Mozilla Firefox Security Updates(mfsa_2017-24_2017-25)-Windows
2017-11-16T00:00:00
ID OPENVAS:1361412562310811349 Type openvas Reporter Copyright (C) 2017 Greenbone Networks GmbH Modified 2019-07-17T00:00:00
Description
This host is installed with Mozilla Firefox
and is prone to multiple vulnerabilities.
###############################################################################
# OpenVAS Vulnerability Test
#
# Mozilla Firefox Security Updates(mfsa_2017-24_2017-25)-Windows
#
# Authors:
# Antu Sanadi <santu@secpod.com>
#
# Copyright:
# Copyright (C) 2017 Greenbone Networks GmbH, http://www.greenbone.net
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################
CPE = "cpe:/a:mozilla:firefox";
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.811349");
script_version("2019-07-17T11:14:11+0000");
script_cve_id("CVE-2017-7828", "CVE-2017-7830", "CVE-2017-7831", "CVE-2017-7832",
"CVE-2017-7833", "CVE-2017-7834", "CVE-2017-7835", "CVE-2017-7836",
"CVE-2017-7837", "CVE-2017-7838", "CVE-2017-7839", "CVE-2017-7840",
"CVE-2017-7842", "CVE-2017-7827", "CVE-2017-7826");
script_bugtraq_id(101832);
script_tag(name:"cvss_base", value:"10.0");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_tag(name:"last_modification", value:"2019-07-17 11:14:11 +0000 (Wed, 17 Jul 2019)");
script_tag(name:"creation_date", value:"2017-11-16 12:41:51 +0530 (Thu, 16 Nov 2017)");
script_name("Mozilla Firefox Security Updates(mfsa_2017-24_2017-25)-Windows");
script_tag(name:"summary", value:"This host is installed with Mozilla Firefox
and is prone to multiple vulnerabilities.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");
script_tag(name:"insight", value:"The multiple flaws exists due to,
- Use-after-free of PressShell while restyling layout.
- Cross-origin URL information leak through Resource Timing API.
- Information disclosure of exposed properties on JavaScript proxy objects.
- Domain spoofing through use of dotless character followed by accent markers.
- Domain spoofing with Arabic and Indic vowel marker characters.
- data: URLs opened in new tabs bypass CSP protections.
- Mixed content blocking incorrectly applies with redirects.
- Pingsender dynamically loads libcurl on Linux and OS X.
- SVG loaded can use meta tags to set cookies.
- Failure of individual decoding of labels in international domain names triggers
punycode display of entire IDN.
- Control characters before javascript: URLs defeats self-XSS prevention mechanism.
- Exported bookmarks do not strip script elements from user-supplied tags.
- Referrer Policy is not always respected for elements.
- Memory safety bugs fixed in Firefox 57.");
script_tag(name:"impact", value:"Successful exploitation will allow remote
to execute arbitrary code, bypass security restrictions, perform unauthorized
actions, and obtain sensitive information. Failed exploit attempts will likely
result in denial-of-service conditions.");
script_tag(name:"affected", value:"Mozilla Firefox version before 57.0 on Windows.");
script_tag(name:"solution", value:"Upgrade to Mozilla Firefox version 57.0 or later.");
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"qod_type", value:"registry");
script_xref(name:"URL", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2017-24/");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2017 Greenbone Networks GmbH");
script_family("General");
script_dependencies("gb_firefox_detect_portable_win.nasl");
script_mandatory_keys("Firefox/Win/Ver");
exit(0);
}
include("host_details.inc");
include("version_func.inc");
if(!infos = get_app_version_and_location(cpe:CPE, exit_no_version:TRUE)) exit(0);
ffVer = infos['version'];
ffPath = infos['location'];
if(version_is_less(version:ffVer, test_version:"57.0"))
{
report = report_fixed_ver(installed_version:ffVer, fixed_version:"57.0", install_path:ffPath);
security_message(data:report);
exit(0);
}
exit(99);
{"id": "OPENVAS:1361412562310811349", "type": "openvas", "bulletinFamily": "scanner", "title": "Mozilla Firefox Security Updates(mfsa_2017-24_2017-25)-Windows", "description": "This host is installed with Mozilla Firefox\n and is prone to multiple vulnerabilities.", "published": "2017-11-16T00:00:00", "modified": "2019-07-17T00:00:00", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310811349", "reporter": "Copyright (C) 2017 Greenbone Networks GmbH", "references": ["https://www.mozilla.org/en-US/security/advisories/mfsa2017-24/"], "cvelist": ["CVE-2017-7833", "CVE-2017-7827", "CVE-2017-7828", "CVE-2017-7838", "CVE-2017-7836", "CVE-2017-7842", "CVE-2017-7831", "CVE-2017-7832", "CVE-2017-7839", "CVE-2017-7840", "CVE-2017-7835", "CVE-2017-7834", "CVE-2017-7837", "CVE-2017-7830", "CVE-2017-7826"], "lastseen": "2019-07-19T22:10:34", "viewCount": 2, "enchantments": {"dependencies": {"references": [{"type": "archlinux", "idList": ["ASA-201711-43", "ASA-201711-23"]}, {"type": "nessus", "idList": ["MACOSX_FIREFOX_57_0.NASL", "UBUNTU_USN-3477-3.NASL", "FREEBSD_PKG_6056BF68F5704E70B740B9F606971283.NASL", "MOZILLA_FIREFOX_52_5_ESR.NASL", "FREEBSD_PKG_F78EAC48C3D146668DE563CEEA25A578.NASL", "UBUNTU_USN-3477-2.NASL", "UBUNTU_USN-3477-1.NASL", "UBUNTU_USN-3477-4.NASL", "MACOSX_FIREFOX_52_5_ESR.NASL", "MOZILLA_FIREFOX_57_0.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310811351", "OPENVAS:1361412562310843390", "OPENVAS:1361412562310882809", "OPENVAS:1361412562310843365", "OPENVAS:1361412562310811352", "OPENVAS:1361412562310812500", "OPENVAS:1361412562310843404", "OPENVAS:1361412562311220171299", "OPENVAS:1361412562310811350", "OPENVAS:1361412562310843383"]}, {"type": "freebsd", "idList": ["F78EAC48-C3D1-4666-8DE5-63CEEA25A578", "6056BF68-F570-4E70-B740-B9F606971283"]}, {"type": "ubuntu", "idList": ["USN-3477-4", "USN-3477-1", "USN-3477-3", "USN-3477-2", "USN-3490-1"]}, {"type": "kaspersky", "idList": ["KLA11135", "KLA11145"]}, {"type": "cve", "idList": ["CVE-2017-7836", "CVE-2017-7832", "CVE-2017-7839", "CVE-2017-7837", "CVE-2017-7834", "CVE-2017-7840", "CVE-2017-7842", "CVE-2017-7838", "CVE-2017-7827", "CVE-2017-7831"]}, {"type": "redhat", "idList": ["RHSA-2017:3247", "RHSA-2017:3372"]}, {"type": "debian", "idList": ["DEBIAN:DSA-4061-1:2184B", "DEBIAN:DLA-1199-1:52DC8", "DEBIAN:DLA-1172-1:AA085", "DEBIAN:DSA-4035-1:DDCB9", "DEBIAN:DSA-4075-1:6639D"]}, {"type": "centos", "idList": ["CESA-2017:3247", "CESA-2017:3372"]}, {"type": "oraclelinux", "idList": ["ELSA-2017-3372", "ELSA-2017-3247"]}, {"type": "suse", "idList": ["OPENSUSE-SU-2017:3027-1", "SUSE-SU-2017:3233-1", "SUSE-SU-2017:3213-1"]}, {"type": "apple", "idList": ["APPLE:HT208474", "APPLE:HT208473"]}], "modified": "2019-07-19T22:10:34", "rev": 2}, "score": {"value": 8.4, "vector": "NONE", "modified": "2019-07-19T22:10:34", "rev": 2}, "vulnersScore": 8.4}, "pluginID": "1361412562310811349", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mozilla Firefox Security Updates(mfsa_2017-24_2017-25)-Windows\n#\n# Authors:\n# Antu Sanadi <santu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2017 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:mozilla:firefox\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.811349\");\n script_version(\"2019-07-17T11:14:11+0000\");\n script_cve_id(\"CVE-2017-7828\", \"CVE-2017-7830\", \"CVE-2017-7831\", \"CVE-2017-7832\",\n\t\t\"CVE-2017-7833\", \"CVE-2017-7834\", \"CVE-2017-7835\", \"CVE-2017-7836\",\n\t\t\"CVE-2017-7837\", \"CVE-2017-7838\", \"CVE-2017-7839\", \"CVE-2017-7840\",\n\t\t\"CVE-2017-7842\", \"CVE-2017-7827\", \"CVE-2017-7826\");\n script_bugtraq_id(101832);\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-07-17 11:14:11 +0000 (Wed, 17 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2017-11-16 12:41:51 +0530 (Thu, 16 Nov 2017)\");\n script_name(\"Mozilla Firefox Security Updates(mfsa_2017-24_2017-25)-Windows\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Mozilla Firefox\n and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The multiple flaws exists due to,\n\n - Use-after-free of PressShell while restyling layout.\n\n - Cross-origin URL information leak through Resource Timing API.\n\n - Information disclosure of exposed properties on JavaScript proxy objects.\n\n - Domain spoofing through use of dotless character followed by accent markers.\n\n - Domain spoofing with Arabic and Indic vowel marker characters.\n\n - data: URLs opened in new tabs bypass CSP protections.\n\n - Mixed content blocking incorrectly applies with redirects.\n\n - Pingsender dynamically loads libcurl on Linux and OS X.\n\n - SVG loaded can use meta tags to set cookies.\n\n - Failure of individual decoding of labels in international domain names triggers\n punycode display of entire IDN.\n\n - Control characters before javascript: URLs defeats self-XSS prevention mechanism.\n\n - Exported bookmarks do not strip script elements from user-supplied tags.\n\n - Referrer Policy is not always respected for elements.\n\n - Memory safety bugs fixed in Firefox 57.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote\n to execute arbitrary code, bypass security restrictions, perform unauthorized\n actions, and obtain sensitive information. Failed exploit attempts will likely\n result in denial-of-service conditions.\");\n\n script_tag(name:\"affected\", value:\"Mozilla Firefox version before 57.0 on Windows.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Mozilla Firefox version 57.0 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"registry\");\n script_xref(name:\"URL\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2017-24/\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_firefox_detect_portable_win.nasl\");\n script_mandatory_keys(\"Firefox/Win/Ver\");\n\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!infos = get_app_version_and_location(cpe:CPE, exit_no_version:TRUE)) exit(0);\nffVer = infos['version'];\nffPath = infos['location'];\n\nif(version_is_less(version:ffVer, test_version:\"57.0\"))\n{\n report = report_fixed_ver(installed_version:ffVer, fixed_version:\"57.0\", install_path:ffPath);\n security_message(data:report);\n exit(0);\n}\n\nexit(99);", "naslFamily": "General", "immutableFields": []}
{"openvas": [{"lastseen": "2019-07-19T22:10:30", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-7833", "CVE-2017-7827", "CVE-2017-7828", "CVE-2017-7838", "CVE-2017-7836", "CVE-2017-7842", "CVE-2017-7831", "CVE-2017-7832", "CVE-2017-7839", "CVE-2017-7840", "CVE-2017-7835", "CVE-2017-7834", "CVE-2017-7837", "CVE-2017-7830", "CVE-2017-7826"], "description": "This host is installed with Mozilla Firefox\n and is prone to multiple vulnerabilities.", "modified": "2019-07-17T00:00:00", "published": "2017-11-16T00:00:00", "id": "OPENVAS:1361412562310811350", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310811350", "type": "openvas", "title": "Mozilla Firefox Security Updates(mfsa_2017-24_2017-25)-MAC OS X", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mozilla Firefox Security Updates(mfsa_2017-24_2017-25)-MAC OS X\n#\n# Authors:\n# Antu Sanadi <santu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2017 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:mozilla:firefox\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.811350\");\n script_version(\"2019-07-17T11:14:11+0000\");\n script_cve_id(\"CVE-2017-7828\", \"CVE-2017-7830\", \"CVE-2017-7831\", \"CVE-2017-7832\",\n\t\t\"CVE-2017-7833\", \"CVE-2017-7834\", \"CVE-2017-7835\", \"CVE-2017-7836\",\n\t\t\"CVE-2017-7837\", \"CVE-2017-7838\", \"CVE-2017-7839\", \"CVE-2017-7840\",\n\t\t\"CVE-2017-7842\", \"CVE-2017-7827\", \"CVE-2017-7826\");\n script_bugtraq_id(101832);\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-07-17 11:14:11 +0000 (Wed, 17 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2017-11-16 12:42:13 +0530 (Thu, 16 Nov 2017)\");\n script_name(\"Mozilla Firefox Security Updates(mfsa_2017-24_2017-25)-MAC OS X\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Mozilla Firefox\n and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The multiple flaws exists due to,\n\n - Use-after-free of PressShell while restyling layout.\n\n - Cross-origin URL information leak through Resource Timing API.\n\n - Information disclosure of exposed properties on JavaScript proxy objects.\n\n - Domain spoofing through use of dotless character followed by accent markers.\n\n - Domain spoofing with Arabic and Indic vowel marker characters.\n\n - Data: URLs opened in new tabs bypass CSP protections.\n\n - Mixed content blocking incorrectly applies with redirects.\n\n - Pingsender dynamically loads libcurl on Linux and OS X.\n\n - SVG loaded as can use meta tags to set cookies.\n\n - Failure of individual decoding of labels in international domain names triggers punycode display of entire IDN.\n\n - Control characters before javascript: URLs defeats self-XSS prevention mechanism.\n\n - Exported bookmarks do not strip script elements from user-supplied tags.\n\n - Referrer Policy is not always respected for elements.\n\n - Memory safety bugs fixed in Firefox 57.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote\n to execute arbitrary code, bypass security restrictions, perform unauthorized\n actions, and obtain sensitive information. Failed exploit attempts will likely\n result in denial-of-service conditions.\");\n\n script_tag(name:\"affected\", value:\"Mozilla Firefox version before 57.0 on MAC OS X.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Mozilla Firefox version 57.0 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2017-24/\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_mozilla_prdts_detect_macosx.nasl\");\n script_mandatory_keys(\"Mozilla/Firefox/MacOSX/Version\");\n\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!infos = get_app_version_and_location(cpe:CPE, exit_no_version:TRUE)) exit(0);\nffVer = infos['version'];\nffPath = infos['location'];\n\nif(version_is_less(version:ffVer, test_version:\"57.0\"))\n{\n report = report_fixed_ver(installed_version:ffVer, fixed_version:\"57.0\", install_path:ffPath);\n security_message(data:report);\n exit(0);\n}\n\nexit(99);", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:34:51", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-7833", "CVE-2017-7827", "CVE-2017-7828", "CVE-2017-7838", "CVE-2017-7842", "CVE-2017-7831", "CVE-2017-7832", "CVE-2017-7839", "CVE-2017-7840", "CVE-2017-7835", "CVE-2017-7834", "CVE-2017-7837", "CVE-2017-7830", "CVE-2017-7826"], "description": "The remote host is missing an update for the ", "modified": "2019-03-13T00:00:00", "published": "2017-11-28T00:00:00", "id": "OPENVAS:1361412562310843383", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310843383", "type": "openvas", "title": "Ubuntu Update for firefox USN-3477-2", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_3477_2.nasl 14140 2019-03-13 12:26:09Z cfischer $\n#\n# Ubuntu Update for firefox USN-3477-2\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2017 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.843383\");\n script_version(\"$Revision: 14140 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-13 13:26:09 +0100 (Wed, 13 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2017-11-28 07:19:25 +0100 (Tue, 28 Nov 2017)\");\n script_cve_id(\"CVE-2017-7826\", \"CVE-2017-7827\", \"CVE-2017-7828\", \"CVE-2017-7830\",\n \"CVE-2017-7831\", \"CVE-2017-7832\", \"CVE-2017-7833\", \"CVE-2017-7834\",\n \"CVE-2017-7835\", \"CVE-2017-7837\", \"CVE-2017-7838\", \"CVE-2017-7842\",\n \"CVE-2017-7839\", \"CVE-2017-7840\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Ubuntu Update for firefox USN-3477-2\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'firefox'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"USN-3477-1 fixed vulnerabilities in Firefox.\n The update caused search suggestions to not be displayed when performing Google\n searches from the search bar. This update fixes the problem. We apologize for\n the inconvenience. Original advisory details: Multiple security issues were\n discovered in Firefox. If a user were tricked in to opening a specially crafted\n website, an attacker could potentially exploit these to cause a denial of\n service, read uninitialized memory, obtain sensitive information, bypass\n same-origin restrictions, bypass CSP protections, bypass mixed content blocking,\n spoof the addressbar, or execute arbitrary code. (CVE-2017-7826, CVE-2017-7827,\n CVE-2017-7828, CVE-2017-7830, CVE-2017-7831, CVE-2017-7832, CVE-2017-7833,\n CVE-2017-7834, CVE-2017-7835, CVE-2017-7837, CVE-2017-7838, CVE-2017-7842) It\n was discovered that javascript: URLs pasted in to the addressbar would be\n executed instead of being blocked in some circumstances. If a user were tricked\n in to copying a specially crafted URL in to the addressbar, an attacker could\n potentially exploit this to conduct cross-site scripting (XSS) attacks.\n (CVE-2017-7839) It was discovered that exported bookmarks do not strip script\n elements from user-supplied tags. If a user were tricked in to adding specially\n crafted tags to bookmarks, exporting them and then opening the resulting HTML\n file, an attacker could potentially exploit this to conduct cross-site scripting\n (XSS) attacks. (CVE-2017-7840)\");\n script_tag(name:\"affected\", value:\"firefox on Ubuntu 17.10,\n Ubuntu 17.04,\n Ubuntu 16.04 LTS,\n Ubuntu 14.04 LTS\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n\n script_xref(name:\"USN\", value:\"3477-2\");\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-3477-2/\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU(14\\.04 LTS|17\\.10|17\\.04|16\\.04 LTS)\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU14.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"firefox\", ver:\"57.0+build4-0ubuntu0.14.04.5\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU17.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"firefox\", ver:\"57.0+build4-0ubuntu0.17.10.6\", rls:\"UBUNTU17.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU17.04\")\n{\n\n if ((res = isdpkgvuln(pkg:\"firefox\", ver:\"57.0+build4-0ubuntu0.17.04.6\", rls:\"UBUNTU17.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU16.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"firefox\", ver:\"57.0+build4-0ubuntu0.16.04.6\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:33:19", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-7833", "CVE-2017-7827", "CVE-2017-7828", "CVE-2017-7838", "CVE-2017-7842", "CVE-2017-7831", "CVE-2017-7832", "CVE-2017-7839", "CVE-2017-7840", "CVE-2017-7835", "CVE-2017-7834", "CVE-2017-7837", "CVE-2017-7830", "CVE-2017-7826"], "description": "The remote host is missing an update for the ", "modified": "2019-03-13T00:00:00", "published": "2018-01-05T00:00:00", "id": "OPENVAS:1361412562310843404", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310843404", "type": "openvas", "title": "Ubuntu Update for firefox USN-3477-4", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_3477_4.nasl 14140 2019-03-13 12:26:09Z cfischer $\n#\n# Ubuntu Update for firefox USN-3477-4\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.843404\");\n script_version(\"$Revision: 14140 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-13 13:26:09 +0100 (Wed, 13 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2018-01-05 23:55:23 +0100 (Fri, 05 Jan 2018)\");\n script_cve_id(\"CVE-2017-7826\", \"CVE-2017-7827\", \"CVE-2017-7828\", \"CVE-2017-7830\",\n \"CVE-2017-7831\", \"CVE-2017-7832\", \"CVE-2017-7833\", \"CVE-2017-7834\",\n \"CVE-2017-7835\", \"CVE-2017-7837\", \"CVE-2017-7838\", \"CVE-2017-7842\",\n \"CVE-2017-7839\", \"CVE-2017-7840\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Ubuntu Update for firefox USN-3477-4\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'firefox'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"USN-3477-1 fixed vulnerabilities in Firefox.\n The update introduced a crash reporting issue where background tab crash reports\n were sent to Mozilla without user opt-in. This update fixes the problem. We\n apologize for the inconvenience. Original advisory details: Multiple security\n issues were discovered in Firefox. If a user were tricked in to opening a\n specially crafted website, an attacker could potentially exploit these to cause\n a denial of service, read uninitialized memory, obtain sensitive information,\n bypass same-origin restrictions, bypass CSP protections, bypass mixed content\n blocking, spoof the addressbar, or execute arbitrary code. (CVE-2017-7826,\n CVE-2017-7827, CVE-2017-7828, CVE-2017-7830, CVE-2017-7831, CVE-2017-7832,\n CVE-2017-7833, CVE-2017-7834, CVE-2017-7835, CVE-2017-7837, CVE-2017-7838,\n CVE-2017-7842) It was discovered that javascript: URLs pasted in to the\n addressbar would be executed instead of being blocked in some circumstances. If\n a user were tricked in to copying a specially crafted URL in to the addressbar,\n an attacker could potentially exploit this to conduct cross-site scripting (XSS)\n attacks. (CVE-2017-7839) It was discovered that exported bookmarks do not strip\n script elements from user-supplied tags. If a user were tricked in to adding\n specially crafted tags to bookmarks, exporting them and then opening the\n resulting HTML file, an attacker could potentially exploit this to conduct\n cross-site scripting (XSS) attacks. (CVE-2017-7840)\");\n script_tag(name:\"affected\", value:\"firefox on Ubuntu 17.10,\n Ubuntu 17.04,\n Ubuntu 16.04 LTS,\n Ubuntu 14.04 LTS\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n\n script_xref(name:\"USN\", value:\"3477-4\");\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-3477-4/\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU(14\\.04 LTS|17\\.10|17\\.04|16\\.04 LTS)\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU14.