ID OPENVAS:1361412562310870194 Type openvas Reporter Copyright (C) 2009 Greenbone Networks GmbH Modified 2018-04-06T00:00:00
Description
Check for the Version of thunderbird
###############################################################################
# OpenVAS Vulnerability Test
#
# RedHat Update for thunderbird RHSA-2007:1083-01
#
# Authors:
# System Generated Check
#
# Copyright:
# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################
include("revisions-lib.inc");
tag_insight = "Mozilla Thunderbird is a standalone mail and newsgroup client.
A cross-site scripting flaw was found in the way Thunderbird handled the
jar: URI scheme. It may be possible for a malicious HTML mail message to
leverage this flaw, and conduct a cross-site scripting attack against a
user running Thunderbird. (CVE-2007-5947)
Several flaws were found in the way Thunderbird processed certain malformed
HTML mail content. A HTML mail message containing malicious content could
cause Thunderbird to crash, or potentially execute arbitrary code as the
user running Thunderbird. (CVE-2007-5959)
A race condition existed when Thunderbird set the "window.location"
property when displaying HTML mail content. This flaw could allow a HTML
mail message to set an arbitrary Referer header, which may lead to a
Cross-site Request Forgery (CSRF) attack against websites that rely only on
the Referer header for protection. (CVE-2007-5960)
All users of thunderbird are advised to upgrade to these updated packages,
which contain backported patches to resolve these issues.";
tag_affected = "thunderbird on Red Hat Enterprise Linux AS version 4,
Red Hat Enterprise Linux ES version 4,
Red Hat Enterprise Linux WS version 4";
tag_solution = "Please Install the Updated Packages.";
if(description)
{
script_xref(name : "URL" , value : "https://www.redhat.com/archives/rhsa-announce/2007-December/msg00017.html");
script_oid("1.3.6.1.4.1.25623.1.0.870194");
script_version("$Revision: 9370 $");
script_tag(name:"last_modification", value:"$Date: 2018-04-06 10:53:14 +0200 (Fri, 06 Apr 2018) $");
script_tag(name:"creation_date", value:"2009-03-06 07:30:35 +0100 (Fri, 06 Mar 2009)");
script_tag(name:"cvss_base", value:"9.3");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:C/I:C/A:C");
script_xref(name: "RHSA", value: "2007:1083-01");
script_cve_id("CVE-2007-5947", "CVE-2007-5959", "CVE-2007-5960");
script_name( "RedHat Update for thunderbird RHSA-2007:1083-01");
script_tag(name:"summary", value:"Check for the Version of thunderbird");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2009 Greenbone Networks GmbH");
script_family("Red Hat Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/rhel", "ssh/login/rpms");
script_tag(name : "affected" , value : tag_affected);
script_tag(name : "solution" , value : tag_solution);
script_tag(name : "insight" , value : tag_insight);
script_tag(name:"qod_type", value:"package");
script_tag(name:"solution_type", value:"VendorFix");
exit(0);
}
include("pkg-lib-rpm.inc");
release = get_kb_item("ssh/login/release");
res = "";
if(release == NULL){
exit(0);
}
if(release == "RHENT_4")
{
if ((res = isrpmvuln(pkg:"thunderbird", rpm:"thunderbird~1.5.0.12~7.el4", rls:"RHENT_4")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"thunderbird-debuginfo", rpm:"thunderbird-debuginfo~1.5.0.12~7.el4", rls:"RHENT_4")) != NULL)
{
security_message(data:res);
exit(0);
}
if (__pkg_match) exit(99); # Not vulnerable.
exit(0);
}
{"id": "OPENVAS:1361412562310870194", "type": "openvas", "bulletinFamily": "scanner", "title": "RedHat Update for thunderbird RHSA-2007:1083-01", "description": "Check for the Version of thunderbird", "published": "2009-03-06T00:00:00", "modified": "2018-04-06T00:00:00", "cvss": {"vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/", "score": 9.3}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310870194", "reporter": "Copyright (C) 2009 Greenbone Networks GmbH", "references": ["2007:1083-01", "https://www.redhat.com/archives/rhsa-announce/2007-December/msg00017.html"], "cvelist": ["CVE-2007-5947", "CVE-2007-5960", "CVE-2007-5959"], "lastseen": "2018-04-09T11:39:03", "viewCount": 1, "enchantments": {"score": {"value": 7.2, "vector": "NONE", "modified": "2018-04-09T11:39:03", "rev": 2}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2007-5960", "CVE-2007-5959", "CVE-2007-5947"]}, {"type": "ubuntu", "idList": ["USN-546-1", "USN-546-2"]}, {"type": "centos", "idList": ["CESA-2007:1082", "CESA-2007:1084", "CESA-2007:1083", "CESA-2007:1084-01"]}, {"type": "suse", "idList": ["SUSE-SA:2007:066"]}, {"type": "redhat", "idList": ["RHSA-2007:1084", "RHSA-2007:1083", "RHSA-2007:1082"]}, {"type": "oraclelinux", "idList": ["ELSA-2007-1082", "ELSA-2007-1084", "ELSA-2007-1083"]}, {"type": "debian", "idList": ["DEBIAN:DSA-1424-1:334EF", "DEBIAN:DSA-1425-1:46BA9"]}, {"type": "fedora", "idList": ["FEDORA:LB3FHVBJ016346"]}, {"type": "gentoo", "idList": ["GLSA-200712-21"]}, {"type": "nessus", "idList": ["ORACLELINUX_ELSA-2007-1082.NASL", "SEAMONKEY_117.NASL", "DEBIAN_DSA-1425.NASL", "SLACKWARE_SSA_2007-333-01.NASL", "FEDORA_2007-4098.NASL", "UBUNTU_USN-546-1.NASL", "CENTOS_RHSA-2007-1083.NASL", "SUSE_MOZILLAFIREFOX-4758.NASL", "MANDRAKE_MDKSA-2007-246.NASL", "UBUNTU_USN-546-2.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:861351", "OPENVAS:59924", "OPENVAS:861529", "OPENVAS:861391", "OPENVAS:861071", "OPENVAS:65377", "OPENVAS:840062", "OPENVAS:861029", "OPENVAS:861360", "OPENVAS:861156"]}], "modified": "2018-04-09T11:39:03", "rev": 2}, "vulnersScore": 7.2}, "pluginID": "1361412562310870194", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for thunderbird RHSA-2007:1083-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Mozilla Thunderbird is a standalone mail and newsgroup client.\n\n A cross-site scripting flaw was found in the way Thunderbird handled the\n jar: URI scheme. It may be possible for a malicious HTML mail message to\n leverage this flaw, and conduct a cross-site scripting attack against a\n user running Thunderbird. (CVE-2007-5947)\n \n Several flaws were found in the way Thunderbird processed certain malformed\n HTML mail content. A HTML mail message containing malicious content could\n cause Thunderbird to crash, or potentially execute arbitrary code as the\n user running Thunderbird. (CVE-2007-5959)\n \n A race condition existed when Thunderbird set the "window.location"\n property when displaying HTML mail content. This flaw could allow a HTML\n mail message to set an arbitrary Referer header, which may lead to a\n Cross-site Request Forgery (CSRF) attack against websites that rely only on\n the Referer header for protection. (CVE-2007-5960) \n \n All users of thunderbird are advised to upgrade to these updated packages,\n which contain backported patches to resolve these issues.\";\n\ntag_affected = \"thunderbird on Red Hat Enterprise Linux AS version 4,\n Red Hat Enterprise Linux ES version 4,\n Red Hat Enterprise Linux WS version 4\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/rhsa-announce/2007-December/msg00017.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.870194\");\n script_version(\"$Revision: 9370 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 10:53:14 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-03-06 07:30:35 +0100 (Fri, 06 Mar 2009)\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"RHSA\", value: \"2007:1083-01\");\n script_cve_id(\"CVE-2007-5947\", \"CVE-2007-5959\", \"CVE-2007-5960\");\n script_name( \"RedHat Update for thunderbird RHSA-2007:1083-01\");\n\n script_tag(name:\"summary\", value:\"Check for the Version of thunderbird\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"RHENT_4\")\n{\n\n if ((res = isrpmvuln(pkg:\"thunderbird\", rpm:\"thunderbird~1.5.0.12~7.el4\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"thunderbird-debuginfo\", rpm:\"thunderbird-debuginfo~1.5.0.12~7.el4\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "naslFamily": "Red Hat Local Security Checks"}
{"cve": [{"lastseen": "2020-12-09T19:26:09", "description": "The jar protocol handler in Mozilla Firefox before 2.0.0.10 and SeaMonkey before 1.1.7 retrieves the inner URL regardless of its MIME type, and considers HTML documents within a jar archive to have the same origin as the inner URL, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a jar: URI.", "edition": 5, "cvss3": {}, "published": "2007-11-14T01:46:00", "title": "CVE-2007-5947", "type": "cve", "cwe": ["CWE-79"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2007-5947"], "modified": "2018-10-15T21:47:00", "cpe": ["cpe:/a:mozilla:firefox:2.0.0.9", "cpe:/a:mozilla:firefox:2.0.0.8", "cpe:/a:mozilla:seamonkey:1.1.2", "cpe:/a:mozilla:firefox:2.0.0.3", "cpe:/a:mozilla:firefox:2.0.0.2", "cpe:/a:mozilla:seamonkey:1.1.6", "cpe:/a:mozilla:firefox:2.0.0.7", "cpe:/a:mozilla:seamonkey:1.1.5", "cpe:/a:mozilla:seamonkey:1.1.4", "cpe:/a:mozilla:firefox:2.0.0.1", "cpe:/a:mozilla:seamonkey:1.1.3", "cpe:/a:mozilla:firefox:2.0.0.6", "cpe:/a:mozilla:firefox:2.0.0.5", "cpe:/a:mozilla:seamonkey:1.1.1", "cpe:/a:mozilla:firefox:2.0.0.4"], "id": "CVE-2007-5947", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-5947", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*"]}, {"lastseen": "2020-10-03T11:45:55", "description": "Multiple unspecified vulnerabilities in Mozilla Firefox before 2.0.0.10 and SeaMonkey before 1.1.7 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors that trigger memory corruption.", "edition": 3, "cvss3": {}, "published": "2007-11-26T23:46:00", "title": "CVE-2007-5959", "type": "cve", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2007-5959"], "modified": "2018-10-15T21:47:00", "cpe": ["cpe:/a:mozilla:seamonkey:1.0.8", "cpe:/a:mozilla:firefox:2.0.0.9", "cpe:/a:mozilla:firefox:1.5.0.3", "cpe:/a:mozilla:firefox:1.5.0.2", "cpe:/a:mozilla:firefox:2.0.0.8", "cpe:/a:mozilla:firefox:1.5.1", "cpe:/a:mozilla:firefox:1.5.4", "cpe:/a:mozilla:seamonkey:1.0.2", "cpe:/a:mozilla:seamonkey:1.1.2", "cpe:/a:mozilla:seamonkey:1.0", "cpe:/a:mozilla:firefox:2.0.0.3", "cpe:/a:mozilla:firefox:2.0.0.2", "cpe:/a:mozilla:firefox:1.5.0.1", "cpe:/a:mozilla:firefox:0.8", "cpe:/a:mozilla:seamonkey:1.0.9", "cpe:/a:mozilla:firefox:1.5.7", "cpe:/a:mozilla:firefox:1.0.5", "cpe:/a:mozilla:firefox:0.10.1", "cpe:/a:mozilla:firefox:2.0", "cpe:/a:mozilla:firefox:1.0", "cpe:/a:mozilla:firefox:1.0.3", "cpe:/a:mozilla:firefox:1.8", "cpe:/a:mozilla:firefox:1.5.0.5", "cpe:/a:mozilla:firefox:1.5.0.12", "cpe:/a:mozilla:firefox:0.9.2", "cpe:/a:mozilla:firefox:1.5.6", "cpe:/a:mozilla:firefox:1.0.4", "cpe:/a:mozilla:firefox:2.0.0.7", "cpe:/a:mozilla:firefox:1.0.7", "cpe:/a:mozilla:seamonkey:1.1.5", "cpe:/a:mozilla:firefox:1.0.6", "cpe:/a:mozilla:firefox:1.0.1", "cpe:/a:mozilla:seamonkey:1.1.4", "cpe:/a:mozilla:firefox:1.5.0.10", "cpe:/a:mozilla:firefox:1.0.2", "cpe:/a:mozilla:seamonkey:1.0.6", "cpe:/a:mozilla:firefox:1.5.8", "cpe:/a:mozilla:firefox:0.10", "cpe:/a:mozilla:firefox:0.9.1", "cpe:/a:mozilla:seamonkey:1.0.4", "cpe:/a:mozilla:seamonkey:1.0.5", "cpe:/a:mozilla:firefox:1.5.5", "cpe:/a:mozilla:firefox:1.5.0.4", "cpe:/a:mozilla:firefox:2.0.0.1", "cpe:/a:mozilla:firefox:1.5.0.9", "cpe:/a:mozilla:seamonkey:1.0.7", "cpe:/a:mozilla:firefox:1.5.2", "cpe:/a:mozilla:seamonkey:1.1.3", "cpe:/a:mozilla:firefox:1.5.0.11", "cpe:/a:mozilla:firefox:1.5.0.6", "cpe:/a:mozilla:firefox:2.0.0.6", "cpe:/a:mozilla:firefox:2.0.0.5", "cpe:/a:mozilla:firefox:1.5", "cpe:/a:mozilla:firefox:1.5.0.7", "cpe:/a:mozilla:firefox:1.5.3", "cpe:/a:mozilla:firefox:1.0.8", "cpe:/a:mozilla:firefox:1.5.0.8", "cpe:/a:mozilla:firefox:0.9", "cpe:/a:mozilla:seamonkey:1.0.1", "cpe:/a:mozilla:seamonkey:1.0.3", "cpe:/a:mozilla:seamonkey:1.1", "cpe:/a:mozilla:firefox:2.0.0.4", "cpe:/a:mozilla:firefox:0.9.3"], "id": "CVE-2007-5959", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-5959", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.9.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.9.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0:rc3:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T19:26:09", "description": "Mozilla Firefox before 2.0.0.10 and SeaMonkey before 1.1.7 sets the Referer header to the window or frame in which script is running, instead of the address of the content that initiated the script, which allows remote attackers to spoof HTTP Referer headers and bypass Referer-based CSRF protection schemes by setting window.location and using a modal alert dialog that causes the wrong Referer to be sent.", "edition": 5, "cvss3": {}, "published": "2007-11-26T23:46:00", "title": "CVE-2007-5960", "type": "cve", "cwe": ["CWE-22"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2007-5960"], "modified": "2018-10-15T21:48:00", "cpe": ["cpe:/a:mozilla:firefox:2.0.0.9", "cpe:/a:mozilla:firefox:1.5.0.3", "cpe:/a:mozilla:firefox:1.5.0.2", "cpe:/a:mozilla:firefox:2.0.0.8", "cpe:/a:mozilla:firefox:1.5.1", "cpe:/a:mozilla:firefox:1.5.4", "cpe:/a:mozilla:firefox:2.0.0.3", "cpe:/a:mozilla:firefox:2.0.0.2", "cpe:/a:mozilla:firefox:1.5.0.1", "cpe:/a:mozilla:firefox:0.8", "cpe:/a:mozilla:firefox:1.5.7", "cpe:/a:mozilla:firefox:1.0.5", "cpe:/a:mozilla:firefox:0.10.1", "cpe:/a:mozilla:firefox:2.0", "cpe:/a:mozilla:firefox:1.0", "cpe:/a:mozilla:firefox:1.0.3", "cpe:/a:mozilla:firefox:1.8", "cpe:/a:mozilla:firefox:1.5.0.5", "cpe:/a:mozilla:firefox:1.5.0.12", "cpe:/a:mozilla:firefox:0.9.2", "cpe:/a:mozilla:firefox:1.5.6", "cpe:/a:mozilla:firefox:1.0.4", "cpe:/a:mozilla:firefox:2.0.0.7", "cpe:/a:mozilla:firefox:1.0.7", "cpe:/a:mozilla:firefox:1.0.6", "cpe:/a:mozilla:firefox:1.0.1", "cpe:/a:mozilla:firefox:1.5.0.10", "cpe:/a:mozilla:firefox:1.0.2", "cpe:/a:mozilla:firefox:1.5.8", "cpe:/a:mozilla:firefox:0.10", "cpe:/a:mozilla:firefox:0.9.1", "cpe:/a:mozilla:firefox:1.5.5", "cpe:/a:mozilla:firefox:1.5.0.4", "cpe:/a:mozilla:firefox:2.0.0.1", "cpe:/a:mozilla:firefox:1.5.0.9", "cpe:/a:mozilla:firefox:1.5.2", "cpe:/a:mozilla:firefox:1.5.0.11", "cpe:/a:mozilla:firefox:1.5.0.6", "cpe:/a:mozilla:firefox:2.0.0.6", "cpe:/a:mozilla:firefox:2.0.0.5", "cpe:/a:mozilla:firefox:1.5", "cpe:/a:mozilla:firefox:1.5.0.7", "cpe:/a:mozilla:seamonkey:1.1.7", "cpe:/a:mozilla:firefox:1.5.3", "cpe:/a:mozilla:firefox:1.0.8", "cpe:/a:mozilla:firefox:1.5.0.8", "cpe:/a:mozilla:firefox:0.9", "cpe:/a:mozilla:firefox:2.0.0.4", "cpe:/a:mozilla:firefox:0.9.3"], "id": "CVE-2007-5960", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-5960", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.9.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.9.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0:rc3:*:*:*:*:*:*"]}], "ubuntu": [{"lastseen": "2020-07-09T00:20:30", "bulletinFamily": "unix", "cvelist": ["CVE-2007-5947", "CVE-2007-5960", "CVE-2007-5959"], "description": "It was discovered that Firefox incorrectly associated redirected sites \nas the origin of \"jar:\" contents. A malicious web site could exploit this \nto modify or steal confidential data (such as passwords) from other web \nsites. (CVE-2007-5947)\n\nVarious flaws were discovered in the layout and JavaScript engines. By \ntricking a user into opening a malicious web page, an attacker could \nexecute arbitrary code with the user's privileges. (CVE-2007-5959)\n\nGregory Fleischer discovered that it was possible to use JavaScript to \nmanipulate Firefox's Referer header. A malicious web site could exploit \nthis to conduct cross-site request forgeries against sites that relied \nonly on Referer headers for protection from such attacks. (CVE-2007-5960)", "edition": 5, "modified": "2007-11-26T00:00:00", "published": "2007-11-26T00:00:00", "id": "USN-546-1", "href": "https://ubuntu.com/security/notices/USN-546-1", "title": "Firefox vulnerabilities", "type": "ubuntu", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-07-09T00:23:24", "bulletinFamily": "unix", "cvelist": ["CVE-2007-5947", "CVE-2007-5960", "CVE-2007-5959"], "description": "USN-546-1 fixed vulnerabilities in Firefox. The upstream update included \na faulty patch which caused the drawImage method of the canvas element to \nfail. This update fixes the problem.