-cpe:/a:fedoraproject:fedora:blam", "p-cpe:/a:fedoraproject:fedora:gnome-web-photo", "p-cpe:/a:fedoraproject:fedora:galeon", "p-cpe:/a:fedoraproject:fedora:Miro", "p-cpe:/a:fedoraproject:fedora:mozvoikko", "p-cpe:/a:fedoraproject:fedora:yelp"], "id": "FEDORA_2009-8288.NASL", "href": "https://www.tenable.com/plugins/nessus/40484", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2009-8288.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(40484);\n script_version(\"1.19\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2009-2470\", \"CVE-2009-2654\", \"CVE-2009-2662\", \"CVE-2009-2663\", \"CVE-2009-2664\", \"CVE-2009-2665\");\n script_bugtraq_id(35803, 35927, 35928);\n script_xref(name:\"FEDORA\", value:\"2009-8288\");\n\n script_name(english:\"Fedora 10 : Miro-2.0.5-3.fc10 / blam-1.8.5-13.fc10 / epiphany-2.24.3-9.fc10 / etc (2009-8288)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Update to new upstream Firefox version 3.0.13, fixing multiple\nsecurity issues detailed in the upstream advisories:\nhttp://www.mozilla.org/security/known-vulnerabilities/firefox30.html#f\nirefox3.0.13 Update also includes all packages depending on gecko-libs\nrebuilt against new version of Firefox / XULRunner. Note: Issues\ndescribed in MFSA 2009-42 and MFSA 2009-43 were previously addressed\nvia rebase of the NSS packages.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2009-August/027514.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?16c75bf6\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2009-August/027515.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?ef9c9c85\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2009-August/027516.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?05980972\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2009-August/027517.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?f685d331\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2009-August/027518.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?0354abc1\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2009-August/027519.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?6395dd56\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2009-August/027520.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?bbdcae2b\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2009-August/027521.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?9be5bde1\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2009-August/027522.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?a3d352de\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2009-August/027523.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?c0dc362f\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2009-August/027524.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?c39c5a31\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2009-August/027525.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?82b08faf\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2009-August/027526.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?fbd84d7b\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2009-August/027527.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?8a467d30\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2009-August/027528.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?d1cf19a6\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2009-August/027529.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?c0d1aa1b\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2009-August/027530.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?e7987091\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2009-August/027531.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?2ec59fd1\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_cwe_id(20, 94, 119, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:Miro\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:blam\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:epiphany\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:evolution-rss\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:firefox\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:galeon\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:gecko-sharp2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:gnome-python2-extras\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:gnome-web-photo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:google-gadgets\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kazehakase\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:mozvoikko\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:mugshot\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:pcmanx-gtk2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:perl-Gtk2-MozEmbed\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:ruby-gnome2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:xulrunner\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:yelp\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:10\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/08/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/08/05\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^10([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 10.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC10\", reference:\"Miro-2.0.5-3.fc10\")) flag++;\nif (rpm_check(release:\"FC10\", reference:\"blam-1.8.5-13.fc10\")) flag++;\nif (rpm_check(release:\"FC10\", reference:\"epiphany-2.24.3-9.fc10\")) flag++;\nif (rpm_check(release:\"FC10\", reference:\"evolution-rss-0.1.2-9.fc10\")) flag++;\nif (rpm_check(release:\"FC10\", reference:\"firefox-3.0.13-1.fc10\")) flag++;\nif (rpm_check(release:\"FC10\", reference:\"galeon-2.0.7-13.fc10\")) flag++;\nif (rpm_check(release:\"FC10\", reference:\"gecko-sharp2-0.13-11.fc10\")) flag++;\nif (rpm_check(release:\"FC10\", reference:\"gnome-python2-extras-2.19.1-33.fc10\")) flag++;\nif (rpm_check(release:\"FC10\", reference:\"gnome-web-photo-0.3-21.fc10\")) flag++;\nif (rpm_check(release:\"FC10\", reference:\"google-gadgets-0.10.5-9.fc10\")) flag++;\nif (rpm_check(release:\"FC10\", reference:\"kazehakase-0.5.6-4.fc10.5\")) flag++;\nif (rpm_check(release:\"FC10\", reference:\"mozvoikko-0.9.5-13.fc10\")) flag++;\nif (rpm_check(release:\"FC10\", reference:\"mugshot-1.2.2-12.fc10\")) flag++;\nif (rpm_check(release:\"FC10\", reference:\"pcmanx-gtk2-0.3.8-12.fc10\")) flag++;\nif (rpm_check(release:\"FC10\", reference:\"perl-Gtk2-MozEmbed-0.08-6.fc10.4\")) flag++;\nif (rpm_check(release:\"FC10\", reference:\"ruby-gnome2-0.19.1-1.fc10.1\")) flag++;\nif (rpm_check(release:\"FC10\", reference:\"xulrunner-1.9.0.13-1.fc10\")) flag++;\nif (rpm_check(release:\"FC10\", reference:\"yelp-2.24.0-12.fc10\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"Miro / blam / epiphany / evolution-rss / firefox / galeon / etc\");\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-12T10:07:34", "description": "Update to new upstream Firefox version 3.5.2, fixing multiple security\nissues detailed in the upstream advisories:\nhttp://www.mozilla.org/security/known-\nvulnerabilities/firefox35.html#firefox3.5.2 Update also includes all\npackages depending on gecko-libs rebuilt against new version of\nFirefox / XULRunner.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 26, "published": "2009-08-05T00:00:00", "title": "Fedora 11 : kazehakase-0.5.6-11.svn3771_trunk.fc11.4 / Miro-2.0.5-3.fc11 / blam-1.8.5-13.fc11 / etc (2009-8279)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-2470", "CVE-2009-2663", "CVE-2009-2662", "CVE-2009-2665", "CVE-2009-2654", "CVE-2009-2664"], "modified": "2009-08-05T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:google-gadgets", "p-cpe:/a:fedoraproject:fedora:xulrunner", "p-cpe:/a:fedoraproject:fedora:firefox", "p-cpe:/a:fedoraproject:fedora:perl-Gtk2-MozEmbed", "p-cpe:/a:fedoraproject:fedora:epiphany", "p-cpe:/a:fedoraproject:fedora:chmsee", "p-cpe:/a:fedoraproject:fedora:ruby-gnome2", "p-cpe:/a:fedoraproject:fedora:evolution-rss", "p-cpe:/a:fedoraproject:fedora:kazehakase", "p-cpe:/a:fedoraproject:fedora:gnome-python2-extras", "p-cpe:/a:fedoraproject:fedora:epiphany-extensions", "p-cpe:/a:fedoraproject:fedora:blam", "p-cpe:/a:fedoraproject:fedora:hulahop", "p-cpe:/a:fedoraproject:fedora:seahorse-plugins", "p-cpe:/a:fedoraproject:fedora:gnome-web-photo", "p-cpe:/a:fedoraproject:fedora:galeon", "cpe:/o:fedoraproject:fedora:11", "p-cpe:/a:fedoraproject:fedora:Miro", "p-cpe:/a:fedoraproject:fedora:mozvoikko", "p-cpe:/a:fedoraproject:fedora:yelp"], "id": "FEDORA_2009-8279.NASL", "href": "https://www.tenable.com/plugins/nessus/40483", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2009-8279.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(40483);\n script_version(\"1.19\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2009-2470\", \"CVE-2009-2654\", \"CVE-2009-2662\", \"CVE-2009-2663\", \"CVE-2009-2664\", \"CVE-2009-2665\");\n script_bugtraq_id(35803, 35927, 35928);\n script_xref(name:\"FEDORA\", value:\"2009-8279\");\n\n script_name(english:\"Fedora 11 : kazehakase-0.5.6-11.svn3771_trunk.fc11.4 / Miro-2.0.5-3.fc11 / blam-1.8.5-13.fc11 / etc (2009-8279)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Update to new upstream Firefox version 3.5.2, fixing multiple security\nissues detailed in the upstream advisories:\nhttp://www.mozilla.org/security/known-\nvulnerabilities/firefox35.html#firefox3.5.2 Update also includes all\npackages depending on gecko-libs rebuilt against new version of\nFirefox / XULRunner.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n # http://www.mozilla.org/security/known-\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/known-\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2009-August/027467.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?b5411894\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2009-August/027468.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?def1e37b\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2009-August/027469.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?f53394a9\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2009-August/027470.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?ddda2adf\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2009-August/027471.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?72dba140\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2009-August/027472.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?fab171fa\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2009-August/027473.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?c1118018\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2009-August/027474.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?cb534fee\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2009-August/027475.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?129fda96\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2009-August/027476.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?de1b481f\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2009-August/027477.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?2e9a4f1b\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2009-August/027478.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?a08809ce\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2009-August/027479.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?dfa76f24\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2009-August/027480.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?cbe3877c\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2009-August/027481.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?0a06a305\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2009-August/027482.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?38556d6e\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2009-August/027483.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?7d618274\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2009-August/027484.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?f84db6b0\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2009-August/027485.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?4c131a96\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_cwe_id(20, 94, 119, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:Miro\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:blam\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:chmsee\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:epiphany\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:epiphany-extensions\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:evolution-rss\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:firefox\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:galeon\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:gnome-python2-extras\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:gnome-web-photo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:google-gadgets\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:hulahop\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kazehakase\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:mozvoikko\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:perl-Gtk2-MozEmbed\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:ruby-gnome2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:seahorse-plugins\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:xulrunner\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:yelp\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:11\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/08/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/08/05\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^11([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 11.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC11\", reference:\"Miro-2.0.5-3.fc11\")) flag++;\nif (rpm_check(release:\"FC11\", reference:\"blam-1.8.5-13.fc11\")) flag++;\nif (rpm_check(release:\"FC11\", reference:\"chmsee-1.0.1-10.fc11\")) flag++;\nif (rpm_check(release:\"FC11\", reference:\"epiphany-2.26.3-3.fc11\")) flag++;\nif (rpm_check(release:\"FC11\", reference:\"epiphany-extensions-2.26.1-5.fc11\")) flag++;\nif (rpm_check(release:\"FC11\", reference:\"evolution-rss-0.1.2-12.fc11\")) flag++;\nif (rpm_check(release:\"FC11\", reference:\"firefox-3.5.2-2.fc11\")) flag++;\nif (rpm_check(release:\"FC11\", reference:\"galeon-2.0.7-13.fc11\")) flag++;\nif (rpm_check(release:\"FC11\", reference:\"gnome-python2-extras-2.25.3-6.fc11\")) flag++;\nif (rpm_check(release:\"FC11\", reference:\"gnome-web-photo-0.7-5.fc11\")) flag++;\nif (rpm_check(release:\"FC11\", reference:\"google-gadgets-0.11.0-3.fc11\")) flag++;\nif (rpm_check(release:\"FC11\", reference:\"hulahop-0.4.9-7.fc11\")) flag++;\nif (rpm_check(release:\"FC11\", reference:\"kazehakase-0.5.6-11.svn3771_trunk.fc11.4\")) flag++;\nif (rpm_check(release:\"FC11\", reference:\"mozvoikko-0.9.7-0.6.rc1.fc11\")) flag++;\nif (rpm_check(release:\"FC11\", reference:\"perl-Gtk2-MozEmbed-0.08-6.fc11.4\")) flag++;\nif (rpm_check(release:\"FC11\", reference:\"ruby-gnome2-0.19.1-1.fc11.1\")) flag++;\nif (rpm_check(release:\"FC11\", reference:\"seahorse-plugins-2.26.2-4.fc11\")) flag++;\nif (rpm_check(release:\"FC11\", reference:\"xulrunner-1.9.1.2-1.fc11\")) flag++;\nif (rpm_check(release:\"FC11\", reference:\"yelp-2.26.0-6.fc11\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"Miro / blam / chmsee / epiphany / epiphany-extensions / etc\");\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-03-01T04:09:20", "description": "The installed version of Firefox is earlier than 3.0.13. Such\nversions are potentially affected by the following security issues :\n\n - The browser can be fooled into trusting a malicious SSL\n server certificate with a null character in the host name.\n (MFSA 2009-42)\n\n - A heap overflow in the code that handles regular\n expressions in certificate names can lead to\n arbitrary code execution. (MFSA 2009-43)\n\n - The location bar and SSL indicators can be spoofed\n by calling window.open() on an invalid URL. A remote\n attacker could use this to perform a phishing attack.\n (MFSA 2009-44)\n\n - Unspecified JavaScript-related vulnerabilities can lead\n to memory corruption, and possibly arbitrary execution\n of code. (MFSA 2009-45)", "edition": 27, "published": "2009-08-04T00:00:00", "title": "Firefox < 3.0.13 Multiple Vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-2663", "CVE-2009-2662", "CVE-2009-2408", "CVE-2009-2654", "CVE-2009-2664", "CVE-2009-2404"], "modified": "2021-03-02T00:00:00", "cpe": ["cpe:/a:mozilla:firefox"], "id": "MOZILLA_FIREFOX_3013.NASL", "href": "https://www.tenable.com/plugins/nessus/40478", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\n\ninclude(\"compat.inc\");\n\n\nif (description)\n{\n script_id(40478);\n script_version(\"1.20\");\n\n script_cve_id(\n \"CVE-2009-2404\", \n \"CVE-2009-2408\", \n \"CVE-2009-2654\", \n \"CVE-2009-2662\",\n \"CVE-2009-2663\", \n \"CVE-2009-2664\"\n );\n script_bugtraq_id(35803, 35888, 35891, 35927, 36018);\n script_xref(name:\"Secunia\", value:\"36001\");\n script_xref(name:\"Secunia\", value:\"36088\");\n\n script_name(english:\"Firefox < 3.0.13 Multiple Vulnerabilities\");\n script_summary(english:\"Checks version of Firefox\");\n\n script_set_attribute( attribute:\"synopsis\", value:\n\"The remote Windows host contains a web browser that is\naffected by multiple flaws.\" );\n script_set_attribute( attribute:\"description\", value:\n\"The installed version of Firefox is earlier than 3.0.13. Such\nversions are potentially affected by the following security issues :\n\n - The browser can be fooled into trusting a malicious SSL\n server certificate with a null character in the host name.\n (MFSA 2009-42)\n\n - A heap overflow in the code that handles regular\n expressions in certificate names can lead to\n arbitrary code execution. (MFSA 2009-43)\n\n - The location bar and SSL indicators can be spoofed\n by calling window.open() on an invalid URL. A remote\n attacker could use this to perform a phishing attack.\n (MFSA 2009-44)\n\n - Unspecified JavaScript-related vulnerabilities can lead\n to memory corruption, and possibly arbitrary execution\n of code. (MFSA 2009-45)\" );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2009-42/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2009-43/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2009-44/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2009-45/\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\"Upgrade to Firefox 3.0.13 or later.