Ubuntu Update for ubufox USN-1638-2

2012-11-23T00:00:00
ID OPENVAS:1361412562310841225
Type openvas
Reporter Copyright (c) 2012 Greenbone Networks GmbH
Modified 2019-03-13T00:00:00

Description

Ubuntu Update for Linux kernel vulnerabilities USN-1638-2

                                        
                                            ###############################################################################
# OpenVAS Vulnerability Test
# $Id: gb_ubuntu_USN_1638_2.nasl 14132 2019-03-13 09:25:59Z cfischer $
#
# Ubuntu Update for ubufox USN-1638-2
#
# Authors:
# System Generated Check
#
# Copyright:
# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################

if(description)
{
  script_xref(name:"URL", value:"http://www.ubuntu.com/usn/usn-1638-2/");
  script_oid("1.3.6.1.4.1.25623.1.0.841225");
  script_version("$Revision: 14132 $");
  script_tag(name:"last_modification", value:"$Date: 2019-03-13 10:25:59 +0100 (Wed, 13 Mar 2019) $");
  script_tag(name:"creation_date", value:"2012-11-23 11:56:36 +0530 (Fri, 23 Nov 2012)");
  script_cve_id("CVE-2012-5842", "CVE-2012-5843", "CVE-2012-4202", "CVE-2012-4201",
                "CVE-2012-5836", "CVE-2012-4203", "CVE-2012-4204", "CVE-2012-4205",
                "CVE-2012-4208", "CVE-2012-5841", "CVE-2012-4207", "CVE-2012-4209",
                "CVE-2012-4210", "CVE-2012-4214", "CVE-2012-4215", "CVE-2012-4216",
                "CVE-2012-5829", "CVE-2012-5839", "CVE-2012-5840", "CVE-2012-4212",
                "CVE-2012-4213", "CVE-2012-4217", "CVE-2012-4218", "CVE-2012-5830",
                 "CVE-2012-5833", "CVE-2012-5835", "CVE-2012-5838");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_xref(name:"USN", value:"1638-2");
  script_name("Ubuntu Update for ubufox USN-1638-2");

  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (c) 2012 Greenbone Networks GmbH");
  script_family("Ubuntu Local Security Checks");
  script_dependencies("gather-package-list.nasl");
  script_mandatory_keys("ssh/login/ubuntu_linux", "ssh/login/packages", re:"ssh/login/release=UBUNTU(12\.04 LTS|11\.10|10\.04 LTS|12\.10)");
  script_tag(name:"summary", value:"Ubuntu Update for Linux kernel vulnerabilities USN-1638-2");
  script_tag(name:"affected", value:"ubufox on Ubuntu 12.10,
  Ubuntu 12.04 LTS,
  Ubuntu 11.10,
  Ubuntu 10.04 LTS");
  script_tag(name:"solution", value:"Please Install the Updated Packages.");
  script_tag(name:"insight", value:"USN-1638-1 fixed vulnerabilities in Firefox. This update provides an
  updated ubufox package for use with the latest Firefox.

  Original advisory details:

  Gary Kwong, Jesse Ruderman, Christian Holler, Bob Clary, Kyle Huey, Ed
  Morley, Chris Lord, Boris Zbarsky, Julian Seward, Bill McCloskey, and
  Andrew McCreight discovered multiple memory safety issues affecting
  Firefox. If the user were tricked into opening a specially crafted page, an
  attacker could possibly exploit these to cause a denial of service via
  application crash, or potentially execute code with the privileges of the
  user invoking Firefox. (CVE-2012-5842, CVE-2012-5843)

  Atte Kettunen discovered a buffer overflow while rendering GIF format
  images. An attacker could exploit this to possibly execute arbitrary code
  as the user invoking Firefox. (CVE-2012-4202)

  It was discovered that the evalInSandbox function's JavaScript sandbox
  context could be circumvented. An attacker could exploit this to perform a
  cross-site scripting (XSS) attack or steal a copy of a local file if the
  user has installed an add-on vulnerable to this attack. With cross-site
  scripting vulnerabilities, if a user were tricked into viewing a specially
  crafted page, a remote attacker could exploit this to modify the contents,
  or steal confidential data, within the same domain. (CVE-2012-4201)

  Jonathan Stephens discovered that combining vectors involving the setting
  of Cascading Style Sheets (CSS) properties in conjunction with SVG text
  could cause Firefox to crash. If a user were tricked into opening a
  malicious web page, an attacker could cause a denial of service via
  application crash or execute arbitrary code with the privliges of the user
  invoking the program. (CVE-2012-5836)

  It was discovered that if a javascript: URL is selected from the list of
  Firefox 'new tab' page, the script will inherit the privileges of the
  privileged 'new tab' page. This allows for the execution of locally
  installed programs if a user can be convinced to save a bookmark of a
  malicious javascript: URL. (CVE-2012-4203)

  Scott Bell discovered a memory corruption issue in the JavaScript engine.
  If a user were tricked into opening a malicious website, an attacker could
  exploit this to execute arbitrary JavaScript code within the context of
  another website or arbitrary code as the user invoking the program.
  (CVE-2012-4204)

  Gabor Krizsanits discovered that XMLHttpRequest objects created within
  sandboxes have the system princip ...

  Description truncated, please see the referenced URL(s) for more information.");
  script_tag(name:"qod_type", value:"package");
  script_tag(name:"solution_type", value:"VendorFix");

  exit(0);
}

include("revisions-lib.inc");
include("pkg-lib-deb.inc");

release = dpkg_get_ssh_release();
if(!release)
  exit(0);

res = "";

if(release == "UBUNTU12.04 LTS")
{

  if ((res = isdpkgvuln(pkg:"xul-ext-ubufox", ver:"2.6-0ubuntu0.12.04.1", rls:"UBUNTU12.04 LTS")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if (__pkg_match) exit(99);
  exit(0);
}


if(release == "UBUNTU11.10")
{

  if ((res = isdpkgvuln(pkg:"xul-ext-ubufox", ver:"2.6-0ubuntu0.11.10.1", rls:"UBUNTU11.10")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if (__pkg_match) exit(99);
  exit(0);
}


if(release == "UBUNTU10.04 LTS")
{

  if ((res = isdpkgvuln(pkg:"xul-ext-ubufox", ver:"2.6-0ubuntu0.10.04.1", rls:"UBUNTU10.04 LTS")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if (__pkg_match) exit(99);
  exit(0);
}


if(release == "UBUNTU12.10")
{

  if ((res = isdpkgvuln(pkg:"xul-ext-ubufox", ver:"2.6-0ubuntu0.12.10.1", rls:"UBUNTU12.10")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if (__pkg_match) exit(99);
  exit(0);
}