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"firefox\", ver:\"57.0.3+build1-0ubuntu0.14.04.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU17.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"firefox\", ver:\"57.0.3+build1-0ubuntu0.17.10.1\", rls:\"UBUNTU17.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU17.04\")\n{\n\n if ((res = isdpkgvuln(pkg:\"firefox\", ver:\"57.0.3+build1-0ubuntu0.17.04.1\", rls:\"UBUNTU17.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU16.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"firefox\", ver:\"57.0.3+build1-0ubuntu0.16.04.1\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:34:50", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-7833", "CVE-2017-7827", "CVE-2017-7828", "CVE-2017-7838", "CVE-2017-7842", "CVE-2017-7831", "CVE-2017-7832", "CVE-2017-7839", "CVE-2017-7840", "CVE-2017-7835", "CVE-2017-7834", "CVE-2017-7837", "CVE-2017-7830", "CVE-2017-7826"], "description": "The remote host is missing an update for the ", "modified": "2019-03-13T00:00:00", "published": "2017-11-18T00:00:00", "id": "OPENVAS:1361412562310843365", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310843365", "type": "openvas", "title": "Ubuntu Update for firefox USN-3477-1", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_3477_1.nasl 14140 2019-03-13 12:26:09Z cfischer $\n#\n# Ubuntu Update for firefox USN-3477-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2017 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.843365\");\n script_version(\"$Revision: 14140 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-13 13:26:09 +0100 (Wed, 13 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2017-11-18 07:32:50 +0100 (Sat, 18 Nov 2017)\");\n script_cve_id(\"CVE-2017-7826\", \"CVE-2017-7827\", \"CVE-2017-7828\", \"CVE-2017-7830\",\n \"CVE-2017-7831\", \"CVE-2017-7832\", \"CVE-2017-7833\", \"CVE-2017-7834\",\n \"CVE-2017-7835\", \"CVE-2017-7837\", \"CVE-2017-7838\", \"CVE-2017-7842\",\n \"CVE-2017-7839\", \"CVE-2017-7840\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Ubuntu Update for firefox USN-3477-1\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'firefox'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"Multiple security issues were discovered in\n Firefox. If a user were tricked in to opening a specially crafted website, an\n attacker could potentially exploit these to cause a denial of service, read\n uninitialized memory, obtain sensitive information, bypass same-origin\n restrictions, bypass CSP protections, bypass mixed content blocking, spoof the\n addressbar, or execute arbitrary code. (CVE-2017-7826, CVE-2017-7827,\n CVE-2017-7828, CVE-2017-7830, CVE-2017-7831, CVE-2017-7832, CVE-2017-7833,\n CVE-2017-7834, CVE-2017-7835, CVE-2017-7837, CVE-2017-7838, CVE-2017-7842) It\n was discovered that javascript: URLs pasted in to the addressbar would be\n executed instead of being blocked in some circumstances. If a user were tricked\n in to copying a specially crafted URL in to the addressbar, an attacker could\n potentially exploit this to conduct cross-site scripting (XSS) attacks.\n (CVE-2017-7839) It was discovered that exported bookmarks do not strip script\n elements from user-supplied tags. If a user were tricked in to adding specially\n crafted tags to bookmarks, exporting them and then opening the resulting HTML\n file, an attacker could potentially exploit this to conduct cross-site scripting\n (XSS) attacks. (CVE-2017-7840)\");\n script_tag(name:\"affected\", value:\"firefox on Ubuntu 17.10,\n Ubuntu 17.04,\n Ubuntu 16.04 LTS,\n Ubuntu 14.04 LTS\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n\n script_xref(name:\"USN\", value:\"3477-1\");\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-3477-1/\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU(14\\.04 LTS|17\\.10|17\\.04|16\\.04 LTS)\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU14.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"firefox\", ver:\"57.0+build4-0ubuntu0.14.04.4\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU17.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"firefox\", ver:\"57.0+build4-0ubuntu0.17.10.5\", rls:\"UBUNTU17.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU17.04\")\n{\n\n if ((res = isdpkgvuln(pkg:\"firefox\", ver:\"57.0+build4-0ubuntu0.17.04.5\", rls:\"UBUNTU17.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU16.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"firefox\", ver:\"57.0+build4-0ubuntu0.16.04.5\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:34:51", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-7833", "CVE-2017-7827", "CVE-2017-7828", "CVE-2017-7838", "CVE-2017-7842", "CVE-2017-7831", "CVE-2017-7832", "CVE-2017-7839", "CVE-2017-7840", "CVE-2017-7835", "CVE-2017-7834", "CVE-2017-7837", "CVE-2017-7830", "CVE-2017-7826"], "description": "The remote host is missing an update for the ", "modified": "2019-03-13T00:00:00", "published": "2017-12-02T00:00:00", "id": "OPENVAS:1361412562310843390", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310843390", "type": "openvas", "title": "Ubuntu Update for firefox USN-3477-3", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_3477_3.nasl 14140 2019-03-13 12:26:09Z cfischer $\n#\n# Ubuntu Update for firefox USN-3477-3\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2017 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.843390\");\n script_version(\"$Revision: 14140 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-13 13:26:09 +0100 (Wed, 13 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2017-12-02 07:28:34 +0100 (Sat, 02 Dec 2017)\");\n script_cve_id(\"CVE-2017-7826\", \"CVE-2017-7827\", \"CVE-2017-7828\", \"CVE-2017-7830\",\n \"CVE-2017-7831\", \"CVE-2017-7832\", \"CVE-2017-7833\", \"CVE-2017-7834\",\n \"CVE-2017-7835\", \"CVE-2017-7837\", \"CVE-2017-7838\", \"CVE-2017-7842\", \"CVE-2017-7839\",\n \"CVE-2017-7840\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Ubuntu Update for firefox USN-3477-3\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'firefox'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"USN-3477-1 fixed vulnerabilities in Firefox.\n The update introduced various minor regressions. This update fixes the problems.\n We apologize for the inconvenience. Original advisory details: Multiple security\n issues were discovered in Firefox. If a user were tricked in to opening a\n specially crafted website, an attacker could potentially exploit these to cause\n a denial of service, read uninitialized memory, obtain sensitive information,\n bypass same-origin restrictions, bypass CSP protections, bypass mixed content\n blocking, spoof the addressbar, or execute arbitrary code. (CVE-2017-7826,\n CVE-2017-7827, CVE-2017-7828, CVE-2017-7830, CVE-2017-7831, CVE-2017-7832,\n CVE-2017-7833, CVE-2017-7834, CVE-2017-7835, CVE-2017-7837, CVE-2017-7838,\n CVE-2017-7842) It was discovered that javascript: URLs pasted in to the\n addressbar would be executed instead of being blocked in some circumstances. If\n a user were tricked in to copying a specially crafted URL in to the addressbar,\n an attacker could potentially exploit this to conduct cross-site scripting (XSS)\n attacks. (CVE-2017-7839) It was discovered that exported bookmarks do not strip\n script elements from user-supplied tags. If a user were tricked in to adding\n specially crafted tags to bookmarks, exporting them and then opening the\n resulting HTML file, an attacker could potentially exploit this to conduct\n cross-site scripting (XSS) attacks. (CVE-2017-7840)\");\n script_tag(name:\"affected\", value:\"firefox on Ubuntu 17.10,\n Ubuntu 17.04,\n Ubuntu 16.04 LTS,\n Ubuntu 14.04 LTS\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n\n script_xref(name:\"USN\", value:\"3477-3\");\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-3477-3/\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU(14\\.04 LTS|17\\.10|17\\.04|16\\.04 LTS)\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU14.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"firefox\", ver:\"57.0.1+build2-0ubuntu0.14.04.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU17.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"firefox\", ver:\"57.0.1+build2-0ubuntu0.17.10.1\", rls:\"UBUNTU17.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU17.04\")\n{\n\n if ((res = isdpkgvuln(pkg:\"firefox\", ver:\"57.0.1+build2-0ubuntu0.17.04.1\", rls:\"UBUNTU17.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU16.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"firefox\", ver:\"57.0.1+build2-0ubuntu0.16.04.1\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:34:51", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-7828", "CVE-2017-7830", "CVE-2017-7826"], "description": "Check the version of thunderbird", "modified": "2019-03-08T00:00:00", "published": "2017-12-07T00:00:00", "id": "OPENVAS:1361412562310882809", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310882809", "type": "openvas", "title": "CentOS Update for thunderbird CESA-2017:3372 centos6", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_CESA-2017_3372_thunderbird_centos6.nasl 14058 2019-03-08 13:25:52Z cfischer $\n#\n# CentOS Update for thunderbird CESA-2017:3372 centos6\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2017 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.882809\");\n script_version(\"$Revision: 14058 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-08 14:25:52 +0100 (Fri, 08 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2017-12-07 07:39:14 +0100 (Thu, 07 Dec 2017)\");\n script_cve_id(\"CVE-2017-7826\", \"CVE-2017-7828\", \"CVE-2017-7830\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"CentOS Update for thunderbird CESA-2017:3372 centos6\");\n script_tag(name:\"summary\", value:\"Check the version of thunderbird\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"Mozilla Thunderbird is a standalone mail\nand newsgroup client.\n\nThis update upgrades Thunderbird to version 52.5.0.\n\nSecurity Fix(es):\n\n * Multiple flaws were found in the processing of malformed web content. A\nweb page containing malicious content could cause Thunderbird to crash or,\npotentially, execute arbitrary code with the privileges of the user running\nThunderbird. (CVE-2017-7826, CVE-2017-7828, CVE-2017-7830)\n\nRed Hat would like to thank the Mozilla project for reporting these issues.\nUpstream acknowledges Christian Holler, David Keeler, Jon Coppeard, Julien\nCristau, Jan de Mooij, Jason Kratzer, Philipp, Nicholas Nethercote, Oriol\nBrufau, Andre Bargull, Bob Clary, Jet Villegas, Randell Jesup, Tyson Smith,\nGary Kwong, Ryan VanderMeulen, Nils, and Jun Kokatsu as the original\nreporters.\");\n script_tag(name:\"affected\", value:\"thunderbird on CentOS 6\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n\n script_xref(name:\"CESA\", value:\"2017:3372\");\n script_xref(name:\"URL\", value:\"http://lists.centos.org/pipermail/centos-announce/2017-December/022686.html\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\", re:\"ssh/login/release=CentOS6\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"CentOS6\")\n{\n\n if ((res = isrpmvuln(pkg:\"thunderbird\", rpm:\"thunderbird~52.5.0~1.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:34:53", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-7828", "CVE-2017-7830", "CVE-2017-7826"], "description": "The remote host is missing an update for the ", "modified": "2018-11-23T00:00:00", "published": "2017-11-18T00:00:00", "id": "OPENVAS:1361412562310812300", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310812300", "type": "openvas", "title": "RedHat Update for firefox RHSA-2017:3247-01", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_RHSA-2017_3247-01_firefox.nasl 12497 2018-11-23 08:28:21Z cfischer $\n#\n# RedHat Update for firefox RHSA-2017:3247-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2017 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.812300\");\n script_version(\"$Revision: 12497 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-11-23 09:28:21 +0100 (Fri, 23 Nov 2018) $\");\n script_tag(name:\"creation_date\", value:\"2017-11-18 07:31:39 +0100 (Sat, 18 Nov 2017)\");\n script_cve_id(\"CVE-2017-7826\", \"CVE-2017-7828\", \"CVE-2017-7830\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"RedHat Update for firefox RHSA-2017:3247-01\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'firefox'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"Mozilla Firefox is an open source web browser.\n\nThis update upgrades Firefox to version 52.5.0 ESR.\n\nSecurity Fix(es):\n\n * Multiple flaws were found in the processing of malformed web content. A\nweb page containing malicious content could cause Firefox to crash or,\npotentially, execute arbitrary code with the privileges of the user running\nFirefox. (CVE-2017-7826, CVE-2017-7828, CVE-2017-7830)\n\nRed Hat would like to thank the Mozilla project for reporting these issues.\nUpstream acknowledges Christian Holler, David Keeler, Jon Coppeard, Julien\nCristau, Jan de Mooij, Jason Kratzer, Philipp, Nicholas Nethercote, Oriol\nBrufau, Andr Bargull, Bob Clary, Jet Villegas, Randell Jesup, Tyson Smith,\nGary Kwong, Ryan VanderMeulen, Nils, and Jun Kokatsu as the original\nreporters.\");\n script_tag(name:\"affected\", value:\"firefox on\n Red Hat Enterprise Linux Desktop (v. 6),\n Red Hat Enterprise Linux Server (v. 6),\n Red Hat Enterprise Linux Server (v. 7),\n Red Hat Enterprise Linux Workstation (v. 6)\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n\n script_xref(name:\"RHSA\", value:\"2017:3247-01\");\n script_xref(name:\"URL\", value:\"https://www.redhat.com/archives/rhsa-announce/2017-November/msg00027.html\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\", re:\"ssh/login/release=RHENT_(7|6)\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"RHENT_7\")\n{\n\n if ((res = isrpmvuln(pkg:\"firefox\", rpm:\"firefox~52.5.0~1.el7_4\", rls:\"RHENT_7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-debuginfo\", rpm:\"firefox-debuginfo~52.5.0~1.el7_4\", rls:\"RHENT_7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"RHENT_6\")\n{\n\n if ((res = isrpmvuln(pkg:\"firefox\", rpm:\"firefox~52.5.0~1.el6_9\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"firefox-debuginfo\", rpm:\"firefox-debuginfo~52.5.0~1.el6_9\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:34:52", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-7828", "CVE-2017-7830", "CVE-2017-7826"], "description": "Several security issues have been found in the Mozilla Firefox web\nbrowser: Multiple memory safety errors, use-after-frees and other\nimplementation errors may lead to the execution of arbitrary code, denial\nof service or bypass of the same origin policy.", "modified": "2019-03-18T00:00:00", "published": "2017-11-15T00:00:00", "id": "OPENVAS:1361412562310704035", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310704035", "type": "openvas", "title": "Debian Security Advisory DSA 4035-1 (firefox-esr - security update)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: deb_4035.nasl 14284 2019-03-18 15:02:15Z cfischer $\n#\n# Auto-generated from advisory DSA 4035-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2017 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License as published by\n# the Free Software Foundation; either version 2 of the License, or\n# (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.704035\");\n script_version(\"$Revision: 14284 $\");\n script_cve_id(\"CVE-2017-7826\", \"CVE-2017-7828\", \"CVE-2017-7830\");\n script_name(\"Debian Security Advisory DSA 4035-1 (firefox-esr - security update)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-18 16:02:15 +0100 (Mon, 18 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2017-11-15 00:00:00 +0100 (Wed, 15 Nov 2017)\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n script_xref(name:\"URL\", value:\"https://www.debian.org/security/2017/dsa-4035.html\");\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2017 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB(9|8)\");\n script_tag(name:\"affected\", value:\"firefox-esr on Debian Linux\");\n script_tag(name:\"solution\", value:\"For the oldstable distribution (jessie), these problems have been fixed\nin version 52.5.0esr-1~deb8u1.\n\nFor the stable distribution (stretch), these problems have been fixed in\nversion 52.5.0esr-1~deb9u1.\n\nWe recommend that you upgrade your firefox-esr packages.\");\n script_tag(name:\"summary\", value:\"Several security issues have been found in the Mozilla Firefox web\nbrowser: Multiple memory safety errors, use-after-frees and other\nimplementation errors may lead to the execution of arbitrary code, denial\nof service or bypass of the same origin policy.\");\n script_tag(name:\"vuldetect\", value:\"This check tests the installed software version using the apt package manager.\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif((res = isdpkgvuln(pkg:\"firefox-esr\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-dev\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-ach\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-af\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-all\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-an\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-ar\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-as\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-ast\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-az\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-bg\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-bn-bd\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-bn-in\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-br\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-bs\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-ca\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-cak\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-cs\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-cy\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-da\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-de\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-dsb\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-el\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-en-gb\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-en-za\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-eo\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-es-ar\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-es-cl\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-es-es\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-es-mx\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-et\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-eu\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-fa\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-ff\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-fi\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-fr\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-fy-nl\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-ga-ie\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-gd\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-gl\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-gn\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-gu-in\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-he\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-hi-in\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-hr\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-hsb\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-hu\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-hy-am\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-id\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-is\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-it\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-ja\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-ka\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-kab\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-kk\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-km\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-kn\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-ko\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-lij\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-lt\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-lv\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-mai\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-mk\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-ml\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-mr\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-ms\