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_cwe_id(20, 119, 310, 399);\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/08/04\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/08/01\");\n script_cvs_date(\"Date: 2018/07/16 14:09:14\");\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:mozilla:firefox\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n script_copyright(english:\"This script is Copyright (C) 2009-2018 Tenable Network Security, Inc.\");\n script_dependencies(\"mozilla_org_installed.nasl\");\n script_require_keys(\"Mozilla/Firefox/Version\");\n exit(0);\n}\n\ninclude(\"mozilla_version.inc\");\nport = get_kb_item_or_exit(\"SMB/transport\"); \n\ninstalls = get_kb_list(\"SMB/Mozilla/Firefox/*\");\nif (isnull(installs)) audit(AUDIT_NOT_INST, \"Firefox\");\n\nmozilla_check_version(installs:installs, product:'firefox', esr:FALSE, fix:'3.0.13', severity:SECURITY_HOLE);", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-03-01T04:09:39", "description": "The installed version of Firefox 3.5 is earlier than 3.5.2. Such \nversions are potentially affected by the following security issues :\n\n - A SOCKS5 proxy that replies with a hostname containing\n more than 15 characters can corrupt the subsequent\n data stream. This can lead to a denial of service,\n though there is reportedly no memory corruption.\n (MFSA 2009-38)\n\n - The location bar and SSL indicators can be spoofed\n by calling window.open() on an invalid URL. A remote\n attacker could use this to perform a phishing attack.\n (MFSA 2009-44)\n\n - Unspecified JavaScript-related vulnerabilities can lead\n to memory corruption, and possibly arbitrary execution\n of code. (MFSA 2009-45, MFSA 2009-47)\n\n - If an add-on has a 'Link:' HTTP header when it is installed,\n the window's global object receives an incorrect security\n wrapper, which could lead to arbitrary JavaScript being\n executed with chrome privileges. (MFSA 2009-46)", "edition": 28, "published": "2009-08-04T00:00:00", "title": "Firefox 3.5.x < 3.5.2 Multiple Vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-2470", "CVE-2009-3071", "CVE-2009-2663", "CVE-2009-2662", "CVE-2009-2665", "CVE-2009-3075", "CVE-2009-2654", "CVE-2009-2664"], "modified": "2021-03-02T00:00:00", "cpe": ["cpe:/a:mozilla:firefox"], "id": "MOZILLA_FIREFOX_352.NASL", "href": "https://www.tenable.com/plugins/nessus/40479", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\n\ninclude(\"compat.inc\");\n\n\nif (description)\n{\n script_id(40479);\n script_version(\"1.18\");\n\n script_cve_id(\n \"CVE-2009-2654\", \n \"CVE-2009-2470\", \n \"CVE-2009-2662\", \n \"CVE-2009-2663\", \n \"CVE-2009-2664\",\n \"CVE-2009-2665\", \n \"CVE-2009-3071\", \n \"CVE-2009-3075\"\n );\n script_bugtraq_id(35803, 35925, 35927, 35928, 36018, 36343);\n script_xref(name:\"Secunia\", value:\"36001\");\n\n script_name(english:\"Firefox 3.5.x < 3.5.2 Multiple Vulnerabilities\");\n script_summary(english:\"Checks version number\");\n\n script_set_attribute( attribute:\"synopsis\", value:\n\"The remote Windows host contains a web browser that is affected by\nmultiple vulnerabilities.\" );\n script_set_attribute( attribute:\"description\", value:\n\"The installed version of Firefox 3.5 is earlier than 3.5.2. Such \nversions are potentially affected by the following security issues :\n\n - A SOCKS5 proxy that replies with a hostname containing\n more than 15 characters can corrupt the subsequent\n data stream. This can lead to a denial of service,\n though there is reportedly no memory corruption.\n (MFSA 2009-38)\n\n - The location bar and SSL indicators can be spoofed\n by calling window.open() on an invalid URL. A remote\n attacker could use this to perform a phishing attack.\n (MFSA 2009-44)\n\n - Unspecified JavaScript-related vulnerabilities can lead\n to memory corruption, and possibly arbitrary execution\n of code. (MFSA 2009-45, MFSA 2009-47)\n\n - If an add-on has a 'Link:' HTTP header when it is installed,\n the window's global object receives an incorrect security\n wrapper, which could lead to arbitrary JavaScript being\n executed with chrome privileges. (MFSA 2009-46)\" );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2009-38/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2009-44/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2009-45/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2009-46/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2009-47/\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\"Upgrade to Firefox 3.5.2 or later.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_cwe_id(20, 94, 119, 399);\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/08/04\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/07/21\");\n script_cvs_date(\"Date: 2018/07/16 14:09:14\");\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:mozilla:firefox\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n script_copyright(english:\"This script is Copyright (C) 2009-2018 Tenable Network Security, Inc.\");\n script_dependencies(\"mozilla_org_installed.nasl\");\n script_require_keys(\"Mozilla/Firefox/Version\");\n exit(0);\n}\n\ninclude(\"mozilla_version.inc\");\nport = get_kb_item_or_exit(\"SMB/transport\"); \n\ninstalls = get_kb_list(\"SMB/Mozilla/Firefox/*\");\nif (isnull(installs)) audit(AUDIT_NOT_INST, \"Firefox\");\n\nmozilla_check_version(installs:installs, product:'firefox', esr:FALSE, fix:'3.5.2', min:'3.5', severity:SECURITY_HOLE);", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-17T14:14:14", "description": "This update brings the Mozilla Firefox browser to the 3.0.14 stable\nrelease.\n\nIt also fixes various security issues: MFSA 2009-47 / CVE-2009-3069 /\nCVE-2009-3070 / CVE-2009-3071 / CVE-2009-3072 / CVE-2009-3073 /\nCVE-2009-30 / CVE-2009-3075: Mozilla developers and community members\nidentified and fixed several stability bugs in the browser engine used\nin Firefox and other Mozilla-based products. Some of these crashes\nshowed evidence of memory corruption under certain circumstances and\nwe presume that with enough effort at least some of these could be\nexploited to run arbitrary code.\n\nMFSA 2009-48 / CVE-2009-3076: Mozilla security researcher Jesse\nRudermanreported that when security modules were added or removed via\npkcs11.addmodule or pkcs11.deletemodule, the resulting dialog was not\nsufficiently informative. Without sufficient warning, an attacker\ncould entice a victim to install a malicious PKCS11 module and affect\nthe cryptographic integrity of the victim's browser. Security\nresearcher Dan Kaminsky reported that this issue had not been fixed in\nFirefox 3.0 and that under certain circumstances pkcs11 modules could\nbe installed from a remote location. Firefox 3.5 releases are not\naffected.\n\nMFSA 2009-49 / CVE-2009-3077: An anonymous security researcher, via\nTippingPoint's Zero Day Initiative, reported that the columns of a XUL\ntree element could be manipulated in a particular way which would\nleave a pointer owned by the column pointing to freed memory. An\nattacker could potentially use this vulnerability to crash a victim's\nbrowser and run arbitrary code on the victim's computer.\n\nMFSA 2009-50 / CVE-2009-3078: Security researcher Juan Pablo Lopez\nYacubian reported that the default Windows font used to render the\nlocationbar and other text fields was improperly displaying certain\nUnicode characters with tall line-height. In such cases the tall\nline-height would cause the rest of the text in the input field to be\nscrolled vertically out of view. An attacker could use this\nvulnerability to prevent a user from seeing the URL of a malicious\nsite. Corrie Sloot also independently reported this issue to Mozilla.\n\nMFSA 2009-51 / CVE-2009-3079: Mozilla security researcher moz_bug_r_a4\nreported that the BrowserFeedWriter could be leveraged to run\nJavaScript code from web content with elevated privileges. Using this\nvulnerability, an attacker could construct an object containing\nmalicious JavaScript and cause the FeedWriter to process the object,\nrunning the malicious code with chrome privileges. Thunderbird does\nnot support the BrowserFeedWriter object and is not vulnerable in its\ndefault configuration. Thunderbird might be vulnerable if the user has\ninstalled any add-on which adds a similarly implemented feature and\nthen enables JavaScript in mail messages. This is not the default\nsetting and we strongly discourage users from running JavaScript in\nmail.\n\nIssues fixed in the 3.0.13 release were: MFSA 2009-44 / CVE-2009-2654:\nSecurity researcher Juan Pablo Lopez Yacubian reported that an\nattacker could call window.open() on an invalid URL which looks\nsimilar to a legitimate URL and then use document.write() to place\ncontent within the new document, appearing to have come from the\nspoofed location. Additionally, if the spoofed document was created by\na document with a valid SSL certificate, the SSL indicators would be\ncarried over into the spoofed document. An attacker could use these\nissues to display misleading location and SSL information for a\nmalicious web page.\n\nMFSA 2009-45 / CVE-2009-2662:The browser engine in Mozilla Firefox\nbefore 3.0.13, and 3.5.x before 3.5.2, allows remote attackers to\ncause a denial of service (memory corruption and application crash) or\npossibly execute arbitrary code via vectors related to the\nTraceRecorder::snapshot function in js/src/jstracer.cpp, and\nunspecified other vectors.\n\nCVE-2009-2663 / MFSA 2009-45: libvorbis before r16182, as used in\nMozilla Firefox before 3.0.13 and 3.5.x before 3.5.2 and other\nproducts, allows context-dependent attackers to cause a denial of\nservice (memory corruption and application crash) or possibly execute\narbitrary code via a crafted .ogg file.\n\nCVE-2009-2664 / MFSA 2009-45: The js_watch_set function in\njs/src/jsdbgapi.cpp in the JavaScript engine in Mozilla Firefox before\n3.0.13, and 3.5.x before 3.5.2, allows remote attackers to cause a\ndenial of service (assertion failure and application exit) or possibly\nexecute arbitrary code via a crafted .js file, related to a 'memory\nsafety bug.", "edition": 25, "published": "2009-10-06T00:00:00", "title": "openSUSE 10 Security Update : MozillaFirefox (MozillaFirefox-6495)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-3076", "CVE-2009-3071", "CVE-2009-2663", "CVE-2009-2662", "CVE-2009-3073", "CVE-2009-3079", "CVE-2009-3072", "CVE-2009-3074", "CVE-2009-3070", "CVE-2009-3069", "CVE-2009-3075", "CVE-2009-2654", "CVE-2009-2664", "CVE-2009-3077", "CVE-2009-3078"], "modified": "2009-10-06T00:00:00", "cpe": ["cpe:/o:novell:opensuse:10.3", "p-cpe:/a:novell:opensuse:mozilla-xulrunner190-gnomevfs-32bit", "p-cpe:/a:novell:opensuse:MozillaFirefox-translations", "p-cpe:/a:novell:opensuse:python-xpcom190", "p-cpe:/a:novell:opensuse:mozilla-xulrunner190-32bit", "p-cpe:/a:novell:opensuse:mozilla-xulrunner190-translations-32bit", "p-cpe:/a:novell:opensuse:mozilla-xulrunner190-devel", "p-cpe:/a:novell:opensuse:mozilla-xulrunner190-translations", "p-cpe:/a:novell:opensuse:MozillaFirefox", "p-cpe:/a:novell:opensuse:mozilla-xulrunner190", "p-cpe:/a:novell:opensuse:mozilla-xulrunner190-gnomevfs"], "id": "SUSE_MOZILLAFIREFOX-6495.NASL", "href": "https://www.tenable.com/plugins/nessus/41984", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update MozillaFirefox-6495.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(41984);\n script_version(\"1.17\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2009-2654\", \"CVE-2009-2662\", \"CVE-2009-2663\", \"CVE-2009-2664\", \"CVE-2009-3069\", \"CVE-2009-3070\", \"CVE-2009-3071\", \"CVE-2009-3072\", \"CVE-2009-3073\", \"CVE-2009-3074\", \"CVE-2009-3075\", \"CVE-2009-3076\", \"CVE-2009-3077\", \"CVE-2009-3078\", \"CVE-2009-3079\");\n\n script_name(english:\"openSUSE 10 Security Update : MozillaFirefox (MozillaFirefox-6495)\");\n script_summary(english:\"Check for the MozillaFirefox-6495 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update brings the Mozilla Firefox browser to the 3.0.14 stable\nrelease.\n\nIt also fixes various security issues: MFSA 2009-47 / CVE-2009-3069 /\nCVE-2009-3070 / CVE-2009-3071 / CVE-2009-3072 / CVE-2009-3073 /\nCVE-2009-30 / CVE-2009-3075: Mozilla developers and community members\nidentified and fixed several stability bugs in the browser engine used\nin Firefox and other Mozilla-based products. Some of these crashes\nshowed evidence of memory corruption under certain circumstances and\nwe presume that with enough effort at least some of these could be\nexploited to run arbitrary code.\n\nMFSA 2009-48 / CVE-2009-3076: Mozilla security researcher Jesse\nRudermanreported that when security modules were added or removed via\npkcs11.addmodule or pkcs11.deletemodule, the resulting dialog was not\nsufficiently informative. Without sufficient warning, an attacker\ncould entice a victim to install a malicious PKCS11 module and affect\nthe cryptographic integrity of the victim's browser. Security\nresearcher Dan Kaminsky reported that this issue had not been fixed in\nFirefox 3.0 and that under certain circumstances pkcs11 modules could\nbe installed from a remote location. Firefox 3.5 releases are not\naffected.\n\nMFSA 2009-49 / CVE-2009-3077: An anonymous security researcher, via\nTippingPoint's Zero Day Initiative, reported that the columns of a XUL\ntree element could be manipulated in a particular way which would\nleave a pointer owned by the column pointing to freed memory. An\nattacker could potentially use this vulnerability to crash a victim's\nbrowser and run arbitrary code on the victim's computer.\n\nMFSA 2009-50 / CVE-2009-3078: Security researcher Juan Pablo Lopez\nYacubian reported that the default Windows font used to render the\nlocationbar and other text fields was improperly displaying certain\nUnicode characters with tall line-height. In such cases the tall\nline-height would cause the rest of the text in the input field to be\nscrolled vertically out of view. An attacker could use this\nvulnerability to prevent a user from seeing the URL of a malicious\nsite. Corrie Sloot also independently reported this issue to Mozilla.\n\nMFSA 2009-51 / CVE-2009-3079: Mozilla security researcher moz_bug_r_a4\nreported that the BrowserFeedWriter could be leveraged to run\nJavaScript code from web content with elevated privileges. Using this\nvulnerability, an attacker could construct an object containing\nmalicious JavaScript and cause the FeedWriter to process the object,\nrunning the malicious code with chrome privileges. Thunderbird does\nnot support the BrowserFeedWriter object and is not vulnerable in its\ndefault configuration. Thunderbird might be vulnerable if the user has\ninstalled any add-on which adds a similarly implemented feature and\nthen enables JavaScript in mail messages. This is not the default\nsetting and we strongly discourage users from running JavaScript in\nmail.\n\nIssues fixed in the 3.0.13 release were: MFSA 2009-44 / CVE-2009-2654:\nSecurity researcher Juan Pablo Lopez Yacubian reported that an\nattacker could call window.open() on an invalid URL which looks\nsimilar to a legitimate URL and then use document.write() to place\ncontent within the new document, appearing to have come from the\nspoofed location. Additionally, if the spoofed document was created by\na document with a valid SSL certificate, the SSL indicators would be\ncarried over into the spoofed document. An attacker could use these\nissues to display misleading location and SSL information for a\nmalicious web page.\n\nMFSA 2009-45 / CVE-2009-2662:The browser engine in Mozilla Firefox\nbefore 3.0.13, and 3.5.x before 3.5.2, allows remote attackers to\ncause a denial of service (memory corruption and application crash) or\npossibly execute arbitrary code via vectors related to the\nTraceRecorder::snapshot function in js/src/jstracer.cpp, and\nunspecified other vectors.\n\nCVE-2009-2663 / MFSA 2009-45: libvorbis before r16182, as used in\nMozilla Firefox before 3.0.13 and 3.5.x before 3.5.2 and other\nproducts, allows context-dependent attackers to cause a denial of\nservice (memory corruption and application crash) or possibly execute\narbitrary code via a crafted .ogg file.\n\nCVE-2009-2664 / MFSA 2009-45: The js_watch_set function in\njs/src/jsdbgapi.cpp in the JavaScript engine in Mozilla Firefox before\n3.0.13, and 3.5.x before 3.5.2, allows remote attackers to cause a\ndenial of service (assertion failure and application exit) or possibly\nexecute arbitrary code via a crafted .js file, related to a 'memory\nsafety bug.\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected MozillaFirefox packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_cwe_id(20, 94, 119, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:MozillaFirefox\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:MozillaFirefox-translations\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-xulrunner190\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-xulrunner190-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-xulrunner190-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-xulrunner190-gnomevfs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-xulrunner190-gnomevfs-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-xulrunner190-translations\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-xulrunner190-translations-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:python-xpcom190\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:10.3\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/09/16\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/10/06\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE10\\.3)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"10.3\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE10.3\", reference:\"MozillaFirefox-3.0.14-0.1\") ) flag++;\nif ( rpm_check(release:\"SUSE10.3\", reference:\"MozillaFirefox-translations-3.0.14-0.1\") ) flag++;\nif ( rpm_check(release:\"SUSE10.3\", reference:\"mozilla-xulrunner190-1.9.0.14-0.1\") ) flag++;\nif ( rpm_check(release:\"SUSE10.3\", reference:\"mozilla-xulrunner190-devel-1.9.0.14-0.1\") ) flag++;\nif ( rpm_check(release:\"SUSE10.3\", reference:\"mozilla-xulrunner190-gnomevfs-1.9.0.14-0.1\") ) flag++;\nif ( rpm_check(release:\"SUSE10.3\", reference:\"mozilla-xulrunner190-translations-1.9.0.14-0.1\") ) flag++;\nif ( rpm_check(release:\"SUSE10.3\", reference:\"python-xpcom190-1.9.0.14-0.1\") ) flag++;\nif ( rpm_check(release:\"SUSE10.3\", cpu:\"x86_64\", reference:\"mozilla-xulrunner190-32bit-1.9.0.14-0.1\") ) flag++;\nif ( rpm_check(release:\"SUSE10.3\", cpu:\"x86_64\", reference:\"mozilla-xulrunner190-gnomevfs-32bit-1.9.0.14-0.1\") ) flag++;\nif ( rpm_check(release:\"SUSE10.3\", cpu:\"x86_64\", reference:\"mozilla-xulrunner190-translations-32bit-1.9.0.14-0.