\n\nWe apologize for the inconvenience.\n\nOriginal advisory details:\n\nIt was discovered that Firefox incorrectly associated redirected sites \nas the origin of \"jar:\" contents. A malicious web site could exploit this \nto modify or steal confidential data (such as passwords) from other web \nsites. (CVE-2007-5947)\n\nVarious flaws were discovered in the layout and JavaScript engines. By \ntricking a user into opening a malicious web page, an attacker could \nexecute arbitrary code with the user's privileges. (CVE-2007-5959)\n\nGregory Fleischer discovered that it was possible to use JavaScript to \nmanipulate Firefox's Referer header. A malicious web site could exploit \nthis to conduct cross-site request forgeries against sites that relied \nonly on Referer headers for protection from such attacks. (CVE-2007-5960)", "edition": 5, "modified": "2007-12-04T00:00:00", "published": "2007-12-04T00:00:00", "id": "USN-546-2", "href": "https://ubuntu.com/security/notices/USN-546-2", "title": "Firefox regression", "type": "ubuntu", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "centos": [{"lastseen": "2019-12-20T18:24:52", "bulletinFamily": "unix", "cvelist": ["CVE-2007-5947", "CVE-2007-5960", "CVE-2007-5959"], "description": "**CentOS Errata and Security Advisory** CESA-2007:1084-01\n\n\nSeaMonkey is an open source Web browser, advanced email and newsgroup\r\nclient, IRC chat client, and HTML editor.\r\n\r\nA cross-site scripting flaw was found in the way SeaMonkey handled the\r\njar: URI scheme. It was possible for a malicious website to leverage this\r\nflaw and conduct a cross-site scripting attack against a user running\r\nSeaMonkey. (CVE-2007-5947)\r\n\r\nSeveral flaws were found in the way SeaMonkey processed certain malformed\r\nweb content. A webpage containing malicious content could cause SeaMonkey\r\nto crash, or potentially execute arbitrary code as the user running\r\nSeaMonkey. (CVE-2007-5959)\r\n\r\nA race condition existed when Seamonkey set the \"window.location\" property\r\nfor a webpage. This flaw could allow a webpage to set an arbitrary Referer\r\nheader, which may lead to a Cross-site Request Forgery (CSRF) attack\r\nagainst websites that rely only on the Referer header for protection.\r\n(CVE-2007-5960)\r\n\r\nUsers of SeaMonkey are advised to upgrade to these updated packages, which\r\ncontain backported patches to resolve these issues.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2007-November/026508.html\n\n**Affected packages:**\nseamonkey\nseamonkey-chat\nseamonkey-devel\nseamonkey-dom-inspector\nseamonkey-js-debugger\nseamonkey-mail\nseamonkey-nspr\nseamonkey-nspr-devel\nseamonkey-nss\nseamonkey-nss-devel\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/rh21as-errata.html", "edition": 3, "modified": "2007-11-30T03:00:22", "published": "2007-11-30T03:00:22", "href": "http://lists.centos.org/pipermail/centos-announce/2007-November/026508.html", "id": "CESA-2007:1084-01", "title": "seamonkey security update", "type": "centos", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-12-20T18:27:45", "bulletinFamily": "unix", "cvelist": ["CVE-2007-5947", "CVE-2007-5960", "CVE-2007-5959"], "description": "**CentOS Errata and Security Advisory** CESA-2007:1082\n\n\nMozilla Firefox is an open source Web browser.\r\n\r\nA cross-site scripting flaw was found in the way Firefox handled the\r\njar: URI scheme. It was possible for a malicious website to leverage this\r\nflaw and conduct a cross-site scripting attack against a user running\r\nFirefox. (CVE-2007-5947)\r\n\r\nSeveral flaws were found in the way Firefox processed certain malformed web\r\ncontent. A webpage containing malicious content could cause Firefox to\r\ncrash, or potentially execute arbitrary code as the user running Firefox.\r\n(CVE-2007-5959)\r\n\r\nA race condition existed when Firefox set the \"window.location\" property\r\nfor a webpage. This flaw could allow a webpage to set an arbitrary Referer\r\nheader, which may lead to a Cross-site Request Forgery (CSRF) attack\r\nagainst websites that rely only on the Referer header for protection.\r\n(CVE-2007-5960)\r\n\r\nUsers of Firefox are advised to upgrade to these updated packages, which\r\ncontain backported patches to resolve these issues.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2007-December/026513.html\nhttp://lists.centos.org/pipermail/centos-announce/2007-November/026499.html\nhttp://lists.centos.org/pipermail/centos-announce/2007-November/026500.html\nhttp://lists.centos.org/pipermail/centos-announce/2007-November/026511.html\n\n**Affected packages:**\nfirefox\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2007-1082.html", "edition": 3, "modified": "2007-12-01T20:20:41", "published": "2007-11-29T13:07:34", "href": "http://lists.centos.org/pipermail/centos-announce/2007-November/026499.html", "id": "CESA-2007:1082", "title": "firefox security update", "type": "centos", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-12-20T18:26:16", "bulletinFamily": "unix", "cvelist": ["CVE-2007-5947", "CVE-2007-5960", "CVE-2007-5959"], "description": "**CentOS Errata and Security Advisory** CESA-2007:1083\n\n\nMozilla Thunderbird is a standalone mail and newsgroup client.\r\n\r\nA cross-site scripting flaw was found in the way Thunderbird handled the\r\njar: URI scheme. It may be possible for a malicious HTML mail message to\r\nleverage this flaw, and conduct a cross-site scripting attack against a\r\nuser running Thunderbird. (CVE-2007-5947)\r\n\r\nSeveral flaws were found in the way Thunderbird processed certain malformed\r\nHTML mail content. A HTML mail message containing malicious content could\r\ncause Thunderbird to crash, or potentially execute arbitrary code as the\r\nuser running Thunderbird. (CVE-2007-5959)\r\n\r\nA race condition existed when Thunderbird set the \"window.location\"\r\nproperty when displaying HTML mail content. This flaw could allow a HTML\r\nmail message to set an arbitrary Referer header, which may lead to a\r\nCross-site Request Forgery (CSRF) attack against websites that rely only on\r\nthe Referer header for protection. (CVE-2007-5960) \r\n\r\nAll users of thunderbird are advised to upgrade to these updated packages,\r\nwhich contain backported patches to resolve these issues.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2007-December/026585.html\nhttp://lists.centos.org/pipermail/centos-announce/2007-December/026586.html\nhttp://lists.centos.org/pipermail/centos-announce/2007-December/026590.html\nhttp://lists.centos.org/pipermail/centos-announce/2007-December/026592.html\nhttp://lists.centos.org/pipermail/centos-announce/2007-December/026595.html\nhttp://lists.centos.org/pipermail/centos-announce/2007-December/026596.html\n\n**Affected packages:**\nthunderbird\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2007-1083.html", "edition": 3, "modified": "2007-12-22T19:35:57", "published": "2007-12-21T16:34:10", "href": "http://lists.centos.org/pipermail/centos-announce/2007-December/026585.html", "id": "CESA-2007:1083", "title": "thunderbird security update", "type": "centos", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-12-20T18:26:01", "bulletinFamily": "unix", "cvelist": ["CVE-2007-5947", "CVE-2007-5960", "CVE-2007-5959"], "description": "**CentOS Errata and Security Advisory** CESA-2007:1084\n\n\nSeaMonkey is an open source Web browser, advanced email and newsgroup\r\nclient, IRC chat client, and HTML editor.\r\n\r\nA cross-site scripting flaw was found in the way SeaMonkey handled the\r\njar: URI scheme. It was possible for a malicious website to leverage this\r\nflaw and conduct a cross-site scripting attack against a user running\r\nSeaMonkey. (CVE-2007-5947)\r\n\r\nSeveral flaws were found in the way SeaMonkey processed certain malformed\r\nweb content. A webpage containing malicious content could cause SeaMonkey\r\nto crash, or potentially execute arbitrary code as the user running\r\nSeaMonkey. (CVE-2007-5959)\r\n\r\nA race condition existed when Seamonkey set the \"window.location\" property\r\nfor a webpage. This flaw could allow a webpage to set an arbitrary Referer\r\nheader, which may lead to a Cross-site Request Forgery (CSRF) attack\r\nagainst websites that rely only on the Referer header for protection.\r\n(CVE-2007-5960)\r\n\r\nUsers of SeaMonkey are advised to upgrade to these updated packages, which\r\ncontain backported patches to resolve these issues.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2007-December/026512.html\nhttp://lists.centos.org/pipermail/centos-announce/2007-November/026496.html\nhttp://lists.centos.org/pipermail/centos-announce/2007-November/026497.html\nhttp://lists.centos.org/pipermail/centos-announce/2007-November/026498.html\nhttp://lists.centos.org/pipermail/centos-announce/2007-November/026501.html\nhttp://lists.centos.org/pipermail/centos-announce/2007-November/026510.html\n\n**Affected packages:**\nseamonkey\nseamonkey-chat\nseamonkey-devel\nseamonkey-dom-inspector\nseamonkey-js-debugger\nseamonkey-mail\nseamonkey-nspr\nseamonkey-nspr-devel\nseamonkey-nss\nseamonkey-nss-devel\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2007-1084.html", "edition": 3, "modified": "2007-12-01T09:26:30", "published": "2007-11-28T19:08:58", "href": "http://lists.centos.org/pipermail/centos-announce/2007-November/026496.html", "id": "CESA-2007:1084", "title": "seamonkey security update", "type": "centos", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "suse": [{"lastseen": "2016-09-04T12:46:24", "bulletinFamily": "unix", "cvelist": ["CVE-2007-5947", "CVE-2007-5960", "CVE-2007-5959"], "description": "The Mozilla Firefox packages were brought to security update version 2.0.0.10 for SUSE Linux Enterprise 10, SUSE Linux 10.0, 10.1 and openSUSE 10.2 and 10.3.\n#### Solution\nThere is no known workaround, please install the update packages.", "edition": 1, "modified": "2007-12-05T17:10:54", "published": "2007-12-05T17:10:54", "id": "SUSE-SA:2007:066", "href": "http://lists.opensuse.org/opensuse-security-announce/2007-12/msg00004.html", "title": "remote code execution in MozillaFirefox", "type": "suse", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "redhat": [{"lastseen": "2019-08-13T18:45:53", "bulletinFamily": "unix", "cvelist": ["CVE-2007-5947", "CVE-2007-5959", "CVE-2007-5960"], "description": "Mozilla Firefox is an open source Web browser.\r\n\r\nA cross-site scripting flaw was found in the way Firefox handled the\r\njar: URI scheme. It was possible for a malicious website to leverage this\r\nflaw and conduct a cross-site scripting attack against a user running\r\nFirefox. (CVE-2007-5947)\r\n\r\nSeveral flaws were found in the way Firefox processed certain malformed web\r\ncontent. A webpage containing malicious content could cause Firefox to\r\ncrash, or potentially execute arbitrary code as the user running Firefox.\r\n(CVE-2007-5959)\r\n\r\nA race condition existed when Firefox set the \"window.location\" property\r\nfor a webpage. This flaw could allow a webpage to set an arbitrary Referer\r\nheader, which may lead to a Cross-site Request Forgery (CSRF) attack\r\nagainst websites that rely only on the Referer header for protection.\r\n(CVE-2007-5960)\r\n\r\nUsers of Firefox are advised to upgrade to these updated packages, which\r\ncontain backported patches to resolve these issues.", "modified": "2017-09-08T11:54:52", "published": "2007-11-26T05:00:00", "id": "RHSA-2007:1082", "href": "https://access.redhat.com/errata/RHSA-2007:1082", "type": "redhat", "title": "(RHSA-2007:1082) Critical: firefox security update", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-08-13T18:46:35", "bulletinFamily": "unix", "cvelist": ["CVE-2007-5947", "CVE-2007-5959", "CVE-2007-5960"], "description": "Mozilla Thunderbird is a standalone mail and newsgroup client.\r\n\r\nA cross-site scripting flaw was found in the way Thunderbird handled the\r\njar: URI scheme. It may be possible for a malicious HTML mail message to\r\nleverage this flaw, and conduct a cross-site scripting attack against a\r\nuser running Thunderbird. (CVE-2007-5947)\r\n\r\nSeveral flaws were found in the way Thunderbird processed certain malformed\r\nHTML mail content. A HTML mail message containing malicious content could\r\ncause Thunderbird to crash, or potentially execute arbitrary code as the\r\nuser running Thunderbird. (CVE-2007-5959)\r\n\r\nA race condition existed when Thunderbird set the \"window.location\"\r\nproperty when displaying HTML mail content. This flaw could allow a HTML\r\nmail message to set an arbitrary Referer header, which may lead to a\r\nCross-site Request Forgery (CSRF) attack against websites that rely only on\r\nthe Referer header for protection. (CVE-2007-5960) \r\n\r\nAll users of thunderbird are advised to upgrade to these updated packages,\r\nwhich contain backported patches to resolve these issues.", "modified": "2017-09-08T12:14:19", "published": "2007-12-19T05:00:00", "id": "RHSA-2007:1083", "href": "https://access.redhat.com/errata/RHSA-2007:1083", "type": "redhat", "title": "(RHSA-2007:1083) Moderate: thunderbird security update", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-08-13T18:46:15", "bulletinFamily": "unix", "cvelist": ["CVE-2007-5947", "CVE-2007-5959", "CVE-2007-5960"], "description": "SeaMonkey is an open source Web browser, advanced email and newsgroup\r\nclient, IRC chat client, and HTML editor.\r\n\r\nA cross-site scripting flaw was found in the way SeaMonkey handled the\r\njar: URI scheme. It was possible for a malicious website to leverage this\r\nflaw and conduct a cross-site scripting attack against a user running\r\nSeaMonkey. (CVE-2007-5947)\r\n\r\nSeveral flaws were found in the way SeaMonkey processed certain malformed\r\nweb content. A webpage containing malicious content could cause SeaMonkey\r\nto crash, or potentially execute arbitrary code as the user running\r\nSeaMonkey. (CVE-2007-5959)\r\n\r\nA race condition existed when Seamonkey set the \"window.location\" property\r\nfor a webpage. This flaw could allow a webpage to set an arbitrary Referer\r\nheader, which may lead to a Cross-site Request Forgery (CSRF) attack\r\nagainst websites that rely only on the Referer header for protection.\r\n(CVE-2007-5960)\r\n\r\nUsers of SeaMonkey are advised to upgrade to these updated packages, which\r\ncontain backported patches to resolve these issues.", "modified": "2019-03-22T23:42:43", "published": "2007-11-26T05:00:00", "id": "RHSA-2007:1084", "href": "https://access.redhat.com/errata/RHSA-2007:1084", "type": "redhat", "title": "(RHSA-2007:1084) Critical: seamonkey security update", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "oraclelinux": [{"lastseen": "2019-05-29T18:34:13", "bulletinFamily": "unix", "cvelist": ["CVE-2007-5947", "CVE-2007-5960", "CVE-2007-5959"], "description": " [1.0.9-0.7.el3.0.1]\n - Add mozilla-home-page.patch, mozilla-oracle-default-bookmarks.html, and\n mozilla-oracle-default-prefs.js\n \n [1.0.9-0.7.el3]\n - Add patches for mozilla bugs:\n 369814,373911,391028,393326,402649,403331 ", "edition": 4, "modified": "2007-11-27T00:00:00", "published": "2007-11-27T00:00:00", "id": "ELSA-2007-1084", "href": "http://linux.oracle.com/errata/ELSA-2007-1084.html", "title": "Critical: seamonkey security update ", "type": "oraclelinux", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:39:40", "bulletinFamily": "unix", "cvelist": ["CVE-2007-5947", "CVE-2007-5960", "CVE-2007-5959"], "description": " [1.5.0.12-7.el4.0.1]\n - Add thunderbird-oracle-default-prefs.js for errata rebuild\n \n [1.5.0.12-7]\n - Add patches for mozilla bugs:\n 369814,373911,391028,393326,402649,403331 ", "edition": 4, "modified": "2007-12-19T00:00:00", "published": "2007-12-19T00:00:00", "id": "ELSA-2007-1083", "href": "http://linux.oracle.com/errata/ELSA-2007-1083.html", "title": "Moderate: thunderbird security update ", "type": "oraclelinux", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:35:17", "bulletinFamily": "unix", "cvelist": ["CVE-2007-5947", "CVE-2007-5960", "CVE-2007-5959"], "description": " [1.5.0.12-7.0.1]\n - Added Oracle specific links into default bookmarks.