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-nb-no\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-nl\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-nn-no\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-or\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-pa-in\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-pl\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-pt-br\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-pt-pt\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-rm\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-ro\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-ru\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-si\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-sk\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-sl\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-son\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-sq\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-sr\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-sv-se\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-ta\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-te\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-th\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-tr\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-uk\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-uz\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-vi\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-xh\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-zh-cn\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-zh-tw\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-dev\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-ach\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-af\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-all\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-an\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-ar\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-as\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-ast\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-az\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-bg\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-bn-bd\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-bn-in\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-br\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-bs\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-ca\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-cak\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-cs\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-cy\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-da\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-de\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-dsb\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-el\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-en-gb\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-en-za\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-eo\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-es-ar\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-es-cl\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-es-es\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-es-mx\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-et\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-eu\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-fa\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-ff\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-fi\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-fr\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-fy-nl\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-ga-ie\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-gd\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-gl\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-gn\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-gu-in\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-he\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-hi-in\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-hr\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-hsb\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-hu\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-hy-am\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-id\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-is\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-it\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-ja\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-ka\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-kab\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-kk\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-km\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-kn\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-ko\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-lij\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-lt\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-lv\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-mai\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-mk\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-ml\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-mr\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-ms\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-nb-no\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-nl\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-nn-no\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-or\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-pa-in\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-pl\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-pt-br\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-pt-pt\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-rm\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-ro\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-ru\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-si\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-sk\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-sl\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-son\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-sq\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-sr\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-sv-se\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-ta\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-te\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-th\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-tr\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-uk\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-uz\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-vi\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-xh\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-zh-cn\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-zh-tw\", ver:\"52.5.0esr-1~deb9u1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-dbg\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-dev\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-ach\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-af\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-all\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-an\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-ar\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-as\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-ast\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-az\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-bg\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-bn-bd\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-bn-in\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-br\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-bs\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-ca\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-cak\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-cs\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-cy\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-da\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-de\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-dsb\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-el\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-en-gb\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-en-za\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-eo\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-es-ar\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-es-cl\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-es-es\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-es-mx\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-et\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-eu\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-fa\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-ff\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-fi\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-fr\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-fy-nl\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-ga-ie\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-gd\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-gl\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-gn\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-gu-in\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-he\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-hi-in\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-hr\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-hsb\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-hu\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-hy-am\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-id\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-is\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-it\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-ja\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-ka\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-kab\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-kk\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-km\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-kn\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-ko\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-lij\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-lt\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-lv\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-mai\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-mk\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-ml\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-mr\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-ms\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-nb-no\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-nl\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-nn-no\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-or\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-pa-in\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-pl\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-pt-br\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-pt-pt\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-rm\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-ro\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-ru\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-si\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-sk\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-sl\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-son\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-sq\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-sr\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-sv-se\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-ta\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-te\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-th\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-tr\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-uk\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-uz\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-vi\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-xh\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-zh-cn\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"firefox-esr-l10n-zh-tw\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-dbg\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-dev\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-ach\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-af\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-all\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-an\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-ar\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-as\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-ast\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-az\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-bg\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-bn-bd\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-bn-in\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-br\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-bs\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-ca\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-cak\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-cs\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-cy\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-da\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-de\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-dsb\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-el\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-en-gb\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-en-za\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-eo\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-es-ar\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-es-cl\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-es-es\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-es-mx\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-et\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-eu\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-fa\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-ff\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-fi\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-fr\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-fy-nl\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-ga-ie\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-gd\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-gl\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-gn\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-gu-in\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-he\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-hi-in\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-hr\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-hsb\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-hu\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-hy-am\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-id\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-is\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-it\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-ja\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-ka\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-kab\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-kk\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-km\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-kn\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-ko\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-lij\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-lt\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-lv\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-mai\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-mk\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-ml\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-mr\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-ms\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-nb-no\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-nl\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-nn-no\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-or\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-pa-in\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-pl\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-pt-br\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-pt-pt\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-rm\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-ro\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-ru\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-si\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-sk\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-sl\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-son\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-sq\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-sr\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-sv-se\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-ta\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-te\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-th\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-tr\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-uk\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-uz\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-vi\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-xh\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-zh-cn\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"iceweasel-l10n-zh-tw\", ver:\"52.5.0esr-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if(__pkg_match) {\n exit(99);\n}", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:34:51", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-7828", "CVE-2017-7830", "CVE-2017-7826"], "description": "Check the version of thunderbird", "modified": "2019-03-08T00:00:00", "published": "2017-12-07T00:00:00", "id": "OPENVAS:1361412562310882818", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310882818", "type": "openvas", "title": "CentOS Update for thunderbird CESA-2017:3372 centos7", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_CESA-2017_3372_thunderbird_centos7.nasl 14058 2019-03-08 13:25:52Z cfischer $\n#\n# CentOS Update for thunderbird CESA-2017:3372 centos7\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2017 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.882818\");\n script_version(\"$Revision: 14058 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-08 14:25:52 +0100 (Fri, 08 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2017-12-07 07:40:53 +0100 (Thu, 07 Dec 2017)\");\n script_cve_id(\"CVE-2017-7826\", \"CVE-2017-7828\", \"CVE-2017-7830\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"CentOS Update for thunderbird CESA-2017:3372 centos7\");\n script_tag(name:\"summary\", value:\"Check the version of thunderbird\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"Mozilla Thunderbird is a standalone mail\nand newsgroup client.\n\nThis update upgrades Thunderbird to version 52.5.0.\n\nSecurity Fix(es):\n\n * Multiple flaws were found in the processing of malformed web content. A\nweb page containing malicious content could cause Thunderbird to crash or,\npotentially, execute arbitrary code with the privileges of the user running\nThunderbird. (CVE-2017-7826, CVE-2017-7828, CVE-2017-7830)\n\nRed Hat would like to thank the Mozilla project for reporting these issues.\nUpstream acknowledges Christian Holler, David Keeler, Jon Coppeard, Julien\nCristau, Jan de Mooij, Jason Kratzer, Philipp, Nicholas Nethercote, Oriol\nBrufau, Andre Bargull, Bob Clary, Jet Villegas, Randell Jesup, Tyson Smith,\nGary Kwong, Ryan VanderMeulen, Nils, and Jun Kokatsu as the original\nreporters.\");\n script_tag(name:\"affected\", value:\"thunderbird on CentOS 7\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n\n script_xref(name:\"CESA\", value:\"2017:3372\");\n script_xref(name:\"URL\", value:\"http://lists.centos.org/pipermail/centos-announce/2017-December/022681.html\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\", re:\"ssh/login/release=CentOS7\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"CentOS7\")\n{\n\n if ((res = isrpmvuln(pkg:\"thunderbird\", rpm:\"thunderbird~52.5.0~1.el7.centos\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:34:51", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-7828", "CVE-2017-7830", "CVE-2017-7826"], "description": "Check the version of firefox", "modified": "2019-03-08T00:00:00", "published": "2017-11-18T00:00:00", "id": "OPENVAS:1361412562310882802", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310882802", "type": "openvas", "title": "CentOS Update for firefox CESA-2017:3247 centos7", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_CESA-2017_3247_firefox_centos7.nasl 14058 2019-03-08 13:25:52Z cfischer $\n#\n# CentOS Update for firefox CESA-2017:3247 centos7\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2017 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.882802\");\n script_version(\"$Revision: 14058 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-08 14:25:52 +0100 (Fri, 08 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2017-11-18 07:32:40 +0100 (Sat, 18 Nov 2017)\");\n script_cve_id(\"CVE-2017-7826\", \"CVE-2017-7828\", \"CVE-2017-7830\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"CentOS Update for firefox CESA-2017:3247 centos7\");\n script_tag(name:\"summary\", value:\"Check the version of firefox\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"Mozilla Firefox is an open source web browser.