Lucene search

K
openvasCopyright (C) 2011 Greenbone AGOPENVAS:1361412562310801885
HistoryMay 18, 2011 - 12:00 a.m.

Mozilla Products Multiple Vulnerabilities - 02 - (May 2011) - Windows

2011-05-1800:00:00
Copyright (C) 2011 Greenbone AG
plugins.openvas.org
13

9.8 High

AI Score

Confidence

High

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.598 Medium

EPSS

Percentile

97.7%

Mozilla Firefox, Seamonkey or Thunderbird is prone to multiple vulnerabilities.

# SPDX-FileCopyrightText: 2011 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.801885");
  script_version("2024-02-26T14:36:40+0000");
  script_tag(name:"last_modification", value:"2024-02-26 14:36:40 +0000 (Mon, 26 Feb 2024)");
  script_tag(name:"creation_date", value:"2011-05-18 15:37:30 +0200 (Wed, 18 May 2011)");
  script_cve_id("CVE-2011-0071", "CVE-2011-0072", "CVE-2011-0074",
                "CVE-2011-0075", "CVE-2011-0077", "CVE-2011-0078",
                "CVE-2011-0080");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_name("Mozilla Products Multiple Vulnerabilities - 02 - (May 2011) - Windows");

  script_xref(name:"URL", value:"http://secunia.com/advisories/44357/");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/47646");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/47647");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/47648");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/47651");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/47655");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/47666");
  script_xref(name:"URL", value:"http://www.vupen.com/english/advisories/2011/1127");
  script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2011/mfsa2011-12.html");

  script_tag(name:"qod_type", value:"registry");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2011 Greenbone AG");
  script_family("General");
  script_dependencies("gb_firefox_detect_portable_win.nasl", "gb_seamonkey_detect_win.nasl",
                      "gb_thunderbird_detect_portable_win.nasl");
  script_mandatory_keys("Mozilla/Firefox_or_Seamonkey_or_Thunderbird/Installed");
  script_tag(name:"impact", value:"Successful exploitation will allow remote attackers to obtain sensitive
  information or execute arbitrary code in the context of the user running the
  affected application.");
  script_tag(name:"affected", value:"SeaMonkey versions before 2.0.14.
  Thunderbird version before 3.1.10
  Mozilla Firefox versions 3.5.19 and 3.6.x before 3.6.17.");
  script_tag(name:"insight", value:"- An error in the implementation of the 'resource:' protocol can be exploited
    to perform directory traversal attacks and disclose sensitive information.

  - Multiple errors in the browser engine can be exploited to corrupt memory
    and potentially execute arbitrary code.");
  script_tag(name:"summary", value:"Mozilla Firefox, Seamonkey or Thunderbird is prone to multiple vulnerabilities.");
  script_tag(name:"solution", value:"Upgrade to Firefox version 3.5.19, 3.6.17, 4.0.1 or later,
  Upgrade to Seamonkey version 2.0.14 or later,
  Upgrade to Thunderbird version 3.1.10 or later.");

  script_tag(name:"solution_type", value:"VendorFix");

  exit(0);
}

include("version_func.inc");

vers = get_kb_item("Firefox/Win/Ver");
if(vers)
{
  if(version_is_less(version:vers, test_version:"3.5.19") ||
     version_in_range(version:vers, test_version:"3.6.0", test_version2:"3.6.16"))
  {
    security_message( port: 0, data: "The target host was found to be vulnerable" );
    exit(0);
  }
}

smVer = get_kb_item("Seamonkey/Win/Ver");
if(smVer != NULL)
{
  if(version_is_less(version:smVer, test_version:"2.0.14"))
  {
    security_message( port: 0, data: "The target host was found to be vulnerable" );
    exit(0);
  }
}

vers = get_kb_item("Thunderbird/Win/Ver");
if(vers)
{
  if(version_is_less(version:vers, test_version:"3.1.10")){
    security_message( port: 0, data: "The target host was found to be vulnerable" );
  }
}

9.8 High

AI Score

Confidence

High

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.598 Medium

EPSS

Percentile

97.7%