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"MozillaFirefox\");\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-06T09:25:54", "description": "Updated firefox packages that fix several security issues are now\navailable for Red Hat Enterprise Linux 4 and 5.\n\nThis update has been rated as having critical security impact by the\nRed Hat Security Response Team.\n\nMozilla Firefox is an open source Web browser. XULRunner provides the\nXUL Runtime environment for Mozilla Firefox. nspr provides the\nNetscape Portable Runtime (NSPR).\n\nSeveral flaws were found in the processing of malformed web content. A\nweb page containing malicious content could cause Firefox to crash or,\npotentially, execute arbitrary code with the privileges of the user\nrunning Firefox. (CVE-2009-3070, CVE-2009-3071, CVE-2009-3072,\nCVE-2009-3074, CVE-2009-3075)\n\nA use-after-free flaw was found in Firefox. An attacker could use this\nflaw to crash Firefox or, potentially, execute arbitrary code with the\nprivileges of the user running Firefox. (CVE-2009-3077)\n\nA flaw was found in the way Firefox handles malformed JavaScript. A\nwebsite with an object containing malicious JavaScript could execute\nthat JavaScript with the privileges of the user running Firefox.\n(CVE-2009-3079)\n\nDescriptions in the dialogs when adding and removing PKCS #11 modules\nwere not informative. An attacker able to trick a user into installing\na malicious PKCS #11 module could use this flaw to install their own\nCertificate Authority certificates on a user's machine, making it\npossible to trick the user into believing they are viewing a trusted\nsite or, potentially, execute arbitrary code with the privileges of\nthe user running Firefox. (CVE-2009-3076)\n\nA flaw was found in the way Firefox displays the address bar when\nwindow.open() is called in a certain way. An attacker could use this\nflaw to conceal a malicious URL, possibly tricking a user into\nbelieving they are viewing a trusted site. (CVE-2009-2654)\n\nA flaw was found in the way Firefox displays certain Unicode\ncharacters. An attacker could use this flaw to conceal a malicious\nURL, possibly tricking a user into believing they are viewing a\ntrusted site. (CVE-2009-3078)\n\nFor technical details regarding these flaws, refer to the Mozilla\nsecurity advisories for Firefox 3.0.14. You can find a link to the\nMozilla advisories in the References section of this errata.\n\nAll Firefox users should upgrade to these updated packages, which\ncontain Firefox version 3.0.14, which corrects these issues. After\ninstalling the update, Firefox must be restarted for the changes to\ntake effect.", "edition": 30, "published": "2009-09-11T00:00:00", "title": "CentOS 4 / 5 : firefox / seamonkey (CESA-2009:1430)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-2470", "CVE-2009-3076", "CVE-2009-3071", "CVE-2009-2663", "CVE-2009-2662", "CVE-2009-3073", "CVE-2009-2665", "CVE-2009-3079", "CVE-2009-3072", "CVE-2009-3074", "CVE-2009-3070", "CVE-2009-3069", "CVE-2009-3075", "CVE-2009-2654", "CVE-2009-2664", "CVE-2009-3077", "CVE-2009-3078"], "modified": "2009-09-11T00:00:00", "cpe": ["p-cpe:/a:centos:centos:xulrunner-devel", "cpe:/o:centos:centos:4", "p-cpe:/a:centos:centos:xulrunner-devel-unstable", "p-cpe:/a:centos:centos:xulrunner", "p-cpe:/a:centos:centos:firefox", "p-cpe:/a:centos:centos:nspr-devel", "p-cpe:/a:centos:centos:nspr", "cpe:/o:centos:centos:5"], "id": "CENTOS_RHSA-2009-1430.NASL", "href": "https://www.tenable.com/plugins/nessus/40932", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2009:1430 and \n# CentOS Errata and Security Advisory 2009:1430 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(40932);\n script_version(\"1.25\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2009-2470\", \"CVE-2009-2654\", \"CVE-2009-2662\", \"CVE-2009-2663\", \"CVE-2009-2664\", \"CVE-2009-2665\", \"CVE-2009-3069\", \"CVE-2009-3070\", \"CVE-2009-3071\", \"CVE-2009-3072\", \"CVE-2009-3073\", \"CVE-2009-3074\", \"CVE-2009-3075\", \"CVE-2009-3076\", \"CVE-2009-3077\", \"CVE-2009-3078\", \"CVE-2009-3079\");\n script_bugtraq_id(35803, 36343);\n script_xref(name:\"RHSA\", value:\"2009:1430\");\n\n script_name(english:\"CentOS 4 / 5 : firefox / seamonkey (CESA-2009:1430)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated firefox packages that fix several security issues are now\navailable for Red Hat Enterprise Linux 4 and 5.\n\nThis update has been rated as having critical security impact by the\nRed Hat Security Response Team.\n\nMozilla Firefox is an open source Web browser. XULRunner provides the\nXUL Runtime environment for Mozilla Firefox. nspr provides the\nNetscape Portable Runtime (NSPR).\n\nSeveral flaws were found in the processing of malformed web content. A\nweb page containing malicious content could cause Firefox to crash or,\npotentially, execute arbitrary code with the privileges of the user\nrunning Firefox. (CVE-2009-3070, CVE-2009-3071, CVE-2009-3072,\nCVE-2009-3074, CVE-2009-3075)\n\nA use-after-free flaw was found in Firefox. An attacker could use this\nflaw to crash Firefox or, potentially, execute arbitrary code with the\nprivileges of the user running Firefox. (CVE-2009-3077)\n\nA flaw was found in the way Firefox handles malformed JavaScript. A\nwebsite with an object containing malicious JavaScript could execute\nthat JavaScript with the privileges of the user running Firefox.\n(CVE-2009-3079)\n\nDescriptions in the dialogs when adding and removing PKCS #11 modules\nwere not informative. An attacker able to trick a user into installing\na malicious PKCS #11 module could use this flaw to install their own\nCertificate Authority certificates on a user's machine, making it\npossible to trick the user into believing they are viewing a trusted\nsite or, potentially, execute arbitrary code with the privileges of\nthe user running Firefox. (CVE-2009-3076)\n\nA flaw was found in the way Firefox displays the address bar when\nwindow.open() is called in a certain way. An attacker could use this\nflaw to conceal a malicious URL, possibly tricking a user into\nbelieving they are viewing a trusted site. (CVE-2009-2654)\n\nA flaw was found in the way Firefox displays certain Unicode\ncharacters. An attacker could use this flaw to conceal a malicious\nURL, possibly tricking a user into believing they are viewing a\ntrusted site. (CVE-2009-3078)\n\nFor technical details regarding these flaws, refer to the Mozilla\nsecurity advisories for Firefox 3.0.14. You can find a link to the\nMozilla advisories in the References section of this errata.\n\nAll Firefox users should upgrade to these updated packages, which\ncontain Firefox version 3.0.14, which corrects these issues. After\ninstalling the update, Firefox must be restarted for the changes to\ntake effect.\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2009-September/016133.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?c88899c7\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2009-September/016134.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?386f19ef\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2009-September/016163.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?ae5ee355\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2009-September/016164.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?4398c541\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected firefox and / or seamonkey packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_cwe_id(20, 94, 119, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:firefox\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:nspr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:nspr-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:xulrunner\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:xulrunner-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:xulrunner-devel-unstable\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:4\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:5\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2009/08/03\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/09/15\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/09/11\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(4|5)([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 4.x / 5.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-4\", cpu:\"i386\", reference:\"firefox-3.0.14-1.el4.centos\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"x86_64\", reference:\"firefox-3.0.14-1.el4.centos\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"i386\", reference:\"nspr-4.7.5-1.el4_8\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"x86_64\", reference:\"nspr-4.7.5-1.el4_8\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"i386\", reference:\"nspr-devel-4.7.5-1.el4_8\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"x86_64\", reference:\"nspr-devel-4.7.5-1.el4_8\")) flag++;\n\nif (rpm_check(release:\"CentOS-5\", reference:\"firefox-3.0.14-1.el5.centos\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"nspr-4.7.5-1.el5_4\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"nspr-devel-4.7.5-1.el5_4\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"xulrunner-1.9.0.14-1.el5_4\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"xulrunner-devel-1.9.0.14-1.el5_4\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"xulrunner-devel-unstable-1.9.0.14-1.el5_4\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"firefox / nspr / nspr-devel / xulrunner / xulrunner-devel / etc\");\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "openvas": [{"lastseen": "2019-05-29T18:40:24", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-2663", "CVE-2009-2662", "CVE-2009-2654", "CVE-2009-2664"], "description": "This host is installed with Mozilla Firefox and is prone to multiple\n Memory Corruption vulnerabilities.", "modified": "2018-12-03T00:00:00", "published": "2009-08-07T00:00:00", "id": "OPENVAS:1361412562310800855", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310800855", "type": "openvas", "title": "Mozilla Firefox Multiple Memory Corruption Vulnerabilities Aug-09 (Windows)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_firefox_mult_mem_crptn_vuln_aug09_win.nasl 12629 2018-12-03 15:19:43Z cfischer $\n#\n# Mozilla Firefox Multiple Memory Corruption Vulnerabilities Aug-09 (Windows)\n#\n# Authors:\n# Sharath S <sharaths@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.800855\");\n script_version(\"$Revision: 12629 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-12-03 16:19:43 +0100 (Mon, 03 Dec 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-08-07 07:29:21 +0200 (Fri, 07 Aug 2009)\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_cve_id(\"CVE-2009-2662\", \"CVE-2009-2663\", \"CVE-2009-2664\", \"CVE-2009-2654\");\n script_bugtraq_id(35927, 35803);\n script_name(\"Mozilla Firefox Multiple Memory Corruption Vulnerabilities Aug-09 (Windows)\");\n script_xref(name:\"URL\", value:\"http://secunia.com/advisories/36001/\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2009/mfsa2009-44.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2009/mfsa2009-45.html\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_firefox_detect_portable_win.nasl\");\n script_mandatory_keys(\"Firefox/Win/Ver\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will let attackers to execute arbitrary code, phishing\n attack, and can cause Denial of Service.\");\n\n script_tag(name:\"affected\", value:\"Firefox version before 3.0.13 or 3.5 before 3.5.2 on Windows.\");\n\n script_tag(name:\"insight\", value:\"Multiple memory corruption are due to:\n\n - Error in 'js_watch_set()' function in js/src/jsdbgapi.cpp in the JavaScript\n engine which can be exploited via a crafted '.js' file.\n\n - Error in 'libvorbis()' which is used in the application can be exploited\n via a crafted '.ogg' file.\n\n - Error in 'TraceRecorder::snapshot()' function in js/src/jstracer.cpp and\n other unspecified vectors.\n\n - Error in 'window.open()' which fails to sanitise the invalid character in\n the crafted URL. This allows remote attackers to spoof the address bar,\n and possibly conduct phishing attacks, via a crafted web page that calls\n window.open with an invalid character in the URL, makes document.write\n calls to the resulting object, and then calls the stop method during the\n loading of the error page.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Firefox version 3.0.13/3.5.2.\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Mozilla Firefox and is prone to multiple\n Memory Corruption vulnerabilities.\");\n\n script_tag(name:\"qod_type\", value:\"registry\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"version_func.inc\");\n\nffVer = get_kb_item(\"Firefox/Win/Ver\");\nif(!ffVer){\n exit(0);\n}\n\nif(version_is_less(version:ffVer, test_version:\"3.0.13\")||\n version_in_range(version:ffVer, test_version:\"3.5\",\n test_version2:\"3.5.1\")){\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2017-07-26T08:56:15", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-2663", "CVE-2009-2662", "CVE-2009-2654", "CVE-2009-2664"], "description": "The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n MozillaFirefox\n MozillaFirefox-translations\n gconf2\n libidl\n mozilla-xulrunner190\n mozilla-xulrunner190-gnomevfs\n mozilla-xulrunner190-translations\n orbit2\n\n\nMore details may also be found by searching for the SuSE\nEnterprise Server 11 patch database located at\nhttp://download.novell.com/patch/finder/", "modified": "2017-07-11T00:00:00", "published": "2009-10-11T00:00:00", "id": "OPENVAS:65706", "href": "http://plugins.openvas.org/nasl.php?oid=65706", "type": "openvas", "title": "SLES11: Security update for Mozilla Firefox", "sourceData": "#\n#VID 0f13983ab3e07c9cb46294b6377d70a9\n# OpenVAS Vulnerability Test\n# $\n# Description: Security update for Mozilla Firefox\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_summary = \"The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n MozillaFirefox\n MozillaFirefox-translations\n gconf2\n libidl\n mozilla-xulrunner190\n mozilla-xulrunner190-gnomevfs\n mozilla-xulrunner190-translations\n orbit2\n\n\nMore details may also be found by searching for the SuSE\nEnterprise Server 11 patch database located at\nhttp://download.novell.com/patch/finder/\";\n\ntag_solution = \"Please install the updates provided by SuSE.\";\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://bugzilla.novell.com/show_bug.cgi?id=527489\");\n script_id(65706);\n script_version(\"$Revision: 6666 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-11 15:13:36 +0200 (Tue, 11 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-10-11 22:58:51 +0200 (Sun, 11 Oct 2009)\");\n script_cve_id(\"CVE-2009-2654\", \"CVE-2009-2662\", \"CVE-2009-2663\", \"CVE-2009-2664\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"SLES11: Security update for Mozilla Firefox\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse_sles\", \"ssh/login/rpms\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"MozillaFirefox\", rpm:\"MozillaFirefox~3.0.13~0.1.2\", rls:\"SLES11.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"MozillaFirefox-translations\", rpm:\"MozillaFirefox-translations~3.0.13~0.1.2\", rls:\"SLES11.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"gconf2\", rpm:\"gconf2~2.24.0~7.5\", rls:\"SLES11.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libidl\", rpm:\"libidl~0.8.11~2.14\", rls:\"SLES11.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"mozilla-xulrunner190\", rpm:\"mozilla-xulrunner190~1.9.0.13~1.1.1\", rls:\"SLES11.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"mozilla-xulrunner190-gnomevfs\", rpm:\"mozilla-xulrunner190-gnomevfs~1.9.0.13~1.1.1\", rls:\"SLES11.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"mozilla-xulrunner190-translations\", rpm:\"mozilla-xulrunner190-translations~1.9.0.13~1.1.1\", rls:\"SLES11.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"orbit2\", rpm:\"orbit2~2.14.16~2.16\", rls:\"SLES11.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-26T08:55:46", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-2663", "CVE-2009-2662", "CVE-2009-2654", "CVE-2009-2664"], "description": "The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n MozillaFirefox\n MozillaFirefox-branding-SLED\n MozillaFirefox-translations\n firefox3-atk\n firefox3-cairo\n firefox3-glib2\n firefox3-gtk2\n firefox3-pango\n mozilla-xulrunner190\n mozilla-xulrunner190-gnomevfs\n mozilla-xulrunner190-translations\n\n\nMore details may also be found by searching for the SuSE\nEnterprise Server 10 patch database located at\nhttp://download.novell.com/patch/finder/", "modified": "2017-07-11T00:00:00", "published": "2009-10-13T00:00:00", "id": "OPENVAS:65792", "href": "http://plugins.openvas.org/nasl.php?oid=65792", "type": "openvas", "title": "SLES10: Security update for Mozilla Firefox", "sourceData": "#\n#VID slesp2-MozillaFirefox-6433\n# OpenVAS Vulnerability Test\n# $\n# Description: Security update for Mozilla Firefox\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_summary = \"The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n MozillaFirefox\n MozillaFirefox-branding-SLED\n MozillaFirefox-translations\n firefox3-atk\n firefox3-cairo\n firefox3-glib2\n firefox3-gtk2\n firefox3-pango\n mozilla-xulrunner190\n mozilla-xulrunner190-gnomevfs\n mozilla-xulrunner190-translations\n\n\nMore details may also be found by searching for the SuSE\nEnterprise Server 10 patch database located at\nhttp://download.novell.com/patch/finder/\";\n\ntag_solution = \"Please install the updates provided by SuSE.