\n\nThis update upgrades Firefox to version 52.5.0 ESR.\n\nSecurity Fix(es):\n\n * Multiple flaws were found in the processing of malformed web content. A\nweb page containing malicious content could cause Firefox to crash or,\npotentially, execute arbitrary code with the privileges of the user running\nFirefox. (CVE-2017-7826, CVE-2017-7828, CVE-2017-7830)\n\nRed Hat would like to thank the Mozilla project for reporting these issues.\nUpstream acknowledges Christian Holler, David Keeler, Jon Coppeard, Julien\nCristau, Jan de Mooij, Jason Kratzer, Philipp, Nicholas Nethercote, Oriol\nBrufau, Andre Bargull, Bob Clary, Jet Villegas, Randell Jesup, Tyson Smith,\nGary Kwong, Ryan VanderMeulen, Nils, and Jun Kokatsu as the original\nreporters.\");\n script_tag(name:\"affected\", value:\"firefox on CentOS 7\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n\n script_xref(name:\"CESA\", value:\"2017:3247\");\n script_xref(name:\"URL\", value:\"http://lists.centos.org/pipermail/centos-announce/2017-November/022628.html\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\", re:\"ssh/login/release=CentOS7\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"CentOS7\")\n{\n\n if ((res = isrpmvuln(pkg:\"firefox\", rpm:\"firefox~52.5.0~1.el7.centos\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "freebsd": [{"lastseen": "2019-05-29T18:32:06", "bulletinFamily": "unix", "cvelist": ["CVE-2017-7833", "CVE-2017-7827", "CVE-2017-7828", "CVE-2017-7838", "CVE-2017-7836", "CVE-2017-7842", "CVE-2017-7831", "CVE-2017-7832", "CVE-2017-7839", "CVE-2017-7840", "CVE-2017-7835", "CVE-2017-7834", "CVE-2017-7837", "CVE-2017-7830", "CVE-2017-7826"], "description": "\nMozilla Foundation reports:\n\nCVE-2017-7828: Use-after-free of PressShell while restyling layout\nCVE-2017-7830: Cross-origin URL information leak through Resource Timing API\nCVE-2017-7831: Information disclosure of exposed properties on JavaScript proxy objects\nCVE-2017-7832: Domain spoofing through use of dotless 'i' character followed by accent markers\nCVE-2017-7833: Domain spoofing with Arabic and Indic vowel marker characters\nCVE-2017-7834: data: URLs opened in new tabs bypass CSP protections\nCVE-2017-7835: Mixed content blocking incorrectly applies with redirects\nCVE-2017-7836: Pingsender dynamically loads libcurl on Linux and OS X\nCVE-2017-7837: SVG loaded as <img> can use meta tags to set cookies\nCVE-2017-7838: Failure of individual decoding of labels in international domain names triggers punycode display of entire IDN\nCVE-2017-7839: Control characters before javascript: URLs defeats self-XSS prevention mechanism\nCVE-2017-7840: Exported bookmarks do not strip script elements from user-supplied tags\nCVE-2017-7842: Referrer Policy is not always respected for <link> elements\nCVE-2017-7827: Memory safety bugs fixed in Firefox 57\nCVE-2017-7826: Memory safety bugs fixed in Firefox 57 and Firefox ESR 52.5\n\n", "edition": 5, "modified": "2017-11-14T00:00:00", "published": "2017-11-14T00:00:00", "id": "F78EAC48-C3D1-4666-8DE5-63CEEA25A578", "href": "https://vuxml.freebsd.org/freebsd/f78eac48-c3d1-4666-8de5-63ceea25a578.html", "title": "mozilla -- multiple vulnerabilities", "type": "freebsd", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:32:06", "bulletinFamily": "unix", "cvelist": ["CVE-2017-7832", "CVE-2017-7840", "CVE-2017-7835"], "description": "\nPale Moon reports:\n\nCVE-2017-7832: Domain spoofing through use of dotless 'i' character followed by accent markers\nCVE-2017-7835: Mixed content blocking incorrectly applies with redirects\nCVE-2017-7840: Exported bookmarks do not strip script elements from user-supplied tags\n\n", "edition": 5, "modified": "2017-11-14T00:00:00", "published": "2017-11-14T00:00:00", "id": "6056BF68-F570-4E70-B740-B9F606971283", "href": "https://vuxml.freebsd.org/freebsd/6056bf68-f570-4e70-b740-b9f606971283.html", "title": "palemoon -- multiple vulnerabilities", "type": "freebsd", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "archlinux": [{"lastseen": "2020-09-22T18:36:42", "bulletinFamily": "unix", "cvelist": ["CVE-2017-7826", "CVE-2017-7827", "CVE-2017-7828", "CVE-2017-7830", "CVE-2017-7831", "CVE-2017-7832", "CVE-2017-7833", "CVE-2017-7834", "CVE-2017-7835", "CVE-2017-7836", "CVE-2017-7837", "CVE-2017-7838", "CVE-2017-7839", "CVE-2017-7840", "CVE-2017-7842"], "description": "Arch Linux Security Advisory ASA-201711-23\n==========================================\n\nSeverity: Critical\nDate : 2017-11-15\nCVE-ID : CVE-2017-7826 CVE-2017-7827 CVE-2017-7828 CVE-2017-7830\nCVE-2017-7831 CVE-2017-7832 CVE-2017-7833 CVE-2017-7834\nCVE-2017-7835 CVE-2017-7836 CVE-2017-7837 CVE-2017-7838\nCVE-2017-7839 CVE-2017-7840 CVE-2017-7842\nPackage : firefox\nType : multiple issues\nRemote : Yes\nLink : https://security.archlinux.org/AVG-494\n\nSummary\n=======\n\nThe package firefox before version 57.0-1 is vulnerable to multiple\nissues including arbitrary code execution, same-origin policy bypass,\naccess restriction bypass, content spoofing, information disclosure,\nprivilege escalation and cross-site scripting.\n\nResolution\n==========\n\nUpgrade to 57.0-1.\n\n# pacman -Syu \"firefox>=57.0-1\"\n\nThe problems have been fixed upstream in version 57.0.\n\nWorkaround\n==========\n\nNone.\n\nDescription\n===========\n\n- CVE-2017-7826 (arbitrary code execution)\n\nSeveral reported memory safety bugs have been found in Firefox before\n57.0. Some of these bugs showed evidence of memory corruption and with\nenough effort some of these could probably be exploited to run\narbitrary code.\n\n- CVE-2017-7827 (arbitrary code execution)\n\nSeveral memory safety bugs have been found in Firefox before 57.0. Some\nof these bugs showed evidence of memory corruption and with enough\neffort some of these could probably be exploited to run arbitrary code.\n\n- CVE-2017-7828 (arbitrary code execution)\n\nA use-after-free vulnerability can occur in Firefox before 57.0 when\nflushing and resizing layout because the PressShell object has been\nfreed while still in use. This results in a potentially exploitable\ncrash during these operations.\n\n- CVE-2017-7830 (same-origin policy bypass)\n\nThe Resource Timing API in Firefox before 57.0 incorrectly revealed\nnavigations in cross-origin iframes. This is a same-origin policy\nviolation and could allow for data theft of URLs loaded by users.\n\n- CVE-2017-7831 (information disclosure)\n\nA vulnerability has been found in Firefox before 57.0 where the\nsecurity wrapper does not deny access to some exposed properties using\nthe deprecated exposedProps mechanism on proxy objects. These\nproperties should be explicitly unavailable to proxy objects.\n\n- CVE-2017-7832 (content spoofing)\n\nThe combined, single character, version of the letter 'i' with any of\nthe potential accents in unicode, such as acute or grave, can be\nspoofed in the addressbar of Firefox before 57.0 by the dotless version\nof 'i' followed by the same accent as a second character with most font\nsets. This allows for domain spoofing attacks because these combined\ndomain names do not display as punycode.\n\n- CVE-2017-7833 (content spoofing)\n\nSome Arabic and Indic vowel marker characters can be combined with\nLatin characters in a domain name to eclipse the non-Latin character\nwith some font sets on the addressbar of Firefox before 57.0. The non-\nLatin character will not be visible to most viewers. This allows for\ndomain spoofing attacks because these combined domain names do not\ndisplay as punycode.\n\n- CVE-2017-7834 (access restriction bypass)\n\nA data: URL loaded in a new tab of Firefox before 57.0 did not inherit\nthe Content Security Policy (CSP) of the original page, allowing for\nbypasses of the policy including the execution of JavaScript. In prior\nversions when data: documents also inherited the context of the\noriginal page this would allow for potential cross-site scripting (XSS)\nattacks.\n\n- CVE-2017-7835 (access restriction bypass)\n\nMixed content blocking of insecure (HTTP) sub-resources in a secure\n(HTTPS) document was not correctly applied for resources that redirect\nfrom HTTPS to HTTP, allowing content that should be blocked, such as\nscripts, to be loaded on a page in Firefox before 57.0.\n\n- CVE-2017-7836 (privilege escalation)\n\nThe \"pingsender\" executable used by the Firefox Health Report before\n57.0 dynamically loads a system copy of libcurl, which an attacker\ncould replace. This allows for privilege escalation as the replaced\nlibcurl code will run with Firefox's privileges. This attack requires\nan attacker have local system access.\n\n- CVE-2017-7837 (same-origin policy bypass)\n\nSVG loaded through <img> tags in Firefox before 57.0 can use <meta>\ntags within the SVG data to set cookies for that page.\n\n- CVE-2017-7838 (content spoofing)\n\nPunycode format text in Firefox before 57.0 will be displayed for\nentire qualified international domain names in some instances when a\nsub-domain triggers the punycode display instead of the primary domain\nbeing displayed in native script and the sub-domain only displaying as\npunycode. This could be used for limited spoofing attacks due to user\nconfusion.\n\n- CVE-2017-7839 (cross-site scripting)\n\nControl characters prepended before javascript: URLs pasted in the\naddressbar in Firefox before 57.0 can cause the leading characters to\nbe ignored and the pasted JavaScript to be executed instead of being\nblocked. This could be used in social engineering and self-cross-site-\nscripting (self-XSS) attacks where users are convinced to copy and\npaste text into the addressbar.\n\n- CVE-2017-7840 (cross-site scripting)\n\nJavaScript can be injected into an exported bookmarks file by placing\nJavaScript code into user-supplied tags in saved bookmarks in Firefox\nbefore 57.0. If the resulting exported HTML file is later opened in a\nbrowser this JavaScript will be executed. This could be used in social\nengineering and self-cross-site-scripting (self-XSS) attacks if users\nwere convinced to add malicious tags to bookmarks, export them, and\nthen open the resulting file.\n\n- CVE-2017-7842 (information disclosure)\n\nIf a document\u2019s Referrer Policy attribute is set to \"no-referrer\"\nsometimes two network requests are made for <link> elements instead of\none in Firefox before 57.0. One of these requests includes the referrer\ninstead of respecting the set policy to not include a referrer on\nrequests.\n\nImpact\n======\n\nA remote attacker can bypass the same-origin policy or the content\nsecurity policy, spoof the content of the addressbar, trick a user into\na self-XSS attack, access sensitive information or execute arbitrary\ncode on the affected host. A local attacker might be able to escalate\nprivilege.\n\nReferences\n==========\n\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2017-24/\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2017-24/#CVE-2017-7826\nhttps://bugzilla.mozilla.org/buglist.cgi?bug_id=1394530%2C1369561%2C1411458%2C1400003%2C1395138%2C1408412%2C1393840%2C1400763%2C1339259%2C1394265%2C1407740%2C1407751%2C1408005%2C1406398%2C1387799%2C1261175%2C1400554%2C1375146%2C1397811%2C1404636%2C1401804\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2017-24/#CVE-2017-7827\nhttps://bugzilla.mozilla.org/buglist.cgi?bug_id=1399922%2C1403646%2C1403716%2C1365894%2C1402876%2C1406154%2C1384121%2C1384615%2C1407375%2C1339485%2C1361432%2C1394031%2C1383019%2C1407032%2C1387845%2C1386490\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2017-24/#CVE-2017-7828\nhttps://bugzilla.mozilla.org/show_bug.cgi?id=1406750\nhttps://bugzilla.mozilla.org/show_bug.cgi?id=1412252\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2017-24/#CVE-2017-7830\nhttps://bugzilla.mozilla.org/show_bug.cgi?id=1408990\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2017-24/#CVE-2017-7831\nhttps://bugzilla.mozilla.org/show_bug.cgi?id=1392026\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2017-24/#CVE-2017-7832\nhttps://bugzilla.mozilla.org/show_bug.cgi?id=1408782\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2017-24/#CVE-2017-7833\nhttps://bugzilla.mozilla.org/show_bug.cgi?id=1370497\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2017-24/#CVE-2017-7834\nhttps://bugzilla.mozilla.org/show_bug.cgi?id=1358009\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2017-24/#CVE-2017-7835\nhttps://bugzilla.mozilla.org/show_bug.cgi?id=1402363\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2017-24/#CVE-2017-7836\nhttps://bugzilla.mozilla.org/show_bug.cgi?id=1401339\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2017-24/#CVE-2017-7837\nhttps://bugzilla.mozilla.org/show_bug.cgi?id=1325923\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2017-24/#CVE-2017-7838\nhttps://bugzilla.mozilla.org/show_bug.cgi?id=1399540\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2017-24/#CVE-2017-7839\nhttps://bugzilla.mozilla.org/show_bug.cgi?id=1402896\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2017-24/#CVE-2017-7840\nhttps://bugzilla.mozilla.org/show_bug.cgi?id=1366420\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2017-24/#CVE-2017-7842\nhttps://bugzilla.mozilla.org/show_bug.cgi?id=1397064\nhttps://security.archlinux.org/CVE-2017-7826\nhttps://security.archlinux.org/CVE-2017-7827\nhttps://security.archlinux.org/CVE-2017-7828\nhttps://security.archlinux.org/CVE-2017-7830\nhttps://security.archlinux.org/CVE-2017-7831\nhttps://security.archlinux.org/CVE-2017-7832\nhttps://security.archlinux.org/CVE-2017-7833\nhttps://security.archlinux.org/CVE-2017-7834\nhttps://security.archlinux.org/CVE-2017-7835\nhttps://security.archlinux.org/CVE-2017-7836\nhttps://security.archlinux.org/CVE-2017-7837\nhttps://security.archlinux.org/CVE-2017-7838\nhttps://security.archlinux.org/CVE-2017-7839\nhttps://security.archlinux.org/CVE-2017-7840\nhttps://security.archlinux.org/CVE-2017-7842", "modified": "2017-11-15T00:00:00", "published": "2017-11-15T00:00:00", "id": "ASA-201711-23", "href": "https://security.archlinux.org/ASA-201711-23", "type": "archlinux", "title": "[ASA-201711-23] firefox: multiple issues", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-09-22T18:36:42", "bulletinFamily": "unix", "cvelist": ["CVE-2017-7826", "CVE-2017-7828", "CVE-2017-7830"], "description": "Arch Linux Security Advisory ASA-201711-43\n==========================================\n\nSeverity: Critical\nDate : 2017-11-30\nCVE-ID : CVE-2017-7826 CVE-2017-7828 CVE-2017-7830\nPackage : thunderbird\nType : multiple issues\nRemote : Yes\nLink : https://security.archlinux.org/AVG-530\n\nSummary\n=======\n\nThe package thunderbird before version 52.5.0-1 is vulnerable to\nmultiple issues including arbitrary code execution and same-origin\npolicy bypass.\n\nResolution\n==========\n\nUpgrade to 52.5.0-1.\n\n# pacman -Syu \"thunderbird>=52.5.0-1\"\n\nThe problems have been fixed upstream in version 52.5.0.\n\nWorkaround\n==========\n\nNone.\n\nDescription\n===========\n\n- CVE-2017-7826 (arbitrary code execution)\n\nSeveral reported memory safety bugs have been found in Firefox before\n57.0 and Thunderbird before 52.5. Some of these bugs showed evidence of\nmemory corruption and with enough effort some of these could probably\nbe exploited to run arbitrary code.\n\n- CVE-2017-7828 (arbitrary code execution)\n\nA use-after-free vulnerability can occur in Firefox before 57.0 and\nThunderbird before 52.5 when flushing and resizing layout because the\nPressShell object has been freed while still in use. This results in a\npotentially exploitable crash during these operations.\n\n- CVE-2017-7830 (same-origin policy bypass)\n\nThe Resource Timing API in Firefox before 57.0 and Thunderbird before\n52.5 incorrectly revealed navigations in cross-origin iframes. This is\na same-origin policy violation and could allow for data theft of URLs\nloaded by users.\n\nImpact\n======\n\nA remote attacker is able to bypass same-origin policy restrictions or\nexecute arbitrary code on the affected host.\n\nReferences\n==========\n\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2017-26/\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2017-24/#CVE-2017-7826\nhttps://bugzilla.mozilla.org/buglist.cgi?bug_id=1394530%2C1369561%2C1411458%2C1400003%2C1395138%2C1408412%2C1393840%2C1400763%2C1339259%2C1394265%2C1407740%2C1407751%2C1408005%2C1406398%2C1387799%2C1261175%2C1400554%2C1375146%2C1397811%2C1404636%2C1401804\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2017-24/#CVE-2017-7828\nhttps://bugzilla.mozilla.org/show_bug.cgi?id=1406750\nhttps://bugzilla.mozilla.org/show_bug.cgi?id=1412252\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2017-24/#CVE-2017-7830\nhttps://bugzilla.mozilla.org/show_bug.cgi?id=1408990\nhttps://security.archlinux.org/CVE-2017-7826\nhttps://security.archlinux.org/CVE-2017-7828\nhttps://security.archlinux.org/CVE-2017-7830", "modified": "2017-11-30T00:00:00", "published": "2017-11-30T00:00:00", "id": "ASA-201711-43", "href": "https://security.archlinux.org/ASA-201711-43", "type": "archlinux", "title": "[ASA-201711-43] thunderbird: multiple issues", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "kaspersky": [{"lastseen": "2020-09-02T11:56:04", "bulletinFamily": "info", "cvelist": ["CVE-2017-7833", "CVE-2017-7827", "CVE-2017-7828", "CVE-2017-7838", "CVE-2017-7836", "CVE-2017-7842", "CVE-2017-7831", "CVE-2017-7832", "CVE-2017-7839", "CVE-2017-7840", "CVE-2017-7835", "CVE-2017-7834", "CVE-2017-7837", "CVE-2017-7830", "CVE-2017-7826"], "description": "### *Detect date*:\n11/14/2017\n\n### *Severity*:\nCritical\n\n### *Description*:\nMultiple serious vulnerabilities have been found in Firefox and Firefox ESR. Malicious users can exploit these vulnerabilities to cause denial of service, bypass security restrictions, spoof user interface, perform cross-site scripting, gain privileges and execute arbitrary code. \n\n### *Affected products*:\nMozilla Firefox versions earlier than 57 \nMozilla Firefox ESR versions earlier than 52.5 \nMozilla Firefox versions earlier than 57 \nMozilla Firefox ESR versions earlier than 52.5\n\n### *Solution*:\nUpdate to the latest version \n[Download Mozilla Firefox](<https://www.mozilla.org/ru/firefox/new/>)\n\n### *Original advisories*:\n[Mozilla Foundation Security Advisory 2017-24](<https://www.mozilla.org/en-US/security/advisories/mfsa2017-24/#CVE-2017-7834>) \n[Mozilla Foundation Security Advisory 2017-25](<https://www.mozilla.org/en-US/security/advisories/mfsa2017-25/>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Mozilla Firefox](<https://threats.kaspersky.com/en/product/Mozilla-Firefox/>)\n\n### *CVE-IDS*:\n[CVE-2017-7827](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7827>)10.0Critical \n[CVE-2017-7826](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7826>)9.8Critical \n[CVE-2017-7828](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7828>)9.8Critical \n[CVE-2017-7830](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7830>)6.5High \n[CVE-2017-7831](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7831>)5.0Critical \n[CVE-2017-7832](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7832>)5.0Critical \n[CVE-2017-7833](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7833>)5.0Critical \n[CVE-2017-7834](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7834>)4.3Warning \n[CVE-2017-7835](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7835>)7.5Critical \n[CVE-2017-7836](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7836>)4.6Warning \n[CVE-2017-7837](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7837>)5.0Critical \n[CVE-2017-7838](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7838>)5.0Critical \n[CVE-2017-7839](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7839>)4.3Warning \n[CVE-2017-7840](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7840>)4.3Warning \n[CVE-2017-7842](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7842>)5.0Critical", "edition": 42, "modified": "2020-05-22T00:00:00", "published": "2017-11-14T00:00:00", "id": "KLA11135", "href": "https://threats.kaspersky.com/en/vulnerability/KLA11135", "title": "\r KLA11135Multiple vulnerabilities in Mozilla Firefox and Firefox ESR ", "type": "kaspersky", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-09-02T11:47:39", "bulletinFamily": "info", "cvelist": ["CVE-2017-7828", "CVE-2017-7830", "CVE-2017-7826"], "description": "### *Detect date*:\n11/23/2017\n\n### *Severity*:\nCritical\n\n### *Description*:\nMultiple serious vulnerabilities have been found in Mozilla Thunderbird. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code or bypass security restrictions.\n\n### *Affected products*:\nMozilla Thunderbird versions earlier than 52.5\n\n### *Solution*:\nUpdate to the latest version \n[Mozilla Thunderbird download page](<https://www.mozilla.org/en-US/thunderbird/>)\n\n### *Original advisories*:\n[Mozilla Foundation Security Advisory 2017-26](<https://www.mozilla.org/en-US/security/advisories/mfsa2017-26/>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Mozilla Thunderbird](<https://threats.kaspersky.com/en/product/Mozilla-Thunderbird/>)\n\n### *CVE-IDS*:\n[CVE-2017-7826](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7826>)9.8Critical \n[CVE-2017-7828](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7828>)9.8Critical \n[CVE-2017-7830](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7830>)6.5High", "edition": 43, "modified": "2020-05-22T00:00:00", "published": "2017-11-23T00:00:00", "id": "KLA11145", "href": "https://threats.kaspersky.com/en/vulnerability/KLA11145", "title": "\r KLA11145Multiple vulnerabilities in Mozilla Thunderbird ", "type": "kaspersky", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "nessus": [{"lastseen": "2021-04-01T03:45:41", "description": "The version of Mozilla Firefox installed on the remote macOS or Mac\nOS X host is prior to 57. It is, therefore, affected by multiple\nvulnerabilities, some of which allow code execution and potentially\nexploitable application crashes.", "edition": 29, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2017-11-16T00:00:00", "title": "Mozilla Firefox < 57 Multiple Vulnerabilities (macOS)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-7833", "CVE-2017-7827", "CVE-2017-7828", "CVE-2017-7838", "CVE-2017-7836", "CVE-2017-7842", "CVE-2017-7831", "CVE-2017-7832", "CVE-2017-7839", "CVE-2017-7840", "CVE-2017-7835", "CVE-2017-7834", "CVE-2017-7837", "CVE-2017-7830", "CVE-2017-7826"], "modified": "2021-04-02T00:00:00", "cpe": ["cpe:/a:mozilla:firefox"], "id": "MACOSX_FIREFOX_57_0.NASL", "href": "https://www.tenable.com/plugins/nessus/104636", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(104636);\n script_version(\"1.5\");\n script_cvs_date(\"Date: 2019/11/12\");\n\n script_cve_id(\n \"CVE-2017-7826\",\n \"CVE-2017-7827\",\n \"CVE-2017-7828\",\n \"CVE-2017-7830\",\n \"CVE-2017-7831\",\n \"CVE-2017-7832\",\n \"CVE-2017-7833\",\n \"CVE-2017-7834\",\n \"CVE-2017-7835\",\n \"CVE-2017-7836\",\n \"CVE-2017-7837\",\n \"CVE-2017-7838\",\n \"CVE-2017-7839\",\n \"CVE-2017-7840\",\n \"CVE-2017-7842\"\n );\n script_bugtraq_id(101832);\n script_xref(name:\"MFSA\", value:\"2017-24\");\n\n script_name(english:\"Mozilla Firefox < 57 Multiple Vulnerabilities (macOS)\");\n script_summary(english:\"Checks the version of Firefox.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"A web browser installed on the remote macOS or Mac OS X host is\naffected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Mozilla Firefox installed on the remote macOS or Mac\nOS X host is prior to 57. It is, therefore, affected by multiple\nvulnerabilities, some of which allow code execution and potentially\nexploitable application crashes.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2017-24/\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Mozilla Firefox version 57 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2017-7827\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/11/14\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/11/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/11/16\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:mozilla:firefox\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"MacOS X Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"macosx_firefox_installed.nasl\");\n script_require_keys(\"MacOSX/Firefox/Installed\");\n\n exit(0);\n}\n\ninclude(\"mozilla_version.inc\");\n\nkb_base = \"MacOSX/Firefox\";\nget_kb_item_or_exit(kb_base+\"/Installed\");\n\nversion = get_kb_item_or_exit(kb_base+\"/Version\", exit_code:1);\npath = get_kb_item_or_exit(kb_base+\"/Path\", exit_code:1);\n\nif (get_kb_item(kb_base + '/is_esr')) exit(0, 'The Mozilla Firefox installation is in the ESR branch.');\n\nmozilla_check_version(product:'firefox', version:version, path:path, esr:FALSE, fix:'57', severity:SECURITY_HOLE);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-04-01T04:08:55", "description": "The version of Mozilla Firefox installed on the remote Windows host is\nprior to 57. It is, therefore, affected by multiple vulnerabilities,\nsome of which allow code execution and potentially exploitable\ncrashes.", "edition": 29, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2017-11-16T00:00:00", "title": "Mozilla Firefox < 57 Multiple Vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-7833", "CVE-2017-7827", "CVE-2017-7828", "CVE-2017-7838", "CVE-2017-7836", "CVE-2017-7842", "CVE-2017-7831", "CVE-2017-7832", "CVE-2017-7839", "CVE-2017-7840", "CVE-2017-7835", "CVE-2017-7834", "CVE-2017-7837", "CVE-2017-7830", "CVE-2017-7826"], "modified": "2021-04-02T00:00:00", "cpe": ["cpe:/a:mozilla:firefox"], "id": "MOZILLA_FIREFOX_57_0.NASL", "href": "https://www.tenable.com/plugins/nessus/104638", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(104638);\n script_version(\"1.5\");\n script_cvs_date(\"Date: 2019/11/12\");\n\n script_cve_id(\n \"CVE-2017-7826\",\n \"CVE-2017-7827\",\n \"CVE-2017-7828\",\n \"CVE-2017-7830\",\n \"CVE-2017-7831\",\n \"CVE-2017-7832\",\n \"CVE-2017-7833\",\n \"CVE-2017-7834\",\n \"CVE-2017-7835\",\n \"CVE-2017-7836\",\n \"CVE-2017-7837\",\n \"CVE-2017-7838\",\n \"CVE-2017-7839\",\n \"CVE-2017-7840\",\n \"CVE-2017-7842\"\n );\n script_bugtraq_id(101832);\n script_xref(name:\"MFSA\", value:\"2017-24\");\n\n script_name(english:\"Mozilla Firefox < 57 Multiple Vulnerabilities\");\n script_summary(english:\"Checks the version of Firefox.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"A web browser installed on the remote Windows host is affected by\nmultiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Mozilla Firefox installed on the remote Windows host is\nprior to 57. It is, therefore, affected by multiple vulnerabilities,\nsome of which allow code execution and potentially exploitable\ncrashes.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2017-24/\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Mozilla Firefox version 57 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2017-7827\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/11/14\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/11/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/11/16\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:mozilla:firefox\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"mozilla_org_installed.nasl\");\n script_require_keys(\"Mozilla/Firefox/Version\");\n\n exit(0);\n}\n\ninclude(\"mozilla_version.inc\");\n\nport = get_kb_item(\"SMB/transport\");\nif (!port) port = 445;\n\ninstalls = get_kb_list(\"SMB/Mozilla/Firefox/*\");\nif (isnull(installs)) audit(AUDIT_NOT_INST, \"Firefox\");\n\nmozilla_check_version(installs:installs, product:'firefox', fix:'57', severity:SECURITY_HOLE);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-04-01T03:45:30", "description": "The version of Mozilla Firefox ESR installed on the remote macOS or\nMac OS X host is prior to 52.5. It is, therefore, affected by multiple\nvulnerabilities, some of which allow code execution and potentially\nexploitable crashes.", "edition": 29, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2017-11-16T00:00:00", "title": "Mozilla Firefox ESR < 52.5 Multiple Vulnerabilities (macOS)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-7833", "CVE-2017-7827", "CVE-2017-7828", "CVE-2017-7838", "CVE-2017-7836", "CVE-2017-7842", "CVE-2017-7831", "CVE-2017-7832", "CVE-2017-7839", "CVE-2017-7840", "CVE-2017-7835", "CVE-2017-7834", "CVE-2017-7837", "CVE-2017-7830", "CVE-2017-7826"], "modified": "2021-04-02T00:00:00", "cpe": ["cpe:/a:mozilla:firefox_esr"], "id": "MACOSX_FIREFOX_52_5_ESR.NASL", "href": "https://www.tenable.com/plugins/nessus/104635", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(104635);\n script_version(\"1.5\");\n script_cvs_date(\"Date: 2019/11/12\");\n\n script_cve_id(\n \"CVE-2017-7826\",\n \"CVE-2017-7827\",\n \"CVE-2017-7828\",\n \"CVE-2017-7830\",\n \"CVE-2017-7831\",\n \"CVE-2017-7832\",\n \"CVE-2017-7833\",\n \"CVE-2017-7834\",\n \"CVE-2017-7835\",\n \"CVE-2017-7836\",\n \"CVE-2017-7837\",\n \"CVE-2017-7838\",\n \"CVE-2017-7839\",\n \"CVE-2017-7840\",\n \"CVE-2017-7842\"\n );\n script_bugtraq_id(101832);\n script_xref(name:\"MFSA\", value:\"2017-25\");\n\n script_name(english:\"Mozilla Firefox ESR < 52.5 Multiple Vulnerabilities (macOS)\");\n script_summary(english:\"Checks the version of Firefox.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"A web browser installed on the remote macOS or Mac OS X host is\naffected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Mozilla Firefox ESR installed on the remote macOS or\nMac OS X host is prior to 52.5. It is, therefore, affected by multiple\nvulnerabilities, some of which allow code execution and potentially\nexploitable crashes.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2017-25/\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Mozilla Firefox ESR version 52.5 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2017-7827\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/11/14\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/11/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/11/16\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:mozilla:firefox_esr\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"MacOS X Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"macosx_firefox_installed.nasl\");\n script_require_keys(\"MacOSX/Firefox/Version\");\n\n exit(0);\n}\n\ninclude(\"mozilla_version.inc\");\n\nkb_base = \"MacOSX/Firefox\";\nget_kb_item_or_exit(kb_base+\"/Installed\");\n\nversion = get_kb_item_or_exit(kb_base+\"/Version\", exit_code:1);\npath = get_kb_item_or_exit(kb_base+\"/Path\", exit_code:1);\n\nis_esr = get_kb_item(kb_base+\"/is_esr\");\nif (isnull(is_esr)) audit(AUDIT_NOT_INST, \"Mozilla Firefox ESR\");\n\nmozilla_check_version(version:version, path:path, product:'firefox', esr:TRUE, fix:'52.5', min:'52', severity:SECURITY_HOLE);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-04-01T04:08:42", "description": "The version of Mozilla Firefox ESR installed on the remote Windows\nhost is prior to 52.5. It is, therefore, affected by multiple\nvulnerabilities, some of which allow code execution and potentially\nexploitable crashes.", "edition": 30, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2017-11-16T00:00:00", "title": "Mozilla Firefox ESR < 52.5 Multiple Vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-7833", "CVE-2017-7827", "CVE-2017-7828", "CVE-2017-7838", "CVE-2017-7836", "CVE-2017-7842", "CVE-2017-7831", "CVE-2017-7832", "CVE-2017-7839", "CVE-2017-7840", "CVE-2017-7835", "CVE-2017-7834", "CVE-2017-7837", "CVE-2017-7830", "CVE-2017-7826"], "modified": "2021-04-02T00:00:00", "cpe": ["cpe:/a:mozilla:firefox_esr"], "id": "MOZILLA_FIREFOX_52_5_ESR.NASL", "href": "https://www.tenable.com/plugins/nessus/104637", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(104637);\n script_version(\"1.6\");\n script_cvs_date(\"Date: 2019/11/12\");\n\n script_cve_id(\n \"CVE-2017-7826\",\n \"CVE-2017-7827\",\n \"CVE-2017-7828\",\n \"CVE-2017-7830\",\n \"CVE-2017-7831\",\n \"CVE-2017-7832\",\n \"CVE-2017-7833\",\n \"CVE-2017-7834\",\n \"CVE-2017-7835\",\n \"CVE-2017-7836\",\n \"CVE-2017-7837\",\n \"CVE-2017-7838\",\n \"CVE-2017-7839\",\n \"CVE-2017-7840\",\n \"CVE-2017-7842\"\n );\n script_bugtraq_id(101832);\n script_xref(name:\"MFSA\", value:\"2017-25\");\n\n script_name(english:\"Mozilla Firefox ESR < 52.5 Multiple Vulnerabilities\");\n script_summary(english:\"Checks the version of Firefox.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"A web browser installed on the remote Windows host is affected by\nmultiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Mozilla Firefox ESR installed on the remote Windows\nhost is prior to 52.5. It is, therefore, affected by multiple\nvulnerabilities, some of which allow code execution and potentially\nexploitable crashes.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2017-25/\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Mozilla Firefox ESR version 52.5 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2017-7827\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/11/14\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/11/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/11/16\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:mozilla:firefox_esr\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"mozilla_org_installed.nasl\");\n script_require_keys(\"Mozilla/Firefox/Version\");\n\n exit(0);\n}\n\ninclude(\"mozilla_version.inc\");\n\nport = get_kb_item(\"SMB/transport\");\nif (!port) port = 445;\n\ninstalls = get_kb_list(\"SMB/Mozilla/Firefox/*\");\nif (isnull(installs)) audit(AUDIT_NOT_INST, \"Firefox\");\n\nmozilla_check_version(installs:installs, product:'firefox', esr:TRUE, fix:'52.5', min:'52', severity:SECURITY_HOLE);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-06T10:59:48", "description": "Mozilla Foundation reports :\n\nCVE-2017-7828: Use-after-free of PressShell while restyling layout\n\nCVE-2017-7830: Cross-origin URL information leak through Resource\nTiming API\n\nCVE-2017-7831: Information disclosure of exposed properties on\nJavaScript proxy objects\n\nCVE-2017-7832: Domain spoofing through use of dotless 'i' character\nfollowed by accent markers\n\nCVE-2017-7833: Domain spoofing with Arabic and Indic vowel marker\ncharacters\n\nCVE-2017-7834: data: URLs opened in new tabs bypass CSP protections\n\nCVE-2017-7835: Mixed content blocking incorrectly applies with\nredirects\n\nCVE-2017-7836: Pingsender dynamically loads libcurl on Linux and OS X\n\nCVE-2017-7837: SVG loaded as <img> can use meta tags to set cookies\n\nCVE-2017-7838: Failure of individual decoding of labels in\ninternational domain names triggers punycode display of entire IDN\n\nCVE-2017-7839: Control characters before javascript: URLs defeats\nself-XSS prevention mechanism\n\nCVE-2017-7840: Exported bookmarks do not strip script elements from\nuser-supplied tags\n\nCVE-2017-7842: Referrer Policy is not always respected for <link>\nelements\n\nCVE-2017-7827: Memory safety bugs fixed in Firefox 57\n\nCVE-2017-7826: Memory safety bugs fixed in Firefox 57 and Firefox ESR\n52.5", "edition": 27, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2017-11-15T00:00:00", "title": "FreeBSD : mozilla -- multiple vulnerabilities (f78eac48-c3d1-4666-8de5-63ceea25a578)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-7833", "CVE-2017-7827", "CVE-2017-7828", "CVE-2017-7838", "CVE-2017-7836", "CVE-2017-7842", "CVE-2017-7831", "CVE-2017-7832", "CVE-2017-7839", "CVE-2017-7840", "CVE-2017-7835", "CVE-2017-7834", "CVE-2017-7837", "CVE-2017-7830", "CVE-2017-7826"], "modified": "2017-11-15T00:00:00", "cpe": ["p-cpe:/a:freebsd:freebsd:linux-thunderbird", "p-cpe:/a:freebsd:freebsd:linux-firefox", "cpe:/o:freebsd:freebsd", "p-cpe:/a:freebsd:freebsd:libxul", "p-cpe:/a:freebsd:freebsd:seamonkey", "p-cpe:/a:freebsd:freebsd:linux-seamonkey", "p-cpe:/a:freebsd:freebsd:firefox", "p-cpe:/a:freebsd:freebsd:thunderbird", "p-cpe:/a:freebsd:freebsd:firefox-esr"], "id": "FREEBSD_PKG_F78EAC48C3D146668DE563CEEA25A578.NASL", "href": "https://www.tenable.com/plugins/nessus/104564", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2018 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(104564);\n script_version(\"3.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2017-7826\", \"CVE-2017-7827\", \"CVE-2017-7828\", \"CVE-2017-7830\", \"CVE-2017-7831\", \"CVE-2017-7832\", \"CVE-2017-7833\", \"CVE-2017-7834\", \"CVE-2017-7835\", \"CVE-2017-7836\", \"CVE-2017-7837\", \"CVE-2017-7838\", \"CVE-2017-7839\", \"CVE-2017-7840\", \"CVE-2017-7842\");\n\n script_name(english:\"FreeBSD : mozilla -- multiple vulnerabilities (f78eac48-c3d1-4666-8de5-63ceea25a578)\");\n script_summary(english:\"Checks for updated packages in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote FreeBSD host is missing one or more security-related\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Mozilla Foundation reports :\n\nCVE-2017-7828: Use-after-free of PressShell while restyling layout\n\nCVE-2017-7830: Cross-origin URL information leak through Resource\nTiming API\n\nCVE-2017-7831: Information disclosure of exposed properties on\nJavaScript proxy objects\n\nCVE-2017-7832: Domain spoofing through use of dotless 'i' character\nfollowed by accent markers\n\nCVE-2017-7833: Domain spoofing with Arabic and Indic vowel marker\ncharacters\n\nCVE-2017-7834: data: URLs opened in new tabs bypass CSP protections\n\nCVE-2017-7835: Mixed content blocking incorrectly applies with\nredirects\n\nCVE-2017-7836: Pingsender dynamically loads libcurl on Linux and OS X\n\nCVE-2017-7837: SVG loaded as <img> can use meta tags to set cookies\n\nCVE-2017-7838: Failure of individual decoding of labels in\ninternational domain names triggers punycode display of entire IDN\n\nCVE-2017-7839: Control characters before javascript: URLs defeats\nself-XSS prevention mechanism\n\nCVE-2017-7840: Exported bookmarks do not strip script elements from\nuser-supplied tags\n\nCVE-2017-7842: Referrer Policy is not always respected for <link>\nelements\n\nCVE-2017-7827: Memory safety bugs fixed in Firefox 57\n\nCVE-2017-7826: Memory safety bugs fixed in Firefox 57 and Firefox ESR\n52.5\"\n );\n # https://www.mozilla.org/security/advisories/mfsa2017-24/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2017-24/\"\n );\n # https://www.mozilla.org/security/advisories/mfsa2017-25/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2017-25/\"\n );\n # https://vuxml.freebsd.org/freebsd/f78eac48-c3d1-4666-8de5-63ceea25a578.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?9d02b5e7\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:firefox\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:firefox-esr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:libxul\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:linux-firefox\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:linux-seamonkey\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:linux-thunderbird\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:seamonkey\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:thunderbird\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/11/14\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/11/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/11/15\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"firefox<56.0.2_10,1\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"seamonkey<2.49.2\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"linux-seamonkey<2.49.2\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"firefox-esr<52.5.0,1\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"linux-firefox<52.5.0,2\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"libxul<52.5.0\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"thunderbird<52.5.0\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"linux-thunderbird<52.5.0\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:pkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-04-01T07:29:42", "description": "USN-3477-1 fixed vulnerabilities in Firefox. The update caused search\nsuggestions to not be displayed when performing Google searches from\nthe search bar. This update fixes the problem.\n\nWe apologize for the inconvenience.\n\nMultiple security issues were discovered in Firefox. If a user were\ntricked in to opening a specially crafted website, an attacker could\npotentially exploit these to cause a denial of service, read\nuninitialized memory, obtain sensitive information, bypass same-origin\nrestrictions, bypass CSP protections, bypass mixed content blocking,\nspoof the addressbar, or execute arbitrary code. (CVE-2017-7826,\nCVE-2017-7827, CVE-2017-7828, CVE-2017-7830, CVE-2017-7831,\nCVE-2017-7832, CVE-2017-7833, CVE-2017-7834, CVE-2017-7835,\nCVE-2017-7837, CVE-2017-7838, CVE-2017-7842)\n\nIt was discovered that javascript: URLs pasted in to the\naddressbar would be executed instead of being blocked in\nsome circumstances. If a user were tricked in to copying a\nspecially crafted URL in to the addressbar, an attacker\ncould potentially exploit this to conduct cross-site\nscripting (XSS) attacks. (CVE-2017-7839)\n\nIt was discovered that exported bookmarks do not strip\nscript elements from user-supplied tags. If a user were\ntricked in to adding specially crafted tags to bookmarks,\nexporting them and then opening the resulting HTML file, an\nattacker could potentially exploit this to conduct\ncross-site scripting (XSS) attacks. (CVE-2017-7840).