\n \n [1.5.0.12-7]\n - Add patches for mozilla bugs:\n 369814,373911,391028,393326,402649,403331 ", "edition": 4, "modified": "2007-11-27T00:00:00", "published": "2007-11-27T00:00:00", "id": "ELSA-2007-1082", "href": "http://linux.oracle.com/errata/ELSA-2007-1082.html", "title": "Critical: firefox security update ", "type": "oraclelinux", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "debian": [{"lastseen": "2020-11-11T13:14:32", "bulletinFamily": "unix", "cvelist": ["CVE-2007-5947", "CVE-2007-5960", "CVE-2007-5959"], "description": "- ------------------------------------------------------------------------\nDebian Security Advisory DSA-1424-1 security@debian.org\nhttp://www.debian.org/security/ Moritz Muehlenhoff\nDecember 08, 2007 http://www.debian.org/security/faq\n- ------------------------------------------------------------------------\n\nPackage : iceweasel\nVulnerability : several\nProblem-Type : remote\nDebian-specific: no\nCVE ID : CVE-2007-5947 CVE-2007-5959 CVE-2007-5960\n\nSeveral remote vulnerabilities have been discovered in the Iceweasel web\nbrowser, an unbranded version of the Firefox browser. The Common\nVulnerabilities and Exposures project identifies the following problems:\n\nCVE-2007-5947\n\n Jesse Ruderman and Petko D. Petkov discovered that the URI handler\n for JAR archives allows cross-site scripting.\n\nCVE-2007-5959\n\n Several crashes in the layout engine were discovered, which might\n allow the execution of arbitrary code.\n\nCVE-2007-5960\n\n Gregory Fleischer discovered a race condition in the handling of\n the "window.location" property, which might lead to cross-site\n request forgery.\n\nThe Mozilla products in the oldstable distribution (sarge) are no longer\nsupported with with security updates.\n\nFor the stable distribution (etch) these problems have been fixed in\nversion 2.0.0.10-0etch1.\n\nFor the unstable distribution (sid) these problems have been fixed in\nversion 2.0.0.10-2.\n\nWe recommend that you upgrade your iceweasel packages.\n\n\nUpgrade instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file.\n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration.\n\n\nDebian 4.0 (stable)\n- -------------------\n\nStable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.\n\nSource archives:\n\n http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.10-0etch1.dsc\n Size/MD5 checksum: 1289 30031e99f0594521e649eb8f7f080a54\n http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.10.orig.tar.gz\n Size/MD5 checksum: 43505088 f016638930a16c0a44fb0b13b6804f99\n http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.10-0etch1.diff.gz\n Size/MD5 checksum: 186288 75492d134ad78c2a3f8c7a3f851d0e6c\n\nArchitecture independent packages:\n\n http://security.debian.org/pool/updates/main/i/iceweasel/mozilla-firefox_2.0.0.10-0etch1_all.deb\n Size/MD5 checksum: 54716 09cee6268a092b9300beb2bd1ea7bf67\n http://security.debian.org/pool/updates/main/i/iceweasel/firefox-gnome-support_2.0.0.10-0etch1_all.deb\n Size/MD5 checksum: 54044 ceeb90ee28309be4785fac53f659d21d\n http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dom-inspector_2.0.0.10-0etch1_all.deb\n Size/MD5 checksum: 239252 b5e1932561074d83a32df5c8dab3f4d8\n http://security.debian.org/pool/updates/main/i/iceweasel/firefox_2.0.0.10-0etch1_all.deb\n Size/MD5 checksum: 54186 6fca16650d5396c091e9967330e77c29\n http://security.debian.org/pool/updates/main/i/iceweasel/firefox-dom-inspector_2.0.0.10-0etch1_all.deb\n Size/MD5 checksum: 54076 d6efb7f19184d30db9368338bcf991b5\n http://security.debian.org/pool/updates/main/i/iceweasel/mozilla-firefox-dom-inspector_2.0.0.10-0etch1_all.deb\n Size/MD5 checksum: 53928 b7c1913d0c2ca87d7ea83b03c0d327c2\n http://security.debian.org/pool/updates/main/i/iceweasel/mozilla-firefox-gnome-support_2.0.0.10-0etch1_all.deb\n Size/MD5 checksum: 53924 d8b3b367ad11122ce45cd52bb051f04f\n\nalpha architecture (DEC Alpha)\n\n http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.10-0etch1_alpha.deb\n Size/MD5 checksum: 11550394 d1d26a5c528540230f52ff10ac3ae23e\n http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.10-0etch1_alpha.deb\n Size/MD5 checksum: 51052142 620c82916d4b66a6ee76b87366182089\n http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.10-0etch1_alpha.deb\n Size/MD5 checksum: 90822 9ac379fc0c601cc8511371201b996698\n\namd64 architecture (AMD x86_64 (AMD64))\n\n http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.10-0etch1_amd64.deb\n Size/MD5 checksum: 87490 60f83326a7f344fe9834ae3fe8895b62\n http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.10-0etch1_amd64.deb\n Size/MD5 checksum: 50039638 dabf8ef7580b504a3d196a05636ef088\n http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.10-0etch1_amd64.deb\n Size/MD5 checksum: 10176298 9119f38cd1ad2f82c431591bf804dc6b\n\narm architecture (ARM)\n\n http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.10-0etch1_arm.deb\n Size/MD5 checksum: 9228834 e86cffc61612357818ec294a74eabbfa\n http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.10-0etch1_arm.deb\n Size/MD5 checksum: 49133114 c0e2eb6a0cd133de08bee88f3075f40d\n http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.10-0etch1_arm.deb\n Size/MD5 checksum: 81260 df61a86635f53be26c54b5f73a1d66fc\n\nhppa architecture (HP PA RISC)\n\n http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.10-0etch1_hppa.deb\n Size/MD5 checksum: 50405944 622c595550e18d27967eeaef510aceb5\n http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.10-0etch1_hppa.deb\n Size/MD5 checksum: 89206 297ff408640ea7bf6e4054bfef8448b8\n http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.10-0etch1_hppa.deb\n Size/MD5 checksum: 11025794 465902271fe5791631821748964e2b62\n\ni386 architecture (Intel ia32)\n\n http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.10-0etch1_i386.deb\n Size/MD5 checksum: 9091212 0fa199d8de98cfca49325210ed823a6c\n http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.10-0etch1_i386.deb\n Size/MD5 checksum: 81600 3792ff6da7de4bbcb16470038f10c4a8\n http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.10-0etch1_i386.deb\n Size/MD5 checksum: 49430176 7d0466681bab9f40177451b6b1a415df\n\nia64 architecture (Intel ia64)\n\n http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.10-0etch1_ia64.deb\n Size/MD5 checksum: 14109280 4e2df466b3317d4b7da74056ccd33cf4\n http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.10-0etch1_ia64.deb\n Size/MD5 checksum: 50384210 cf73c1a8856bc596b59963179ad68c76\n http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.10-0etch1_ia64.deb\n Size/MD5 checksum: 99796 8183b0bba38858221714bcc64e6b1b96\n\nmips architecture (MIPS (Big Endian))\n\n http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.10-0etch1_mips.deb\n Size/MD5 checksum: 53825892 6ae638d0442622e981ed0bb739480465\n http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.10-0etch1_mips.deb\n Size/MD5 checksum: 82922 1a07be11a79484b9eed232451979cd5f\n http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.10-0etch1_mips.deb\n Size/MD5 checksum: 10954574 5f794b588d1d987ab39a241a45e380d8\n\nmipsel architecture (MIPS (Little Endian))\n\n http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.10-0etch1_mipsel.deb\n Size/MD5 checksum: 52384634 3fc9ee7c2b49bbdce775222bf7a0b5cb\n http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.10-0etch1_mipsel.deb\n Size/MD5 checksum: 10732344 812e9ba923390aeb276f905a149a1447\n http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.10-0etch1_mipsel.deb\n Size/MD5 checksum: 82762 41f283d3cc7c14f11bd1012da2d03fd3\n\npowerpc architecture (PowerPC)\n\n http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.10-0etch1_powerpc.deb\n Size/MD5 checksum: 83326 f3dbf30a7aa86ac64a1a586b9861bfd4\n http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.10-0etch1_powerpc.deb\n Size/MD5 checksum: 51838412 551d3a0549c7f6a633a2c44305464869\n http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.10-0etch1_powerpc.deb\n Size/MD5 checksum: 9911966 6dd5f24d2b19b60e5193cc3a4a7f6fa4\n\ns390 architecture (IBM S/390)\n\n http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.10-0etch1_s390.deb\n Size/MD5 checksum: 50714116 5c137d63563275f256e62b4267f1783f\n http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.10-0etch1_s390.deb\n Size/MD5 checksum: 10333216 35b0ad810916603417fe10344013b5ab\n http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.10-0etch1_s390.deb\n Size/MD5 checksum: 87698 596716a1ceb5243820b4c644831cb4ad\n\nsparc architecture (Sun SPARC/UltraSPARC)\n\n http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.10-0etch1_sparc.deb\n Size/MD5 checksum: 49052450 bcefe06c2296cfd190364b3eff4e0d5c\n http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.10-0etch1_sparc.deb\n Size/MD5 checksum: 81434 34e0345eb0430e59ad057bb0efcb98c5\n http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.10-0etch1_sparc.deb\n Size/MD5 checksum: 9119000 1d5327c89d681fcbc7e8b80eaeab3834\n\n\n These files will probably be moved into the stable distribution on\n its next update.\n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>\n", "edition": 3, "modified": "2007-12-08T00:00:00", "published": "2007-12-08T00:00:00", "id": "DEBIAN:DSA-1424-1:334EF", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2007/msg00205.html", "title": "[SECURITY] [DSA 1424-1] New iceweasel packages fix several vulnerabilities", "type": "debian", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-11-11T13:21:29", "bulletinFamily": "unix", "cvelist": ["CVE-2007-5947", "CVE-2007-5960", "CVE-2007-5959"], "description": "- ------------------------------------------------------------------------\nDebian Security Advisory DSA-1425-1 security@debian.org\nhttp://www.debian.org/security/ Moritz Muehlenhoff\nDecember 08, 2007 http://www.debian.org/security/faq\n- ------------------------------------------------------------------------\n\nPackage : xulrunner\nVulnerability : several\nProblem type : remote\nDebian-specific: no\nCVE ID : CVE-2007-5947 CVE-2007-5959 CVE-2007-5960\n\nSeveral remote vulnerabilities have been discovered in Xulrunner, a\nruntime environment for XUL applications. The Common Vulnerabilities\nand Exposures project identifies the following problems:\n\nCVE-2007-5947\n\n Jesse Ruderman and Petko D. Petkov discovered that the URI handler\n for JAR archives allows cross-site scripting.\n\nCVE-2007-5959\n\n Several crashes in the layout engine were discovered, which might\n allow the execution of arbitrary code.\n\nCVE-2007-5960\n\n Gregory Fleischer discovered a race condition in the handling of\n the "window.location" property, which might lead to cross-site\n request forgery.\n\nThe oldstable distribution (sarge) doesn't contain xulrunner.\n\nFor the stable distribution (etch) these problems have been fixed in\nversion 1.8.0.14~pre071019c-0etch1.\n\nFor the unstable distribution (sid) these problems have been fixed in\nversion 1.8.1.11-1.\n\nWe recommend that you upgrade your xulrunner packages.\n\nUpgrade instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file.\n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration.\n\n\nDebian 4.0 (stable)\n- -------------------\n\nStable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.\n\nSource archives:\n\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner_1.8.0.14~pre071019c-0etch1.dsc\n Size/MD5 checksum: 1346 0bc026a1fcefe6f716831af527540852\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner_1.8.0.14~pre071019c.orig.tar.gz\n Size/MD5 checksum: 41757150 a274e70248f511b2cc7f282caa2a68be\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner_1.8.0.14~pre071019c-0etch1.diff.gz\n Size/MD5 checksum: 145820 48ccca33b6b328df1ffa3611c18900fc\n\nArchitecture independent packages:\n\n http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs-dev_1.8.0.14~pre071019c-0etch1_all.deb\n Size/MD5 checksum: 175438 f329a0135f9b1eeb7f154cacd80b9a80\n http://security.debian.org/pool/updates/main/x/xulrunner/libnss3-dev_1.8.0.14~pre071019c-0etch1_all.deb\n Size/MD5 checksum: 230042 dd0075626ab4c2d4ac92875625ade3c4\n http://security.debian.org/pool/updates/main/x/xulrunner/libsmjs-dev_1.8.0.14~pre071019c-0etch1_all.deb\n Size/MD5 checksum: 35402 a22d223ec93403fa1bb8ce45fca495d3\n http://security.debian.org/pool/updates/main/x/xulrunner/libxul-common_1.8.0.14~pre071019c-0etch1_all.deb\n Size/MD5 checksum: 1049926 7188c936788d465d46d2d96f47a6bfac\n http://security.debian.org/pool/updates/main/x/xulrunner/libnspr4-dev_1.8.0.14~pre071019c-0etch1_all.deb\n Size/MD5 checksum: 206496 4b9f46066fe809a85459f0aa01f80467\n http://security.debian.org/pool/updates/main/x/xulrunner/libsmjs1_1.8.0.14~pre071019c-0etch1_all.deb\n Size/MD5 checksum: 35368 a3b63f8d0611bd915284ece04d5043bd\n http://security.debian.org/pool/updates/main/x/xulrunner/libmozillainterfaces-java_1.8.0.14~pre071019c-0etch1_all.deb\n Size/MD5 checksum: 1029098 697bc71bc14377f9e15c8a6984429798\n http://security.debian.org/pool/updates/main/x/xulrunner/libxul-dev_1.8.0.14~pre071019c-0etch1_all.deb\n Size/MD5 checksum: 2632684 11a5fd534e36ecbbb7ab78d10eacf497\n\nalpha architecture (DEC Alpha)\n\n http://security.debian.org/pool/updates/main/x/xulrunner/libnss3-0d_1.8.0.14~pre071019c-0etch1_alpha.deb\n Size/MD5 checksum: 905912 2ecfb4a88cfe088f173edb6f49dac606\n http://security.debian.org/pool/updates/main/x/xulrunner/libnspr4-0d-dbg_1.8.0.14~pre071019c-0etch1_alpha.deb\n Size/MD5 checksum: 300530 ec48850b193e49c5a75d1127ecfdc0a2\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner_1.8.0.14~pre071019c-0etch1_alpha.deb\n Size/MD5 checksum: 290696 1270a34729985d74d10696fb59fa0b57\n http://security.debian.org/pool/updates/main/x/xulrunner/libxul0d_1.8.0.14~pre071019c-0etch1_alpha.deb\n Size/MD5 checksum: 7327672 d36f74793f0d225efdacb3ad9b4f95f7\n http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs0d_1.8.0.14~pre071019c-0etch1_alpha.deb\n Size/MD5 checksum: 384642 71def5d18385ddf896dc7b8e756b33f9\n http://security.debian.org/pool/updates/main/x/xulrunner/libnss3-tools_1.8.0.14~pre071019c-0etch1_alpha.deb\n Size/MD5 checksum: 737922 6b261bc6c20dff0753f29ced2e23e816\n http://security.debian.org/pool/updates/main/x/xulrunner/libnss3-0d-dbg_1.8.0.14~pre071019c-0etch1_alpha.deb\n Size/MD5 checksum: 3185832 13e50586e15d949bd50787c0e947426c\n http://security.debian.org/pool/updates/main/x/xulrunner/libnspr4-0d_1.8.0.14~pre071019c-0etch1_alpha.deb\n Size/MD5 checksum: 160788 9939e3883e012f6edfb1e7867f5f6efe\n http://security.debian.org/pool/updates/main/x/xulrunner/spidermonkey-bin_1.8.0.14~pre071019c-0etch1_alpha.deb\n Size/MD5 checksum: 51854 d72c300fb39e4de1cb2964e1d9e21898\n http://security.debian.org/pool/updates/main/x/xulrunner/python-xpcom_1.8.0.14~pre071019c-0etch1_alpha.deb\n Size/MD5 checksum: 129746 e0eda5a4215a9acb1361d3147b882d3c\n http://security.debian.org/pool/updates/main/x/xulrunner/libxul0d-dbg_1.8.0.14~pre071019c-0etch1_alpha.deb\n Size/MD5 checksum: 45936328 f27ade2bf672007e15a2e0c52bcda908\n http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs0d-dbg_1.8.0.14~pre071019c-0etch1_alpha.deb\n Size/MD5 checksum: 764198 a7d1d5d077a907045639dde8df22d457\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-gnome-support_1.8.0.14~pre071019c-0etch1_alpha.deb\n Size/MD5 checksum: 70016 bf033e5608c9bbe18778808bb82a063e\n\namd64 architecture (AMD x86_64 (AMD64))\n\n http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs0d-dbg_1.8.0.14~pre071019c-0etch1_amd64.deb\n Size/MD5 checksum: 752592 9ea1f42c9ce53e3008741fc1143046da\n