\";\n\nif(description)\n{\n script_id(65792);\n script_version(\"$Revision: 6666 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-11 15:13:36 +0200 (Tue, 11 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-10-13 18:25:40 +0200 (Tue, 13 Oct 2009)\");\n script_cve_id(\"CVE-2009-2654\", \"CVE-2009-2662\", \"CVE-2009-2663\", \"CVE-2009-2664\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"SLES10: Security update for Mozilla Firefox\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse_sles\", \"ssh/login/rpms\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"MozillaFirefox\", rpm:\"MozillaFirefox~3.0.13~0.4\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"MozillaFirefox-branding-SLED\", rpm:\"MozillaFirefox-branding-SLED~3.0.3~7.4.3\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"MozillaFirefox-translations\", rpm:\"MozillaFirefox-translations~3.0.13~0.4\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"firefox3-atk\", rpm:\"firefox3-atk~1.12.3~0.4.3\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"firefox3-cairo\", rpm:\"firefox3-cairo~1.2.4~0.4.3\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"firefox3-glib2\", rpm:\"firefox3-glib2~2.12.4~0.4.3\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"firefox3-gtk2\", rpm:\"firefox3-gtk2~2.10.6~0.4.3\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"firefox3-pango\", rpm:\"firefox3-pango~1.14.5~0.4.3\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"mozilla-xulrunner190\", rpm:\"mozilla-xulrunner190~1.9.0.13~1.4\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"mozilla-xulrunner190-gnomevfs\", rpm:\"mozilla-xulrunner190-gnomevfs~1.9.0.13~1.4\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"mozilla-xulrunner190-translations\", rpm:\"mozilla-xulrunner190-translations~1.9.0.13~1.4\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-04-06T11:40:22", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-2663", "CVE-2009-2662", "CVE-2009-2654", "CVE-2009-2664"], "description": "The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n MozillaFirefox\n MozillaFirefox-translations\n gconf2\n libidl\n mozilla-xulrunner190\n mozilla-xulrunner190-gnomevfs\n mozilla-xulrunner190-translations\n orbit2\n\n\nMore details may also be found by searching for the SuSE\nEnterprise Server 11 patch database located at\nhttp://download.novell.com/patch/finder/", "modified": "2018-04-06T00:00:00", "published": "2009-10-11T00:00:00", "id": "OPENVAS:136141256231065706", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231065706", "type": "openvas", "title": "SLES11: Security update for Mozilla Firefox", "sourceData": "#\n#VID 0f13983ab3e07c9cb46294b6377d70a9\n# OpenVAS Vulnerability Test\n# $\n# Description: Security update for Mozilla Firefox\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_summary = \"The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n MozillaFirefox\n MozillaFirefox-translations\n gconf2\n libidl\n mozilla-xulrunner190\n mozilla-xulrunner190-gnomevfs\n mozilla-xulrunner190-translations\n orbit2\n\n\nMore details may also be found by searching for the SuSE\nEnterprise Server 11 patch database located at\nhttp://download.novell.com/patch/finder/\";\n\ntag_solution = \"Please install the updates provided by SuSE.\";\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://bugzilla.novell.com/show_bug.cgi?id=527489\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.65706\");\n script_version(\"$Revision: 9350 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-10-11 22:58:51 +0200 (Sun, 11 Oct 2009)\");\n script_cve_id(\"CVE-2009-2654\", \"CVE-2009-2662\", \"CVE-2009-2663\", \"CVE-2009-2664\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"SLES11: Security update for Mozilla Firefox\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse_sles\", \"ssh/login/rpms\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"MozillaFirefox\", rpm:\"MozillaFirefox~3.0.13~0.1.2\", rls:\"SLES11.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"MozillaFirefox-translations\", rpm:\"MozillaFirefox-translations~3.0.13~0.1.2\", rls:\"SLES11.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"gconf2\", rpm:\"gconf2~2.24.0~7.5\", rls:\"SLES11.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libidl\", rpm:\"libidl~0.8.11~2.14\", rls:\"SLES11.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"mozilla-xulrunner190\", rpm:\"mozilla-xulrunner190~1.9.0.13~1.1.1\", rls:\"SLES11.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"mozilla-xulrunner190-gnomevfs\", rpm:\"mozilla-xulrunner190-gnomevfs~1.9.0.13~1.1.1\", rls:\"SLES11.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"mozilla-xulrunner190-translations\", rpm:\"mozilla-xulrunner190-translations~1.9.0.13~1.1.1\", rls:\"SLES11.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"orbit2\", rpm:\"orbit2~2.14.16~2.16\", rls:\"SLES11.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-04-06T11:38:54", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-2663", "CVE-2009-2662", "CVE-2009-2654", "CVE-2009-2664"], "description": "The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n MozillaFirefox\n MozillaFirefox-branding-SLED\n MozillaFirefox-translations\n firefox3-atk\n firefox3-cairo\n firefox3-glib2\n firefox3-gtk2\n firefox3-pango\n mozilla-xulrunner190\n mozilla-xulrunner190-gnomevfs\n mozilla-xulrunner190-translations\n\n\nMore details may also be found by searching for the SuSE\nEnterprise Server 10 patch database located at\nhttp://download.novell.com/patch/finder/", "modified": "2018-04-06T00:00:00", "published": "2009-10-13T00:00:00", "id": "OPENVAS:136141256231065792", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231065792", "type": "openvas", "title": "SLES10: Security update for Mozilla Firefox", "sourceData": "#\n#VID slesp2-MozillaFirefox-6433\n# OpenVAS Vulnerability Test\n# $\n# Description: Security update for Mozilla Firefox\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_summary = \"The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n MozillaFirefox\n MozillaFirefox-branding-SLED\n MozillaFirefox-translations\n firefox3-atk\n firefox3-cairo\n firefox3-glib2\n firefox3-gtk2\n firefox3-pango\n mozilla-xulrunner190\n mozilla-xulrunner190-gnomevfs\n mozilla-xulrunner190-translations\n\n\nMore details may also be found by searching for the SuSE\nEnterprise Server 10 patch database located at\nhttp://download.novell.com/patch/finder/\";\n\ntag_solution = \"Please install the updates provided by SuSE.\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.65792\");\n script_version(\"$Revision: 9350 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-10-13 18:25:40 +0200 (Tue, 13 Oct 2009)\");\n script_cve_id(\"CVE-2009-2654\", \"CVE-2009-2662\", \"CVE-2009-2663\", \"CVE-2009-2664\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"SLES10: Security update for Mozilla Firefox\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse_sles\", \"ssh/login/rpms\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"MozillaFirefox\", rpm:\"MozillaFirefox~3.0.13~0.4\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"MozillaFirefox-branding-SLED\", rpm:\"MozillaFirefox-branding-SLED~3.0.3~7.4.3\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"MozillaFirefox-translations\", rpm:\"MozillaFirefox-translations~3.0.13~0.4\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"firefox3-atk\", rpm:\"firefox3-atk~1.12.3~0.4.3\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"firefox3-cairo\", rpm:\"firefox3-cairo~1.2.4~0.4.3\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"firefox3-glib2\", rpm:\"firefox3-glib2~2.12.4~0.4.3\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"firefox3-gtk2\", rpm:\"firefox3-gtk2~2.10.6~0.4.3\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"firefox3-pango\", rpm:\"firefox3-pango~1.14.5~0.4.3\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"mozilla-xulrunner190\", rpm:\"mozilla-xulrunner190~1.9.0.13~1.4\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"mozilla-xulrunner190-gnomevfs\", rpm:\"mozilla-xulrunner190-gnomevfs~1.9.0.13~1.4\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"mozilla-xulrunner190-translations\", rpm:\"mozilla-xulrunner190-translations~1.9.0.13~1.4\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-02T21:14:19", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-2663", "CVE-2009-2662", "CVE-2009-2654", "CVE-2009-2664"], "description": "This host is installed with Mozilla Firefox and is prone to multiple\n Memory Corruption vulnerabilities.", "modified": "2016-12-28T00:00:00", "published": "2009-08-07T00:00:00", "id": "OPENVAS:800856", "href": "http://plugins.openvas.org/nasl.php?oid=800856", "type": "openvas", "title": "Mozilla Firefox Multiple Memory Corruption Vulnerabilities Aug-09 (Linux)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_firefox_mult_mem_crptn_vuln_aug09_lin.nasl 4865 2016-12-28 16:16:43Z teissa $\n#\n# Mozilla Firefox Multiple Memory Corruption Vulnerabilities Aug-09 (Linux)\n#\n# Authors:\n# Sharath S <sharaths@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_impact = \"Successful exploitation will let attackers to execute arbitrary code,\n phishing attack, and can cause Denial of Service.\n Impact Level: System/Application\";\ntag_affected = \"Firefox version before 3.0.13 or 3.5 before 3.5.2 on Linux.\";\ntag_insight = \"Multiple memory corruption due to:\n - Error in 'js_watch_set()' function in js/src/jsdbgapi.cpp in the JavaScript\n engine which can be exploited via a crafted '.js' file.\n - Error in 'libvorbis()' which is used in the application can be exploited\n via a crafted '.ogg' file.\n - Error in 'TraceRecorder::snapshot()' function in js/src/jstracer.cpp and\n other unspecified vectors.\n - Error in 'window.open()' which fails to sanitise the invalid character in\n the crafted URL. This allows remote attackers to spoof the address bar,\n and possibly conduct phishing attacks, via a crafted web page that calls\n window.open with an invalid character in the URL, makes document.write\n calls to the resulting object, and then calls the stop method during the\n loading of the error page.\";\ntag_solution = \"Upgrade to Firefox version 3.0.13/3.5.2\n http://www.mozilla.com/en-US/firefox/all.html\";\ntag_summary = \"This host is installed with Mozilla Firefox and is prone to multiple\n Memory Corruption vulnerabilities.\";\n\nif(description)\n{\n script_id(800856);\n script_version(\"$Revision: 4865 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2016-12-28 17:16:43 +0100 (Wed, 28 Dec 2016) $\");\n script_tag(name:\"creation_date\", value:\"2009-08-07 07:29:21 +0200 (Fri, 07 Aug 2009)\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_cve_id(\"CVE-2009-2662\", \"CVE-2009-2663\", \"CVE-2009-2664\", \"CVE-2009-2654\");\n script_bugtraq_id(35927, 35803);\n script_name(\"Mozilla Firefox Multiple Memory Corruption Vulnerabilities Aug-09 (Linux)\");\n script_xref(name : \"URL\" , value : \"http://secunia.com/advisories/36001/\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2009/mfsa2009-44.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2009/mfsa2009-45.html\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_firefox_detect_lin.nasl\");\n script_require_keys(\"Firefox/Linux/Ver\");\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\nffVer = get_kb_item(\"Firefox/Linux/Ver\");\nif(!ffVer){\n exit(0);\n}\n\n# Grep for Firefox version < 3.0.13 or 3.5 < 3.5.2\nif(version_is_less(version:ffVer, test_version:\"3.0.13\")||\n version_in_range(version:ffVer, test_version:\"3.5\",\n test_version2:\"3.5.1\")){\n security_message(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-02T21:14:08", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-2663", "CVE-2009-2662", "CVE-2009-2654", "CVE-2009-2664"], "description": "This host is installed with Mozilla Firefox and is prone to multiple\n Memory Corruption vulnerabilities.", "modified": "2016-12-28T00:00:00", "published": "2009-08-07T00:00:00", "id": "OPENVAS:800855", "href": "http://plugins.openvas.org/nasl.php?oid=800855", "type": "openvas", "title": "Mozilla Firefox Multiple Memory Corruption Vulnerabilities Aug-09 (Windows)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_firefox_mult_mem_crptn_vuln_aug09_win.nasl 4865 2016-12-28 16:16:43Z teissa $\n#\n# Mozilla Firefox Multiple Memory Corruption Vulnerabilities Aug-09 (Windows)\n#\n# Authors:\n# Sharath S <sharaths@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_impact = \"Successful exploitation will let attackers to execute arbitrary code, phishing\n attack, and can cause Denial of Service.\n Impact Level: System/Application\";\ntag_affected = \"Firefox version before 3.0.13 or 3.5 before 3.5.2 on Windows.\";\ntag_insight = \"Multiple memory corruption are due to:\n - Error in 'js_watch_set()' function in js/src/jsdbgapi.cpp in the JavaScript\n engine which can be exploited via a crafted '.js' file.\n - Error in 'libvorbis()' which is used in the application can be exploited\n via a crafted '.ogg' file.\n - Error in 'TraceRecorder::snapshot()' function in js/src/jstracer.cpp and\n other unspecified vectors.\n - Error in 'window.open()' which fails to sanitise the invalid character in\n the crafted URL. This allows remote attackers to spoof the address bar,\n and possibly conduct phishing attacks, via a crafted web page that calls\n window.open with an invalid character in the URL, makes document.write\n calls to the resulting object, and then calls the stop method during the\n loading of the error page.\";\ntag_solution = \"Upgrade to Firefox version 3.0.13/3.5.2\n http://www.mozilla.com/en-US/firefox/all.html\";\ntag_summary = \"This host is installed with Mozilla Firefox and is prone to multiple\n Memory Corruption vulnerabilities.\";\n\nif(description)\n{\n script_id(800855);\n script_version(\"$Revision: 4865 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2016-12-28 17:16:43 +0100 (Wed, 28 Dec 2016) $\");\n script_tag(name:\"creation_date\", value:\"2009-08-07 07:29:21 +0200 (Fri, 07 Aug 2009)\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_cve_id(\"CVE-2009-2662\", \"CVE-2009-2663\", \"CVE-2009-2664\", \"CVE-2009-2654\");\n script_bugtraq_id(35927, 35803);\n script_name(\"Mozilla Firefox Multiple Memory Corruption Vulnerabilities Aug-09 (Windows)\");\n script_xref(name : \"URL\" , value : \"http://secunia.com/advisories/36001/\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2009/mfsa2009-44.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2009/mfsa2009-45.html\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_firefox_detect_win.nasl\");\n script_require_keys(\"Firefox/Win/Ver\");\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"registry\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\nffVer = get_kb_item(\"Firefox/Win/Ver\");\nif(!ffVer){\n exit(0);\n}\n\n# Grep for Firefox version < 3.0.13 or 3.5 < 3.5.2\nif(version_is_less(version:ffVer, test_version:\"3.0.13\")||\n version_in_range(version:ffVer, test_version:\"3.5\",\n test_version2:\"3.5.1\")){\n security_message(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-25T10:56:08", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-2470", "CVE-2009-2663", "CVE-2009-2662", "CVE-2009-2665", "CVE-2009-2654", "CVE-2009-2664"], "description": "The remote host is missing an update to perl-Gtk2-MozEmbed\nannounced via advisory FEDORA-2009-8288.", "modified": "2017-07-10T00:00:00", "published": "2009-08-17T00:00:00", "id": "OPENVAS:64554", "href": "http://plugins.openvas.org/nasl.php?oid=64554", "type": "openvas", "title": "Fedora Core 10 FEDORA-2009-8288 (perl-Gtk2-MozEmbed)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: fcore_2009_8288.nasl 6624 2017-07-10 06:11:55Z cfischer $\n# Description: Auto-generated from advisory FEDORA-2009-8288 (perl-Gtk2-MozEmbed)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"This module allows you to use the Mozilla embedding widget from Perl.\n\nUpdate Information:\n\nUpdate to new upstream Firefox version 3.0.13, fixing multiple security issues\ndetailed in the upstream advisories:\nhttp://www.mozilla.org/security/known-vulnerabilities/firefox30.html#firefox3.0.13\n\nUpdate also includes all packages depending on gecko-libs rebuilt against\nnew version of Firefox / XULRunner.\n\nNote: Issues described in MFSA 2009-42 and MFSA 2009-43 were\npreviously addressed via rebase of the NSS packages.\";\ntag_solution = \"Apply the appropriate updates.\n\nThis update can be installed with the yum update program. Use \nsu -c 'yum update perl-Gtk2-MozEmbed' at the command line.\nFor more information, refer to Managing Software with yum,\navailable at http://docs.fedoraproject.org/yum/.\n\nhttps://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-8288\";\ntag_summary = \"The remote host is missing an update to perl-Gtk2-MozEmbed\nannounced via advisory FEDORA-2009-8288.\";\n\n\n\nif(description)\n{\n script_id(64554);\n script_cve_id(\"CVE-2009-2470\",\"CVE-2009-2654\",\"CVE-2009-2662\",\"CVE-2009-2663\",\"CVE-2009-2664\",\"CVE-2009-2665\");\n script_version(\"$Revision: 6624 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 08:11:55 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-08-17 16:54:45 +0200 (Mon, 17 Aug 2009)\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"Fedora Core 10 FEDORA-2009-8288 (perl-Gtk2-MozEmbed)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"perl-Gtk2-MozEmbed\", rpm:\"perl-Gtk2-MozEmbed~0.08~6.fc10.4\", rls:\"FC10\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"perl-Gtk2-MozEmbed\", rpm:\"perl-Gtk2-MozEmbed~debuginfo~0.08\", rls:\"FC10\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-04-06T11:38:55", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-2470", "CVE-2009-2663", "CVE-2009-2662", "CVE-2009-2665", "CVE-2009-2654", "CVE-2009-2664"], "description": "The remote host is missing an update to xulrunner\nannounced via advisory FEDORA-2009-8279.", "modified": "2018-04-06T00:00:00", "published": "2009-08-17T00:00:00", "id": "OPENVAS:136141256231064552", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231064552", "type": "openvas", "title": "Fedora Core 11 FEDORA-2009-8279 (xulrunner)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: fcore_2009_8279.nasl 9350 2018-04-06 07:03:33Z cfischer $\n# Description: Auto-generated from advisory FEDORA-2009-8279 (xulrunner)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"XULRunner provides the XUL Runtime environment for Gecko applications.\n\nUpdate Information:\n\nUpdate to new upstream Firefox version 3.5.2, fixing multiple security issues\ndetailed in the upstream advisories:\nhttp://www.mozilla.org/security/known-vulnerabilities/firefox35.html#firefox3.5.2\n\nUpdate also includes all packages depending on gecko-libs rebuilt against\nnew version of Firefox / XULRunner.