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 27, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2017-11-28T00:00:00", "title": "Ubuntu 14.04 LTS / 16.04 LTS / 17.04 / 17.10 : firefox regression (USN-3477-2)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-7833", "CVE-2017-7827", "CVE-2017-7828", "CVE-2017-7838", "CVE-2017-7842", "CVE-2017-7831", "CVE-2017-7832", "CVE-2017-7839", "CVE-2017-7840", "CVE-2017-7835", "CVE-2017-7834", "CVE-2017-7837", "CVE-2017-7830", "CVE-2017-7826"], "modified": "2021-04-02T00:00:00", "cpe": ["cpe:/o:canonical:ubuntu_linux:17.10", "cpe:/o:canonical:ubuntu_linux:17.04", "p-cpe:/a:canonical:ubuntu_linux:firefox", "cpe:/o:canonical:ubuntu_linux:16.04", "cpe:/o:canonical:ubuntu_linux:14.04"], "id": "UBUNTU_USN-3477-2.NASL", "href": "https://www.tenable.com/plugins/nessus/104807", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-3477-2. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(104807);\n script_version(\"3.5\");\n script_cvs_date(\"Date: 2019/09/18 12:31:47\");\n\n script_cve_id(\"CVE-2017-7826\", \"CVE-2017-7827\", \"CVE-2017-7828\", \"CVE-2017-7830\", \"CVE-2017-7831\", \"CVE-2017-7832\", \"CVE-2017-7833\", \"CVE-2017-7834\", \"CVE-2017-7835\", \"CVE-2017-7837\", \"CVE-2017-7838\", \"CVE-2017-7839\", \"CVE-2017-7840\", \"CVE-2017-7842\");\n script_xref(name:\"USN\", value:\"3477-2\");\n\n script_name(english:\"Ubuntu 14.04 LTS / 16.04 LTS / 17.04 / 17.10 : firefox regression (USN-3477-2)\");\n script_summary(english:\"Checks dpkg output for updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Ubuntu host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"USN-3477-1 fixed vulnerabilities in Firefox. The update caused search\nsuggestions to not be displayed when performing Google searches from\nthe search bar. This update fixes the problem.\n\nWe apologize for the inconvenience.\n\nMultiple security issues were discovered in Firefox. If a user were\ntricked in to opening a specially crafted website, an attacker could\npotentially exploit these to cause a denial of service, read\nuninitialized memory, obtain sensitive information, bypass same-origin\nrestrictions, bypass CSP protections, bypass mixed content blocking,\nspoof the addressbar, or execute arbitrary code. (CVE-2017-7826,\nCVE-2017-7827, CVE-2017-7828, CVE-2017-7830, CVE-2017-7831,\nCVE-2017-7832, CVE-2017-7833, CVE-2017-7834, CVE-2017-7835,\nCVE-2017-7837, CVE-2017-7838, CVE-2017-7842)\n\nIt was discovered that javascript: URLs pasted in to the\naddressbar would be executed instead of being blocked in\nsome circumstances. If a user were tricked in to copying a\nspecially crafted URL in to the addressbar, an attacker\ncould potentially exploit this to conduct cross-site\nscripting (XSS) attacks. (CVE-2017-7839)\n\nIt was discovered that exported bookmarks do not strip\nscript elements from user-supplied tags. If a user were\ntricked in to adding specially crafted tags to bookmarks,\nexporting them and then opening the resulting HTML file, an\nattacker could potentially exploit this to conduct\ncross-site scripting (XSS) attacks. (CVE-2017-7840).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/3477-2/\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected firefox package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:14.04\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:16.04\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:17.04\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:17.10\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/06/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/11/27\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/11/28\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2017-2019 Canonical, Inc. / NASL script (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(14\\.04|16\\.04|17\\.04|17\\.10)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 14.04 / 16.04 / 17.04 / 17.10\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"14.04\", pkgname:\"firefox\", pkgver:\"57.0+build4-0ubuntu0.14.04.5\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"firefox\", pkgver:\"57.0+build4-0ubuntu0.16.04.6\")) flag++;\nif (ubuntu_check(osver:\"17.04\", pkgname:\"firefox\", pkgver:\"57.0+build4-0ubuntu0.17.04.6\")) flag++;\nif (ubuntu_check(osver:\"17.10\", pkgname:\"firefox\", pkgver:\"57.0+build4-0ubuntu0.17.10.6\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"firefox\");\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-04-01T07:29:42", "description": "Multiple security issues were discovered in Firefox. If a user were\ntricked in to opening a specially crafted website, an attacker could\npotentially exploit these to cause a denial of service, read\nuninitialized memory, obtain sensitive information, bypass same-origin\nrestrictions, bypass CSP protections, bypass mixed content blocking,\nspoof the addressbar, or execute arbitrary code. (CVE-2017-7826,\nCVE-2017-7827, CVE-2017-7828, CVE-2017-7830, CVE-2017-7831,\nCVE-2017-7832, CVE-2017-7833, CVE-2017-7834, CVE-2017-7835,\nCVE-2017-7837, CVE-2017-7838, CVE-2017-7842)\n\nIt was discovered that javascript: URLs pasted in to the addressbar\nwould be executed instead of being blocked in some circumstances. If a\nuser were tricked in to copying a specially crafted URL in to the\naddressbar, an attacker could potentially exploit this to conduct\ncross-site scripting (XSS) attacks. (CVE-2017-7839)\n\nIt was discovered that exported bookmarks do not strip script elements\nfrom user-supplied tags. If a user were tricked in to adding specially\ncrafted tags to bookmarks, exporting them and then opening the\nresulting HTML file, an attacker could potentially exploit this to\nconduct cross-site scripting (XSS) attacks. (CVE-2017-7840).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 29, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2017-11-17T00:00:00", "title": "Ubuntu 14.04 LTS / 16.04 LTS / 17.04 / 17.10 : firefox vulnerabilities (USN-3477-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-7833", "CVE-2017-7827", "CVE-2017-7828", "CVE-2017-7838", "CVE-2017-7842", "CVE-2017-7831", "CVE-2017-7832", "CVE-2017-7839", "CVE-2017-7840", "CVE-2017-7835", "CVE-2017-7834", "CVE-2017-7837", "CVE-2017-7830", "CVE-2017-7826"], "modified": "2021-04-02T00:00:00", "cpe": ["cpe:/o:canonical:ubuntu_linux:17.10", "cpe:/o:canonical:ubuntu_linux:17.04", "p-cpe:/a:canonical:ubuntu_linux:firefox", "cpe:/o:canonical:ubuntu_linux:16.04", "cpe:/o:canonical:ubuntu_linux:14.04"], "id": "UBUNTU_USN-3477-1.NASL", "href": "https://www.tenable.com/plugins/nessus/104652", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-3477-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(104652);\n script_version(\"3.7\");\n script_cvs_date(\"Date: 2019/09/18 12:31:47\");\n\n script_cve_id(\"CVE-2017-7826\", \"CVE-2017-7827\", \"CVE-2017-7828\", \"CVE-2017-7830\", \"CVE-2017-7831\", \"CVE-2017-7832\", \"CVE-2017-7833\", \"CVE-2017-7834\", \"CVE-2017-7835\", \"CVE-2017-7837\", \"CVE-2017-7838\", \"CVE-2017-7839\", \"CVE-2017-7840\", \"CVE-2017-7842\");\n script_xref(name:\"USN\", value:\"3477-1\");\n\n script_name(english:\"Ubuntu 14.04 LTS / 16.04 LTS / 17.04 / 17.10 : firefox vulnerabilities (USN-3477-1)\");\n script_summary(english:\"Checks dpkg output for updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Ubuntu host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Multiple security issues were discovered in Firefox. If a user were\ntricked in to opening a specially crafted website, an attacker could\npotentially exploit these to cause a denial of service, read\nuninitialized memory, obtain sensitive information, bypass same-origin\nrestrictions, bypass CSP protections, bypass mixed content blocking,\nspoof the addressbar, or execute arbitrary code. (CVE-2017-7826,\nCVE-2017-7827, CVE-2017-7828, CVE-2017-7830, CVE-2017-7831,\nCVE-2017-7832, CVE-2017-7833, CVE-2017-7834, CVE-2017-7835,\nCVE-2017-7837, CVE-2017-7838, CVE-2017-7842)\n\nIt was discovered that javascript: URLs pasted in to the addressbar\nwould be executed instead of being blocked in some circumstances. If a\nuser were tricked in to copying a specially crafted URL in to the\naddressbar, an attacker could potentially exploit this to conduct\ncross-site scripting (XSS) attacks. (CVE-2017-7839)\n\nIt was discovered that exported bookmarks do not strip script elements\nfrom user-supplied tags. If a user were tricked in to adding specially\ncrafted tags to bookmarks, exporting them and then opening the\nresulting HTML file, an attacker could potentially exploit this to\nconduct cross-site scripting (XSS) attacks. (CVE-2017-7840).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/3477-1/\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected firefox package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:14.04\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:16.04\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:17.04\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:17.10\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/06/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/11/16\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/11/17\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2017-2019 Canonical, Inc. / NASL script (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(14\\.04|16\\.04|17\\.04|17\\.10)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 14.04 / 16.04 / 17.04 / 17.10\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"14.04\", pkgname:\"firefox\", pkgver:\"57.0+build4-0ubuntu0.14.04.4\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"firefox\", pkgver:\"57.0+build4-0ubuntu0.16.04.5\")) flag++;\nif (ubuntu_check(osver:\"17.04\", pkgname:\"firefox\", pkgver:\"57.0+build4-0ubuntu0.17.04.5\")) flag++;\nif (ubuntu_check(osver:\"17.10\", pkgname:\"firefox\", pkgver:\"57.0+build4-0ubuntu0.17.10.5\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"firefox\");\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-04-01T07:29:43", "description": "USN-3477-1 fixed vulnerabilities in Firefox. The update introduced a\ncrash reporting issue where background tab crash reports were sent to\nMozilla without user opt-in. This update fixes the problem.\n\nWe apologize for the inconvenience.\n\nMultiple security issues were discovered in Firefox. If a user were\ntricked in to opening a specially crafted website, an attacker could\npotentially exploit these to cause a denial of service, read\nuninitialized memory, obtain sensitive information, bypass same-origin\nrestrictions, bypass CSP protections, bypass mixed content blocking,\nspoof the addressbar, or execute arbitrary code. (CVE-2017-7826,\nCVE-2017-7827, CVE-2017-7828, CVE-2017-7830, CVE-2017-7831,\nCVE-2017-7832, CVE-2017-7833, CVE-2017-7834, CVE-2017-7835,\nCVE-2017-7837, CVE-2017-7838, CVE-2017-7842)\n\nIt was discovered that javascript: URLs pasted in to the\naddressbar would be executed instead of being blocked in\nsome circumstances. If a user were tricked in to copying a\nspecially crafted URL in to the addressbar, an attacker\ncould potentially exploit this to conduct cross-site\nscripting (XSS) attacks. (CVE-2017-7839)\n\nIt was discovered that exported bookmarks do not strip\nscript elements from user-supplied tags. If a user were\ntricked in to adding specially crafted tags to bookmarks,\nexporting them and then opening the resulting HTML file, an\nattacker could potentially exploit this to conduct\ncross-site scripting (XSS) attacks. (CVE-2017-7840).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 29, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2018-01-04T00:00:00", "title": "Ubuntu 14.04 LTS / 16.04 LTS / 17.04 / 17.10 : firefox regression (USN-3477-4)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-7833", "CVE-2017-7827", "CVE-2017-7828", "CVE-2017-7838", "CVE-2017-7842", "CVE-2017-7831", "CVE-2017-7832", "CVE-2017-7839", "CVE-2017-7840", "CVE-2017-7835", "CVE-2017-7834", "CVE-2017-7837", "CVE-2017-7830", "CVE-2017-7826"], "modified": "2021-04-02T00:00:00", "cpe": ["cpe:/o:canonical:ubuntu_linux:17.10", "cpe:/o:canonical:ubuntu_linux:17.04", "p-cpe:/a:canonical:ubuntu_linux:firefox", "cpe:/o:canonical:ubuntu_linux:16.04", "cpe:/o:canonical:ubuntu_linux:14.04"], "id": "UBUNTU_USN-3477-4.NASL", "href": "https://www.tenable.com/plugins/nessus/105542", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-3477-4. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(105542);\n script_version(\"3.7\");\n script_cvs_date(\"Date: 2019/09/18 12:31:47\");\n\n script_cve_id(\"CVE-2017-7826\", \"CVE-2017-7827\", \"CVE-2017-7828\", \"CVE-2017-7830\", \"CVE-2017-7831\", \"CVE-2017-7832\", \"CVE-2017-7833\", \"CVE-2017-7834\", \"CVE-2017-7835\", \"CVE-2017-7837\", \"CVE-2017-7838\", \"CVE-2017-7839\", \"CVE-2017-7840\", \"CVE-2017-7842\");\n script_xref(name:\"USN\", value:\"3477-4\");\n\n script_name(english:\"Ubuntu 14.04 LTS / 16.04 LTS / 17.04 / 17.10 : firefox regression (USN-3477-4)\");\n script_summary(english:\"Checks dpkg output for updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Ubuntu host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"USN-3477-1 fixed vulnerabilities in Firefox. The update introduced a\ncrash reporting issue where background tab crash reports were sent to\nMozilla without user opt-in. This update fixes the problem.\n\nWe apologize for the inconvenience.\n\nMultiple security issues were discovered in Firefox. If a user were\ntricked in to opening a specially crafted website, an attacker could\npotentially exploit these to cause a denial of service, read\nuninitialized memory, obtain sensitive information, bypass same-origin\nrestrictions, bypass CSP protections, bypass mixed content blocking,\nspoof the addressbar, or execute arbitrary code. (CVE-2017-7826,\nCVE-2017-7827, CVE-2017-7828, CVE-2017-7830, CVE-2017-7831,\nCVE-2017-7832, CVE-2017-7833, CVE-2017-7834, CVE-2017-7835,\nCVE-2017-7837, CVE-2017-7838, CVE-2017-7842)\n\nIt was discovered that javascript: URLs pasted in to the\naddressbar would be executed instead of being blocked in\nsome circumstances. If a user were tricked in to copying a\nspecially crafted URL in to the addressbar, an attacker\ncould potentially exploit this to conduct cross-site\nscripting (XSS) attacks. (CVE-2017-7839)\n\nIt was discovered that exported bookmarks do not strip\nscript elements from user-supplied tags. If a user were\ntricked in to adding specially crafted tags to bookmarks,\nexporting them and then opening the resulting HTML file, an\nattacker could potentially exploit this to conduct\ncross-site scripting (XSS) attacks. (CVE-2017-7840).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/3477-4/\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected firefox package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:14.04\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:16.04\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:17.04\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:17.10\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/06/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/01/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/01/04\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2018-2019 Canonical, Inc. / NASL script (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(14\\.04|16\\.04|17\\.04|17\\.10)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 14.04 / 16.04 / 17.04 / 17.10\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"14.04\", pkgname:\"firefox\", pkgver:\"57.0.3+build1-0ubuntu0.14.04.1\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"firefox\", pkgver:\"57.0.3+build1-0ubuntu0.16.04.1\")) flag++;\nif (ubuntu_check(osver:\"17.04\", pkgname:\"firefox\", pkgver:\"57.0.3+build1-0ubuntu0.17.04.1\")) flag++;\nif (ubuntu_check(osver:\"17.10\", pkgname:\"firefox\", pkgver:\"57.0.3+build1-0ubuntu0.17.10.1\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"firefox\");\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-04-01T07:29:42", "description": "USN-3477-1 fixed vulnerabilities in Firefox. The update introduced\nvarious minor regressions. This update fixes the problems.\n\nWe apologize for the inconvenience.\n\nMultiple security issues were discovered in Firefox. If a user were\ntricked in to opening a specially crafted website, an attacker could\npotentially exploit these to cause a denial of service, read\nuninitialized memory, obtain sensitive information, bypass same-origin\nrestrictions, bypass CSP protections, bypass mixed content blocking,\nspoof the addressbar, or execute arbitrary code. (CVE-2017-7826,\nCVE-2017-7827, CVE-2017-7828, CVE-2017-7830, CVE-2017-7831,\nCVE-2017-7832, CVE-2017-7833, CVE-2017-7834, CVE-2017-7835,\nCVE-2017-7837, CVE-2017-7838, CVE-2017-7842)\n\nIt was discovered that javascript: URLs pasted in to the\naddressbar would be executed instead of being blocked in\nsome circumstances. If a user were tricked in to copying a\nspecially crafted URL in to the addressbar, an attacker\ncould potentially exploit this to conduct cross-site\nscripting (XSS) attacks. (CVE-2017-7839)\n\nIt was discovered that exported bookmarks do not strip\nscript elements from user-supplied tags. If a user were\ntricked in to adding specially crafted tags to bookmarks,\nexporting them and then opening the resulting HTML file, an\nattacker could potentially exploit this to conduct\ncross-site scripting (XSS) attacks. (CVE-2017-7840).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 29, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2017-12-04T00:00:00", "title": "Ubuntu 14.04 LTS / 16.04 LTS / 17.04 / 17.10 : firefox regressions (USN-3477-3)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-7833", "CVE-2017-7827", "CVE-2017-7828", "CVE-2017-7838", "CVE-2017-7842", "CVE-2017-7831", "CVE-2017-7832", "CVE-2017-7839", "CVE-2017-7840", "CVE-2017-7835", "CVE-2017-7834", "CVE-2017-7837", "CVE-2017-7830", "CVE-2017-7826"], "modified": "2021-04-02T00:00:00", "cpe": ["cpe:/o:canonical:ubuntu_linux:17.10", "cpe:/o:canonical:ubuntu_linux:17.04", "p-cpe:/a:canonical:ubuntu_linux:firefox", "cpe:/o:canonical:ubuntu_linux:16.04", "cpe:/o:canonical:ubuntu_linux:14.04"], "id": "UBUNTU_USN-3477-3.NASL", "href": "https://www.tenable.com/plugins/nessus/104994", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-3477-3. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(104994);\n script_version(\"3.7\");\n script_cvs_date(\"Date: 2019/09/18 12:31:47\");\n\n script_cve_id(\"CVE-2017-7826\", \"CVE-2017-7827\", \"CVE-2017-7828\", \"CVE-2017-7830\", \"CVE-2017-7831\", \"CVE-2017-7832\", \"CVE-2017-7833\", \"CVE-2017-7834\", \"CVE-2017-7835\", \"CVE-2017-7837\", \"CVE-2017-7838\", \"CVE-2017-7839\", \"CVE-2017-7840\", \"CVE-2017-7842\");\n script_xref(name:\"USN\", value:\"3477-3\");\n\n script_name(english:\"Ubuntu 14.04 LTS / 16.04 LTS / 17.04 / 17.10 : firefox regressions (USN-3477-3)\");\n script_summary(english:\"Checks dpkg output for updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Ubuntu host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"USN-3477-1 fixed vulnerabilities in Firefox. The update introduced\nvarious minor regressions. This update fixes the problems.\n\nWe apologize for the inconvenience.\n\nMultiple security issues were discovered in Firefox. If a user were\ntricked in to opening a specially crafted website, an attacker could\npotentially exploit these to cause a denial of service, read\nuninitialized memory, obtain sensitive information, bypass same-origin\nrestrictions, bypass CSP protections, bypass mixed content blocking,\nspoof the addressbar, or execute arbitrary code. (CVE-2017-7826,\nCVE-2017-7827, CVE-2017-7828, CVE-2017-7830, CVE-2017-7831,\nCVE-2017-7832, CVE-2017-7833, CVE-2017-7834, CVE-2017-7835,\nCVE-2017-7837, CVE-2017-7838, CVE-2017-7842)\n\nIt was discovered that javascript: URLs pasted in to the\naddressbar would be executed instead of being blocked in\nsome circumstances. If a user were tricked in to copying a\nspecially crafted URL in to the addressbar, an attacker\ncould potentially exploit this to conduct cross-site\nscripting (XSS) attacks. (CVE-2017-7839)\n\nIt was discovered that exported bookmarks do not strip\nscript elements from user-supplied tags. If a user were\ntricked in to adding specially crafted tags to bookmarks,\nexporting them and then opening the resulting HTML file, an\nattacker could potentially exploit this to conduct\ncross-site scripting (XSS) attacks. (CVE-2017-7840).