http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs0d_1.8.0.14~pre071019c-0etch1_amd64.deb\n Size/MD5 checksum: 354244 1d6572f7beb3e3242fb605303ae9a0c1\n http://security.debian.org/pool/updates/main/x/xulrunner/libnss3-0d_1.8.0.14~pre071019c-0etch1_amd64.deb\n Size/MD5 checksum: 808122 afb49a928903e7ed99e9ad8e298b2da0\n http://security.debian.org/pool/updates/main/x/xulrunner/libnspr4-0d_1.8.0.14~pre071019c-0etch1_amd64.deb\n Size/MD5 checksum: 147444 a91471a8b318f65ee2305756f67539f8\n http://security.debian.org/pool/updates/main/x/xulrunner/python-xpcom_1.8.0.14~pre071019c-0etch1_amd64.deb\n Size/MD5 checksum: 124742 9f718d8f9a6669cd13f5e65392cc067f\n http://security.debian.org/pool/updates/main/x/xulrunner/spidermonkey-bin_1.8.0.14~pre071019c-0etch1_amd64.deb\n Size/MD5 checksum: 51634 667204aaf4c6e8d90c083cf2b0ad7d9b\n http://security.debian.org/pool/updates/main/x/xulrunner/libxul0d-dbg_1.8.0.14~pre071019c-0etch1_amd64.deb\n Size/MD5 checksum: 45136444 6769a4ecc4a85d6e237877103a682beb\n http://security.debian.org/pool/updates/main/x/xulrunner/libnss3-tools_1.8.0.14~pre071019c-0etch1_amd64.deb\n Size/MD5 checksum: 669228 0a55a0c16f8c2dbbc3c39d789149d160\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner_1.8.0.14~pre071019c-0etch1_amd64.deb\n Size/MD5 checksum: 276912 8745d60623b8be2d01fda9db1803ca65\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-gnome-support_1.8.0.14~pre071019c-0etch1_amd64.deb\n Size/MD5 checksum: 67896 7be8f8bc1e0c10268faa8eb9fe330189\n http://security.debian.org/pool/updates/main/x/xulrunner/libnspr4-0d-dbg_1.8.0.14~pre071019c-0etch1_amd64.deb\n Size/MD5 checksum: 303354 b4a77a25c1b76aa779c2c429f5886013\n http://security.debian.org/pool/updates/main/x/xulrunner/libxul0d_1.8.0.14~pre071019c-0etch1_amd64.deb\n Size/MD5 checksum: 6321876 55e03efcd2252d1d4d3f495031975078\n http://security.debian.org/pool/updates/main/x/xulrunner/libnss3-0d-dbg_1.8.0.14~pre071019c-0etch1_amd64.deb\n Size/MD5 checksum: 3173530 a96f8774132726d575a1ec24f853eaf9\n\narm architecture (ARM)\n\n http://security.debian.org/pool/updates/main/x/xulrunner/libnss3-0d_1.8.0.14~pre071019c-0etch1_arm.deb\n Size/MD5 checksum: 730268 5a7cc8751f5e658d8bc80f06038182f6\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-gnome-support_1.8.0.14~pre071019c-0etch1_arm.deb\n Size/MD5 checksum: 61246 cbb33a545eb0bc33273e83c8f171e3b4\n http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs0d-dbg_1.8.0.14~pre071019c-0etch1_arm.deb\n Size/MD5 checksum: 702778 bc6c0b850465c8b728854137d1064701\n http://security.debian.org/pool/updates/main/x/xulrunner/libxul0d_1.8.0.14~pre071019c-0etch1_arm.deb\n Size/MD5 checksum: 5353388 41be6112a4f40061307886a6b67a0e98\n http://security.debian.org/pool/updates/main/x/xulrunner/libnspr4-0d-dbg_1.8.0.14~pre071019c-0etch1_arm.deb\n Size/MD5 checksum: 288802 273d2ed53275b872e6ee346b9e545e90\n http://security.debian.org/pool/updates/main/x/xulrunner/libnspr4-0d_1.8.0.14~pre071019c-0etch1_arm.deb\n Size/MD5 checksum: 135182 fb250f86ebf8f80e69bb316808f162c9\n http://security.debian.org/pool/updates/main/x/xulrunner/libnss3-tools_1.8.0.14~pre071019c-0etch1_arm.deb\n Size/MD5 checksum: 592770 3c5c775c0be26c51a3ba44e9cb0ba624\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner_1.8.0.14~pre071019c-0etch1_arm.deb\n Size/MD5 checksum: 258470 c7f51d956a6360fc5b1e289311452651\n http://security.debian.org/pool/updates/main/x/xulrunner/python-xpcom_1.8.0.14~pre071019c-0etch1_arm.deb\n Size/MD5 checksum: 117402 aba0a9fb9aacc8cc1a1901290bcf9e9f\n http://security.debian.org/pool/updates/main/x/xulrunner/libnss3-0d-dbg_1.8.0.14~pre071019c-0etch1_arm.deb\n Size/MD5 checksum: 2967998 02d432a0f22f7c930473e8ba2eb571eb\n http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs0d_1.8.0.14~pre071019c-0etch1_arm.deb\n Size/MD5 checksum: 323856 052a74e03c0d3487d56c4114b27605ee\n http://security.debian.org/pool/updates/main/x/xulrunner/spidermonkey-bin_1.8.0.14~pre071019c-0etch1_arm.deb\n Size/MD5 checksum: 48956 d3f578a42e0a78508bf6df66a833c7c0\n http://security.debian.org/pool/updates/main/x/xulrunner/libxul0d-dbg_1.8.0.14~pre071019c-0etch1_arm.deb\n Size/MD5 checksum: 44659194 8e6efffe64a0cafdc255f894f83d94f1\n\nhppa architecture (HP PA RISC)\n\n http://security.debian.org/pool/updates/main/x/xulrunner/libnss3-0d-dbg_1.8.0.14~pre071019c-0etch1_hppa.deb\n Size/MD5 checksum: 3101840 17feb0c8c58e79084d3c34212ca8dd91\n http://security.debian.org/pool/updates/main/x/xulrunner/spidermonkey-bin_1.8.0.14~pre071019c-0etch1_hppa.deb\n Size/MD5 checksum: 52276 d894afbe86061072f2ce8a32d96f48e5\n http://security.debian.org/pool/updates/main/x/xulrunner/libnss3-tools_1.8.0.14~pre071019c-0etch1_hppa.deb\n Size/MD5 checksum: 702420 29968fed2da85cc6610181c606688b0a\n http://security.debian.org/pool/updates/main/x/xulrunner/python-xpcom_1.8.0.14~pre071019c-0etch1_hppa.deb\n Size/MD5 checksum: 132018 7e4c536fe8b274e852249e8859341900\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-gnome-support_1.8.0.14~pre071019c-0etch1_hppa.deb\n Size/MD5 checksum: 69546 d4661e3f15c8a7fb494ce42ee473529b\n http://security.debian.org/pool/updates/main/x/xulrunner/libxul0d_1.8.0.14~pre071019c-0etch1_hppa.deb\n Size/MD5 checksum: 7530106 f0ddd2e3cca5530dca76a4e6c1fe6c0d\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner_1.8.0.14~pre071019c-0etch1_hppa.deb\n Size/MD5 checksum: 286052 8e6f61c1009aafbd733f0dbfcfea6b94\n http://security.debian.org/pool/updates/main/x/xulrunner/libnspr4-0d_1.8.0.14~pre071019c-0etch1_hppa.deb\n Size/MD5 checksum: 159184 f5c4122ab250cddb9d3906a85b3ea51d\n http://security.debian.org/pool/updates/main/x/xulrunner/libxul0d-dbg_1.8.0.14~pre071019c-0etch1_hppa.deb\n Size/MD5 checksum: 46046798 b907bc50628a47e7dcc8ab3649c96668\n http://security.debian.org/pool/updates/main/x/xulrunner/libnspr4-0d-dbg_1.8.0.14~pre071019c-0etch1_hppa.deb\n Size/MD5 checksum: 300468 f7a8fd4d27cabd70dd5a9c557762d93f\n http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs0d-dbg_1.8.0.14~pre071019c-0etch1_hppa.deb\n Size/MD5 checksum: 750216 f88dc9fcdfe62795da185c299dfa4c30\n http://security.debian.org/pool/updates/main/x/xulrunner/libnss3-0d_1.8.0.14~pre071019c-0etch1_hppa.deb\n Size/MD5 checksum: 873576 9e026ca5d08efe3342d3cc3ff4bca59d\n http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs0d_1.8.0.14~pre071019c-0etch1_hppa.deb\n Size/MD5 checksum: 388696 8da1113ae2b768753283de04efd14f4f\n\ni386 architecture (Intel ia32)\n\n http://security.debian.org/pool/updates/main/x/xulrunner/libnspr4-0d_1.8.0.14~pre071019c-0etch1_i386.deb\n Size/MD5 checksum: 138318 a2a613d347c9b0f431f5a9d604980267\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-gnome-support_1.8.0.14~pre071019c-0etch1_i386.deb\n Size/MD5 checksum: 62300 2610e54cac482e619b2fc82528fed83f\n http://security.debian.org/pool/updates/main/x/xulrunner/libxul0d-dbg_1.8.0.14~pre071019c-0etch1_i386.deb\n Size/MD5 checksum: 44611344 f97a7b4d03d12059f20e8f7a6c8300f6\n http://security.debian.org/pool/updates/main/x/xulrunner/libnspr4-0d-dbg_1.8.0.14~pre071019c-0etch1_i386.deb\n Size/MD5 checksum: 295098 980a91370103ec4e580927c82ec6fee8\n http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs0d-dbg_1.8.0.14~pre071019c-0etch1_i386.deb\n Size/MD5 checksum: 710358 a8a3898072315b9fa00cbafe6066ddff\n http://security.debian.org/pool/updates/main/x/xulrunner/spidermonkey-bin_1.8.0.14~pre071019c-0etch1_i386.deb\n Size/MD5 checksum: 49148 c332294b517ff0b2fe53d933b69846e2\n http://security.debian.org/pool/updates/main/x/xulrunner/libnss3-tools_1.8.0.14~pre071019c-0etch1_i386.deb\n Size/MD5 checksum: 626866 f95894d174ceb7f1542b3f7c0184f51b\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner_1.8.0.14~pre071019c-0etch1_i386.deb\n Size/MD5 checksum: 266280 5a9523b6aa860017ee4f775e6b740288\n http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs0d_1.8.0.14~pre071019c-0etch1_i386.deb\n Size/MD5 checksum: 334224 7235c4b9b97ec40d6da26e3788e84dd2\n http://security.debian.org/pool/updates/main/x/xulrunner/libnss3-0d_1.8.0.14~pre071019c-0etch1_i386.deb\n Size/MD5 checksum: 741220 d2bf9404c02d40206ae22f16f1c20364\n http://security.debian.org/pool/updates/main/x/xulrunner/libxul0d_1.8.0.14~pre071019c-0etch1_i386.deb\n Size/MD5 checksum: 5365260 7563d938eea6d2bf7c85718d6abf5dd8\n http://security.debian.org/pool/updates/main/x/xulrunner/libnss3-0d-dbg_1.8.0.14~pre071019c-0etch1_i386.deb\n Size/MD5 checksum: 3032856 021db7aa9fe0312f13c0298e83a45fca\n http://security.debian.org/pool/updates/main/x/xulrunner/python-xpcom_1.8.0.14~pre071019c-0etch1_i386.deb\n Size/MD5 checksum: 116410 4e42764f9d8bdf0da68f3b2313efc54c\n\nia64 architecture (Intel ia64)\n\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner_1.8.0.14~pre071019c-0etch1_ia64.deb\n Size/MD5 checksum: 332220 a8165b14a156f1f0bd070e47b5a8f90b\n http://security.debian.org/pool/updates/main/x/xulrunner/libnspr4-0d_1.8.0.14~pre071019c-0etch1_ia64.deb\n Size/MD5 checksum: 197650 69cf47582561fe575fffd27172b07ed9\n http://security.debian.org/pool/updates/main/x/xulrunner/libxul0d_1.8.0.14~pre071019c-0etch1_ia64.deb\n Size/MD5 checksum: 9655852 e780120b388a49ae14d67811d03cdd4e\n http://security.debian.org/pool/updates/main/x/xulrunner/libnss3-0d_1.8.0.14~pre071019c-0etch1_ia64.deb\n Size/MD5 checksum: 1121148 ac8d5b5131c76165d184b96c4b915d94\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-gnome-support_1.8.0.14~pre071019c-0etch1_ia64.deb\n Size/MD5 checksum: 79376 e85142c406177f3a401c6cdeb6dbc5e7\n http://security.debian.org/pool/updates/main/x/xulrunner/spidermonkey-bin_1.8.0.14~pre071019c-0etch1_ia64.deb\n Size/MD5 checksum: 56158 1180ab9ad4831591f54cd5eda1ecfd73\n http://security.debian.org/pool/updates/main/x/xulrunner/python-xpcom_1.8.0.14~pre071019c-0etch1_ia64.deb\n Size/MD5 checksum: 148596 2bf3fc1d2c04f06aad38cc9937d38a86\n http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs0d-dbg_1.8.0.14~pre071019c-0etch1_ia64.deb\n Size/MD5 checksum: 755576 e8e9caca5574a22a4edbfa2b018aeb1b\n http://security.debian.org/pool/updates/main/x/xulrunner/libnspr4-0d-dbg_1.8.0.14~pre071019c-0etch1_ia64.deb\n Size/MD5 checksum: 286048 cc9ca87f03550290c2db85fc4c599e22\n http://security.debian.org/pool/updates/main/x/xulrunner/libnss3-tools_1.8.0.14~pre071019c-0etch1_ia64.deb\n Size/MD5 checksum: 936678 0496a4ba7842a99efc744d9e8129b9fb\n http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs0d_1.8.0.14~pre071019c-0etch1_ia64.deb\n Size/MD5 checksum: 530538 cab9c6f120f9462d232361d371a07c05\n http://security.debian.org/pool/updates/main/x/xulrunner/libnss3-0d-dbg_1.8.0.14~pre071019c-0etch1_ia64.deb\n Size/MD5 checksum: 3051344 82bfd3aa12cad33b9581814e62e4b4cd\n http://security.debian.org/pool/updates/main/x/xulrunner/libxul0d-dbg_1.8.0.14~pre071019c-0etch1_ia64.deb\n Size/MD5 checksum: 45348238 93e58f1ab075c4d048b75fc0a75c3d38\n\nmips architecture (MIPS (Big Endian))\n\n http://security.debian.org/pool/updates/main/x/xulrunner/libnspr4-0d-dbg_1.8.0.14~pre071019c-0etch1_mips.deb\n Size/MD5 checksum: 311522 e2114eea5dfb74c0fad815c25246b0fd\n http://security.debian.org/pool/updates/main/x/xulrunner/libnss3-tools_1.8.0.14~pre071019c-0etch1_mips.deb\n Size/MD5 checksum: 669802 777d4560a338fe3d167da21c1fa7d064\n http://security.debian.org/pool/updates/main/x/xulrunner/spidermonkey-bin_1.8.0.14~pre071019c-0etch1_mips.deb\n Size/MD5 checksum: 50792 3b40e0d540d9ad7f7eb4f4eec2cb7a0a\n http://security.debian.org/pool/updates/main/x/xulrunner/libnss3-0d_1.8.0.14~pre071019c-0etch1_mips.deb\n Size/MD5 checksum: 807832 ba81b430734bf7a3ce6f2e010c57e58a\n http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs0d_1.8.0.14~pre071019c-0etch1_mips.deb\n Size/MD5 checksum: 350936 7640a1f36efcdde6cd84ea0a814c47bc\n http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs0d-dbg_1.8.0.14~pre071019c-0etch1_mips.deb\n Size/MD5 checksum: 783946 b910a5e842023d4bdd27955874fd45c0\n http://security.debian.org/pool/updates/main/x/xulrunner/libnspr4-0d_1.8.0.14~pre071019c-0etch1_mips.deb\n Size/MD5 checksum: 145236 526a8c14bcb09f9e8c2549e4b7b1d858\n http://security.debian.org/pool/updates/main/x/xulrunner/libxul0d_1.8.0.14~pre071019c-0etch1_mips.deb\n Size/MD5 checksum: 5938668 6cf80f758bff67edbf33b266298730b4\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner_1.8.0.14~pre071019c-0etch1_mips.deb\n Size/MD5 checksum: 272512 b6437930ff18bd696dd8435d07fb76a1\n http://security.debian.org/pool/updates/main/x/xulrunner/python-xpcom_1.8.0.14~pre071019c-0etch1_mips.deb\n Size/MD5 checksum: 117560 13d065b91e9f12736a5eae22ca927a3a\n http://security.debian.org/pool/updates/main/x/xulrunner/libnss3-0d-dbg_1.8.0.14~pre071019c-0etch1_mips.deb\n Size/MD5 checksum: 3286916 532ae2b5ab6490afab67346c2f69c4d3\n http://security.debian.org/pool/updates/main/x/xulrunner/libxul0d-dbg_1.8.0.14~pre071019c-0etch1_mips.deb\n Size/MD5 checksum: 46678578 a6f757a8bbc3a7ee6ba1a00b7a661db2\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-gnome-support_1.8.0.14~pre071019c-0etch1_mips.deb\n Size/MD5 checksum: 63804 cdb4e5a117b4c08be2ea971359a19be7\n\nmipsel architecture (MIPS (Little Endian))\n\n http://security.debian.org/pool/updates/main/x/xulrunner/libnspr4-0d-dbg_1.8.0.14~pre071019c-0etch1_mipsel.deb\n Size/MD5 checksum: 304618 ae01f3c1a0efb8a98788347d98b403d1\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner_1.8.0.14~pre071019c-0etch1_mipsel.deb\n Size/MD5 checksum: 273330 8022de5cfd4527be13581ec649c7bff2\n http://security.debian.org/pool/updates/main/x/xulrunner/libxul0d-dbg_1.8.0.14~pre071019c-0etch1_mipsel.deb\n Size/MD5 checksum: 45278922 746c8fef83c1f489cff58a214b8fca04\n http://security.debian.org/pool/updates/main/x/xulrunner/libnss3-0d-dbg_1.8.0.14~pre071019c-0etch1_mipsel.deb\n Size/MD5 checksum: 3185842 b105d3f5cd44fb966aea226c000a88c9\n http://security.debian.org/pool/updates/main/x/xulrunner/libnss3-0d_1.8.0.14~pre071019c-0etch1_mipsel.deb\n Size/MD5 checksum: 784388 44b24b58d7f7be59bdd8d0ac6f960453\n http://security.debian.org/pool/updates/main/x/xulrunner/python-xpcom_1.8.0.14~pre071019c-0etch1_mipsel.deb\n Size/MD5 checksum: 117340 c6de958295aefd105780fa1af5afdac2\n http://security.debian.org/pool/updates/main/x/xulrunner/libnss3-tools_1.8.0.14~pre071019c-0etch1_mipsel.deb\n Size/MD5 checksum: 669260 734bd543f1fe805724f94d80a57e9a6f\n http://security.debian.org/pool/updates/main/x/xulrunner/libnspr4-0d_1.8.0.14~pre071019c-0etch1_mipsel.deb\n Size/MD5 checksum: 144882 5298293257fe121360d25bda17c1213d\n http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs0d_1.8.0.14~pre071019c-0etch1_mipsel.deb\n Size/MD5 checksum: 349618 1865bf4eb4b25b4484914ee93987c39b\n http://security.debian.org/pool/updates/main/x/xulrunner/spidermonkey-bin_1.8.0.14~pre071019c-0etch1_mipsel.deb\n Size/MD5 checksum: 50856 735a35ab7baba56ac6870c2ef36de133\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-gnome-support_1.8.0.14~pre071019c-0etch1_mipsel.deb\n Size/MD5 checksum: 63636 5229961d824addf23c3fd615753f3124\n http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs0d-dbg_1.8.0.14~pre071019c-0etch1_mipsel.deb\n Size/MD5 checksum: 764846 2f90087ced23bc8be5bb851262e53392\n http://security.debian.org/pool/updates/main/x/xulrunner/libxul0d_1.8.0.14~pre071019c-0etch1_mipsel.deb\n Size/MD5 checksum: 5735608 18c2a35361efdbddf76a09e50836201b\n\npowerpc architecture (PowerPC)\n\n http://security.debian.org/pool/updates/main/x/xulrunner/libxul0d_1.8.0.14~pre071019c-0etch1_powerpc.deb\n Size/MD5 checksum: 6093950 2c1a8c299df3a968284b48e4644e992e\n http://security.debian.org/pool/updates/main/x/xulrunner/libnss3-0d-dbg_1.8.0.14~pre071019c-0etch1_powerpc.deb\n Size/MD5 checksum: 3207182 7771d73f1b8840aa13e8b145d3c7acb5\n http://security.debian.org/pool/updates/main/x/xulrunner/libnss3-0d_1.8.0.14~pre071019c-0etch1_powerpc.deb\n Size/MD5 checksum: 809010 3be359c94a70b23ebd3367c7475fe093\n http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs0d-dbg_1.8.0.14~pre071019c-0etch1_powerpc.deb\n Size/MD5 checksum: 772256 