\n\nChangeLog:\n\n* Mon Aug 3 2009 Martin Stransky 1.9.1.1-2\n- Update to 1.9.1.2\n* Fri Jul 17 2009 Martin Stransky 1.9.1.1-1\n- Update to 1.9.1.1\n* Thu Jul 16 2009 Christopher Aillon - 1.9.1-5\n- Fix for milw0rm 9137\n* Tue Jul 14 2009 Jan Horak - 1.9.1-4\n- Fixed multilib issues\";\ntag_solution = \"Apply the appropriate updates.\n\nThis update can be installed with the yum update program. Use \nsu -c 'yum update xulrunner' at the command line.\nFor more information, refer to Managing Software with yum,\navailable at http://docs.fedoraproject.org/yum/.\n\nhttps://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-8279\";\ntag_summary = \"The remote host is missing an update to xulrunner\nannounced via advisory FEDORA-2009-8279.\";\n\n\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.64552\");\n script_cve_id(\"CVE-2009-2470\",\"CVE-2009-2654\",\"CVE-2009-2662\",\"CVE-2009-2663\",\"CVE-2009-2664\",\"CVE-2009-2665\");\n script_version(\"$Revision: 9350 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-08-17 16:54:45 +0200 (Mon, 17 Aug 2009)\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"Fedora Core 11 FEDORA-2009-8279 (xulrunner)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"xulrunner\", rpm:\"xulrunner~1.9.1.2~1.fc11\", rls:\"FC11\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"xulrunner-devel\", rpm:\"xulrunner-devel~1.9.1.2~1.fc11\", rls:\"FC11\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"xulrunner-devel-unstable\", rpm:\"xulrunner-devel-unstable~1.9.1.2~1.fc11\", rls:\"FC11\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"xulrunner-python\", rpm:\"xulrunner-python~1.9.1.2~1.fc11\", rls:\"FC11\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"xulrunner-python-devel\", rpm:\"xulrunner-python-devel~1.9.1.2~1.fc11\", rls:\"FC11\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"xulrunner-debuginfo\", rpm:\"xulrunner-debuginfo~1.9.1.2~1.fc11\", rls:\"FC11\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-25T10:56:38", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-2470", "CVE-2009-2663", "CVE-2009-2662", "CVE-2009-2665", "CVE-2009-2654", "CVE-2009-2664"], "description": "The remote host is missing an update to xulrunner\nannounced via advisory FEDORA-2009-8279.", "modified": "2017-07-10T00:00:00", "published": "2009-08-17T00:00:00", "id": "OPENVAS:64552", "href": "http://plugins.openvas.org/nasl.php?oid=64552", "type": "openvas", "title": "Fedora Core 11 FEDORA-2009-8279 (xulrunner)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: fcore_2009_8279.nasl 6624 2017-07-10 06:11:55Z cfischer $\n# Description: Auto-generated from advisory FEDORA-2009-8279 (xulrunner)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"XULRunner provides the XUL Runtime environment for Gecko applications.\n\nUpdate Information:\n\nUpdate to new upstream Firefox version 3.5.2, fixing multiple security issues\ndetailed in the upstream advisories:\nhttp://www.mozilla.org/security/known-vulnerabilities/firefox35.html#firefox3.5.2\n\nUpdate also includes all packages depending on gecko-libs rebuilt against\nnew version of Firefox / XULRunner.\n\nChangeLog:\n\n* Mon Aug 3 2009 Martin Stransky 1.9.1.1-2\n- Update to 1.9.1.2\n* Fri Jul 17 2009 Martin Stransky 1.9.1.1-1\n- Update to 1.9.1.1\n* Thu Jul 16 2009 Christopher Aillon - 1.9.1-5\n- Fix for milw0rm 9137\n* Tue Jul 14 2009 Jan Horak - 1.9.1-4\n- Fixed multilib issues\";\ntag_solution = \"Apply the appropriate updates.\n\nThis update can be installed with the yum update program. Use \nsu -c 'yum update xulrunner' at the command line.\nFor more information, refer to Managing Software with yum,\navailable at http://docs.fedoraproject.org/yum/.\n\nhttps://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-8279\";\ntag_summary = \"The remote host is missing an update to xulrunner\nannounced via advisory FEDORA-2009-8279.\";\n\n\n\nif(description)\n{\n script_id(64552);\n script_cve_id(\"CVE-2009-2470\",\"CVE-2009-2654\",\"CVE-2009-2662\",\"CVE-2009-2663\",\"CVE-2009-2664\",\"CVE-2009-2665\");\n script_version(\"$Revision: 6624 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 08:11:55 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-08-17 16:54:45 +0200 (Mon, 17 Aug 2009)\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"Fedora Core 11 FEDORA-2009-8279 (xulrunner)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"xulrunner\", rpm:\"xulrunner~1.9.1.2~1.fc11\", rls:\"FC11\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"xulrunner-devel\", rpm:\"xulrunner-devel~1.9.1.2~1.fc11\", rls:\"FC11\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"xulrunner-devel-unstable\", rpm:\"xulrunner-devel-unstable~1.9.1.2~1.fc11\", rls:\"FC11\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"xulrunner-python\", rpm:\"xulrunner-python~1.9.1.2~1.fc11\", rls:\"FC11\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"xulrunner-python-devel\", rpm:\"xulrunner-python-devel~1.9.1.2~1.fc11\", rls:\"FC11\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"xulrunner-debuginfo\", rpm:\"xulrunner-debuginfo~1.9.1.2~1.fc11\", rls:\"FC11\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "suse": [{"lastseen": "2016-09-04T12:23:45", "bulletinFamily": "unix", "cvelist": ["CVE-2009-3076", "CVE-2009-3071", "CVE-2009-2663", "CVE-2009-2662", "CVE-2009-3073", "CVE-2009-2408", "CVE-2009-3079", "CVE-2009-3072", "CVE-2009-3074", "CVE-2009-3070", "CVE-2009-3069", "CVE-2009-3075", "CVE-2009-2654", "CVE-2009-2664", "CVE-2009-3077", "CVE-2009-2404", "CVE-2009-3078"], "description": "The Mozilla Firefox was updated to current stable versions on all affected Linux products.\n#### Solution\nThere is no known workaround, please install the update packages.", "edition": 1, "modified": "2009-10-20T17:59:46", "published": "2009-10-20T17:59:46", "id": "SUSE-SA:2009:048", "href": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00003.html", "title": "remote code execution in MozillaFirefox", "type": "suse", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "centos": [{"lastseen": "2019-12-20T18:25:13", "bulletinFamily": "unix", "cvelist": ["CVE-2009-2663"], "description": "**CentOS Errata and Security Advisory** CESA-2009:1219\n\n\nThe libvorbis packages contain runtime libraries for use in programs that\nsupport Ogg Vorbis. Ogg Vorbis is a fully open, non-proprietary, patent-and\nroyalty-free, general-purpose compressed audio format.\n\nAn insufficient input validation flaw was found in the way libvorbis\nprocesses the codec file headers (static mode headers and encoding books)\nof the Ogg Vorbis audio file format (Ogg). A remote attacker could provide\na specially-crafted Ogg file that would cause a denial of service (memory\ncorruption and application crash) or, potentially, execute arbitrary code\nwith the privileges of an application using the libvorbis library when\nopened by a victim. (CVE-2009-2663)\n\nUsers of libvorbis should upgrade to these updated packages, which contain\na backported patch to correct this issue. The desktop must be restarted\n(log out, then log back in) for this update to take effect.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2009-August/028131.html\nhttp://lists.centos.org/pipermail/centos-announce/2009-August/028132.html\nhttp://lists.centos.org/pipermail/centos-announce/2009-August/028141.html\nhttp://lists.centos.org/pipermail/centos-announce/2009-August/028142.html\n\n**Affected packages:**\nlibvorbis\nlibvorbis-devel\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2009-1219.html", "edition": 3, "modified": "2009-08-19T09:22:01", "published": "2009-08-18T19:17:02", "href": "http://lists.centos.org/pipermail/centos-announce/2009-August/028131.html", "id": "CESA-2009:1219", "title": "libvorbis security update", "type": "centos", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-12-20T18:23:59", "bulletinFamily": "unix", "cvelist": ["CVE-2009-3076", "CVE-2009-3072", "CVE-2009-3075", "CVE-2009-2654", "CVE-2009-3077"], "description": "**CentOS Errata and Security Advisory** CESA-2009:1431\n\n\nSeaMonkey is an open source Web browser, email and newsgroup client, IRC\nchat client, and HTML editor.\n\nSeveral flaws were found in the processing of malformed web content. A web\npage containing malicious content could cause SeaMonkey to crash or,\npotentially, execute arbitrary code with the privileges of the user running\nSeaMonkey. (CVE-2009-3072, CVE-2009-3075)\n\nA use-after-free flaw was found in SeaMonkey. An attacker could use this\nflaw to crash SeaMonkey or, potentially, execute arbitrary code with the\nprivileges of the user running SeaMonkey. (CVE-2009-3077)\n\nDescriptions in the dialogs when adding and removing PKCS #11 modules were\nnot informative. An attacker able to trick a user into installing a\nmalicious PKCS #11 module could use this flaw to install their own\nCertificate Authority certificates on a user's machine, making it possible\nto trick the user into believing they are viewing a trusted site or,\npotentially, execute arbitrary code with the privileges of the user running\nSeaMonkey. (CVE-2009-3076)\n\nA flaw was found in the way SeaMonkey displays the address bar when\nwindow.open() is called in a certain way. An attacker could use this flaw\nto conceal a malicious URL, possibly tricking a user into believing they\nare viewing a trusted site. (CVE-2009-2654)\n\nAll SeaMonkey users should upgrade to these updated packages, which correct\nthese issues. After installing the update, SeaMonkey must be restarted for\nthe changes to take effect.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2009-September/028173.html\nhttp://lists.centos.org/pipermail/centos-announce/2009-September/028174.html\n\n**Affected packages:**\nseamonkey\nseamonkey-chat\nseamonkey-devel\nseamonkey-dom-inspector\nseamonkey-js-debugger\nseamonkey-mail\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2009-1431.html", "edition": 3, "modified": "2009-09-10T22:51:18", "published": "2009-09-10T22:51:03", "href": "http://lists.centos.org/pipermail/centos-announce/2009-September/028173.html", "id": "CESA-2009:1431", "title": "seamonkey security update", "type": "centos", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "redhat": [{"lastseen": "2019-08-13T18:44:37", "bulletinFamily": "unix", "cvelist": ["CVE-2009-2663"], "description": "The libvorbis packages contain runtime libraries for use in programs that\nsupport Ogg Vorbis. Ogg Vorbis is a fully open, non-proprietary, patent-and\nroyalty-free, general-purpose compressed audio format.\n\nAn insufficient input validation flaw was found in the way libvorbis\nprocesses the codec file headers (static mode headers and encoding books)\nof the Ogg Vorbis audio file format (Ogg). A remote attacker could provide\na specially-crafted Ogg file that would cause a denial of service (memory\ncorruption and application crash) or, potentially, execute arbitrary code\nwith the privileges of an application using the libvorbis library when\nopened by a victim. (CVE-2009-2663)\n\nUsers of libvorbis should upgrade to these updated packages, which contain\na backported patch to correct this issue. The desktop must be restarted\n(log out, then log back in) for this update to take effect.", "modified": "2018-05-26T04:26:18", "published": "2009-08-18T04:00:00", "id": "RHSA-2009:1219", "href": "https://access.redhat.com/errata/RHSA-2009:1219", "type": "redhat", "title": "(RHSA-2009:1219) Important: libvorbis security update", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "oraclelinux": [{"lastseen": "2019-05-29T18:34:21", "bulletinFamily": "unix", "cvelist": ["CVE-2009-2663"], "description": "[1:1.1.2-3.el5.3]\r\n- fix CVE-2009-2663\r\nResolves: #516348", "edition": 4, "modified": "2009-08-18T00:00:00", "published": "2009-08-18T00:00:00", "id": "ELSA-2009-1219", "href": "http://linux.oracle.com/errata/ELSA-2009-1219.html", "title": "libvorbis security update", "type": "oraclelinux", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:37:12", "bulletinFamily": "unix", "cvelist": ["CVE-2009-3076", "CVE-2009-3072", "CVE-2009-3075", "CVE-2009-2654", "CVE-2009-3077"], "description": "[1.0.9-48.0.1.el4_8]\n- Added mozilla-oracle-default-prefs.js and mozilla-oracle-default-bookmarks.html\n and removed corresponding Redhat ones\n[1.0.9-48.el4]\n- More 1.9.0.14 fixes\n[1.0.9-47.el4]\n- Added fixes from 1.9.0.14\n[1.0.9-46.el4]\n- Added fixes from 1.9.0.13 ", "edition": 4, "modified": "2009-09-10T00:00:00", "published": "2009-09-10T00:00:00", "id": "ELSA-2009-1431", "href": "http://linux.oracle.com/errata/ELSA-2009-1431.html", "title": "seamonkey security update", "type": "oraclelinux", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "gentoo": [{"lastseen": "2016-09-06T19:46:12", "bulletinFamily": "unix", "cvelist": ["CVE-2009-2663"], "description": "### Background\n\nlibvorbis is the reference implementation of the Xiph.org Ogg Vorbis audio file format. It is used by many applications for playback of Ogg Vorbis files. \n\n### Description\n\nLucas Adamski reported that libvorbis does not correctly process file headers, related to static mode headers and encoding books. \n\n### Impact\n\nA remote attacker could entice a user to play a specially crafted OGG Vorbis file using an application that uses libvorbis, possibly resulting in the execution of arbitrary code with the privileges of the user running the application, or a Denial of Service. \n\n### Workaround\n\nThere is no known workaround at this time. \n\n### Resolution\n\nAll libvorbis users should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=media-libs/libvorbis-1.2.3\"", "edition": 1, "modified": "2009-09-07T00:00:00", "published": "2009-09-07T00:00:00", "id": "GLSA-200909-02", "href": "https://security.gentoo.org/glsa/200909-02", "type": "gentoo", "title": "libvorbis: User-assisted execution of arbitrary code", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "fedora": [{"lastseen": "2020-12-21T08:17:49", "bulletinFamily": "unix", "cvelist": ["CVE-2009-2663"], "description": "Ogg Vorbis is a fully open, non-proprietary, patent- and royalty-free, general-purpose compressed audio format for audio and music at fixed and variable bitrates from 16 to 128 kbps/channel. The libvorbis package contains runtime libraries for use in programs that support Ogg Vorbis. ", "modified": "2009-08-10T21:50:41", "published": "2009-08-10T21:50:41", "id": "FEDORA:2E2DE10F90F", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 10 Update: libvorbis-1.2.0-6.fc10", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-12-21T08:17:49", "bulletinFamily": "unix", "cvelist": ["CVE-2009-2663"], "description": "Ogg Vorbis is a fully open, non-proprietary, patent- and royalty-free, general-purpose compressed audio format for audio and music at fixed and variable bitrates from 16 to 128 kbps/channel. The libvorbis package contains runtime libraries for use in programs that support Ogg Vorbis. ", "modified": "2009-08-10T21:51:43", "published": "2009-08-10T21:51:43", "id": "FEDORA:C218010F8BF", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 11 Update: libvorbis-1.2.0-8.fc11", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-12-21T08:17:49", "bulletinFamily": "unix", "cvelist": ["CVE-2009-2663", "CVE-2009-3379"], "description": "Ogg Vorbis is a fully open, non-proprietary, patent- and royalty-free, general-purpose compressed audio format for audio and music at fixed and variable bitrates from 16 to 128 kbps/channel. The libvorbis package contains runtime libraries for use in programs that support Ogg Vorbis. ", "modified": "2009-11-10T17:43:32", "published": "2009-11-10T17:43:32", "id": "FEDORA:EB12810F899", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 10 Update: libvorbis-1.2.0-7.fc10", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-12-21T08:17:49", "bulletinFamily": "unix", "cvelist": ["CVE-2009-2663", "CVE-2009-3379"], "description": "Ogg Vorbis is a fully open, non-proprietary, patent- and royalty-free, general-purpose compressed audio format for audio and music at fixed and variable bitrates from 16 to 128 kbps/channel. The libvorbis package contains runtime libraries for use in programs that support Ogg Vorbis. ", "modified": "2009-11-10T17:52:37", "published": "2009-11-10T17:52:37", "id": "FEDORA:DF86B10F8A5", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 11 Update: libvorbis-1.2.0-9.fc11", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "debian": [{"lastseen": "2020-11-11T13:11:22", "bulletinFamily": "unix", "cvelist": ["CVE-2009-2654"], "description": "- ------------------------------------------------------------------------\nDebian Security Advisory DSA-1873-1 security@debian.org\nhttp://www.debian.org/security/ Moritz Muehlenhoff\nAugust 26, 2009 http://www.debian.org/security/faq\n- ------------------------------------------------------------------------\n\nPackage : xulrunner\nVulnerability : programming error\nProblem type : remote\nDebian-specific: no\nCVE Id(s) : CVE-2009-2654\n\nJuan Pablo Lopez Yacubian discovered that incorrect handling of invalid\nURLs could be used for spoofing the location bar and the SSL certificate\nstatus of a web page.\n\nXulrunner is no longer supported for the old stable distribution (etch).\n\nFor the stable distribution (lenny), this problem has been fixed in\nversion 1.9.0.13-0lenny1.\n\nFor the unstable distribution (sid), this problem has been fixed in\nversion 1.9.0.13-1.\n\nWe recommend that you upgrade your xulrunner packages.\n\nUpgrade instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file.\n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration.\n\n\nDebian GNU/Linux 5.0 alias lenny\n- --------------------------------\n\nStable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.