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/3477-3/\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected firefox package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:14.04\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:16.04\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:17.04\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:17.10\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/06/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/12/01\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/12/04\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2017-2019 Canonical, Inc. / NASL script (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(14\\.04|16\\.04|17\\.04|17\\.10)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 14.04 / 16.04 / 17.04 / 17.10\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"14.04\", pkgname:\"firefox\", pkgver:\"57.0.1+build2-0ubuntu0.14.04.1\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"firefox\", pkgver:\"57.0.1+build2-0ubuntu0.16.04.1\")) flag++;\nif (ubuntu_check(osver:\"17.04\", pkgname:\"firefox\", pkgver:\"57.0.1+build2-0ubuntu0.17.04.1\")) flag++;\nif (ubuntu_check(osver:\"17.10\", pkgname:\"firefox\", pkgver:\"57.0.1+build2-0ubuntu0.17.10.1\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"firefox\");\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-06T10:52:24", "description": "Pale Moon reports :\n\nCVE-2017-7832: Domain spoofing through use of dotless 'i' character\nfollowed by accent markers\n\nCVE-2017-7835: Mixed content blocking incorrectly applies with\nredirects\n\nCVE-2017-7840: Exported bookmarks do not strip script elements from\nuser-supplied tags", "edition": 26, "cvss3": {"score": 7.3, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}, "published": "2017-11-29T00:00:00", "title": "FreeBSD : palemoon -- multiple vulnerabilities (6056bf68-f570-4e70-b740-b9f606971283)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-7832", "CVE-2017-7840", "CVE-2017-7835"], "modified": "2017-11-29T00:00:00", "cpe": ["cpe:/o:freebsd:freebsd", "p-cpe:/a:freebsd:freebsd:palemoon"], "id": "FREEBSD_PKG_6056BF68F5704E70B740B9F606971283.NASL", "href": "https://www.tenable.com/plugins/nessus/104836", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2018 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(104836);\n script_version(\"3.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2017-7832\", \"CVE-2017-7835\", \"CVE-2017-7840\");\n\n script_name(english:\"FreeBSD : palemoon -- multiple vulnerabilities (6056bf68-f570-4e70-b740-b9f606971283)\");\n script_summary(english:\"Checks for updated package in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote FreeBSD host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Pale Moon reports :\n\nCVE-2017-7832: Domain spoofing through use of dotless 'i' character\nfollowed by accent markers\n\nCVE-2017-7835: Mixed content blocking incorrectly applies with\nredirects\n\nCVE-2017-7840: Exported bookmarks do not strip script elements from\nuser-supplied tags\"\n );\n # https://vuxml.freebsd.org/freebsd/6056bf68-f570-4e70-b740-b9f606971283.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?257353c9\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:palemoon\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/11/14\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/11/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/11/29\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"palemoon<27.6.2\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:pkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "ubuntu": [{"lastseen": "2020-07-02T11:37:41", "bulletinFamily": "unix", "cvelist": ["CVE-2017-7833", "CVE-2017-7827", "CVE-2017-7828", "CVE-2017-7838", "CVE-2017-7842", "CVE-2017-7831", "CVE-2017-7832", "CVE-2017-7839", "CVE-2017-7840", "CVE-2017-7835", "CVE-2017-7834", "CVE-2017-7837", "CVE-2017-7830", "CVE-2017-7826"], "description": "USN-3477-1 fixed vulnerabilities in Firefox. The update introduced a \ncrash reporting issue where background tab crash reports were sent to \nMozilla without user opt-in. This update fixes the problem.\n\nWe apologize for the inconvenience.\n\nOriginal advisory details:\n\nMultiple security issues were discovered in Firefox. If a user were \ntricked in to opening a specially crafted website, an attacker could \npotentially exploit these to cause a denial of service, read uninitialized \nmemory, obtain sensitive information, bypass same-origin restrictions, \nbypass CSP protections, bypass mixed content blocking, spoof the \naddressbar, or execute arbitrary code. (CVE-2017-7826, CVE-2017-7827, \nCVE-2017-7828, CVE-2017-7830, CVE-2017-7831, CVE-2017-7832, CVE-2017-7833, \nCVE-2017-7834, CVE-2017-7835, CVE-2017-7837, CVE-2017-7838, CVE-2017-7842)\n\nIt was discovered that javascript: URLs pasted in to the addressbar \nwould be executed instead of being blocked in some circumstances. If a \nuser were tricked in to copying a specially crafted URL in to the \naddressbar, an attacker could potentially exploit this to conduct \ncross-site scripting (XSS) attacks. (CVE-2017-7839)\n\nIt was discovered that exported bookmarks do not strip script elements \nfrom user-supplied tags. If a user were tricked in to adding specially \ncrafted tags to bookmarks, exporting them and then opening the resulting \nHTML file, an attacker could potentially exploit this to conduct \ncross-site scripting (XSS) attacks. (CVE-2017-7840)", "edition": 6, "modified": "2018-01-03T00:00:00", "published": "2018-01-03T00:00:00", "id": "USN-3477-4", "href": "https://ubuntu.com/security/notices/USN-3477-4", "title": "Firefox regression", "type": "ubuntu", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-07-02T11:35:07", "bulletinFamily": "unix", "cvelist": ["CVE-2017-7833", "CVE-2017-7827", "CVE-2017-7828", "CVE-2017-7838", "CVE-2017-7842", "CVE-2017-7831", "CVE-2017-7832", "CVE-2017-7839", "CVE-2017-7840", "CVE-2017-7835", "CVE-2017-7834", "CVE-2017-7837", "CVE-2017-7830", "CVE-2017-7826"], "description": "USN-3477-1 fixed vulnerabilities in Firefox. The update caused search \nsuggestions to not be displayed when performing Google searches from the \nsearch bar. This update fixes the problem.\n\nWe apologize for the inconvenience.\n\nOriginal advisory details:\n\nMultiple security issues were discovered in Firefox. If a user were \ntricked in to opening a specially crafted website, an attacker could \npotentially exploit these to cause a denial of service, read uninitialized \nmemory, obtain sensitive information, bypass same-origin restrictions, \nbypass CSP protections, bypass mixed content blocking, spoof the \naddressbar, or execute arbitrary code. (CVE-2017-7826, CVE-2017-7827, \nCVE-2017-7828, CVE-2017-7830, CVE-2017-7831, CVE-2017-7832, CVE-2017-7833, \nCVE-2017-7834, CVE-2017-7835, CVE-2017-7837, CVE-2017-7838, CVE-2017-7842)\n\nIt was discovered that javascript: URLs pasted in to the addressbar \nwould be executed instead of being blocked in some circumstances. If a \nuser were tricked in to copying a specially crafted URL in to the \naddressbar, an attacker could potentially exploit this to conduct \ncross-site scripting (XSS) attacks. (CVE-2017-7839)\n\nIt was discovered that exported bookmarks do not strip script elements \nfrom user-supplied tags. If a user were tricked in to adding specially \ncrafted tags to bookmarks, exporting them and then opening the resulting \nHTML file, an attacker could potentially exploit this to conduct \ncross-site scripting (XSS) attacks. (CVE-2017-7840)", "edition": 6, "modified": "2017-11-27T00:00:00", "published": "2017-11-27T00:00:00", "id": "USN-3477-2", "href": "https://ubuntu.com/security/notices/USN-3477-2", "title": "Firefox regression", "type": "ubuntu", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-07-02T11:41:58", "bulletinFamily": "unix", "cvelist": ["CVE-2017-7833", "CVE-2017-7827", "CVE-2017-7828", "CVE-2017-7838", "CVE-2017-7842", "CVE-2017-7831", "CVE-2017-7832", "CVE-2017-7839", "CVE-2017-7840", "CVE-2017-7835", "CVE-2017-7834", "CVE-2017-7837", "CVE-2017-7830", "CVE-2017-7826"], "description": "USN-3477-1 fixed vulnerabilities in Firefox. The update introduced various \nminor regressions. This update fixes the problems.\n\nWe apologize for the inconvenience.\n\nOriginal advisory details:\n\nMultiple security issues were discovered in Firefox. If a user were \ntricked in to opening a specially crafted website, an attacker could \npotentially exploit these to cause a denial of service, read uninitialized \nmemory, obtain sensitive information, bypass same-origin restrictions, \nbypass CSP protections, bypass mixed content blocking, spoof the \naddressbar, or execute arbitrary code. (CVE-2017-7826, CVE-2017-7827, \nCVE-2017-7828, CVE-2017-7830, CVE-2017-7831, CVE-2017-7832, CVE-2017-7833, \nCVE-2017-7834, CVE-2017-7835, CVE-2017-7837, CVE-2017-7838, CVE-2017-7842)\n\nIt was discovered that javascript: URLs pasted in to the addressbar \nwould be executed instead of being blocked in some circumstances. If a \nuser were tricked in to copying a specially crafted URL in to the \naddressbar, an attacker could potentially exploit this to conduct \ncross-site scripting (XSS) attacks. (CVE-2017-7839)\n\nIt was discovered that exported bookmarks do not strip script elements \nfrom user-supplied tags. If a user were tricked in to adding specially \ncrafted tags to bookmarks, exporting them and then opening the resulting \nHTML file, an attacker could potentially exploit this to conduct \ncross-site scripting (XSS) attacks. (CVE-2017-7840)", "edition": 6, "modified": "2017-12-01T00:00:00", "published": "2017-12-01T00:00:00", "id": "USN-3477-3", "href": "https://ubuntu.com/security/notices/USN-3477-3", "title": "Firefox regressions", "type": "ubuntu", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-07-02T11:39:47", "bulletinFamily": "unix", "cvelist": ["CVE-2017-7833", "CVE-2017-7827", "CVE-2017-7828", "CVE-2017-7838", "CVE-2017-7842", "CVE-2017-7831", "CVE-2017-7832", "CVE-2017-7839", "CVE-2017-7840", "CVE-2017-7835", "CVE-2017-7834", "CVE-2017-7837", "CVE-2017-7830", "CVE-2017-7826"], "description": "Multiple security issues were discovered in Firefox. If a user were \ntricked in to opening a specially crafted website, an attacker could \npotentially exploit these to cause a denial of service, read uninitialized \nmemory, obtain sensitive information, bypass same-origin restrictions, \nbypass CSP protections, bypass mixed content blocking, spoof the \naddressbar, or execute arbitrary code. (CVE-2017-7826, CVE-2017-7827, \nCVE-2017-7828, CVE-2017-7830, CVE-2017-7831, CVE-2017-7832, CVE-2017-7833, \nCVE-2017-7834, CVE-2017-7835, CVE-2017-7837, CVE-2017-7838, CVE-2017-7842)\n\nIt was discovered that javascript: URLs pasted in to the addressbar \nwould be executed instead of being blocked in some circumstances. If a \nuser were tricked in to copying a specially crafted URL in to the \naddressbar, an attacker could potentially exploit this to conduct \ncross-site scripting (XSS) attacks. (CVE-2017-7839)\n\nIt was discovered that exported bookmarks do not strip script elements \nfrom user-supplied tags. If a user were tricked in to adding specially \ncrafted tags to bookmarks, exporting them and then opening the resulting \nHTML file, an attacker could potentially exploit this to conduct \ncross-site scripting (XSS) attacks. (CVE-2017-7840)", "edition": 6, "modified": "2017-11-16T00:00:00", "published": "2017-11-16T00:00:00", "id": "USN-3477-1", "href": "https://ubuntu.com/security/notices/USN-3477-1", "title": "Firefox vulnerabilities", "type": "ubuntu", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-07-02T11:33:32", "bulletinFamily": "unix", "cvelist": ["CVE-2017-7828", "CVE-2017-7830", "CVE-2017-7826"], "description": "Multiple security issues were discovered in Thunderbird. If a user were \ntricked in to opening a specially crafted website in a browsing-like \ncontext, an attacker could potentially exploit these to bypass same-origin \nrestrictions, cause a denial of service via application crash, or execute \narbitrary code. (CVE-2017-7826, CVE-2017-7828, CVE-2017-7830)", "edition": 6, "modified": "2017-12-01T00:00:00", "published": "2017-12-01T00:00:00", "id": "USN-3490-1", "href": "https://ubuntu.com/security/notices/USN-3490-1", "title": "Thunderbird vulnerabilities", "type": "ubuntu", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "cve": [{"lastseen": "2021-02-02T06:36:50", "description": "Punycode format text will be displayed for entire qualified international domain names in some instances when a sub-domain triggers the punycode display instead of the primary domain being displayed in native script and the sub-domain only displaying as punycode. This could be used for limited spoofing attacks due to user confusion. This vulnerability affects Firefox < 57.", "edition": 6, "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "baseScore": 5.3, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 1.4}, "published": "2018-06-11T21:29:00", "title": "CVE-2017-7838", "type": "cve", "cwe": ["CWE-20"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-7838"], "modified": "2018-06-25T19:10:00", "cpe": ["cpe:/a:mozilla:firefox:56.0.2"], "id": "CVE-2017-7838", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-7838", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:a:mozilla:firefox:56.0.2:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T06:36:50", "description": "A \"data:\" URL loaded in a new tab did not inherit the Content Security Policy (CSP) of the original page, allowing for bypasses of the policy including the execution of JavaScript. In prior versions when \"data:\" documents also inherited the context of the original page this would allow for potential cross-site scripting (XSS) attacks. This vulnerability affects Firefox < 57.", "edition": 6, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "baseScore": 6.1, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 2.7}, "published": "2018-06-11T21:29:00", "title": "CVE-2017-7834", "type": "cve", "cwe": ["CWE-79"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-7834"], "modified": "2018-06-25T18:46:00", "cpe": ["cpe:/a:mozilla:firefox:56.0.2"], "id": "CVE-2017-7834", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-7834", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:a:mozilla:firefox:56.0.2:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T06:36:50", "description": "A vulnerability where the security wrapper does not deny access to some exposed properties using the deprecated \"_exposedProps_\" mechanism on proxy objects. These properties should be explicitly unavailable to proxy objects. This vulnerability affects Firefox < 57.", "edition": 6, "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.3, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 1.4}, "published": "2018-06-11T21:29:00", "title": "CVE-2017-7831", "type": "cve", "cwe": ["CWE-200"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-7831"], "modified": "2018-06-25T18:46:00", "cpe": ["cpe:/a:mozilla:firefox:56.0.2"], "id": "CVE-2017-7831", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-7831", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:a:mozilla:firefox:56.0.2:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T06:36:50", "description": "The \"pingsender\" executable used by the Firefox Health Report dynamically loads a system copy of libcurl, which an attacker could replace. This allows for privilege escalation as the replaced libcurl code will run with Firefox's privileges. Note: This attack requires an attacker have local system access and only affects OS X and Linux. Windows systems are not affected. This vulnerability affects Firefox < 57.", "edition": 7, "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 5.9}, "published": "2018-06-11T21:29:00", "title": "CVE-2017-7836", "type": "cve", "cwe": ["CWE-427"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-7836"], "modified": "2019-10-03T00:03:00", "cpe": ["cpe:/a:mozilla:firefox:56.0.2"], "id": "CVE-2017-7836", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-7836", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:mozilla:firefox:56.0.2:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T06:36:50", "description": "Control characters prepended before \"javascript:\" URLs pasted in the addressbar can cause the leading characters to be ignored and the pasted JavaScript to be executed instead of being blocked. This could be used in social engineering and self-cross-site-scripting (self-XSS) attacks where users are convinced to copy and paste text into the addressbar. This vulnerability affects Firefox < 57.", "edition": 6, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "baseScore": 6.1, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 2.7}, "published": "2018-06-11T21:29:00", "title": "CVE-2017-7839", "type": "cve", "cwe": ["CWE-79"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-7839"], "modified": "2018-06-25T18:46:00", "cpe": ["cpe:/a:mozilla:firefox:56.0.2"], "id": "CVE-2017-7839", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-7839", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:a:mozilla:firefox:56.0.2:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T06:36:50", "description": "JavaScript can be injected into an exported bookmarks file by placing JavaScript code into user-supplied tags in saved bookmarks. If the resulting exported HTML file is later opened in a browser this JavaScript will be executed. This could be used in social engineering and self-cross-site-scripting (self-XSS) attacks if users were convinced to add malicious tags to bookmarks, export them, and then open the resulting file. This vulnerability affects Firefox < 57.", "edition": 6, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "baseScore": 6.1, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 2.7}, "published": "2018-06-11T21:29:00", "title": "CVE-2017-7840", "type": "cve", "cwe": ["CWE-79"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-7840"], "modified": "2018-06-25T18:47:00", "cpe": ["cpe:/a:mozilla:firefox:56.0.2"], "id": "CVE-2017-7840", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-7840", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:a:mozilla:firefox:56.0.2:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T06:36:50", "description": "The combined, single character, version of the letter 'i' with any of the potential accents in unicode, such as acute or grave, can be spoofed in the addressbar by the dotless version of 'i' followed by the same accent as a second character with most font sets. This allows for domain spoofing attacks because these combined domain names do not display as punycode. This vulnerability affects Firefox < 57.", "edition": 6, "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "baseScore": 5.3, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 1.4}, "published": "2018-06-11T21:29:00", "title": "CVE-2017-7832", "type": "cve", "cwe": ["CWE-20"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-7832"], "modified": "2018-06-25T19:12:00", "cpe": ["cpe:/a:mozilla:firefox:56.0.2"], "id": "CVE-2017-7832", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-7832", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:a:mozilla:firefox:56.0.2:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T06:36:50", "description": "Memory safety bugs were reported in Firefox 56. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 57.", "edition": 6, "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 9.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 5.9}, "published": "2018-06-11T21:29:00", "title": "CVE-2017-7827", "type": "cve", "cwe": ["CWE-119"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-7827"], "modified": "2018-06-25T18:47:00", "cpe": ["cpe:/a:mozilla:firefox:56.0.2"], "id": "CVE-2017-7827", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-7827", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:mozilla:firefox:56.0.2:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T06:36:50", "description": "Mixed content blocking of insecure (HTTP) sub-resources in a secure (HTTPS) document was not correctly applied for resources that redirect from HTTPS to HTTP, allowing content that should be blocked, such as scripts, to be loaded on a page. This vulnerability affects Firefox < 57.", "edition": 7, "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "LOW", "integrityImpact": "LOW", "baseScore": 7.3, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 3.4}, "published": "2018-06-11T21:29:00", "title": "CVE-2017-7835", "type": "cve", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-7835"], "modified": "2019-10-03T00:03:00", "cpe": ["cpe:/a:mozilla:firefox:56.0.2"], "id": "CVE-2017-7835", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-7835", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:mozilla:firefox:56.0.2:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T06:36:50", "description": "Some Arabic and Indic vowel marker characters can be combined with Latin characters in a domain name to eclipse the non-Latin character with some font sets on the addressbar. The non-Latin character will not be visible to most viewers. This allows for domain spoofing attacks because these combined domain names do not display as punycode. This vulnerability affects Firefox < 57.", "edition": 6, "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "baseScore": 5.3, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 1.4}, "published": "2018-06-11T21:29:00", "title": "CVE-2017-7833", "type": "cve", "cwe": ["CWE-20"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-7833"], "modified": "2018-06-25T19:11:00", "cpe": ["cpe:/a:mozilla:firefox:56.0.2"], "id": "CVE-2017-7833", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-7833", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:a:mozilla:firefox:56.0.2:*:*:*:*:*:*:*"]}], "suse": [{"lastseen": "2017-12-08T01:31:02", "bulletinFamily": "unix", "cvelist": ["CVE-2017-7828", "CVE-2017-7830", "CVE-2017-7826"], "description": "This update for MozillaFirefox ESR 52.5 fixes the following issues:\n\n Security issues fixed:\n - CVE-2017-7826: Memory safety bugs fixed (bsc#1068101).