41ebec24637472b825a2821eae719034\n http://security.debian.org/pool/updates/main/x/xulrunner/libxul0d-dbg_1.8.0.14~pre071019c-0etch1_powerpc.deb\n Size/MD5 checksum: 46862218 d69afa6bea526ae072b90f6429eac110\n http://security.debian.org/pool/updates/main/x/xulrunner/libnss3-tools_1.8.0.14~pre071019c-0etch1_powerpc.deb\n Size/MD5 checksum: 638902 eaa60acd9d43f0cf3d7100ecc8ca6cc4\n http://security.debian.org/pool/updates/main/x/xulrunner/libnspr4-0d-dbg_1.8.0.14~pre071019c-0etch1_powerpc.deb\n Size/MD5 checksum: 309868 360ee4b7f306b959be630ce79ea135cc\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner_1.8.0.14~pre071019c-0etch1_powerpc.deb\n Size/MD5 checksum: 277350 8f7d46fddb14138e2ef1ece988b2c02f\n http://security.debian.org/pool/updates/main/x/xulrunner/spidermonkey-bin_1.8.0.14~pre071019c-0etch1_powerpc.deb\n Size/MD5 checksum: 52108 8837bbcc8b10a055b99e1ff861444e8c\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-gnome-support_1.8.0.14~pre071019c-0etch1_powerpc.deb\n Size/MD5 checksum: 63550 82a96439982eaa90451823b1932e29cb\n http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs0d_1.8.0.14~pre071019c-0etch1_powerpc.deb\n Size/MD5 checksum: 348162 2ae2e02e586cac4f7e04b821c41b8643\n http://security.debian.org/pool/updates/main/x/xulrunner/libnspr4-0d_1.8.0.14~pre071019c-0etch1_powerpc.deb\n Size/MD5 checksum: 146640 0561077a332fe650fc6c67c4425c28a2\n http://security.debian.org/pool/updates/main/x/xulrunner/python-xpcom_1.8.0.14~pre071019c-0etch1_powerpc.deb\n Size/MD5 checksum: 122602 5d96be768b0a0428d862a809b52df390\n\ns390 architecture (IBM S/390)\n\n http://security.debian.org/pool/updates/main/x/xulrunner/libnspr4-0d-dbg_1.8.0.14~pre071019c-0etch1_s390.deb\n Size/MD5 checksum: 305394 2f6339b8baca80be43273e943a6e9878\n http://security.debian.org/pool/updates/main/x/xulrunner/libnspr4-0d_1.8.0.14~pre071019c-0etch1_s390.deb\n Size/MD5 checksum: 159214 7bdcfef75ec2c2f48c61faf714891107\n http://security.debian.org/pool/updates/main/x/xulrunner/libnss3-tools_1.8.0.14~pre071019c-0etch1_s390.deb\n Size/MD5 checksum: 687478 e913a2ac26f5898896aeb1457c926b12\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner_1.8.0.14~pre071019c-0etch1_s390.deb\n Size/MD5 checksum: 281238 dcac2a8a7bc6df99e80da738e83b2b8c\n http://security.debian.org/pool/updates/main/x/xulrunner/libxul0d_1.8.0.14~pre071019c-0etch1_s390.deb\n Size/MD5 checksum: 6796316 328ba86cc9f2d6e70420df5c7dbeaa03\n http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs0d_1.8.0.14~pre071019c-0etch1_s390.deb\n Size/MD5 checksum: 371004 413726914d9bd7bc7bc2700dcd32364a\n http://security.debian.org/pool/updates/main/x/xulrunner/libnss3-0d-dbg_1.8.0.14~pre071019c-0etch1_s390.deb\n Size/MD5 checksum: 3180406 f2c3d605d212f3c4476146719abd714d\n http://security.debian.org/pool/updates/main/x/xulrunner/libnss3-0d_1.8.0.14~pre071019c-0etch1_s390.deb\n Size/MD5 checksum: 897536 4fd79da6fc717664854fd09f1cbda54e\n http://security.debian.org/pool/updates/main/x/xulrunner/python-xpcom_1.8.0.14~pre071019c-0etch1_s390.deb\n Size/MD5 checksum: 125588 57a4b26e7dcacc6494a31b9d23dd1b31\n http://security.debian.org/pool/updates/main/x/xulrunner/spidermonkey-bin_1.8.0.14~pre071019c-0etch1_s390.deb\n Size/MD5 checksum: 52364 2beb10b5100700e7aa2e6f5f080b041f\n http://security.debian.org/pool/updates/main/x/xulrunner/libxul0d-dbg_1.8.0.14~pre071019c-0etch1_s390.deb\n Size/MD5 checksum: 45997386 f69ff2a27dd091c7a7ecbffade4213ea\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-gnome-support_1.8.0.14~pre071019c-0etch1_s390.deb\n Size/MD5 checksum: 68490 4ab8efbafa4cd9026ff1461c7a4029f2\n http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs0d-dbg_1.8.0.14~pre071019c-0etch1_s390.deb\n Size/MD5 checksum: 754932 f61b1169bbfb9a08aa6bec1be075f720\n\nsparc architecture (Sun SPARC/UltraSPARC)\n\n http://security.debian.org/pool/updates/main/x/xulrunner/libnss3-0d-dbg_1.8.0.14~pre071019c-0etch1_sparc.deb\n Size/MD5 checksum: 2854316 b76fefb3334910acba7a2a979a36a094\n http://security.debian.org/pool/updates/main/x/xulrunner/libnss3-0d_1.8.0.14~pre071019c-0etch1_sparc.deb\n Size/MD5 checksum: 718590 0363495bca2b2f51f68d609c960d2a0f\n http://security.debian.org/pool/updates/main/x/xulrunner/libnspr4-0d_1.8.0.14~pre071019c-0etch1_sparc.deb\n Size/MD5 checksum: 135428 960fca09e8c29b4dba7aeb99be2f2cae\n http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs0d_1.8.0.14~pre071019c-0etch1_sparc.deb\n Size/MD5 checksum: 321926 99457b016453308ab8a740cb3a363b34\n http://security.debian.org/pool/updates/main/x/xulrunner/libxul0d-dbg_1.8.0.14~pre071019c-0etch1_sparc.deb\n Size/MD5 checksum: 44713040 06bcd99b0b80b15acff9fe9f93a5056a\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner_1.8.0.14~pre071019c-0etch1_sparc.deb\n Size/MD5 checksum: 259680 96f67eb66c8e75f0a0b4408303dd3684\n http://security.debian.org/pool/updates/main/x/xulrunner/spidermonkey-bin_1.8.0.14~pre071019c-0etch1_sparc.deb\n Size/MD5 checksum: 50232 807a07f093bf311983cf7870210c5d08\n http://security.debian.org/pool/updates/main/x/xulrunner/python-xpcom_1.8.0.14~pre071019c-0etch1_sparc.deb\n Size/MD5 checksum: 117546 8b5e1f0f8464cec30f962d928bf69142\n http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-gnome-support_1.8.0.14~pre071019c-0etch1_sparc.deb\n Size/MD5 checksum: 61836 39e089e1941d128fbbebab8a5bf2edb7\n http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs0d-dbg_1.8.0.14~pre071019c-0etch1_sparc.deb\n Size/MD5 checksum: 673742 27149b1e7eafee6216dfe367f534dc91\n http://security.debian.org/pool/updates/main/x/xulrunner/libnss3-tools_1.8.0.14~pre071019c-0etch1_sparc.deb\n Size/MD5 checksum: 584812 def3e6edab4f045632e0633ab32145a9\n http://security.debian.org/pool/updates/main/x/xulrunner/libxul0d_1.8.0.14~pre071019c-0etch1_sparc.deb\n Size/MD5 checksum: 5673382 6604925d6824868f9bc853f628a5be7a\n http://security.debian.org/pool/updates/main/x/xulrunner/libnspr4-0d-dbg_1.8.0.14~pre071019c-0etch1_sparc.deb\n Size/MD5 checksum: 282926 61a1bb427f38e156bfccdbfd74b334fc\n\n\n These files will probably be moved into the stable distribution on\n its next update.\n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>\n", "edition": 3, "modified": "2007-12-08T00:00:00", "published": "2007-12-08T00:00:00", "id": "DEBIAN:DSA-1425-1:46BA9", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2007/msg00206.html", "title": "[SECURITY] [DSA 1425-1] New xulrunner packages fix several vulnerabilities", "type": "debian", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "fedora": [{"lastseen": "2020-12-21T08:17:48", "bulletinFamily": "unix", "cvelist": ["CVE-2007-5947", "CVE-2007-5959", "CVE-2007-5960"], "description": "Mozilla Firefox is an open-source web browser, designed for standards compliance, performance and portability. ", "modified": "2007-12-03T15:43:57", "published": "2007-12-03T15:43:57", "id": "FEDORA:LB3FHVBJ016346", "href": "", "type": "fedora", "title": "[SECURITY] Fedora Core 6 Update: firefox-1.5.0.12-7.fc6", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "gentoo": [{"lastseen": "2016-09-06T19:46:19", "bulletinFamily": "unix", "cvelist": ["CVE-2007-5947", "CVE-2007-5960", "CVE-2007-5959"], "description": "### Background\n\nMozilla Firefox is a cross-platform web browser from Mozilla. SeaMonkey is a free, cross-platform Internet suite. \n\n### Description\n\nJesse Ruderman and Petko D. Petkov reported that the jar protocol handler in Mozilla Firefox and Seamonkey does not properly check MIME types (CVE-2007-5947). Gregory Fleischer reported that the window.location property can be used to generate a fake HTTP Referer (CVE-2007-5960). Multiple memory errors have also been reported (CVE-2007-5959). \n\n### Impact\n\nA remote attacker could possibly exploit these vulnerabilities to execute arbitrary code in the context of the browser and conduct Cross-Site-Scripting or Cross-Site Request Forgery attacks. \n\n### Workaround\n\nThere is no known workaround at this time. \n\n### Resolution\n\nAll Mozilla Firefox users should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=www-client/mozilla-firefox-2.0.0.11\"\n\nAll Mozilla Firefox binary users should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=www-client/mozilla-firefox-bin-2.0.0.11\"\n\nAll SeaMonkey users should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=www-client/seamonkey-1.1.7\"\n\nAll SeaMonkey binary users should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=www-client/seamonkey-bin-1.1.7\"", "edition": 1, "modified": "2007-12-29T00:00:00", "published": "2007-12-29T00:00:00", "id": "GLSA-200712-21", "href": "https://security.gentoo.org/glsa/200712-21", "type": "gentoo", "title": "Mozilla Firefox, SeaMonkey: Multiple vulnerabilities", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "openvas": [{"lastseen": "2019-05-29T18:39:15", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-5947", "CVE-2007-5960", "CVE-2007-5959"], "description": "The remote host is missing an update as announced\nvia advisory SSA:2007-333-01.", "modified": "2019-03-15T00:00:00", "published": "2012-09-11T00:00:00", "id": "OPENVAS:136141256231059924", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231059924", "type": "openvas", "title": "Slackware Advisory SSA:2007-333-01 seamonkey", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: esoft_slk_ssa_2007_333_01.nasl 14202 2019-03-15 09:16:15Z cfischer $\n# Description: Auto-generated from the corresponding slackware advisory\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.59924\");\n script_tag(name:\"creation_date\", value:\"2012-09-11 01:34:21 +0200 (Tue, 11 Sep 2012)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 10:16:15 +0100 (Fri, 15 Mar 2019) $\");\n script_version(\"$Revision: 14202 $\");\n script_cve_id(\"CVE-2007-5947\", \"CVE-2007-5959\", \"CVE-2007-5960\");\n script_bugtraq_id(26385, 26593, 26589);\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_name(\"Slackware Advisory SSA:2007-333-01 seamonkey\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Slackware Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/slackware_linux\", \"ssh/login/slackpack\", re:\"ssh/login/release=SLK(11\\.0|12\\.0)\");\n\n script_xref(name:\"URL\", value:\"https://secure1.securityspace.com/smysecure/catid.html?in=SSA:2007-333-01\");\n\n script_tag(name:\"insight\", value:\"New seamonkey packages are available for Slackware 11.0, 12.0, and -current to\nfix security issues.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to the new package(s).\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update as announced\nvia advisory SSA:2007-333-01.\");\n\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-slack.inc\");\n\nreport = \"\";\nres = \"\";\n\nif((res = isslkpkgvuln(pkg:\"seamonkey\", ver:\"1.1.7-i486-1_slack11.0\", rls:\"SLK11.0\")) != NULL) {\n report += res;\n}\nif((res = isslkpkgvuln(pkg:\"seamonkey\", ver:\"1.1.7-i486-1_slack12.0\", rls:\"SLK12.0\")) != NULL) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if(__pkg_match) {\n exit(99);\n}", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2017-07-25T10:56:49", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-5947", "CVE-2007-5960", "CVE-2007-5959"], "description": "Check for the Version of chmsee", "modified": "2017-07-10T00:00:00", "published": "2009-02-27T00:00:00", "id": "OPENVAS:861307", "href": "http://plugins.openvas.org/nasl.php?oid=861307", "type": "openvas", "title": "Fedora Update for chmsee FEDORA-2007-3952", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for chmsee FEDORA-2007-3952\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"A gtk2 chm document viewer.\n\n It uses chmlib to extract files. It uses gecko to display pages. It supports\n displaying multilingual pages due to gecko. It features bookmarks and tabs.\n The tabs could be used to jump inside the chm file conveniently. Its UI is\n clean and handy, also is well localized. It is actively developed and\n maintained. The author of chmsee is Jungle Ji and several other great people.\n \n Hint\n * Unlike other chm viewers, chmsee extracts files from chm file, and then read\n and display them. The extracted files could be found in $HOME/.chmsee/bookshelf\n directory. You can clean those files at any time and there is a special config\n option for that.\n * The bookmark is related to each file so not all bookmarks will be loaded,\n only current file's.\n * Try to remove $HOME/.chmsee if you encounter any problem after an upgrade.\";\n\ntag_affected = \"chmsee on Fedora 7\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/fedora-package-announce/2007-November/msg01010.html\");\n script_id(861307);\n script_version(\"$Revision: 6623 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 08:10:20 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-02-27 16:23:18 +0100 (Fri, 27 Feb 2009)\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"FEDORA\", value: \"2007-3952\");\n script_cve_id(\"CVE-2007-5947\", \"CVE-2007-5959\", \"CVE-2007-5960\");\n script_name( \"Fedora Update for chmsee FEDORA-2007-3952\");\n\n script_summary(\"Check for the Version of chmsee\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC7\")\n{\n\n if ((res = isrpmvuln(pkg:\"chmsee\", rpm:\"chmsee~1.0.0~1.27.fc7\", rls:\"FC7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"chmsee-debuginfo\", rpm:\"chmsee-debuginfo~1.0.0~1.27.fc7\", rls:\"FC7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"chmsee\", rpm:\"chmsee~1.0.0~1.27.fc7\", rls:\"FC7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"chmsee\", rpm:\"chmsee~1.0.0~1.27.fc7\", rls:\"FC7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"chmsee-debuginfo\", rpm:\"chmsee-debuginfo~1.0.0~1.27.fc7\", rls:\"FC7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-24T12:51:09", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-5947", "CVE-2007-5960", "CVE-2007-5959"], "description": "The remote host is missing an update as announced\nvia advisory SSA:2007-331-01.", "modified": "2017-07-07T00:00:00", "published": "2012-09-11T00:00:00", "id": "OPENVAS:59643", "href": "http://plugins.openvas.org/nasl.php?oid=59643", "type": "openvas", "title": "Slackware Advisory SSA:2007-331-01 firefox", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: esoft_slk_ssa_2007_331_01.nasl 6598 2017-07-07 09:36:44Z cfischer $\n# Description: Auto-generated from the corresponding slackware advisory\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"New mozilla-firefox packages are available for Slackware 10.2, 11.0, 12.0,\nand -current to fix security issues.\";\ntag_summary = \"The remote host is missing an update as announced\nvia advisory SSA:2007-331-01.\";\n\ntag_solution = \"https://secure1.securityspace.com/smysecure/catid.html?in=SSA:2007-331-01\";\n \nif(description)\n{\n script_id(59643);\n script_tag(name:\"creation_date\", value:\"2012-09-11 01:34:21 +0200 (Tue, 11 Sep 2012)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 11:36:44 +0200 (Fri, 07 Jul 2017) $\");\n script_version(\"$Revision: 6598 $\");\n script_cve_id(\"CVE-2007-5947\", \"CVE-2007-5959\", \"CVE-2007-5960\");\n script_bugtraq_id(26385, 26593, 26589);\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n name = \"Slackware Advisory SSA:2007-331-01 firefox \";\n script_name(name);\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Slackware Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/slackware_linux\", \"ssh/login/slackpack\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-slack.inc\");\nvuln = 0;\nif(isslkpkgvuln(pkg:\"mozilla-firefox\", ver:\"2.0.0.10-i686-1\", rls:\"SLK10.2\")) {\n vuln = 1;\n}\nif(isslkpkgvuln(pkg:\"mozilla-firefox\", ver:\"2.0.0.10-i686-1\", rls:\"SLK11.0\")) {\n vuln = 1;\n}\nif(isslkpkgvuln(pkg:\"mozilla-firefox\", ver:\"2.0.0.10-i686-1\", rls:\"SLK12.0\")) {\n vuln = 1;\n}\n\nif(vuln) {\n security_message(0);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-25T10:56:59", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-5947", "CVE-2007-5960", "CVE-2007-5959"], "description": "Check for the Version of Miro", "modified": "2017-07-10T00:00:00", "published": "2009-02-27T00:00:00", "id": "OPENVAS:861255", "href": "http://plugins.openvas.org/nasl.php?oid=861255", "type": "openvas", "title": "Fedora Update for Miro FEDORA-2007-3962", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for Miro FEDORA-2007-3962\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"Miro on Fedora 8\";\ntag_insight = \"Miro is a free application that turns your computer into an\n internet TV video player. This release is still a beta version, which means\n that there are some bugs, but we're moving quickly to fix them and will be\n releasing bug fixes on a regular basis.