\n\nSource archives:\n\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner_1.9.0.13-0lenny1.dsc\n Size/MD5 checksum: 1784 3cb69f62da64dd1811ba2390cda7ad70\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner_1.9.0.13.orig.tar.gz\n Size/MD5 checksum: 44087336 54f6301790198d83d9781a8d107d903f\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner_1.9.0.13-0lenny1.diff.gz\n Size/MD5 checksum: 116763 193df5562df81a7d2cc54624fd2a0f51\n\nArchitecture independent packages:\n\n http://security.debian.org/pool/updates/main/x/xulrunner/libmozillainterfaces-java_1.9.0.13-0lenny1_all.deb\n Size/MD5 checksum: 1463692 3b7d737dad1999992c031048c503b67f\n\nalpha architecture (DEC Alpha)\n\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-dev_1.9.0.13-0lenny1_alpha.deb\n Size/MD5 checksum: 3650174 f2d621d2e631411a1893b76416f35698\n http://security.debian.org/pool/updates/main/x/xulrunner/python-xpcom_1.9.0.13-0lenny1_alpha.deb\n Size/MD5 checksum: 163726 4cb583d327edcd3edc684fa0426caab1\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-dbg_1.9.0.13-0lenny1_alpha.deb\n Size/MD5 checksum: 51076842 1350fb7090a2690e36b8709f653b561b\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-gnome-support_1.9.0.13-0lenny1_alpha.deb\n Size/MD5 checksum: 111814 4bb1d9a1370d0622e866ff6210f18066\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9_1.9.0.13-0lenny1_alpha.deb\n Size/MD5 checksum: 9490426 215edc3094a23db0c6adabd50884a3a0\n http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d-dbg_1.9.0.13-0lenny1_alpha.deb\n Size/MD5 checksum: 936830 ff33f0f1af57ae59db2aaa6598985adf\n http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs-dev_1.9.0.13-0lenny1_alpha.deb\n Size/MD5 checksum: 221362 1d2d8cbb54b693fde85dd515b55d9922\n http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d_1.9.0.13-0lenny1_alpha.deb\n Size/MD5 checksum: 431216 d2ddb135a2c4a8cc03c1be10f6ca82f8\n http://security.debian.org/pool/updates/main/x/xulrunner/spidermonkey-bin_1.9.0.13-0lenny1_alpha.deb\n Size/MD5 checksum: 71488 368acbceaa33290726ee9f91b1f389f8\n\namd64 architecture (AMD x86_64 (AMD64))\n\n http://security.debian.org/pool/updates/main/x/xulrunner/python-xpcom_1.9.0.13-0lenny1_amd64.deb\n Size/MD5 checksum: 151740 9106bb0c5d9e8625604f613f5194ae1a\n http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d_1.9.0.13-0lenny1_amd64.deb\n Size/MD5 checksum: 373904 0bc676e23d286be9271b3fd364a9c836\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-gnome-support_1.9.0.13-0lenny1_amd64.deb\n Size/MD5 checksum: 101310 221078690fc300a9fcf87a26bd4800bb\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-dev_1.9.0.13-0lenny1_amd64.deb\n Size/MD5 checksum: 3286694 f72eb5cd02d92766474a20579aa74a8b\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9_1.9.0.13-0lenny1_amd64.deb\n Size/MD5 checksum: 7717078 a49f4154a3e5e4a6522ca7ea58d0cf79\n http://security.debian.org/pool/updates/main/x/xulrunner/spidermonkey-bin_1.9.0.13-0lenny1_amd64.deb\n Size/MD5 checksum: 69392 3730969373079331b269890cb104629e\n http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs-dev_1.9.0.13-0lenny1_amd64.deb\n Size/MD5 checksum: 222702 c98d1bbf8f80c512a7eea7f94eaf8952\n http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d-dbg_1.9.0.13-0lenny1_amd64.deb\n Size/MD5 checksum: 889904 a7c23d16ff8d30bc16767f6af21c23e3\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-dbg_1.9.0.13-0lenny1_amd64.deb\n Size/MD5 checksum: 50310800 c8555989c076088e089e838de0c358f0\n\narm architecture (ARM)\n\n http://security.debian.org/pool/updates/main/x/xulrunner/spidermonkey-bin_1.9.0.13-0lenny1_arm.deb\n Size/MD5 checksum: 67760 647d54e6c11674dac17de983be62ba50\n http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs-dev_1.9.0.13-0lenny1_arm.deb\n Size/MD5 checksum: 221772 ab8d0eea1b0bf9b6c200803b4192f629\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-gnome-support_1.9.0.13-0lenny1_arm.deb\n Size/MD5 checksum: 83654 fc7e855940039a4fff5eb80c625beebe\n http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d_1.9.0.13-0lenny1_arm.deb\n Size/MD5 checksum: 350400 534ba7ef0348ff992af810ffeb1f76d8\n http://security.debian.org/pool/updates/main/x/xulrunner/python-xpcom_1.9.0.13-0lenny1_arm.deb\n Size/MD5 checksum: 140512 690f123b67cbe0e7e274d747797e352e\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9_1.9.0.13-0lenny1_arm.deb\n Size/MD5 checksum: 6787090 aba34ff0035b27bb484ff0836704fc7f\n http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d-dbg_1.9.0.13-0lenny1_arm.deb\n Size/MD5 checksum: 815226 1a9276433c4f7e874361fbe5da86f729\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-dbg_1.9.0.13-0lenny1_arm.deb\n Size/MD5 checksum: 49271924 62555f78d84da2a81b92464eab212c84\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-dev_1.9.0.13-0lenny1_arm.deb\n Size/MD5 checksum: 3579964 0de1b683c71a22bed53ac594622c0468\n\narmel architecture (ARM EABI)\n\n http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs-dev_1.9.0.13-0lenny1_armel.deb\n Size/MD5 checksum: 223226 ae31e5e725a09f487b0476485fb705f9\n http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d-dbg_1.9.0.13-0lenny1_armel.deb\n Size/MD5 checksum: 823178 93fa22f50efadbca49e10a4486f7a6c9\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-dev_1.9.0.13-0lenny1_armel.deb\n Size/MD5 checksum: 3569696 47bfedd77b1ccbece88d409689446e18\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-gnome-support_1.9.0.13-0lenny1_armel.deb\n Size/MD5 checksum: 84234 cffb345d34eb558d3f5f146271f9b6ce\n http://security.debian.org/pool/updates/main/x/xulrunner/spidermonkey-bin_1.9.0.13-0lenny1_armel.deb\n Size/MD5 checksum: 69972 3ab93baf817484f69bab714f051aaa99\n http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d_1.9.0.13-0lenny1_armel.deb\n Size/MD5 checksum: 352934 14daf47f48e323cec7e1a808ec0a8f28\n http://security.debian.org/pool/updates/main/x/xulrunner/python-xpcom_1.9.0.13-0lenny1_armel.deb\n Size/MD5 checksum: 142542 b3d32666b9f5b5380e70bf10103645a0\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-dbg_1.9.0.13-0lenny1_armel.deb\n Size/MD5 checksum: 50103556 f3931dc067555d273bb2f7af74c97b6b\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9_1.9.0.13-0lenny1_armel.deb\n Size/MD5 checksum: 6948592 46428e5f62b429da082113b8da76564e\n\nhppa architecture (HP PA RISC)\n\n http://security.debian.org/pool/updates/main/x/xulrunner/python-xpcom_1.9.0.13-0lenny1_hppa.deb\n Size/MD5 checksum: 158262 bf0a5603b559f81e51b3e8fe835d5eff\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-dbg_1.9.0.13-0lenny1_hppa.deb\n Size/MD5 checksum: 51211330 caec065a57aa72660a0a73c237e652f3\n http://security.debian.org/pool/updates/main/x/xulrunner/spidermonkey-bin_1.9.0.13-0lenny1_hppa.deb\n Size/MD5 checksum: 71492 da5e96bc768535373f3df6797b79e888\n http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d_1.9.0.13-0lenny1_hppa.deb\n Size/MD5 checksum: 412516 3cba0886d4220c295ff51d6fce4a874f\n http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs-dev_1.9.0.13-0lenny1_hppa.deb\n Size/MD5 checksum: 223092 4872c51582be0e1972239ec1ef56d7ad\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-dev_1.9.0.13-0lenny1_hppa.deb\n Size/MD5 checksum: 3629140 aac13891915a46ed202713dcaa1ffdd2\n http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d-dbg_1.9.0.13-0lenny1_hppa.deb\n Size/MD5 checksum: 899436 1f8368b4f8d577904f586f84c3f5250a\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9_1.9.0.13-0lenny1_hppa.deb\n Size/MD5 checksum: 9503478 e1e18573037291f60981240e81a5a80e\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-gnome-support_1.9.0.13-0lenny1_hppa.deb\n Size/MD5 checksum: 106514 eb881ae75b3fe865b5e8f78db5141565\n\ni386 architecture (Intel ia32)\n\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-gnome-support_1.9.0.13-0lenny1_i386.deb\n Size/MD5 checksum: 78942 d69b8b65d1c250d24d21e7961242ce4d\n http://security.debian.org/pool/updates/main/x/xulrunner/spidermonkey-bin_1.9.0.13-0lenny1_i386.deb\n Size/MD5 checksum: 67614 3ef0065dbf512988f310b379ecbb0c7b\n http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs-dev_1.9.0.13-0lenny1_i386.deb\n Size/MD5 checksum: 222934 5671e70f2de1832fd1b2f96decdb2de7\n http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d_1.9.0.13-0lenny1_i386.deb\n Size/MD5 checksum: 350452 fcfb729d77cdfcaa34d1dbce66c2b90c\n http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d-dbg_1.9.0.13-0lenny1_i386.deb\n Size/MD5 checksum: 851486 7cbad5a2fb4453b08fb8a4a4543f238b\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-dev_1.9.0.13-0lenny1_i386.deb\n Size/MD5 checksum: 3564388 bc2223a0931115a4d3ecc6bb0062ed03\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-dbg_1.9.0.13-0lenny1_i386.deb\n Size/MD5 checksum: 49481952 b12493504db71e8379ea0eac86d9869b\n http://security.debian.org/pool/updates/main/x/xulrunner/python-xpcom_1.9.0.13-0lenny1_i386.deb\n Size/MD5 checksum: 141078 fd880d99a562d8e07b83dd885f8c4a56\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9_1.9.0.13-0lenny1_i386.deb\n Size/MD5 checksum: 6594618 e8043afeed3bcd924d6fab356965b69c\n\nia64 architecture (Intel ia64)\n\n http://security.debian.org/pool/updates/main/x/xulrunner/python-xpcom_1.9.0.13-0lenny1_ia64.deb\n Size/MD5 checksum: 179980 719fac1e4f7c966ae583fb0dc370f14f\n http://security.debian.org/pool/updates/main/x/xulrunner/spidermonkey-bin_1.9.0.13-0lenny1_ia64.deb\n Size/MD5 checksum: 75864 0f1777d61ada527ef5b8116b2b3097d1\n http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d-dbg_1.9.0.13-0lenny1_ia64.deb\n Size/MD5 checksum: 811252 bf630847aff060fcd1a9867139c33dd9\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-gnome-support_1.9.0.13-0lenny1_ia64.deb\n Size/MD5 checksum: 121340 a22aa06f1fad6e084b896e8bf3ef69c8\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-dev_1.9.0.13-0lenny1_ia64.deb\n Size/MD5 checksum: 3396354 d694cff83fe82d7125af3bca844e2434\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9_1.9.0.13-0lenny1_ia64.deb\n Size/MD5 checksum: 11292004 8874413465733b654819940cebc9ce0a\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-dbg_1.9.0.13-0lenny1_ia64.deb\n Size/MD5 checksum: 49653978 993621bd3d1b2cdc05663f8941ae90b8\n http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs-dev_1.9.0.13-0lenny1_ia64.deb\n Size/MD5 checksum: 222916 aeeb890a09b31ed3c9d4b56db64a9b80\n http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d_1.9.0.13-0lenny1_ia64.deb\n Size/MD5 checksum: 542196 7dcca5c07da0ee93bf746b49d58c703c\n\nmips architecture (MIPS (Big Endian))\n\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-gnome-support_1.9.0.13-0lenny1_mips.deb\n Size/MD5 checksum: 96912 8aeb2510afea5d1f92ff7810cf4ae8f1\n http://security.debian.org/pool/updates/main/x/xulrunner/python-xpcom_1.9.0.13-0lenny1_mips.deb\n Size/MD5 checksum: 144496 3fe45b281a226a094732bb2bae46fd3c\n http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d_1.9.0.13-0lenny1_mips.deb\n Size/MD5 checksum: 379912 e1d1da46d473c72f1a462aecbeba45a5\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-dbg_1.9.0.13-0lenny1_mips.deb\n Size/MD5 checksum: 51839016 804b5b45b4899b1f96fb02ff558b1017\n http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d-dbg_1.9.0.13-0lenny1_mips.deb\n Size/MD5 checksum: 918304 1c49ffadf9f71ad385932389ef10624f\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9_1.9.0.13-0lenny1_mips.deb\n Size/MD5 checksum: 7661930 dde7ba616bfeef980f71f0a07c158026\n http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs-dev_1.9.0.13-0lenny1_mips.deb\n Size/MD5 checksum: 222762 181364c559aaf7a91899d16dabe4fcb3\n http://security.debian.org/pool/updates/main/x/xulrunner/spidermonkey-bin_1.9.0.13-0lenny1_mips.deb\n Size/MD5 checksum: 69692 0f5c37b1b56abbf4583fa347afb3f5cc\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-dev_1.9.0.13-0lenny1_mips.deb\n Size/MD5 checksum: 3612680 13b571b9dc508ff6f49471e180ccbf8f\n\nmipsel architecture (MIPS (Little Endian))\n\n http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d_1.9.0.13-0lenny1_mipsel.deb\n Size/MD5 checksum: 378170 4f6003e95c9a9326c3d331a83fbc0c07\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-dbg_1.9.0.13-0lenny1_mipsel.deb\n Size/MD5 checksum: 49952368 ea9e3bb040ec093988b53745a55dd170\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-gnome-support_1.9.0.13-0lenny1_mipsel.deb\n Size/MD5 checksum: 96570 cbcaf650c878d4e1e5759614e65e4372\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9_1.9.0.13-0lenny1_mipsel.deb\n Size/MD5 checksum: 7371816 4e0cd58aec00a343d0964254b4d4be6d\n http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs-dev_1.9.0.13-0lenny1_mipsel.deb\n Size/MD5 checksum: 222906 6c08a02a49459bfb64876f40fe910d5b\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-dev_1.9.0.13-0lenny1_mipsel.deb\n Size/MD5 checksum: 3307316 2982b19df977a71f65f5aa180294bc3c\n http://security.debian.org/pool/updates/main/x/xulrunner/spidermonkey-bin_1.9.0.13-0lenny1_mipsel.deb\n Size/MD5 checksum: 69374 654f66b755959297882b8719e673cb36\n http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d-dbg_1.9.0.13-0lenny1_mipsel.deb\n Size/MD5 checksum: 900092 438dc2616c421125d23af5ff72794226\n http://security.debian.org/pool/updates/main/x/xulrunner/python-xpcom_1.9.0.13-0lenny1_mipsel.deb\n Size/MD5 checksum: 144774 0ba7ddcd1cadb1ec34e2295cf3222cd1\n\npowerpc architecture (PowerPC)\n\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-gnome-support_1.9.0.13-0lenny1_powerpc.deb\n Size/MD5 checksum: 94598 0555d823fb826f33f955e2bc155f39af\n http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs-dev_1.9.0.13-0lenny1_powerpc.deb\n Size/MD5 checksum: 222912 5c58ab00c1c27713fe3ae42142647a85\n http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d-dbg_1.9.0.13-0lenny1_powerpc.deb\n Size/MD5 checksum: 888022 194f79d5ce4448c04908cbaa103b0483\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9_1.9.0.13-0lenny1_powerpc.deb\n Size/MD5 checksum: 7270354 8a754bf9937966182d61179c73200e07\n http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d_1.9.0.13-0lenny1_powerpc.deb\n Size/MD5 checksum: 362116 eaaa7e43204f7565d618907240a0a533\n http://security.debian.org/pool/updates/main/x/xulrunner/python-xpcom_1.9.0.13-0lenny1_powerpc.deb\n Size/MD5 checksum: 152068 ad2ff0c3674e5d1f321d62b1327c3223\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-dbg_1.9.0.13-0lenny1_powerpc.deb\n Size/MD5 checksum: 51365442 9d24613bc7c49884c20a07d14f3f07b2\n http://security.debian.org/pool/updates/main/x/xulrunner/spidermonkey-bin_1.9.0.13-0lenny1_powerpc.deb\n Size/MD5 checksum: 72542 8c09d7d4ef509da594af64f85ccce9ca\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-dev_1.9.0.13-0lenny1_powerpc.deb\n Size/MD5 checksum: 3282570 7ba98adc2a29b38f779ceb93c4a9f420\n\ns390 architecture (IBM S/390)\n\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-gnome-support_1.9.0.13-0lenny1_s390.deb\n Size/MD5 checksum: 105364 3f1e74e0623c971c41234822c44808a5\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-dbg_1.9.0.13-0lenny1_s390.deb\n Size/MD5 checksum: 51156554 62fb601d05680608773383f5755fc271\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9_1.9.0.13-0lenny1_s390.deb\n Size/MD5 checksum: 8381832 24aa30f03b5f8ea822f9679614021d68\n http://security.debian.org/pool/updates/main/x/xulrunner/python-xpcom_1.9.0.13-0lenny1_s390.deb\n Size/MD5 checksum: 155884 daa6d5ca41f2a17ea2c62a88491383cf\n http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d-dbg_1.9.0.13-0lenny1_s390.deb\n Size/MD5 checksum: 909310 a382ee499cea150ef460a74baf528764\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-dev_1.9.0.13-0lenny1_s390.deb\n Size/MD5 checksum: 3305188 0828ab7702dc77530a331a45da049d22\n http://security.debian.org/pool/updates/main/x/xulrunner/spidermonkey-bin_1.9.0.13-0lenny1_s390.deb\n Size/MD5 checksum: 72364 1d508c1eb2518d24993a011a026c9952\n http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d_1.9.0.13-0lenny1_s390.deb\n Size/MD5 checksum: 406306 b7cee75289784de2c682c4f5abd0b5cb\n http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs-dev_1.9.0.13-0lenny1_s390.deb\n Size/MD5 checksum: 222908 76f9c545195fb95ad53419b037b35583\n\nsparc architecture (Sun SPARC/UltraSPARC)\n\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-dev_1.9.0.13-0lenny1_sparc.deb\n Size/MD5 checksum: 3575950 9760510e902b131e94d6057733c69566\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-dbg_1.9.0.13-0lenny1_sparc.deb\n Size/MD5 checksum: 49350930 9cc7507d39a67b4fd06267dbf2bd93e3\n http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d_1.9.0.13-0lenny1_sparc.deb\n Size/MD5 checksum: 349936 398ae95c0067f213383696b86b341b36\n http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs-dev_1.9.0.13-0lenny1_sparc.deb\n Size/MD5 checksum: 222994 f28fbfc9107b7a13e0695a4888fe8f75\n http://security.debian.org/pool/updates/main/x/xulrunner/python-xpcom_1.9.0.13-0lenny1_sparc.deb\n Size/MD5 checksum: 143022 945475c4924eef6eee00f8738aaea153\n http://security.debian.org/pool/updates/main/x/xulrunner/spidermonkey-bin_1.9.0.13-0lenny1_sparc.deb\n Size/MD5 checksum: 68862 ebe2658e7020e3d866644d1151d4dd07\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9_1.9.0.13-0lenny1_sparc.deb\n Size/MD5 checksum: 7169696 3356fafabab8464291700a09f78c59c1\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9-gnome-support_1.9.0.13-0lenny1_sparc.deb\n Size/MD5 checksum: 88016 6d500d79d352c9d9b1e1fb451cba45a3\n http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs1d-dbg_1.9.0.13-0lenny1_sparc.deb\n Size/MD5 checksum: 821482 625b551efab2c8854443878748ce17c0\n\n These files will probably be moved into the stable distribution on\n its next update.\n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>\n", "edition": 3, "modified": "2009-08-26T18:52:02", "published": "2009-08-26T18:52:02", "id": "DEBIAN:DSA-1873-1:F50AD", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2009/msg00191.html", "title": "[SECURITY] [DSA 1873-1] New xulrunner packages fix spoofing vulnerabilities", "type": "debian", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:P"}}, {"lastseen": "2020-11-11T13:19:46", "bulletinFamily": "unix", "cvelist": ["CVE-2009-3379", "CVE-2009-2663"], "description": "- ------------------------------------------------------------------------\nDebian Security Advisory DSA-1939-1 security@debian.org\nhttp://www.debian.org/security/ Giuseppe Iuculano\nNovember 24, 2009 http://www.debian.org/security/faq\n- ------------------------------------------------------------------------\n\nPackage : libvorbis\nVulnerability : several\nProblem type : local(remote)\nDebian-specific: no\nDebian bug : 540958\nCVE Ids : CVE-2009-2663 CVE-2009-3379\n\nLucas Adamski, Matthew Gregan, David Keeler, and Dan Kaminsky discovered\nthat libvorbis, a library for the Vorbis general-purpose compressed\naudio codec, did not correctly handle certain malformed ogg files. An\nattacher could cause a denial of service (memory corruption and\napplication crash) or possibly execute arbitrary code via a crafted .ogg\nfile.\n\nFor the oldstable distribution (etch), these problems have been fixed in\nversion 1.1.2.dfsg-1.4+etch1.\n\nFor the stable distribution (lenny), these problems have been fixed in\nversion 1.2.0.dfsg-3.1+lenny1.