\n - CVE-2017-7828: Use-after-free of PressShell while restyling layout\n (bsc#1068101).\n - CVE-2017-7830: Cross-origin URL information leak through Resource Timing\n API (bsc#1068101).\n\n Mozilla Foundation Security Advisory (MFSA 2017-25):\n - <a rel=\"nofollow\" href=\"https://www.mozilla.org/en-US/security/advisories/mfsa2017-25/\">https://www.mozilla.org/en-US/security/advisories/mfsa2017-25/</a>\n\n", "edition": 1, "modified": "2017-12-07T21:11:24", "published": "2017-12-07T21:11:24", "href": "http://lists.opensuse.org/opensuse-security-announce/2017-12/msg00014.html", "id": "SUSE-SU-2017:3233-1", "title": "Security update for MozillaFirefox (important)", "type": "suse", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2017-12-06T01:02:58", "bulletinFamily": "unix", "cvelist": ["CVE-2017-7828", "CVE-2017-7830", "CVE-2017-7826"], "description": "This update for MozillaFirefox ESR 52.5 fixes the following issues:\n\n Security issues fixed:\n - CVE-2017-7826: Memory safety bugs fixed (bsc#1068101).\n - CVE-2017-7828: Use-after-free of PressShell while restyling layout\n (bsc#1068101).\n - CVE-2017-7830: Cross-origin URL information leak through Resource Timing\n API (bsc#1068101).\n\n Mozilla Foundation Security Advisory (MFSA 2017-25):\n - <a rel=\"nofollow\" href=\"https://www.mozilla.org/en-US/security/advisories/mfsa2017-25/\">https://www.mozilla.org/en-US/security/advisories/mfsa2017-25/</a>\n\n", "edition": 1, "modified": "2017-12-05T21:09:46", "published": "2017-12-05T21:09:46", "href": "http://lists.opensuse.org/opensuse-security-announce/2017-12/msg00007.html", "id": "SUSE-SU-2017:3213-1", "title": "Security update for MozillaFirefox (important)", "type": "suse", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2017-11-17T02:33:40", "bulletinFamily": "unix", "cvelist": ["CVE-2017-7828", "CVE-2017-7830", "CVE-2017-7826"], "description": "MozillaFirefox was updated to 52.5.0esr (boo#1068101)\n\n MFSA 2017-25\n\n * CVE-2017-7828: Fixed a use-after-free of PressShell while restyling\n layout\n * CVE-2017-7830: Cross-origin URL information leak through Resource Timing\n API\n * CVE-2017-7826: Memory safety bugs fixed in Firefox 57 and Firefox ESR\n 52.5\n\n Also fixed:\n\n - Correct plugin directory for aarch64 (boo#1061207). The wrapper script\n was not detecting aarch64 as a 64 bit architecture, thus used\n /usr/lib/browser-plugins/.\n\n", "edition": 1, "modified": "2017-11-17T00:07:09", "published": "2017-11-17T00:07:09", "href": "http://lists.opensuse.org/opensuse-security-announce/2017-11/msg00028.html", "id": "OPENSUSE-SU-2017:3027-1", "title": "Security update for MozillaFirefox (important)", "type": "suse", "cvss": {"score": 0.0, "vector": "NONE"}}], "redhat": [{"lastseen": "2019-08-13T18:46:57", "bulletinFamily": "unix", "cvelist": ["CVE-2017-7826", "CVE-2017-7828", "CVE-2017-7830"], "description": "Mozilla Thunderbird is a standalone mail and newsgroup client.\n\nThis update upgrades Thunderbird to version 52.5.0.\n\nSecurity Fix(es):\n\n* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2017-7826, CVE-2017-7828, CVE-2017-7830)\n\nRed Hat would like to thank the Mozilla project for reporting these issues. Upstream acknowledges Christian Holler, David Keeler, Jon Coppeard, Julien Cristau, Jan de Mooij, Jason Kratzer, Philipp, Nicholas Nethercote, Oriol Brufau, Andr\u00e9 Bargull, Bob Clary, Jet Villegas, Randell Jesup, Tyson Smith, Gary Kwong, Ryan VanderMeulen, Nils, and Jun Kokatsu as the original reporters.", "modified": "2018-06-07T18:22:33", "published": "2017-12-04T04:25:45", "id": "RHSA-2017:3372", "href": "https://access.redhat.com/errata/RHSA-2017:3372", "type": "redhat", "title": "(RHSA-2017:3372) Important: thunderbird security update", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-08-13T18:46:18", "bulletinFamily": "unix", "cvelist": ["CVE-2017-7826", "CVE-2017-7828", "CVE-2017-7830"], "description": "Mozilla Firefox is an open source web browser.\n\nThis update upgrades Firefox to version 52.5.0 ESR.\n\nSecurity Fix(es):\n\n* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2017-7826, CVE-2017-7828, CVE-2017-7830)\n\nRed Hat would like to thank the Mozilla project for reporting these issues. Upstream acknowledges Christian Holler, David Keeler, Jon Coppeard, Julien Cristau, Jan de Mooij, Jason Kratzer, Philipp, Nicholas Nethercote, Oriol Brufau, Andr\u00e9 Bargull, Bob Clary, Jet Villegas, Randell Jesup, Tyson Smith, Gary Kwong, Ryan VanderMeulen, Nils, and Jun Kokatsu as the original reporters.", "modified": "2018-06-07T18:23:43", "published": "2017-11-17T12:31:46", "id": "RHSA-2017:3247", "href": "https://access.redhat.com/errata/RHSA-2017:3247", "type": "redhat", "title": "(RHSA-2017:3247) Critical: firefox security update", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "oraclelinux": [{"lastseen": "2019-05-29T18:35:02", "bulletinFamily": "unix", "cvelist": ["CVE-2017-7828", "CVE-2017-7830", "CVE-2017-7826"], "description": "[52.5.0-1.0.1]\n- Add firefox-oracle-default-prefs.js and remove the corresponding Red Hat one\n- Force requirement of newer gdk-pixbuf2 to ensure a proper update (Todd Vierling) [orabug 19847484]\n[52.5.0-1]\n- Update to 52.5.0 ESR", "edition": 5, "modified": "2017-11-17T00:00:00", "published": "2017-11-17T00:00:00", "id": "ELSA-2017-3247", "href": "http://linux.oracle.com/errata/ELSA-2017-3247.html", "title": "firefox security update", "type": "oraclelinux", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:36:09", "bulletinFamily": "unix", "cvelist": ["CVE-2017-7828", "CVE-2017-7830", "CVE-2017-7826"], "description": "[52.5.0-1.0.1]\n- Replaced thunderbird-redhat-default-prefs.js with thunderbird-oracle-default-prefs.js\n[52.5.0-1]\n- Update to 52.5.0", "edition": 5, "modified": "2017-12-04T00:00:00", "published": "2017-12-04T00:00:00", "id": "ELSA-2017-3372", "href": "http://linux.oracle.com/errata/ELSA-2017-3372.html", "title": "thunderbird security update", "type": "oraclelinux", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "debian": [{"lastseen": "2021-01-11T01:18:33", "bulletinFamily": "unix", "cvelist": ["CVE-2017-7828", "CVE-2017-7830", "CVE-2017-7826"], "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-4035-1 security@debian.org\nhttps://www.debian.org/security/ Moritz Muehlenhoff\nNovember 15, 2017 https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : firefox-esr\nCVE ID : CVE-2017-7826 CVE-2017-7828 CVE-2017-7830\n\nSeveral security issues have been found in the Mozilla Firefox web\nbrowser: Multiple memory safety errors, use-after-frees and other\nimplementation errors may lead to the execution of arbitrary code, denial\nof service or bypass of the same origin policy.\n\nFor the oldstable distribution (jessie), these problems have been fixed\nin version 52.5.0esr-1~deb8u1.\n\nFor the stable distribution (stretch), these problems have been fixed in\nversion 52.5.0esr-1~deb9u1.\n\nWe recommend that you upgrade your firefox-esr packages.\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n", "edition": 23, "modified": "2017-11-15T21:55:16", "published": "2017-11-15T21:55:16", "id": "DEBIAN:DSA-4035-1:DDCB9", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2017/msg00298.html", "title": "[SECURITY] [DSA 4035-1] firefox-esr security update", "type": "debian", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-10-17T13:47:36", "bulletinFamily": "unix", "cvelist": ["CVE-2017-7828", "CVE-2017-7830", "CVE-2017-7826"], "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-4061-1 security@debian.org\nhttps://www.debian.org/security/ Moritz Muehlenhoff\nDecember 10, 2017 https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : thunderbird\nCVE ID : CVE-2017-7826 CVE-2017-7828 CVE-2017-7830\n\nMultiple security issues have been found in Thunderbird, which may lead\nto the execution of arbitrary code or denial of service.\n\nFor the oldstable distribution (jessie), these problems have been fixed\nin version 1:52.5.0-1~deb8u1.\n\nFor the stable distribution (stretch), these problems have been fixed in\nversion 1:52.5.0-1~deb9u1.\n\nWe recommend that you upgrade your thunderbird packages.\n\nFor the detailed security status of thunderbird please refer to\nits security tracker page at:\nhttps://security-tracker.debian.org/tracker/thunderbird\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n", "edition": 17, "modified": "2017-12-10T21:40:56", "published": "2017-12-10T21:40:56", "id": "DEBIAN:DSA-4061-1:2184B", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2017/msg00324.html", "title": "[SECURITY] [DSA 4061-1] thunderbird security update", "type": "debian", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-30T02:21:52", "bulletinFamily": "unix", "cvelist": ["CVE-2017-7828", "CVE-2017-7830", "CVE-2017-7826"], "description": "Package : thunderbird\nVersion : 1:52.5.0-1~deb7u1\nCVE ID : CVE-2017-7826 CVE-2017-7828 CVE-2017-7830\n\nMultiple security issues have been found in the Mozilla Thunderbird mail\nclient: Multiple memory safety errors, use after free and other\nimplementation errors may lead to crashes or the execution of arbitrary\ncode.\n\nFor Debian 7 "Wheezy", these problems have been fixed in version\n1:52.5.0-1~deb7u1.\n\nWe recommend that you upgrade your thunderbird packages.\n\nFurther information about Debian LTS security advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://wiki.debian.org/LTS\n", "edition": 3, "modified": "2017-12-09T16:47:11", "published": "2017-12-09T16:47:11", "id": "DEBIAN:DLA-1199-1:52DC8", "href": "https://lists.debian.org/debian-lts-announce/2017/debian-lts-announce-201712/msg00001.html", "title": "[SECURITY] [DLA 1199-1] thunderbird security update", "type": "debian", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-30T02:22:51", "bulletinFamily": "unix", "cvelist": ["CVE-2017-7828", "CVE-2017-7830", "CVE-2017-7826"], "description": "Package : firefox-esr\nVersion : 52.5.0esr-1~deb7u1\nCVE ID : CVE-2017-7826 CVE-2017-7828 CVE-2017-7830\n\nSeveral security issues have been found in the Mozilla Firefox web\nbrowser: Multiple memory safety errors, use-after-frees and other\nimplementation errors may lead to the execution of arbitrary code, denial\nof service or bypass of the same origin policy.\n\nFor Debian 7 "Wheezy", these problems have been fixed in version\n52.5.0esr-1~deb7u1.\n\nWe recommend that you upgrade your firefox-esr packages.\n\nFurther information about Debian LTS security advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://wiki.debian.org/LTS\n", "edition": 3, "modified": "2017-11-15T23:48:34", "published": "2017-11-15T23:48:34", "id": "DEBIAN:DLA-1172-1:AA085", "href": "https://lists.debian.org/debian-lts-announce/2017/debian-lts-announce-201711/msg00018.html", "title": "[SECURITY] [DLA 1172-1] firefox-esr security update", "type": "debian", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-10-17T13:45:31", "bulletinFamily": "unix", "cvelist": ["CVE-2017-7847", "CVE-2017-7828", "CVE-2017-7848", "CVE-2017-7829", "CVE-2017-7846", "CVE-2017-7830", "CVE-2017-7826"], "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-4075-1 security@debian.org\nhttps://www.debian.org/security/ Moritz Muehlenhoff\nDecember 29, 2017 https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : thunderbird\nCVE ID : CVE-2017-7826 CVE-2017-7828 CVE-2017-7829 CVE-2017-7830 \n CVE-2017-7846 CVE-2017-7847 CVE-2017-7848\n\nMultiple security issues have been found in Thunderbird, which may lead\nto the execution of arbitrary code, denial of service, information\ndisclosure or spoofing of sender's email addresses.\n \nFor the oldstable distribution (jessie), these problems have been fixed\nin version 1:52.5.2-2~deb8u1.\n\nFor the stable distribution (stretch), these problems have been fixed in\nversion 1:52.5.2-2~deb9u1.\n\nWe recommend that you upgrade your thunderbird packages.\n\nFor the detailed security status of thunderbird please refer to\nits security tracker page at:\nhttps://security-tracker.debian.org/tracker/thunderbird\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n", "edition": 17, "modified": "2017-12-29T21:58:40", "published": "2017-12-29T21:58:40", "id": "DEBIAN:DSA-4075-1:6639D", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2017/msg00338.html", "title": "[SECURITY] [DSA 4075-1] thunderbird security update", "type": "debian", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "centos": [{"lastseen": "2020-12-08T03:36:48", "bulletinFamily": "unix", "cvelist": ["CVE-2017-7828", "CVE-2017-7830", "CVE-2017-7826"], "description": "**CentOS Errata and Security Advisory** CESA-2017:3247\n\n\nMozilla Firefox is an open source web browser.\n\nThis update upgrades Firefox to version 52.5.0 ESR.\n\nSecurity Fix(es):\n\n* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2017-7826, CVE-2017-7828, CVE-2017-7830)\n\nRed Hat would like to thank the Mozilla project for reporting these issues. Upstream acknowledges Christian Holler, David Keeler, Jon Coppeard, Julien Cristau, Jan de Mooij, Jason Kratzer, Philipp, Nicholas Nethercote, Oriol Brufau, Andr\u00e9 Bargull, Bob Clary, Jet Villegas, Randell Jesup, Tyson Smith, Gary Kwong, Ryan VanderMeulen, Nils, and Jun Kokatsu as the original reporters.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2017-November/034665.html\nhttp://lists.centos.org/pipermail/centos-announce/2017-November/034666.html\n\n**Affected packages:**\nfirefox\n\n**Upstream details at:**\n", "edition": 6, "modified": "2017-11-17T16:54:29", "published": "2017-11-17T16:50:04", "id": "CESA-2017:3247", "href": "http://lists.centos.org/pipermail/centos-announce/2017-November/034665.html", "title": "firefox security update", "type": "centos", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-12-08T03:35:28", "bulletinFamily": "unix", "cvelist": ["CVE-2017-7828", "CVE-2017-7830", "CVE-2017-7826"], "description": "**CentOS Errata and Security Advisory** CESA-2017:3372\n\n\nMozilla Thunderbird is a standalone mail and newsgroup client.\n\nThis update upgrades Thunderbird to version 52.5.0.\n\nSecurity Fix(es):\n\n* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2017-7826, CVE-2017-7828, CVE-2017-7830)\n\nRed Hat would like to thank the Mozilla project for reporting these issues. Upstream acknowledges Christian Holler, David Keeler, Jon Coppeard, Julien Cristau, Jan de Mooij, Jason Kratzer, Philipp, Nicholas Nethercote, Oriol Brufau, Andr\u00e9 Bargull, Bob Clary, Jet Villegas, Randell Jesup, Tyson Smith, Gary Kwong, Ryan VanderMeulen, Nils, and Jun Kokatsu as the original reporters.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2017-December/034719.html\nhttp://lists.centos.org/pipermail/centos-announce/2017-December/034724.html\n\n**Affected packages:**\nthunderbird\n\n**Upstream details at:**\n", "edition": 6, "modified": "2017-12-06T13:29:04", "published": "2017-12-06T13:18:36", "id": "CESA-2017:3372", "href": "http://lists.centos.org/pipermail/centos-announce/2017-December/034719.html", "title": "thunderbird security update", "type": "centos", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "apple": [{"lastseen": "2020-12-24T20:42:42", "bulletinFamily": "software", "cvelist": ["CVE-2018-4147", "CVE-2018-4088", "CVE-2018-4096", "CVE-2017-7830"], "description": "## About Apple security updates\n\nFor our customers' protection, Apple doesn't disclose, discuss, or confirm security issues until an investigation has occurred and patches or releases are available. Recent releases are listed on the [Apple security updates](<https://support.apple.com/kb/HT201222>) page.\n\nFor more information about security, see the [Apple Product Security](<https://support.apple.com/kb/HT201220>) page. You can encrypt communications with Apple using the [Apple Product Security PGP Key](<https://support.apple.com/kb/HT201601>).\n\nApple security documents reference vulnerabilities by [CVE-ID](<http://cve.mitre.org/about/>) when possible.\n\n\n\n## iCloud for Windows 7.3\n\nReleased January 23, 2018\n\n**WebKit**\n\nAvailable for: Windows 7 and later\n\nImpact: Processing maliciously crafted web content may lead to arbitrary code execution\n\nDescription: Multiple memory corruption issues were addressed with improved memory handling.\n\nCVE-2018-4088: Jeonghoon Shin of Theori\n\nCVE-2018-4096: found by OSS-Fuzz\n\n**WebKit**\n\nAvailable for: Windows 7 and later\n\nImpact: Processing maliciously crafted web content may lead to arbitrary code execution\n\nDescription: Multiple memory corruption issues were addressed with improved memory handling.\n\nCVE-2018-4147: found by OSS-Fuzz\n\nEntry added October 18, 2018\n\n**WebKit Page Loading**\n\nAvailable for: Windows 7 and later\n\nImpact: Processing maliciously crafted web content may lead to arbitrary code execution\n\nDescription: Multiple memory corruption issues were addressed with improved memory handling.\n\nCVE-2017-7830: Jun Kokatsu (@shhnjk)\n\nEntry added October 18, 2018\n", "edition": 2, "modified": "2018-10-18T04:39:34", "published": "2018-10-18T04:39:34", "id": "APPLE:HT208473", "href": "https://support.apple.com/kb/HT208473", "title": "About the security content of iCloud for Windows 7.3 - Apple Support", "type": "apple", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-12-24T20:43:19", "bulletinFamily": "software", "cvelist": ["CVE-2018-4147", "CVE-2018-4088", "CVE-2018-4096", "CVE-2017-7830"], "description": "## About Apple security updates\n\nFor our customers' protection, Apple doesn't disclose, discuss, or confirm security issues until an investigation has occurred and patches or releases are available. Recent releases are listed on the [Apple security updates](<https://support.apple.com/kb/HT201222>) page.\n\nFor more information about security, see the [Apple Product Security](<https://support.apple.com/kb/HT201220>) page. You can encrypt communications with Apple using the [Apple Product Security PGP Key](<https://support.apple.com/kb/HT201601>).\n\nApple security documents reference vulnerabilities by [CVE-ID](<http://cve.mitre.org/about/>) when possible.\n\n\n\n## iTunes 12.7.3 for Windows\n\nReleased January 23, 2018\n\n**WebKit**\n\nAvailable for: Windows 7 and later\n\nImpact: Processing maliciously crafted web content may lead to arbitrary code execution\n\nDescription: Multiple memory corruption issues were addressed with improved memory handling.\n\nCVE-2018-4088: Jeonghoon Shin of Theori\n\nCVE-2018-4096: found by OSS-Fuzz\n\n**WebKit**\n\nAvailable for: Windows 7 and later\n\nImpact: Processing maliciously crafted web content may lead to arbitrary code execution\n\nDescription: Multiple memory corruption issues were addressed with improved memory handling.\n\nCVE-2018-4147: found by OSS-Fuzz\n\nEntry added October 18, 2018\n\n**WebKit Page Loading**\n\nAvailable for: Windows 7 and later\n\nImpact: Processing maliciously crafted web content may lead to arbitrary code execution\n\nDescription: Multiple memory corruption issues were addressed with improved memory handling.\n\nCVE-2017-7830: Jun Kokatsu (@shhnjk)\n\nEntry added October 18, 2018\n", "edition": 2, "modified": "2018-10-18T05:11:13", "published": "2018-10-18T05:11:13", "id": "APPLE:HT208474", "href": "https://support.apple.com/kb/HT208474", "title": "About the security content of iTunes 12.7.3 for Windows - Apple Support", "type": "apple", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-12-24T20:44:33", "bulletinFamily": "software", "cvelist": ["CVE-2018-4147", "CVE-2018-4088", "CVE-2018-4096", "CVE-2018-4089", "CVE-2017-7830"], "description": "## About Apple security updates\n\nFor our customers' protection, Apple doesn't disclose, discuss, or confirm security issues until an investigation has occurred and patches or releases are available. Recent releases are listed on the [Apple security updates](<https://support.apple.com/kb/HT201222>) page.\n\nFor more information about security, see the [Apple Product Security](<https://support.apple.com/kb/HT201220>) page. You can encrypt communications with Apple using the [Apple Product Security PGP Key](<https://support.apple.com/kb/HT201601>).\n\nApple security documents reference vulnerabilities by [CVE-ID](<http://cve.mitre.org/about/>) when possible.\n\n\n\n## Safari 11.0.3\n\nReleased January 23, 2018\n\n**WebKit**\n\nAvailable for: OS X El Capitan 10.11.6, macOS Sierra 10.12.6, and macOS High Sierra 10.13.3\n\nImpact: Processing maliciously crafted web content may lead to arbitrary code execution\n\nDescription: Multiple memory corruption issues were addressed with improved memory handling.\n\nCVE-2018-4088: Jeonghoon Shin of Theori\n\nCVE-2018-4089: Ivan Fratric of Google Project Zero\n\nCVE-2018-4096: found by OSS-Fuzz\n\nCVE-2018-4147: found by OSS-Fuzz\n\nCVE-2017-7830: Jun Kokatsu (@shhnjk)\n\nEntry updated October 18, 2018\n", "edition": 2, "modified": "2018-10-18T05:51:25", "published": "2018-10-18T05:51:25", "id": "APPLE:HT208475", "href": "https://support.apple.com/kb/HT208475", "title": "About the security content of Safari 11.0.3 - Apple Support", "type": "apple", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}]}