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/fedora-package-announce/2007-November/msg01055.html\");\n script_id(861255);\n script_version(\"$Revision: 6623 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 08:10:20 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-02-27 16:23:18 +0100 (Fri, 27 Feb 2009)\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"FEDORA\", value: \"2007-3962\");\n script_cve_id(\"CVE-2007-5947\", \"CVE-2007-5959\", \"CVE-2007-5960\");\n script_name( \"Fedora Update for Miro FEDORA-2007-3962\");\n\n script_summary(\"Check for the Version of Miro\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC8\")\n{\n\n if ((res = isrpmvuln(pkg:\"Miro\", rpm:\"Miro~1.0~2.fc8\", rls:\"FC8\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"Miro-debuginfo\", rpm:\"Miro-debuginfo~1.0~2.fc8\", rls:\"FC8\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"Miro\", rpm:\"Miro~1.0~2.fc8\", rls:\"FC8\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"Miro\", rpm:\"Miro~1.0~2.fc8\", rls:\"FC8\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"Miro-debuginfo\", rpm:\"Miro-debuginfo~1.0~2.fc8\", rls:\"FC8\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-25T10:57:07", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-5947", "CVE-2007-5960", "CVE-2007-5959"], "description": "Check for the Version of openvrml", "modified": "2017-07-10T00:00:00", "published": "2009-02-27T00:00:00", "id": "OPENVAS:861501", "href": "http://plugins.openvas.org/nasl.php?oid=861501", "type": "openvas", "title": "Fedora Update for openvrml FEDORA-2007-3962", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for openvrml FEDORA-2007-3962\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"openvrml on Fedora 8\";\ntag_insight = \"OpenVRML is a VRML/X3D support library, including a runtime and facilities\n for reading and displaying VRML and X3D models.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/fedora-package-announce/2007-November/msg01047.html\");\n script_id(861501);\n script_version(\"$Revision: 6623 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 08:10:20 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-02-27 16:23:18 +0100 (Fri, 27 Feb 2009)\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"FEDORA\", value: \"2007-3962\");\n script_cve_id(\"CVE-2007-5947\", \"CVE-2007-5959\", \"CVE-2007-5960\");\n script_name( \"Fedora Update for openvrml FEDORA-2007-3962\");\n\n script_summary(\"Check for the Version of openvrml\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC8\")\n{\n\n if ((res = isrpmvuln(pkg:\"openvrml\", rpm:\"openvrml~0.16.7~2.fc8\", rls:\"FC8\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"openvrml-mozilla-plugin\", rpm:\"openvrml-mozilla-plugin~0.16.7~2.fc8\", rls:\"FC8\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"openvrml-gl-devel\", rpm:\"openvrml-gl-devel~0.16.7~2.fc8\", rls:\"FC8\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"openvrml-xembed\", rpm:\"openvrml-xembed~0.16.7~2.fc8\", rls:\"FC8\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"openvrml\", rpm:\"openvrml~0.16.7~2.fc8\", rls:\"FC8\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"openvrml-debuginfo\", rpm:\"openvrml-debuginfo~0.16.7~2.fc8\", rls:\"FC8\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"openvrml-gl\", rpm:\"openvrml-gl~0.16.7~2.fc8\", rls:\"FC8\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"openvrml-player\", rpm:\"openvrml-player~0.16.7~2.fc8\", rls:\"FC8\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"openvrml-devel\", rpm:\"openvrml-devel~0.16.7~2.fc8\", rls:\"FC8\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"openvrml-xembed\", rpm:\"openvrml-xembed~0.16.7~2.fc8\", rls:\"FC8\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"openvrml-gl\", rpm:\"openvrml-gl~0.16.7~2.fc8\", rls:\"FC8\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"openvrml-debuginfo\", rpm:\"openvrml-debuginfo~0.16.7~2.fc8\", rls:\"FC8\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"openvrml-devel\", rpm:\"openvrml-devel~0.16.7~2.fc8\", rls:\"FC8\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"openvrml\", rpm:\"openvrml~0.16.7~2.fc8\", rls:\"FC8\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"openvrml-player\", rpm:\"openvrml-player~0.16.7~2.fc8\", rls:\"FC8\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"openvrml-mozilla-plugin\", rpm:\"openvrml-mozilla-plugin~0.16.7~2.fc8\", rls:\"FC8\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"openvrml-gl-devel\", rpm:\"openvrml-gl-devel~0.16.7~2.fc8\", rls:\"FC8\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-25T10:56:23", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-5947", "CVE-2007-5960", "CVE-2007-5959"], "description": "Check for the Version of liferea", "modified": "2017-07-10T00:00:00", "published": "2009-02-27T00:00:00", "id": "OPENVAS:861475", "href": "http://plugins.openvas.org/nasl.php?oid=861475", "type": "openvas", "title": "Fedora Update for liferea FEDORA-2007-3952", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for liferea FEDORA-2007-3952\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"liferea on Fedora 7\";\ntag_insight = \"Liferea (Linux Feed Reader) is an RSS/RDF feed reader.\n It's intended to be a clone of the Windows-only FeedReader.\n It can be used to maintain a list of subscribed feeds,\n browse through their items, and show their contents.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/fedora-package-announce/2007-November/msg01012.html\");\n script_id(861475);\n script_version(\"$Revision: 6623 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 08:10:20 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-02-27 16:23:18 +0100 (Fri, 27 Feb 2009)\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"FEDORA\", value: \"2007-3952\");\n script_cve_id(\"CVE-2007-5947\", \"CVE-2007-5959\", \"CVE-2007-5960\");\n script_name( \"Fedora Update for liferea FEDORA-2007-3952\");\n\n script_summary(\"Check for the Version of liferea\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC7\")\n{\n\n if ((res = isrpmvuln(pkg:\"liferea\", rpm:\"liferea~1.4.8~2.fc7\", rls:\"FC7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"liferea\", rpm:\"liferea~1.4.8~2.fc7\", rls:\"FC7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"liferea-debuginfo\", rpm:\"liferea-debuginfo~1.4.8~2.fc7\", rls:\"FC7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"liferea-debuginfo\", rpm:\"liferea-debuginfo~1.4.8~2.fc7\", rls:\"FC7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"liferea\", rpm:\"liferea~1.4.8~2.fc7\", rls:\"FC7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-25T10:56:25", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-5947", "CVE-2007-5960", "CVE-2007-5959"], "description": "Check for the Version of epiphany-extensions", "modified": "2017-07-10T00:00:00", "published": "2009-02-27T00:00:00", "id": "OPENVAS:861362", "href": "http://plugins.openvas.org/nasl.php?oid=861362", "type": "openvas", "title": "Fedora Update for epiphany-extensions FEDORA-2007-3962", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for epiphany-extensions FEDORA-2007-3962\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"epiphany-extensions on Fedora 8\";\ntag_insight = \"Epiphany Extensions is a collection of extensions for Epiphany, the\n GNOME web browser.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/fedora-package-announce/2007-November/msg01042.html\");\n script_id(861362);\n script_version(\"$Revision: 6623 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 08:10:20 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-02-27 16:23:18 +0100 (Fri, 27 Feb 2009)\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"FEDORA\", value: \"2007-3962\");\n script_cve_id(\"CVE-2007-5947\", \"CVE-2007-5959\", \"CVE-2007-5960\");\n script_name( \"Fedora Update for epiphany-extensions FEDORA-2007-3962\");\n\n script_summary(\"Check for the Version of epiphany-extensions\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC8\")\n{\n\n if ((res = isrpmvuln(pkg:\"epiphany-extensions\", rpm:\"epiphany-extensions~2.20.1~4.fc8\", rls:\"FC8\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"epiphany-extensions-debuginfo\", rpm:\"epiphany-extensions-debuginfo~2.20.1~4.fc8\", rls:\"FC8\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"epiphany-extensions\", rpm:\"epiphany-extensions~2.20.1~4.fc8\", rls:\"FC8\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"epiphany-extensions-debuginfo\", rpm:\"epiphany-extensions-debuginfo~2.20.1~4.fc8\", rls:\"FC8\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"epiphany-extensions\", rpm:\"epiphany-extensions~2.20.1~4.fc8\", rls:\"FC8\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-25T10:56:25", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-5947", "CVE-2007-5960", "CVE-2007-5959"], "description": "Check for the Version of firefox", "modified": "2017-07-10T00:00:00", "published": "2009-02-27T00:00:00", "id": "OPENVAS:861517", "href": "http://plugins.openvas.org/nasl.php?oid=861517", "type": "openvas", "title": "Fedora Update for firefox FEDORA-2007-756", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for firefox FEDORA-2007-756\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"firefox on Fedora Core 6\";\ntag_insight = \"Mozilla Firefox is an open-source web browser, designed for standards\n compliance, performance and portability.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00115.html\");\n script_id(861517);\n script_version(\"$Revision: 6622 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 07:52:50 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-02-27 16:31:39 +0100 (Fri, 27 Feb 2009)\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"FEDORA\", value: \"2007-756\");\n script_cve_id(\"CVE-2007-5947\", \"CVE-2007-5959\", \"CVE-2007-5960\");\n script_name( \"Fedora Update for firefox FEDORA-2007-756\");\n\n script_summary(\"Check for the Version of firefox\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora_core\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC6\")\n{\n\n if ((res = isrpmvuln(pkg:\"firefox\", rpm:\"firefox~1.5.0.12~7.fc6\", rls:\"FC6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x86_64/firefox\", rpm:\"x86_64/firefox~1.5.0.12~7.fc6\", rls:\"FC6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x86_64/firefox-devel\", rpm:\"x86_64/firefox-devel~1.5.0.12~7.fc6\", rls:\"FC6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x86_64/debug/firefox-debuginfo\", rpm:\"x86_64/debug/firefox-debuginfo~1.5.0.12~7.fc6\", rls:\"FC6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"i386/firefox\", rpm:\"i386/firefox~1.5.0.12~7.fc6\", rls:\"FC6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"i386/firefox-devel\", rpm:\"i386/firefox-devel~1.5.0.12~7.fc6\", rls:\"FC6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"i386/debug/firefox-debuginfo\", rpm:\"i386/debug/firefox-debuginfo~1.5.0.12~7.fc6\", rls:\"FC6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-25T10:56:56", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-5947", "CVE-2007-5960", "CVE-2007-5959"], "description": "Check for the Version of galeon", "modified": "2017-07-10T00:00:00", "published": "2009-02-27T00:00:00", "id": "OPENVAS:861570", "href": "http://plugins.openvas.org/nasl.php?oid=861570", "type": "openvas", "title": "Fedora Update for galeon FEDORA-2007-3962", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for galeon FEDORA-2007-3962\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"galeon on Fedora 8\";\ntag_insight = \"Galeon is a web browser built around Gecko (Mozilla's rendering\n engine) and Necko (Mozilla's networking engine). It's a GNOME web\n browser, designed to take advantage of as many GNOME technologies as\n makes sense. Galeon was written to do just one thing - browse the web.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/fedora-package-announce/2007-November/msg01041.html\");\n script_id(861570);\n script_version(\"$Revision: 6623 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 08:10:20 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-02-27 16:23:18 +0100 (Fri, 27 Feb 2009)\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"FEDORA\", value: \"2007-3962\");\n script_cve_id(\"CVE-2007-5947\", \"CVE-2007-5959\", \"CVE-2007-5960\");\n script_name( \"Fedora Update for galeon FEDORA-2007-3962\");\n\n script_summary(\"Check for the Version of galeon\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC8\")\n{\n\n if ((res = isrpmvuln(pkg:\"galeon\", rpm:\"galeon~2.0.3~16.fc8\", rls:\"FC8\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"galeon\", rpm:\"galeon~2.0.3~16.fc8\", rls:\"FC8\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"galeon-debuginfo\", rpm:\"galeon-debuginfo~2.0.3~16.fc8\", rls:\"FC8\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"galeon\", rpm:\"galeon~2.0.3~16.fc8\", rls:\"FC8\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"galeon-debuginfo\", rpm:\"galeon-debuginfo~2.0.3~16.fc8\", rls:\"FC8\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-24T12:49:54", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-5947", "CVE-2007-5960", "CVE-2007-5959"], "description": "The remote host is missing an update to xulrunner\nannounced via advisory DSA 1425-1.", "modified": "2017-07-07T00:00:00", "published": "2008-01-17T00:00:00", "id": "OPENVAS:59959", "href": "http://plugins.openvas.org/nasl.php?oid=59959", "type": "openvas", "title": "Debian Security Advisory DSA 1425-1 (xulrunner)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_1425_1.nasl 6616 2017-07-07 12:10:49Z cfischer $\n# Description: Auto-generated from advisory DSA 1425-1\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largerly excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Several remote vulnerabilities have been discovered in Xulrunner, a\nruntime environment for XUL applications. The Common Vulnerabilities\nand Exposures project identifies the following problems:\n\nCVE-2007-5947\n\nJesse Ruderman and Petko D. Petkov discovered that the URI handler\nfor JAR archives allows cross-site scripting.\n\nCVE-2007-5959\n\nSeveral crashes in the layout engine were discovered, which might\nallow the execution of arbitrary code.\n\nCVE-2007-5960\n\nGregory Fleischer discovered a race condition in the handling of\nthe window.location property, which might lead to cross-site\nrequest forgery.\n\nThe oldstable distribution (sarge) doesn't contain xulrunner.\n\nFor the stable distribution (etch) these problems have been fixed in\nversion 1.8.0.14~pre071019c-0etch1.\n\nFor the unstable distribution (sid) these problems have been fixed in\nversion 1.8.1.11-1.\n\nWe recommend that you upgrade your xulrunner packages.\";\ntag_summary = \"The remote host is missing an update to xulrunner\nannounced via advisory DSA 1425-1.