\n\nFor the testing distribution (squeeze) and the unstable distribution\n(sid), these problems have been fixed in version 1.2.3-1\n\nWe recommend that you upgrade your libvorbis packages.\n\nUpgrade instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file.\n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration.\n\n\nDebian GNU/Linux 4.0 alias etch\n- -------------------------------\n\nOldstable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.\n\nSource archives:\n\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis_1.1.2.dfsg-1.4+etch1.diff.gz\n Size/MD5 checksum: 17870 2e11d2c0176fd0a8e796e80667a681d8\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis_1.1.2.dfsg.orig.tar.gz\n Size/MD5 checksum: 1312540 44cf09fef7f78e7c6ba7dd63b6137412\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis_1.1.2.dfsg-1.4+etch1.dsc\n Size/MD5 checksum: 808 2a9e6b4dcd72e8bc8cf956404a1fb7ca\n\nalpha architecture (DEC Alpha)\n\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisenc2_1.1.2.dfsg-1.4+etch1_alpha.deb\n Size/MD5 checksum: 94682 9c20663d4f36265241830b388d90a455\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisfile3_1.1.2.dfsg-1.4+etch1_alpha.deb\n Size/MD5 checksum: 19440 7caafa303b7fa32f0a6192d6b75b9874\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis0a_1.1.2.dfsg-1.4+etch1_alpha.deb\n Size/MD5 checksum: 110988 8751f9d236abbacaf14c7f5e5a57a078\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis-dev_1.1.2.dfsg-1.4+etch1_alpha.deb\n Size/MD5 checksum: 495658 681d35e8b06a6d0d8c37f7c9fb5325c8\n\namd64 architecture (AMD x86_64 (AMD64))\n\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisenc2_1.1.2.dfsg-1.4+etch1_amd64.deb\n Size/MD5 checksum: 93808 ee1c37e468df9f96aa86ecf11a9c3050\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisfile3_1.1.2.dfsg-1.4+etch1_amd64.deb\n Size/MD5 checksum: 18018 767aa39de969e302a62a8b1968aa8c39\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis0a_1.1.2.dfsg-1.4+etch1_amd64.deb\n Size/MD5 checksum: 102012 91d4ff0b056c721041ec925adb956623\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis-dev_1.1.2.dfsg-1.4+etch1_amd64.deb\n Size/MD5 checksum: 463556 431c01bc7bc69936fdc4d4c1d32c12eb\n\narm architecture (ARM)\n\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis-dev_1.1.2.dfsg-1.4+etch1_arm.deb\n Size/MD5 checksum: 459034 52d059837ff4ec37205c65c952d10dfd\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisenc2_1.1.2.dfsg-1.4+etch1_arm.deb\n Size/MD5 checksum: 75992 33f262fdec3a52f4d6e5cebd3238f600\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis0a_1.1.2.dfsg-1.4+etch1_arm.deb\n Size/MD5 checksum: 98776 7c24697b474af64e5a85625777d0bc8d\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisfile3_1.1.2.dfsg-1.4+etch1_arm.deb\n Size/MD5 checksum: 18776 c00e2fcb4e65aa26d8a9d2fda4a86c0c\n\nhppa architecture (HP PA RISC)\n\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis-dev_1.1.2.dfsg-1.4+etch1_hppa.deb\n Size/MD5 checksum: 486808 97cee8dfb056da78638884749a4cd3bb\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisfile3_1.1.2.dfsg-1.4+etch1_hppa.deb\n Size/MD5 checksum: 22180 97e127da32402398f9d3d073917aaf30\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis0a_1.1.2.dfsg-1.4+etch1_hppa.deb\n Size/MD5 checksum: 108614 9e7b5f226060f6d492aa5a37830e8382\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisenc2_1.1.2.dfsg-1.4+etch1_hppa.deb\n Size/MD5 checksum: 92586 d768d0011d425413b5513cc6077c90cc\n\ni386 architecture (Intel ia32)\n\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisfile3_1.1.2.dfsg-1.4+etch1_i386.deb\n Size/MD5 checksum: 19096 ddf590ab7c51f75015815e7500c73c02\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis0a_1.1.2.dfsg-1.4+etch1_i386.deb\n Size/MD5 checksum: 98656 d84b4ff35636254f8b79c4a1817a9f1b\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis-dev_1.1.2.dfsg-1.4+etch1_i386.deb\n Size/MD5 checksum: 455630 419e92bd2278385d2332485bfb5ec1c4\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisenc2_1.1.2.dfsg-1.4+etch1_i386.deb\n Size/MD5 checksum: 75688 8162e49e13fdd5f4f90b5e04737aef5b\n\nia64 architecture (Intel ia64)\n\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisfile3_1.1.2.dfsg-1.4+etch1_ia64.deb\n Size/MD5 checksum: 24924 8d0212e706fc747d46a3975aecab7216\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis0a_1.1.2.dfsg-1.4+etch1_ia64.deb\n Size/MD5 checksum: 136680 c1c52b4d20178d8f2cce5201965bdfd9\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis-dev_1.1.2.dfsg-1.4+etch1_ia64.deb\n Size/MD5 checksum: 510898 b6c1d63e991ad6ac200b84a2ef2c7778\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisenc2_1.1.2.dfsg-1.4+etch1_ia64.deb\n Size/MD5 checksum: 98322 3fabeea5ac4bccea511c9896e9348bd4\n\nmips architecture (MIPS (Big Endian))\n\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis-dev_1.1.2.dfsg-1.4+etch1_mips.deb\n Size/MD5 checksum: 479806 3d49befd4f109864db338470ca55cfc7\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisenc2_1.1.2.dfsg-1.4+etch1_mips.deb\n Size/MD5 checksum: 81862 6d767ac118ce0a06283d21bb324769f4\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis0a_1.1.2.dfsg-1.4+etch1_mips.deb\n Size/MD5 checksum: 105506 b11a6faac0f84f7a39cd0926de7663d4\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisfile3_1.1.2.dfsg-1.4+etch1_mips.deb\n Size/MD5 checksum: 21196 0d5bab8e1549e3de1800c81d3103cef5\n\nmipsel architecture (MIPS (Little Endian))\n\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisfile3_1.1.2.dfsg-1.4+etch1_mipsel.deb\n Size/MD5 checksum: 21184 4217f461a2c1d30891835bae475a4821\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis0a_1.1.2.dfsg-1.4+etch1_mipsel.deb\n Size/MD5 checksum: 105478 f3465e3a92fc170d74fbb0506e4680ad\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis-dev_1.1.2.dfsg-1.4+etch1_mipsel.deb\n Size/MD5 checksum: 469818 126dd26c5dcde5fe3d600e0d40a9ceba\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisenc2_1.1.2.dfsg-1.4+etch1_mipsel.deb\n Size/MD5 checksum: 77222 b9441d25e697dcc50d524f1877cfca5e\n\npowerpc architecture (PowerPC)\n\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis0a_1.1.2.dfsg-1.4+etch1_powerpc.deb\n Size/MD5 checksum: 105636 a61d57534c62b311e960335f238c0470\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisfile3_1.1.2.dfsg-1.4+etch1_powerpc.deb\n Size/MD5 checksum: 21596 cf321ab0979c9515553214fdbb4e133e\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis-dev_1.1.2.dfsg-1.4+etch1_powerpc.deb\n Size/MD5 checksum: 481752 593995999d19a5d57c3478675e98c420\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisenc2_1.1.2.dfsg-1.4+etch1_powerpc.deb\n Size/MD5 checksum: 82404 fd07873df7789ab093013b1baaee0edc\n\ns390 architecture (IBM S/390)\n\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisenc2_1.1.2.dfsg-1.4+etch1_s390.deb\n Size/MD5 checksum: 90790 4408b9fbd5a4f7f942b65db63784e7a7\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis0a_1.1.2.dfsg-1.4+etch1_s390.deb\n Size/MD5 checksum: 103024 f3ea14da7a63f1cfbc44dc1339c40262\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis-dev_1.1.2.dfsg-1.4+etch1_s390.deb\n Size/MD5 checksum: 453202 d0ba253a2d00eb5d250be7d0b99bb727\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisfile3_1.1.2.dfsg-1.4+etch1_s390.deb\n Size/MD5 checksum: 21148 104ecad6b00ae020821510a23cdfa8b7\n\nsparc architecture (Sun SPARC/UltraSPARC)\n\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis-dev_1.1.2.dfsg-1.4+etch1_sparc.deb\n Size/MD5 checksum: 460314 dac04732917ced67c8a81f708db6cfd4\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis0a_1.1.2.dfsg-1.4+etch1_sparc.deb\n Size/MD5 checksum: 98978 e83cbcf90ca35296f02f01d57b3e915e\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisenc2_1.1.2.dfsg-1.4+etch1_sparc.deb\n Size/MD5 checksum: 79810 12328b2d6338996b25aeac8877331400\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisfile3_1.1.2.dfsg-1.4+etch1_sparc.deb\n Size/MD5 checksum: 18084 46c1fef587328abad16f2fb4f47add8d\n\nDebian GNU/Linux 5.0 alias lenny\n- --------------------------------\n\nStable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.\n\nSource archives:\n\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis_1.2.0.dfsg-3.1+lenny1.diff.gz\n Size/MD5 checksum: 10323 8a3c02bfdb7c2e6edc1a6ba952f4706e\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis_1.2.0.dfsg-3.1+lenny1.dsc\n Size/MD5 checksum: 1280 0e4285bf0fc44a182f35b15b3bef92af\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis_1.2.0.dfsg.orig.tar.gz\n Size/MD5 checksum: 1477935 3c7fff70c0989ab3c1c85366bf670818\n\nalpha architecture (DEC Alpha)\n\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisfile3_1.2.0.dfsg-3.1+lenny1_alpha.deb\n Size/MD5 checksum: 21514 54f57d2e85a0be5e1acad07ce954a168\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis0a_1.2.0.dfsg-3.1+lenny1_alpha.deb\n Size/MD5 checksum: 115208 f6dc710dafeffbec73e13170d9105829\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis-dev_1.2.0.dfsg-3.1+lenny1_alpha.deb\n Size/MD5 checksum: 506716 140e414c05e73eab318a51f7d4aa2b8d\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisenc2_1.2.0.dfsg-3.1+lenny1_alpha.deb\n Size/MD5 checksum: 96064 73db866b777df1909563190182640945\n\namd64 architecture (AMD x86_64 (AMD64))\n\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis-dev_1.2.0.dfsg-3.1+lenny1_amd64.deb\n Size/MD5 checksum: 478134 8ebe1257d8e115a5af1058f8a61d50bd\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisfile3_1.2.0.dfsg-3.1+lenny1_amd64.deb\n Size/MD5 checksum: 20274 a89e0200bbd700c8ed5661493534f02b\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis0a_1.2.0.dfsg-3.1+lenny1_amd64.deb\n Size/MD5 checksum: 109190 f6ff320aee0bd6866e801206af4484f1\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisenc2_1.2.0.dfsg-3.1+lenny1_amd64.deb\n Size/MD5 checksum: 95610 cea6849521bd398355ca1532577d331d\n\narm architecture (ARM)\n\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisfile3_1.2.0.dfsg-3.1+lenny1_arm.deb\n Size/MD5 checksum: 20652 66ffe73d9861dcd3232dbd436f8dcc6b\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis0a_1.2.0.dfsg-3.1+lenny1_arm.deb\n Size/MD5 checksum: 102034 cd5000ef6cacd9233d085ae95ea23d2b\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis-dev_1.2.0.dfsg-3.1+lenny1_arm.deb\n Size/MD5 checksum: 468072 30b862d2990829dcc6e981216367f969\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisenc2_1.2.0.dfsg-3.1+lenny1_arm.deb\n Size/MD5 checksum: 78076 37db0e079e0d0fd143ef3ec24346d007\n\narmel architecture (ARM EABI)\n\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisenc2_1.2.0.dfsg-3.1+lenny1_armel.deb\n Size/MD5 checksum: 81476 5ab9275754100c446347e657240e875f\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis0a_1.2.0.dfsg-3.1+lenny1_armel.deb\n Size/MD5 checksum: 111004 823aec12ac3297a641b2dea659618a1a\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisfile3_1.2.0.dfsg-3.1+lenny1_armel.deb\n Size/MD5 checksum: 23996 753c36a998841c8f8aefa4d934d5823b\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis-dev_1.2.0.dfsg-3.1+lenny1_armel.deb\n Size/MD5 checksum: 480568 2d544a79b74d22a2e680b521236ac4e7\n\nhppa architecture (HP PA RISC)\n\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisfile3_1.2.0.dfsg-3.1+lenny1_hppa.deb\n Size/MD5 checksum: 24294 f2ef7f0f4a071a61756b244a1c2f8fdd\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis-dev_1.2.0.dfsg-3.1+lenny1_hppa.deb\n Size/MD5 checksum: 498788 cc869f79c972f23a0d0a4fba7257f67b\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis0a_1.2.0.dfsg-3.1+lenny1_hppa.deb\n Size/MD5 checksum: 114236 161bd0d31cdc44d0dce14f68af75d2bf\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisenc2_1.2.0.dfsg-3.1+lenny1_hppa.deb\n Size/MD5 checksum: 93650 2120a920860dbf8b027ab3d0f53e35c3\n\ni386 architecture (Intel ia32)\n\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis0a_1.2.0.dfsg-3.1+lenny1_i386.deb\n Size/MD5 checksum: 101822 b35241103ae3b649b37082c75bb6c349\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisenc2_1.2.0.dfsg-3.1+lenny1_i386.deb\n Size/MD5 checksum: 77266 e6272466696d9b1307c446495933904a\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisfile3_1.2.0.dfsg-3.1+lenny1_i386.deb\n Size/MD5 checksum: 21228 5c64197678bc8102cac8d5e24ebf30f4\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis-dev_1.2.0.dfsg-3.1+lenny1_i386.deb\n Size/MD5 checksum: 465548 3b5e01cb7ed617ceef7cfac672c42061\n\nia64 architecture (Intel ia64)\n\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisfile3_1.2.0.dfsg-3.1+lenny1_ia64.deb\n Size/MD5 checksum: 27076 b10ab2d103d2c360fe8d865592170fed\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis0a_1.2.0.dfsg-3.1+lenny1_ia64.deb\n Size/MD5 checksum: 145298 1a48bdf218f2ad34e214edbdb74d3017\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisenc2_1.2.0.dfsg-3.1+lenny1_ia64.deb\n Size/MD5 checksum: 100386 815eea5cd2cdd1f5c880d027e9d0d047\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis-dev_1.2.0.dfsg-3.1+lenny1_ia64.deb\n Size/MD5 checksum: 529794 243a7c8dc4d8005141b722709e00fefd\n\nmips architecture (MIPS (Big Endian))\n\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisfile3_1.2.0.dfsg-3.1+lenny1_mips.deb\n Size/MD5 checksum: 23034 862ec33f1cdc5de0fe9d70a1dddabddc\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis-dev_1.2.0.dfsg-3.1+lenny1_mips.deb\n Size/MD5 checksum: 489974 335f4276e4ace9e795a708bb378293ed\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisenc2_1.2.0.dfsg-3.1+lenny1_mips.deb\n Size/MD5 checksum: 83664 5ebfbe684ab67af2070d7ebd78e920b6\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis0a_1.2.0.dfsg-3.1+lenny1_mips.deb\n Size/MD5 checksum: 109642 9088464063081cf3db925abbd77f95ab\n\nmipsel architecture (MIPS (Little Endian))\n\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisenc2_1.2.0.dfsg-3.1+lenny1_mipsel.deb\n Size/MD5 checksum: 78800 cbf9d026a528889229ede2fbbf07f9b1\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis0a_1.2.0.dfsg-3.1+lenny1_mipsel.deb\n Size/MD5 checksum: 110172 56df9de194208745f918c2489fd07dc4\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisfile3_1.2.0.dfsg-3.1+lenny1_mipsel.deb\n Size/MD5 checksum: 23038 ebafe740326f2b2477e4a2932e0b1f20\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis-dev_1.2.0.dfsg-3.1+lenny1_mipsel.deb\n Size/MD5 checksum: 480462 354c01ff4d127cfbd90b5d2bbf115124\n\npowerpc architecture (PowerPC)\n\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisenc2_1.2.0.dfsg-3.1+lenny1_powerpc.deb\n Size/MD5 checksum: 84936 a8e159dfb4a7947ab21d03e42743f273\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis-dev_1.2.0.dfsg-3.1+lenny1_powerpc.deb\n Size/MD5 checksum: 489602 055f226558649f3824c77ccf8710b3ff\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisfile3_1.2.0.dfsg-3.1+lenny1_powerpc.deb\n Size/MD5 checksum: 25112 cbc19a2f5b18a39027a5f4796c328d38\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis0a_1.2.0.dfsg-3.1+lenny1_powerpc.deb\n Size/MD5 checksum: 115288 69dcb48991d54cb44f440951453819be\n\ns390 architecture (IBM S/390)\n\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisenc2_1.2.0.dfsg-3.1+lenny1_s390.deb\n Size/MD5 checksum: 92652 332abcfbc21fde03527f98394d430589\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisfile3_1.2.0.dfsg-3.1+lenny1_s390.deb\n Size/MD5 checksum: 23374 459565d5bf6fb2423bb966585050f76e\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis0a_1.2.0.dfsg-3.1+lenny1_s390.deb\n Size/MD5 checksum: 108572 d18b6585b3ac105589cbd85149f6dbf2\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis-dev_1.2.0.dfsg-3.1+lenny1_s390.deb\n Size/MD5 checksum: 464128 54fd2ed9b7f46e98c61717df93623179\n\nsparc architecture (Sun SPARC/UltraSPARC)\n\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis0a_1.2.0.dfsg-3.1+lenny1_sparc.deb\n Size/MD5 checksum: 104330 4c01729046cf263045262dbac19cf380\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisfile3_1.2.0.dfsg-3.1+lenny1_sparc.deb\n Size/MD5 checksum: 20572 737481d4662074e10faaec373056d761\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisenc2_1.2.0.dfsg-3.1+lenny1_sparc.deb\n Size/MD5 checksum: 81536 6ac89e9942629ddbf7e1bbf21226fda1\n http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis-dev_1.2.0.dfsg-3.1+lenny1_sparc.deb\n Size/MD5 checksum: 472582 bb723b7a07db184b259c28d757d1e271\n\n\n These files will probably be moved into the stable distribution on\n its next update.\n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>\n", "edition": 9, "modified": "2009-11-24T22:41:33", "published": "2009-11-24T22:41:33", "id": "DEBIAN:DSA-1939-1:4E1D6", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2009/msg00262.html", "title": "[SECURITY] [DSA 1939-1] New libvorbis packages fix several vulnerabilities", "type": "debian", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "exploitdb": [{"lastseen": "2016-02-03T18:28:56", "description": "Mozilla Firefox 3.5.1 Error Page Address Bar URI Spoofing Vulnerability. CVE-2009-2654. Remote exploit for linux platform", "published": "2009-06-24T00:00:00", "type": "exploitdb", "title": "Mozilla Firefox <= 3.5.1 Error Page Address Bar URI Spoofing Vulnerability", "bulletinFamily": "exploit", "cvelist": ["CVE-2009-2654"], "modified": "2009-06-24T00:00:00", "id": "EDB-ID:33103", "href": "https://www.exploit-db.com/exploits/33103/", "sourceData": "source: http://www.securityfocus.com/bid/35803/info\r\n\r\nMozilla Firefox is affected by a URI-spoofing vulnerability.\r\n\r\nAn attacker may leverage this issue by inserting arbitrary content to spoof a URI presented to an unsuspecting user. This may lead to a false sense of trust because the victim may be presented with a URI of a seemingly trusted site while interacting with the attacker's malicious site.\r\n\r\nThis issue affects Firefox versions prior to 3.5.2 and 3.0.13. \r\n\r\n</script> <center> <h1>Firefox spoofing</h1> </center> <p> <a href=\"javascript:spoof()\">test!</a> <p> <script> function spoof() { a = window.open(\"http://www.example.com%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20,\") a.document.write(\"<H1>FAKE PAGE<\\h1>\") a.document.write(\"<title>test</title>\") a.stop (); } </script> <br> Juan Pablo Lopez Yacubian ", "cvss": {"score": 5.