\";\n\ntag_solution = \"https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201425-1\";\n\nif(description)\n{\n script_id(59959);\n script_version(\"$Revision: 6616 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 14:10:49 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2008-01-17 23:23:47 +0100 (Thu, 17 Jan 2008)\");\n script_cve_id(\"CVE-2007-5947\", \"CVE-2007-5959\", \"CVE-2007-5960\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_name(\"Debian Security Advisory DSA 1425-1 (xulrunner)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"libmozjs-dev\", ver:\"1.8.0.14~pre071019c-0etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libnss3-dev\", ver:\"1.8.0.14~pre071019c-0etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libsmjs-dev\", ver:\"1.8.0.14~pre071019c-0etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxul-common\", ver:\"1.8.0.14~pre071019c-0etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libnspr4-dev\", ver:\"1.8.0.14~pre071019c-0etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libsmjs1\", ver:\"1.8.0.14~pre071019c-0etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libmozillainterfaces-java\", ver:\"1.8.0.14~pre071019c-0etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxul-dev\", ver:\"1.8.0.14~pre071019c-0etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libnss3-0d\", ver:\"1.8.0.14~pre071019c-0etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libnspr4-0d-dbg\", ver:\"1.8.0.14~pre071019c-0etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"xulrunner\", ver:\"1.8.0.14~pre071019c-0etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxul0d\", ver:\"1.8.0.14~pre071019c-0etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libmozjs0d\", ver:\"1.8.0.14~pre071019c-0etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libnss3-tools\", ver:\"1.8.0.14~pre071019c-0etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libnss3-0d-dbg\", ver:\"1.8.0.14~pre071019c-0etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libnspr4-0d\", ver:\"1.8.0.14~pre071019c-0etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"spidermonkey-bin\", ver:\"1.8.0.14~pre071019c-0etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"python-xpcom\", ver:\"1.8.0.14~pre071019c-0etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxul0d-dbg\", ver:\"1.8.0.14~pre071019c-0etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libmozjs0d-dbg\", ver:\"1.8.0.14~pre071019c-0etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"xulrunner-gnome-support\", ver:\"1.8.0.14~pre071019c-0etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "nessus": [{"lastseen": "2021-01-07T10:52:18", "description": "The remote host is affected by the vulnerability described in GLSA-200712-21\n(Mozilla Firefox, SeaMonkey: Multiple vulnerabilities)\n\n Jesse Ruderman and Petko D. Petkov reported that the jar protocol\n handler in Mozilla Firefox and SeaMonkey does not properly check MIME\n types (CVE-2007-5947). Gregory Fleischer reported that the\n window.location property can be used to generate a fake HTTP Referer\n (CVE-2007-5960). Multiple memory errors have also been reported\n (CVE-2007-5959).\n \nImpact :\n\n A remote attacker could possibly exploit these vulnerabilities to\n execute arbitrary code in the context of the browser and conduct\n Cross-Site-Scripting or Cross-Site Request Forgery attacks.\n \nWorkaround :\n\n There is no known workaround at this time.", "edition": 25, "published": "2007-12-31T00:00:00", "title": "GLSA-200712-21 : Mozilla Firefox, SeaMonkey: Multiple vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-5947", "CVE-2007-5960", "CVE-2007-5959"], "modified": "2007-12-31T00:00:00", "cpe": ["p-cpe:/a:gentoo:linux:seamonkey-bin", "p-cpe:/a:gentoo:linux:mozilla-firefox-bin", "cpe:/o:gentoo:linux", "p-cpe:/a:gentoo:linux:seamonkey", "p-cpe:/a:gentoo:linux:mozilla-firefox"], "id": "GENTOO_GLSA-200712-21.NASL", "href": "https://www.tenable.com/plugins/nessus/29818", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Gentoo Linux Security Advisory GLSA 200712-21.\n#\n# The advisory text is Copyright (C) 2001-2016 Gentoo Foundation, Inc.\n# and licensed under the Creative Commons - Attribution / Share Alike \n# license. See http://creativecommons.org/licenses/by-sa/3.0/\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(29818);\n script_version(\"1.19\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2007-5947\", \"CVE-2007-5959\", \"CVE-2007-5960\");\n script_bugtraq_id(26385, 26589, 26593);\n script_xref(name:\"GLSA\", value:\"200712-21\");\n\n script_name(english:\"GLSA-200712-21 : Mozilla Firefox, SeaMonkey: Multiple vulnerabilities\");\n script_summary(english:\"Checks for updated package(s) in /var/db/pkg\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Gentoo host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote host is affected by the vulnerability described in GLSA-200712-21\n(Mozilla Firefox, SeaMonkey: Multiple vulnerabilities)\n\n Jesse Ruderman and Petko D. Petkov reported that the jar protocol\n handler in Mozilla Firefox and SeaMonkey does not properly check MIME\n types (CVE-2007-5947). Gregory Fleischer reported that the\n window.location property can be used to generate a fake HTTP Referer\n (CVE-2007-5960). Multiple memory errors have also been reported\n (CVE-2007-5959).\n \nImpact :\n\n A remote attacker could possibly exploit these vulnerabilities to\n execute arbitrary code in the context of the browser and conduct\n Cross-Site-Scripting or Cross-Site Request Forgery attacks.\n \nWorkaround :\n\n There is no known workaround at this time.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.gentoo.org/glsa/200712-21\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"All Mozilla Firefox users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=www-client/mozilla-firefox-2.0.0.11'\n All Mozilla Firefox binary users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=www-client/mozilla-firefox-bin-2.0.0.11'\n All SeaMonkey users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=www-client/seamonkey-1.1.7'\n All SeaMonkey binary users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=www-client/seamonkey-bin-1.1.7'\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(22, 79);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:mozilla-firefox\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:mozilla-firefox-bin\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:seamonkey\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:seamonkey-bin\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:gentoo:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2007/12/29\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2007/12/31\");\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2007/11/09\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2007-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Gentoo Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Gentoo/release\", \"Host/Gentoo/qpkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"qpkg.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Gentoo/release\")) audit(AUDIT_OS_NOT, \"Gentoo\");\nif (!get_kb_item(\"Host/Gentoo/qpkg-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (qpkg_check(package:\"www-client/mozilla-firefox-bin\", unaffected:make_list(\"ge 2.0.0.11\"), vulnerable:make_list(\"lt 2.0.0.11\"))) flag++;\nif (qpkg_check(package:\"www-client/seamonkey-bin\", unaffected:make_list(\"ge 1.1.7\"), vulnerable:make_list(\"lt 1.1.7\"))) flag++;\nif (qpkg_check(package:\"www-client/seamonkey\", unaffected:make_list(\"ge 1.1.7\"), vulnerable:make_list(\"lt 1.1.7\"))) flag++;\nif (qpkg_check(package:\"www-client/mozilla-firefox\", unaffected:make_list(\"ge 2.0.0.11\"), vulnerable:make_list(\"lt 2.0.0.11\"))) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = qpkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"Mozilla Firefox / SeaMonkey\");\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-17T13:43:49", "description": "A cross-site scripting flaw was found in the way Thunderbird handled\nthe jar: URI scheme. It may be possible for a malicious HTML mail\nmessage to leverage this flaw, and conduct a cross-site scripting\nattack against a user running Thunderbird. (CVE-2007-5947)\n\nSeveral flaws were found in the way Thunderbird processed certain\nmalformed HTML mail content. A HTML mail message containing malicious\ncontent could cause Thunderbird to crash, or potentially execute\narbitrary code as the user running Thunderbird. (CVE-2007-5959)\n\nA race condition existed when Thunderbird set the 'window.location'\nproperty when displaying HTML mail content. This flaw could allow a\nHTML mail message to set an arbitrary Referer header, which may lead\nto a Cross-site Request Forgery (CSRF) attack against websites that\nrely only on the Referer header for protection. (CVE-2007-5960)", "edition": 26, "published": "2012-08-01T00:00:00", "title": "Scientific Linux Security Update : thunderbird on SL5.x, SL4.x i386/x86_64", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-5947", "CVE-2007-5960", "CVE-2007-5959"], "modified": "2012-08-01T00:00:00", "cpe": ["x-cpe:/o:fermilab:scientific_linux"], "id": "SL_20071219_THUNDERBIRD_ON_SL5_X.NASL", "href": "https://www.tenable.com/plugins/nessus/60338", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text is (C) Scientific Linux.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(60338);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2007-5947\", \"CVE-2007-5959\", \"CVE-2007-5960\");\n\n script_name(english:\"Scientific Linux Security Update : thunderbird on SL5.x, SL4.x i386/x86_64\");\n script_summary(english:\"Checks rpm output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Scientific Linux host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"A cross-site scripting flaw was found in the way Thunderbird handled\nthe jar: URI scheme. It may be possible for a malicious HTML mail\nmessage to leverage this flaw, and conduct a cross-site scripting\nattack against a user running Thunderbird. (CVE-2007-5947)\n\nSeveral flaws were found in the way Thunderbird processed certain\nmalformed HTML mail content. A HTML mail message containing malicious\ncontent could cause Thunderbird to crash, or potentially execute\narbitrary code as the user running Thunderbird. (CVE-2007-5959)\n\nA race condition existed when Thunderbird set the 'window.location'\nproperty when displaying HTML mail content. This flaw could allow a\nHTML mail message to set an arbitrary Referer header, which may lead\nto a Cross-site Request Forgery (CSRF) attack against websites that\nrely only on the Referer header for protection. (CVE-2007-5960)\"\n );\n # https://listserv.fnal.gov/scripts/wa.exe?A2=ind0712&L=scientific-linux-errata&T=0&P=2386\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?0eda7779\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected thunderbird package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_cwe_id(22, 79);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"x-cpe:/o:fermilab:scientific_linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2007/12/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/08/01\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Scientific Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Scientific Linux \" >!< release) audit(AUDIT_HOST_NOT, \"running Scientific Linux\");\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Scientific Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"SL4\", reference:\"thunderbird-1.5.0.12-7.el4\")) flag++;\n\nif (rpm_check(release:\"SL5\", reference:\"thunderbird-1.5.0.12-7.el5\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-17T14:43:32", "description": "This update brings the Mozilla XUL runner engine to security update\nversion 1.8.1.10\n\nMFSA 2007-37 / CVE-2007-5947: The jar protocol handler in Mozilla\nFirefox retrieves the inner URL regardless of its MIME type, and\nconsiders HTML documents within a jar archive to have the same origin\nas the inner URL, which allows remote attackers to conduct cross-site\nscripting (XSS) attacks via a jar: URI.\n\nMFSA 2007-38 / CVE-2007-5959: The Firefox 2.0.0.10 update contains\nfixes for three bugs that improve the stability of the product. These\ncrashes showed some evidence of memory corruption under certain\ncircumstances and we presume that with enough effort at least some of\nthese could be exploited to run arbitrary code.\n\nMFSA 2007-39 / CVE-2007-5960: Gregory Fleischer demonstrated that it\nwas possible to generate a fake HTTP Referer header by exploiting a\ntiming condition when setting the window.location property. This could\nbe used to conduct a Cross-site Request Forgery (CSRF) attack against\nwebsites that rely only on the Referer header as protection against\nsuch attacks.", "edition": 24, "published": "2008-01-10T00:00:00", "title": "openSUSE 10 Security Update : epiphany (epiphany-4870)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-5947", "CVE-2007-5960", "CVE-2007-5959"], "modified": "2008-01-10T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:epiphany", "cpe:/o:novell:opensuse:10.3", "cpe:/o:novell:opensuse:10.2", "p-cpe:/a:novell:opensuse:mozilla-xulrunner181-32bit", "p-cpe:/a:novell:opensuse:mozilla-xulrunner181-devel", "p-cpe:/a:novell:opensuse:epiphany-extensions-lang", "p-cpe:/a:novell:opensuse:mozilla-xulrunner181-l10n", "p-cpe:/a:novell:opensuse:epiphany-extensions", "p-cpe:/a:novell:opensuse:epiphany-devel", "p-cpe:/a:novell:opensuse:epiphany-lang", "p-cpe:/a:novell:opensuse:mozilla-xulrunner181"], "id": "SUSE_EPIPHANY-4870.NASL", "href": "https://www.tenable.com/plugins/nessus/29915", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update epiphany-4870.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(29915);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2007-5947\", \"CVE-2007-5959\", \"CVE-2007-5960\");\n\n script_name(english:\"openSUSE 10 Security Update : epiphany (epiphany-4870)\");\n script_summary(english:\"Check for the epiphany-4870 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update brings the Mozilla XUL runner engine to security update\nversion 1.8.1.10\n\nMFSA 2007-37 / CVE-2007-5947: The jar protocol handler in Mozilla\nFirefox retrieves the inner URL regardless of its MIME type, and\nconsiders HTML documents within a jar archive to have the same origin\nas the inner URL, which allows remote attackers to conduct cross-site\nscripting (XSS) attacks via a jar: URI.\n\nMFSA 2007-38 / CVE-2007-5959: The Firefox 2.0.0.10 update contains\nfixes for three bugs that improve the stability of the product. These\ncrashes showed some evidence of memory corruption under certain\ncircumstances and we presume that with enough effort at least some of\nthese could be exploited to run arbitrary code.\n\nMFSA 2007-39 / CVE-2007-5960: Gregory Fleischer demonstrated that it\nwas possible to generate a fake HTTP Referer header by exploiting a\ntiming condition when setting the window.location property. This could\nbe used to conduct a Cross-site Request Forgery (CSRF) attack against\nwebsites that rely only on the Referer header as protection against\nsuch attacks.