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://www.exploit-db.com/download/33103/"}], "ubuntu": [{"lastseen": "2020-07-09T00:32:21", "bulletinFamily": "unix", "cvelist": ["CVE-2009-2654"], "description": "Juan Pablo Lopez Yacubian discovered that Firefox did not properly display \ninvalid URLs. If a user were tricked into accessing a malicious website, an \nattacker could exploit this to spoof the location bar, such as in a \nphishing attack. Furthermore, if the malicious website had a valid SSL \ncertificate, Firefox would display the spoofed page as trusted.", "edition": 5, "modified": "2009-08-08T00:00:00", "published": "2009-08-08T00:00:00", "id": "USN-811-1", "href": "https://ubuntu.com/security/notices/USN-811-1", "title": "Firefox and Xulrunner vulnerability", "type": "ubuntu", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:P"}}, {"lastseen": "2020-07-09T00:22:06", "bulletinFamily": "unix", "cvelist": ["CVE-2008-1420", "CVE-2009-2663"], "description": "It was discovered that libvorbis did not correctly handle certain malformed \nogg files. If a user were tricked into opening a specially crafted ogg file \nwith an application that uses libvorbis, an attacker could execute \narbitrary code with the user's privileges. (CVE-2009-2663)\n\nUSN-682-1 provided updated libvorbis packages to fix multiple security \nvulnerabilities. The upstream security patch to fix CVE-2008-1420 \nintroduced a regression when reading sound files encoded with libvorbis \n1.0beta1. This update corrects the problem.\n\nOriginal advisory details:\n\nIt was discovered that libvorbis did not correctly handle certain \nmalformed sound files. If a user were tricked into opening a specially \ncrafted sound file with an application that uses libvorbis, an attacker \ncould execute arbitrary code with the user's privileges. (CVE-2008-1420)", "edition": 5, "modified": "2009-08-24T00:00:00", "published": "2009-08-24T00:00:00", "id": "USN-825-1", "href": "https://ubuntu.com/security/notices/USN-825-1", "title": "libvorbis vulnerability", "type": "ubuntu", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "securityvulns": [{"lastseen": "2018-08-31T11:10:31", "bulletinFamily": "software", "cvelist": ["CVE-2009-2654"], "description": "Mozilla Foundation Security Advisory 2009-44\r\n\r\nTitle: Location bar and SSL indicator spoofing via window.open() on invalid URL\r\nImpact: Moderate\r\nAnnounced: August 3, 2009\r\nReporter: Juan Pablo Lopez Yacubian\r\nProducts: Firefox\r\n\r\nFixed in: Firefox 3.5.2\r\n Firefox 3.0.13\r\nDescription\r\n\r\nSecurity researcher Juan Pablo Lopez Yacubian reported that an attacker could call window.open() on an invalid URL which looks similar to a legitimate URL and then use document.write() to place content within the new document, appearing to have come from the spoofed location. Additionally, if the spoofed document was created by a document with a valid SSL certificate, the SSL indicators would be carried over into the spoofed document. An attacker could use these issues to display misleading location and SSL information for a malicious web page.\r\nReferences\r\n\r\n * https://bugzilla.mozilla.org/show_bug.cgi?id=451898\r\n * CVE-2009-2654\r\n", "edition": 1, "modified": "2009-08-07T00:00:00", "published": "2009-08-07T00:00:00", "id": "SECURITYVULNS:DOC:22256", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:22256", "title": "Mozilla Foundation Security Advisory 2009-44", "type": "securityvulns", "cvss": {"score": 5.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-08-31T11:10:31", "bulletinFamily": "software", "cvelist": ["CVE-2008-1420", "CVE-2009-2663"], "description": "===========================================================\r\nUbuntu Security Notice USN-825-1 August 24, 2009\r\nlibvorbis vulnerability\r\nCVE-2008-1420, CVE-2009-2663\r\n===========================================================\r\n\r\nA security issue affects the following Ubuntu releases:\r\n\r\nUbuntu 8.04 LTS\r\nUbuntu 8.10\r\nUbuntu 9.04\r\n\r\nThis advisory also applies to the corresponding versions of\r\nKubuntu, Edubuntu, and Xubuntu.\r\n\r\nThe problem can be corrected by upgrading your system to the\r\nfollowing package versions:\r\n\r\nUbuntu 8.04 LTS:\r\n libvorbis0a 1.2.0.dfsg-2ubuntu0.2\r\n\r\nUbuntu 8.10:\r\n libvorbis0a 1.2.0.dfsg-3.1ubuntu0.8.10.1\r\n\r\nUbuntu 9.04:\r\n libvorbis0a 1.2.0.dfsg-3.1ubuntu0.9.04.1\r\n\r\nAfter a standard system upgrade you need to restart any applications that\r\nuse libvorbis, such as Totem and gtkpod, to effect the necessary changes.\r\n\r\nDetails follow:\r\n\r\nIt was discovered that libvorbis did not correctly handle certain malformed\r\nogg files. If a user were tricked into opening a specially crafted ogg file\r\nwith an application that uses libvorbis, an attacker could execute\r\narbitrary code with the user's privileges. (CVE-2009-2663)\r\n\r\nUSN-682-1 provided updated libvorbis packages to fix multiple security\r\nvulnerabilities. The upstream security patch to fix CVE-2008-1420\r\nintroduced a regression when reading sound files encoded with libvorbis\r\n1.0beta1. This update corrects the problem.\r\n\r\nOriginal advisory details:\r\n\r\n It was discovered that libvorbis did not correctly handle certain\r\n malformed sound files. If a user were tricked into opening a specially\r\n crafted sound file with an application that uses libvorbis, an attacker\r\n could execute arbitrary code with the user's privileges. (CVE-2008-1420)\r\n\r\n\r\nUpdated packages for Ubuntu 8.04 LTS:\r\n\r\n Source archives:\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/libv/libvorbis/libvorbis_1.2.0.dfsg-2ubuntu0.2.diff.gz\r\n Size/MD5: 7638 5ef4a460b5fd50930d7fff2a3ae16525\r\n http://security.ubuntu.com/ubuntu/pool/main/libv/libvorbis/libvorbis_1.2.0.dfsg-2ubuntu0.2.dsc\r\n Size/MD5: 936 d8ad7ba3c0193a2f3316bdc5fd1d5e3a\r\n http://security.ubuntu.com/ubuntu/pool/main/libv/libvorbis/libvorbis_1.2.0.dfsg.orig.tar.gz\r\n Size/MD5: 1477935 3c7fff70c0989ab3c1c85366bf670818\r\n\r\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/libv/libvorbis/libvorbis-dev_1.2.0.dfsg-2ubuntu0.2_amd64.deb\r\n Size/MD5: 475166 de6d259598243961b3c5182c94100f1b\r\n http://security.ubuntu.com/ubuntu/pool/main/libv/libvorbis/libvorbis0a_1.2.0.dfsg-2ubuntu0.2_amd64.deb\r\n Size/MD5: 103952 88f017ca397bc19027405bc68a5289ce\r\n http://security.ubuntu.com/ubuntu/pool/main/libv/libvorbis/libvorbisenc2_1.2.0.dfsg-2ubuntu0.2_amd64.deb\r\n Size/MD5: 94498 76e594149cea4b564987e11dbafec73a\r\n http://security.ubuntu.com/ubuntu/pool/main/libv/libvorbis/libvorbisfile3_1.2.0.dfsg-2ubuntu0.2_amd64.deb\r\n Size/MD5: 19140 538a4089efae6cdfc04566fc58b42891\r\n\r\n i386 architecture (x86 compatible Intel/AMD):\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/libv/libvorbis/libvorbis-dev_1.2.0.dfsg-2ubuntu0.2_i386.deb\r\n Size/MD5: 455682 de7271e005d596055ae7fa9b1b4bc62b\r\n http://security.ubuntu.com/ubuntu/pool/main/libv/libvorbis/libvorbis0a_1.2.0.dfsg-2ubuntu0.2_i386.deb\r\n Size/MD5: 98852 bd8fa74c395c206003e6e91aadf6deeb\r\n http://security.ubuntu.com/ubuntu/pool/main/libv/libvorbis/libvorbisenc2_1.2.0.dfsg-2ubuntu0.2_i386.deb\r\n Size/MD5: 76234 8504521d4e73b31a0a6c609ab774e8ce\r\n http://security.ubuntu.com/ubuntu/pool/main/libv/libvorbis/libvorbisfile3_1.2.0.dfsg-2ubuntu0.2_i386.deb\r\n Size/MD5: 19986 98e7e407c4b79bd621fa30d2b84f9b2c\r\n\r\n lpia architecture (Low Power Intel Architecture):\r\n\r\n http://ports.ubuntu.com/pool/main/libv/libvorbis/libvorbis-dev_1.2.0.dfsg-2ubuntu0.2_lpia.deb\r\n Size/MD5: 457660 14ed971b555ea3670d5dd42f611620ce\r\n http://ports.ubuntu.com/pool/main/libv/libvorbis/libvorbis0a_1.2.0.dfsg-2ubuntu0.2_lpia.deb\r\n Size/MD5: 99468 07e87d8d7af71050d53166ced47504fe\r\n http://ports.ubuntu.com/pool/main/libv/libvorbis/libvorbisenc2_1.2.0.dfsg-2ubuntu0.2_lpia.deb\r\n Size/MD5: 76374 6c8d29103543fb88fd1a062f1bfe5b0d\r\n http://ports.ubuntu.com/pool/main/libv/libvorbis/libvorbisfile3_1.2.0.dfsg-2ubuntu0.2_lpia.deb\r\n Size/MD5: 19988 34bea1bc33491a9f6fc23cfbbe2e6fdd\r\n\r\n powerpc architecture (Apple Macintosh G3/G4/G5):\r\n\r\n http://ports.ubuntu.com/pool/main/libv/libvorbis/libvorbis-dev_1.2.0.dfsg-2ubuntu0.2_powerpc.deb\r\n Size/MD5: 484518 642acb42cf899742df77c023f611a5c3\r\n http://ports.ubuntu.com/pool/main/libv/libvorbis/libvorbis0a_1.2.0.dfsg-2ubuntu0.2_powerpc.deb\r\n Size/MD5: 108862 1b97fcc0cf8d5d761f4527ceec4ae6c5\r\n http://ports.ubuntu.com/pool/main/libv/libvorbis/libvorbisenc2_1.2.0.dfsg-2ubuntu0.2_powerpc.deb\r\n Size/MD5: 83746 b063ec251329025e942c2957c7bec973\r\n http://ports.ubuntu.com/pool/main/libv/libvorbis/libvorbisfile3_1.2.0.dfsg-2ubuntu0.2_powerpc.deb\r\n Size/MD5: 23846 9ea8d0f1d7e2feda361483667ee8c98b\r\n\r\n sparc architecture (Sun SPARC/UltraSPARC):\r\n\r\n http://ports.ubuntu.com/pool/main/libv/libvorbis/libvorbis-dev_1.2.0.dfsg-2ubuntu0.2_sparc.deb\r\n Size/MD5: 462056 23faf950e87cdc4ca8afbb7e0ebf8efb\r\n http://ports.ubuntu.com/pool/main/libv/libvorbis/libvorbis0a_1.2.0.dfsg-2ubuntu0.2_sparc.deb\r\n Size/MD5: 99760 70afdb67c094d2f0335d6b0fc8613e39\r\n http://ports.ubuntu.com/pool/main/libv/libvorbis/libvorbisenc2_1.2.0.dfsg-2ubuntu0.2_sparc.deb\r\n Size/MD5: 80730 e90392526ecb5627c47d0a0d7b0712c5\r\n http://ports.ubuntu.com/pool/main/libv/libvorbis/libvorbisfile3_1.2.0.dfsg-2ubuntu0.2_sparc.deb\r\n Size/MD5: 19260 3cb72f75781984eb6d348f09e4892dea\r\n\r\nUpdated packages for Ubuntu 8.10:\r\n\r\n Source archives:\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/libv/libvorbis/libvorbis_1.2.0.dfsg-3.1ubuntu0.8.10.1.diff.gz\r\n Size/MD5: 8801 f3917fc3cf6a8e35febf6b334cda2cdf\r\n http://security.ubuntu.com/ubuntu/pool/main/libv/libvorbis/libvorbis_1.2.0.dfsg-3.1ubuntu0.8.10.1.dsc\r\n Size/MD5: 1388 4ba46a758620e3fe5d938cfe97ed038f\r\n http://security.ubuntu.com/ubuntu/pool/main/libv/libvorbis/libvorbis_1.2.0.dfsg.orig.tar.gz\r\n Size/MD5: 1477935 3c7fff70c0989ab3c1c85366bf670818\r\n\r\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/libv/libvorbis/libvorbis-dev_1.2.0.dfsg-3.1ubuntu0.8.10.1_amd64.deb\r\n Size/MD5: 479182 1eeb2b5e550c6f815c33324df5554f76\r\n http://security.ubuntu.com/ubuntu/pool/main/libv/libvorbis/libvorbis0a_1.2.0.dfsg-3.1ubuntu0.8.10.1_amd64.deb\r\n Size/MD5: 108578 e960e8b794da2927d930f1cf4334ec23\r\n http://security.ubuntu.com/ubuntu/pool/main/libv/libvorbis/libvorbisenc2_1.2.0.dfsg-3.1ubuntu0.8.10.1_amd64.deb\r\n Size/MD5: 95710 84bbe4ccb1f4b302c0710c2c86f5b89a\r\n http://security.ubuntu.com/ubuntu/pool/main/libv/libvorbis/libvorbisfile3_1.2.0.dfsg-3.1ubuntu0.8.10.1_amd64.deb\r\n Size/MD5: 20338 34698dc57acb94faa3464a9f0b5d2c50\r\n\r\n i386 architecture (x86 compatible Intel/AMD):\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/libv/libvorbis/libvorbis-dev_1.2.0.dfsg-3.1ubuntu0.8.10.1_i386.deb\r\n Size/MD5: 459476 9281d6ab6f50761dff11d81a8579a884\r\n http://security.ubuntu.com/ubuntu/pool/main/libv/libvorbis/libvorbis0a_1.2.0.dfsg-3.1ubuntu0.8.10.1_i386.deb\r\n Size/MD5: 101988 77988363a0bf4a683b941cae203e6e5e\r\n http://security.ubuntu.com/ubuntu/pool/main/libv/libvorbis/libvorbisenc2_1.2.0.dfsg-3.1ubuntu0.8.10.1_i386.deb\r\n Size/MD5: 77430 430623540170ef59f74808456daecd5f\r\n http://security.ubuntu.com/ubuntu/pool/main/libv/libvorbis/libvorbisfile3_1.2.0.dfsg-3.1ubuntu0.8.10.1_i386.deb\r\n Size/MD5: 21394 f46e5ee13b6c7c8adebad46f274caa43\r\n\r\n lpia architecture (Low Power Intel Architecture):\r\n\r\n http://ports.ubuntu.com/pool/main/libv/libvorbis/libvorbis-dev_1.2.0.dfsg-3.1ubuntu0.8.10.1_lpia.deb\r\n Size/MD5: 461190 ef1e6948c399b4b4d34b4993ca1a0fd8\r\n http://ports.ubuntu.com/pool/main/libv/libvorbis/libvorbis0a_1.2.0.dfsg-3.1ubuntu0.8.10.1_lpia.deb\r\n Size/MD5: 102700 685a266d67332245778e49e208ab60eb\r\n http://ports.ubuntu.com/pool/main/libv/libvorbis/libvorbisenc2_1.2.0.dfsg-3.1ubuntu0.8.10.1_lpia.deb\r\n Size/MD5: 77588 266965c986c24dc8acbf9f0ecee6121e\r\n http://ports.ubuntu.com/pool/main/libv/libvorbis/libvorbisfile3_1.2.0.dfsg-3.1ubuntu0.8.10.1_lpia.deb\r\n Size/MD5: 21222 4df718e05f80a23ebb5accc4a627933f\r\n\r\n powerpc architecture (Apple Macintosh G3/G4/G5):\r\n\r\n http://ports.ubuntu.com/pool/main/libv/libvorbis/libvorbis-dev_1.2.0.dfsg-3.1ubuntu0.8.10.1_powerpc.deb\r\n Size/MD5: 490558 ffe86da6864c8d83c7f7b5931c9ef0e4\r\n http://ports.ubuntu.com/pool/main/libv/libvorbis/libvorbis0a_1.2.0.dfsg-3.1ubuntu0.8.10.1_powerpc.deb\r\n Size/MD5: 114702 b8e2d3ab8557085c3c834ae57ca68490\r\n http://ports.ubuntu.com/pool/main/libv/libvorbis/libvorbisenc2_1.2.0.dfsg-3.1ubuntu0.8.10.1_powerpc.deb\r\n Size/MD5: 85080 d1d00cca1f654d523fa6a6f054a89df8\r\n http://ports.ubuntu.com/pool/main/libv/libvorbis/libvorbisfile3_1.2.0.dfsg-3.1ubuntu0.8.10.1_powerpc.deb\r\n Size/MD5: 25152 ea2c19f249936b64a5110b2330394533\r\n\r\n sparc architecture (Sun SPARC/UltraSPARC):\r\n\r\n http://ports.ubuntu.com/pool/main/libv/libvorbis/libvorbis-dev_1.2.0.dfsg-3.1ubuntu0.8.10.1_sparc.deb\r\n Size/MD5: 465326 78eaf19b4bb88f020a41699894f1d502\r\n http://ports.ubuntu.com/pool/main/libv/libvorbis/libvorbis0a_1.2.0.dfsg-3.1ubuntu0.8.10.1_sparc.deb\r\n Size/MD5: 104264 4a602b8bebfb44f3cfa7add1187af42a\r\n http://ports.ubuntu.com/pool/main/libv/libvorbis/libvorbisenc2_1.2.0.dfsg-3.1ubuntu0.8.10.1_sparc.deb\r\n Size/MD5: 82016 4ed85df7024e4b2d9826a8191b3cf112\r\n http://ports.ubuntu.com/pool/main/libv/libvorbis/libvorbisfile3_1.2.0.dfsg-3.1ubuntu0.8.10.1_sparc.deb\r\n Size/MD5: 20786 d7b24c2778ce94510823f86fd94d1e04\r\n\r\nUpdated packages for Ubuntu 9.04:\r\n\r\n Source archives:\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/libv/libvorbis/libvorbis_1.2.0.dfsg-3.1ubuntu0.9.04.1.diff.gz\r\n Size/MD5: 8809 9a4601ba8d5ef852360032dc4f28135b\r\n http://security.ubuntu.com/ubuntu/pool/main/libv/libvorbis/libvorbis_1.2.0.dfsg-3.1ubuntu0.9.04.1.dsc\r\n Size/MD5: 1388 7bf6c7ee35a1ca2b0d4b25e8188585b5\r\n http://security.ubuntu.com/ubuntu/pool/main/libv/libvorbis/libvorbis_1.2.0.dfsg.orig.tar.gz\r\n Size/MD5: 1477935 3c7fff70c0989ab3c1c85366bf670818\r\n\r\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/libv/libvorbis/libvorbis-dev_1.2.0.dfsg-3.1ubuntu0.9.04.1_amd64.deb\r\n Size/MD5: 479242 f585f7e7ae50de3569efc48dfed2dd55\r\n http://security.ubuntu.com/ubuntu/pool/main/libv/libvorbis/libvorbis0a_1.2.0.dfsg-3.1ubuntu0.9.04.1_amd64.deb\r\n Size/MD5: 108562 3ba8aada28f378b9776e0c8305e271fc\r\n http://security.ubuntu.com/ubuntu/pool/main/libv/libvorbis/libvorbisenc2_1.2.0.dfsg-3.1ubuntu0.9.04.1_amd64.deb\r\n Size/MD5: 95702 68add631494d9a565d58a8b22a5f9bf0\r\n http://security.ubuntu.com/ubuntu/pool/main/libv/libvorbis/libvorbisfile3_1.2.0.dfsg-3.1ubuntu0.9.04.1_amd64.deb\r\n Size/MD5: 20328 da6cc0a70f79cfa253445d563ee5c250\r\n\r\n i386 architecture (x86 compatible Intel/AMD):\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/libv/libvorbis/libvorbis-dev_1.2.0.dfsg-3.1ubuntu0.9.04.1_i386.deb\r\n Size/MD5: 459624 8e285a17020f6b93dc375af4f8284920\r\n http://security.ubuntu.com/ubuntu/pool/main/libv/libvorbis/libvorbis0a_1.2.0.dfsg-3.1ubuntu0.9.04.1_i386.deb\r\n Size/MD5: 102166 6148fa7ea86461915751f0dba2ef00c6\r\n http://security.ubuntu.com/ubuntu/pool/main/libv/libvorbis/libvorbisenc2_1.2.0.dfsg-3.1ubuntu0.9.04.1_i386.deb\r\n Size/MD5: 77442 505253f72260e8f365ce68d947acab36\r\n http://security.ubuntu.com/ubuntu/pool/main/libv/libvorbis/libvorbisfile3_1.2.0.dfsg-3.1ubuntu0.9.04.1_i386.deb\r\n Size/MD5: 21392 fee6650bfc4b4463a5a71e3dd12528bf\r\n\r\n lpia architecture (Low Power Intel Architecture):\r\n\r\n http://ports.ubuntu.com/pool/main/libv/libvorbis/libvorbis-dev_1.2.0.dfsg-3.1ubuntu0.9.04.1_lpia.deb\r\n Size/MD5: 461294 24968b96a1ddafaef908011c82a6b9ee\r\n http://ports.ubuntu.com/pool/main/libv/libvorbis/libvorbis0a_1.2.0.dfsg-3.1ubuntu0.9.04.1_lpia.deb\r\n Size/MD5: 102760 30ee010aefe3420151f6ace2e4a92b2b\r\n http://ports.ubuntu.com/pool/main/libv/libvorbis/libvorbisenc2_1.2.0.dfsg-3.1ubuntu0.9.04.1_lpia.deb\r\n Size/MD5: 77590 b6c9b556dfb4eae270f45fd1e9670700\r\n http://ports.ubuntu.com/pool/main/libv/libvorbis/libvorbisfile3_1.2.0.dfsg-3.1ubuntu0.9.04.1_lpia.deb\r\n Size/MD5: 21216 791d88d0551b48a2f6af17612c4e096e\r\n\r\n powerpc architecture (Apple Macintosh G3/G4/G5):\r\n\r\n http://ports.ubuntu.com/pool/main/libv/libvorbis/libvorbis-dev_1.2.0.dfsg-3.1ubuntu0.9.04.1_powerpc.deb\r\n Size/MD5: 490584 dc808a4fd3fdabfb9a76a10ec23f6529\r\n http://ports.ubuntu.com/pool/main/libv/libvorbis/libvorbis0a_1.2.0.dfsg-3.1ubuntu0.9.04.1_powerpc.deb\r\n Size/MD5: 114712 cdfdd11b2c932cb2a017c27d1001fbc1\r\n http://ports.ubuntu.com/pool/main/libv/libvorbis/libvorbisenc2_1.2.0.dfsg-3.1ubuntu0.9.04.1_powerpc.deb\r\n Size/MD5: 85096 6cb5a1202e3db005ce69d7f2e0f8813c\r\n http://ports.ubuntu.com/pool/main/libv/libvorbis/libvorbisfile3_1.2.0.dfsg-3.1ubuntu0.9.04.1_powerpc.deb\r\n Size/MD5: 25156 9ddf20413d09f546d061b3a0b093ad1e\r\n\r\n sparc architecture (Sun SPARC/UltraSPARC):\r\n\r\n http://ports.ubuntu.com/pool/main/libv/libvorbis/libvorbis-dev_1.2.0.dfsg-3.1ubuntu0.9.04.1_sparc.deb\r\n Size/MD5: 465382 4de8bfe56cdcbf0490c2a69de7bca0e9\r\n http://ports.ubuntu.com/pool/main/libv/libvorbis/libvorbis0a_1.2.0.dfsg-3.1ubuntu0.9.04.1_sparc.deb\r\n Size/MD5: 104286 6a238cd48456d2bd4b1b6dad87a0b506\r\n http://ports.ubuntu.com/pool/main/libv/libvorbis/libvorbisenc2_1.2.0.dfsg-3.1ubuntu0.9.04.1_sparc.deb\r\n Size/MD5: 81958 ce25c1cc928142e84a20c8f37caecf52\r\n http://ports.ubuntu.com/pool/main/libv/libvorbis/libvorbisfile3_1.2.0.dfsg-3.1ubuntu0.9.04.1_sparc.deb\r\n Size/MD5: 20758 976ef82da1d5cb2de170dc5dcf4532b9\r\n\r\n\r\n", "edition": 1, "modified": "2009-08-25T00:00:00", "published": "2009-08-25T00:00:00", "id": "SECURITYVULNS:DOC:22365", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:22365", "title": "[USN-825-1] libvorbis vulnerability", "type": "securityvulns", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:09:29", "bulletinFamily": "software", "cvelist": ["CVE-2008-1420", "CVE-2008-1419", "CVE-2009-2663", "CVE-2008-1423"], "description": "Multiple integer overflows and denial of service.", "edition": 1, "modified": "2009-08-25T00:00:00", "published": "2009-08-25T00:00:00", "id": "SECURITYVULNS:VULN:9045", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:9045", "title": "libvorbis multiple security vulnerabilities", "type": "securityvulns", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:09:33", "bulletinFamily": "software", "cvelist": ["CVE-2009-2470", "CVE-2009-2408", "CVE-2009-2654", "CVE-2009-2404"], "description": "Certificate spoofing, buffer overflow, code execution.", "edition": 1, "modified": "2009-08-07T00:00:00", "published": "2009-08-07T00:00:00", "id": "SECURITYVULNS:VULN:10121", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:10121", "title": "Mozilla Firefox, Thunderbird, SeaMonkey, NSS multiple security vulnerabilities", "type": "securityvulns", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}]}