\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected epiphany packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_cwe_id(22, 79);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:epiphany\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:epiphany-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:epiphany-extensions\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:epiphany-extensions-lang\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:epiphany-lang\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-xulrunner181\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-xulrunner181-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-xulrunner181-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-xulrunner181-l10n\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:10.2\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:10.3\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/01/07\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2008/01/10\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2008-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE10\\.2|SUSE10\\.3)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"10.2 / 10.3\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE10.2\", reference:\"epiphany-2.16.1-30\") ) flag++;\nif ( rpm_check(release:\"SUSE10.2\", reference:\"epiphany-devel-2.16.1-30\") ) flag++;\nif ( rpm_check(release:\"SUSE10.2\", reference:\"epiphany-extensions-2.16.1-30\") ) flag++;\nif ( rpm_check(release:\"SUSE10.2\", reference:\"mozilla-xulrunner181-1.8.1.10-0.1\") ) flag++;\nif ( rpm_check(release:\"SUSE10.2\", reference:\"mozilla-xulrunner181-devel-1.8.1.10-0.1\") ) flag++;\nif ( rpm_check(release:\"SUSE10.2\", reference:\"mozilla-xulrunner181-l10n-1.8.1.10-0.1\") ) flag++;\nif ( rpm_check(release:\"SUSE10.3\", reference:\"epiphany-2.20.0-8.1\") ) flag++;\nif ( rpm_check(release:\"SUSE10.3\", reference:\"epiphany-devel-2.20.0-8.1\") ) flag++;\nif ( rpm_check(release:\"SUSE10.3\", reference:\"epiphany-extensions-2.20.0-8.1\") ) flag++;\nif ( rpm_check(release:\"SUSE10.3\", reference:\"epiphany-extensions-lang-2.20.0-8.1\") ) flag++;\nif ( rpm_check(release:\"SUSE10.3\", reference:\"epiphany-lang-2.20.0-8.1\") ) flag++;\nif ( rpm_check(release:\"SUSE10.3\", reference:\"mozilla-xulrunner181-1.8.1.10-0.1\") ) flag++;\nif ( rpm_check(release:\"SUSE10.3\", reference:\"mozilla-xulrunner181-devel-1.8.1.10-0.1\") ) flag++;\nif ( rpm_check(release:\"SUSE10.3\", reference:\"mozilla-xulrunner181-l10n-1.8.1.10-0.1\") ) flag++;\nif ( rpm_check(release:\"SUSE10.3\", cpu:\"x86_64\", reference:\"mozilla-xulrunner181-32bit-1.8.1.10-0.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"mozilla-xulrunner181\");\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-17T14:14:09", "description": "This update brings Mozilla Firefox to security update version 2.0.0.10\n\nFollowing security problems were fixed: MFSA 2007-37 / CVE-2007-5947:\nThe jar protocol handler in Mozilla Firefox retrieves the inner URL\nregardless of its MIME type, and considers HTML documents within a jar\narchive to have the same origin as the inner URL, which allows remote\nattackers to conduct cross-site scripting (XSS) attacks via a jar:\nURI.\n\n - The Firefox 2.0.0.10 update contains fixes for three\n bugs that improve the stability of the product. These\n crashes showed some evidence of memory corruption under\n certain circumstances and we presume that with enough\n effort at least some of these could be exploited to run\n arbitrary code. (MFSA 2007-38 / CVE-2007-5959)\n\n - Gregory Fleischer demonstrated that it was possible to\n generate a fake HTTP Referer header by exploiting a\n timing condition when setting the window.location\n property. This could be used to conduct a Cross-site\n Request Forgery (CSRF) attack against websites that rely\n only on the Referer header as protection against such\n attacks. (MFSA 2007-39 / CVE-2007-5960)", "edition": 24, "published": "2007-12-13T00:00:00", "title": "SuSE 10 Security Update : MozillaFirefox (ZYPP Patch Number 4757)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-5947", "CVE-2007-5960", "CVE-2007-5959"], "modified": "2007-12-13T00:00:00", "cpe": ["cpe:/o:suse:suse_linux"], "id": "SUSE_MOZILLAFIREFOX-4757.NASL", "href": "https://www.tenable.com/plugins/nessus/29363", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The text description of this plugin is (C) Novell, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(29363);\n script_version(\"1.19\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2007-5947\", \"CVE-2007-5959\", \"CVE-2007-5960\");\n\n script_name(english:\"SuSE 10 Security Update : MozillaFirefox (ZYPP Patch Number 4757)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SuSE 10 host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update brings Mozilla Firefox to security update version 2.0.0.10\n\nFollowing security problems were fixed: MFSA 2007-37 / CVE-2007-5947:\nThe jar protocol handler in Mozilla Firefox retrieves the inner URL\nregardless of its MIME type, and considers HTML documents within a jar\narchive to have the same origin as the inner URL, which allows remote\nattackers to conduct cross-site scripting (XSS) attacks via a jar:\nURI.\n\n - The Firefox 2.0.0.10 update contains fixes for three\n bugs that improve the stability of the product. These\n crashes showed some evidence of memory corruption under\n certain circumstances and we presume that with enough\n effort at least some of these could be exploited to run\n arbitrary code. (MFSA 2007-38 / CVE-2007-5959)\n\n - Gregory Fleischer demonstrated that it was possible to\n generate a fake HTTP Referer header by exploiting a\n timing condition when setting the window.location\n property. This could be used to conduct a Cross-site\n Request Forgery (CSRF) attack against websites that rely\n only on the Referer header as protection against such\n attacks. (MFSA 2007-39 / CVE-2007-5960)\"\n );\n # http://www.mozilla.org/security/announce/2007/mfsa2007-37.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2007-37/\"\n );\n # http://www.mozilla.org/security/announce/2007/mfsa2007-38.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2007-38/\"\n );\n # http://www.mozilla.org/security/announce/2007/mfsa2007-39.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2007-39/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2007-5947.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2007-5959.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2007-5960.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Apply ZYPP patch number 4757.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_cwe_id(22, 79);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:suse:suse_linux\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2007/11/13\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2007/11/27\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2007/12/13\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2007-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) exit(0, \"Local checks are not enabled.\");\nif (!get_kb_item(\"Host/SuSE/release\")) exit(0, \"The host is not running SuSE.\");\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) exit(1, \"Could not obtain the list of installed packages.\");\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) exit(1, \"Failed to determine the architecture type.\");\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") exit(1, \"Local checks for SuSE 10 on the '\"+cpu+\"' architecture have not been implemented.\");\n\n\nflag = 0;\nif (rpm_check(release:\"SLED10\", sp:1, reference:\"MozillaFirefox-2.0.0.10-0.2\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:1, reference:\"MozillaFirefox-translations-2.0.0.10-0.2\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:1, reference:\"MozillaFirefox-2.0.0.10-0.2\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:1, reference:\"MozillaFirefox-translations-2.0.0.10-0.2\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse exit(0, \"The host is not affected.\");\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-06T09:25:13", "description": "Updated firefox packages that fix several security issues are now\navailable for Red Hat Enterprise Linux 4 and 5.\n\nThis update has been rated as having critical security impact by the\nRed Hat Security Response Team.\n\nMozilla Firefox is an open source Web browser.\n\nA cross-site scripting flaw was found in the way Firefox handled the\njar: URI scheme. It was possible for a malicious website to leverage\nthis flaw and conduct a cross-site scripting attack against a user\nrunning Firefox. (CVE-2007-5947)\n\nSeveral flaws were found in the way Firefox processed certain\nmalformed web content. A webpage containing malicious content could\ncause Firefox to crash, or potentially execute arbitrary code as the\nuser running Firefox. (CVE-2007-5959)\n\nA race condition existed when Firefox set the 'window.location'\nproperty for a webpage. This flaw could allow a webpage to set an\narbitrary Referer header, which may lead to a Cross-site Request\nForgery (CSRF) attack against websites that rely only on the Referer\nheader for protection. (CVE-2007-5960)\n\nUsers of Firefox are advised to upgrade to these updated packages,\nwhich contain backported patches to resolve these issues.", "edition": 28, "published": "2009-04-23T00:00:00", "title": "CentOS 4 : firefox (CESA-2007:1082)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-5947", "CVE-2007-5960", "CVE-2007-5959"], "modified": "2009-04-23T00:00:00", "cpe": ["cpe:/o:centos:centos:4", "p-cpe:/a:centos:centos:firefox"], "id": "CENTOS_RHSA-2007-1082.NASL", "href": "https://www.tenable.com/plugins/nessus/37591", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2007:1082 and \n# CentOS Errata and Security Advisory 2007:1082 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(37591);\n script_version(\"1.15\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2007-5947\", \"CVE-2007-5959\", \"CVE-2007-5960\");\n script_bugtraq_id(26385, 26589, 26593);\n script_xref(name:\"RHSA\", value:\"2007:1082\");\n\n script_name(english:\"CentOS 4 : firefox (CESA-2007:1082)\");\n script_summary(english:\"Checks rpm output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated firefox packages that fix several security issues are now\navailable for Red Hat Enterprise Linux 4 and 5.\n\nThis update has been rated as having critical security impact by the\nRed Hat Security Response Team.\n\nMozilla Firefox is an open source Web browser.\n\nA cross-site scripting flaw was found in the way Firefox handled the\njar: URI scheme. It was possible for a malicious website to leverage\nthis flaw and conduct a cross-site scripting attack against a user\nrunning Firefox. (CVE-2007-5947)\n\nSeveral flaws were found in the way Firefox processed certain\nmalformed web content. A webpage containing malicious content could\ncause Firefox to crash, or potentially execute arbitrary code as the\nuser running Firefox. (CVE-2007-5959)\n\nA race condition existed when Firefox set the 'window.location'\nproperty for a webpage. This flaw could allow a webpage to set an\narbitrary Referer header, which may lead to a Cross-site Request\nForgery (CSRF) attack against websites that rely only on the Referer\nheader for protection. (CVE-2007-5960)\n\nUsers of Firefox are advised to upgrade to these updated packages,\nwhich contain backported patches to resolve these issues.\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2007-November/014473.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?9e240c1f\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected firefox package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(22, 79);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:firefox\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:4\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2007/11/13\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2007/11/30\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/04/23\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^4([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 4.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-4\", cpu:\"ia64\", reference:\"firefox-1.5.0.12-0.8.el4.centos\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"firefox\");\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-12T10:06:16", "description": "Updated firefox packages that fix several security issues are now\navailable for Fedora Core 6.\n\nThis update has been rated as having critical security impact by the\nFedora Security Response Team.\n\nMozilla Firefox is an open source Web browser.\n\nA cross-site scripting flaw was found in the way Firefox handled the\njar: URI scheme. It was possible for a malicious website to leverage\nthis flaw and conduct a cross-site scripting attack against a user\nrunning Firefox. (CVE-2007-5947)\n\nSeveral flaws were found in the way Firefox processed certain\nmalformed web content. A web page containing malicious content could\ncause Firefox to crash, or potentially execute arbitrary code as the\nuser running Firefox. (CVE-2007-5959)\n\nA race condition existed when Firefox set the 'window.location'\nproperty for a web page. This flaw could allow a web page to set an\narbitrary Referer header, which may lead to a Cross-site Request\nForgery (CSRF) attack against websites that rely only on the Referer\nheader for protection. (CVE-2007-5960)\n\nUsers of Firefox are advised to upgrade to these updated packages,\nwhich contain backported patches to resolve these issues.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 25, "published": "2007-12-04T00:00:00", "title": "Fedora Core 6 : firefox-1.5.0.12-7.fc6 (2007-756)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-5947", "CVE-2007-5960", "CVE-2007-5959"], "modified": "2007-12-04T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:firefox", "p-cpe:/a:fedoraproject:fedora:firefox-devel", "cpe:/o:fedoraproject:fedora_core:6", "p-cpe:/a:fedoraproject:fedora:firefox-debuginfo"], "id": "FEDORA_2007-756.NASL", "href": "https://www.tenable.com/plugins/nessus/29197", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2007-756.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(29197);\n script_version(\"1.15\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2007-5947\", \"CVE-2007-5959\", \"CVE-2007-5960\");\n script_xref(name:\"FEDORA\", value:\"2007-756\");\n\n script_name(english:\"Fedora Core 6 : firefox-1.5.0.12-7.fc6 (2007-756)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora Core host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated firefox packages that fix several security issues are now\navailable for Fedora Core 6.\n\nThis update has been rated as having critical security impact by the\nFedora Security Response Team.\n\nMozilla Firefox is an open source Web browser.\n\nA cross-site scripting flaw was found in the way Firefox handled the\njar: URI scheme. It was possible for a malicious website to leverage\nthis flaw and conduct a cross-site scripting attack against a user\nrunning Firefox. (CVE-2007-5947)\n\nSeveral flaws were found in the way Firefox processed certain\nmalformed web content. A web page containing malicious content could\ncause Firefox to crash, or potentially execute arbitrary code as the\nuser running Firefox. (CVE-2007-5959)\n\nA race condition existed when Firefox set the 'window.location'\nproperty for a web page. This flaw could allow a web page to set an\narbitrary Referer header, which may lead to a Cross-site Request\nForgery (CSRF) attack against websites that rely only on the Referer\nheader for protection. (CVE-2007-5960)\n\nUsers of Firefox are advised to upgrade to these updated packages,\nwhich contain backported patches to resolve these issues.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2007-December/005577.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?45a578ed\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Update the affected firefox, firefox-debuginfo and / or firefox-devel\npackages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_cwe_id(22, 79);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:firefox\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:firefox-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:firefox-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora_core:6\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2007/12/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2007/12/04\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2007-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 6.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC6\", reference:\"firefox-1.5.0.12-7.fc6\")) flag++;\nif (rpm_check(release:\"FC6\", reference:\"firefox-debuginfo-1.5.0.12-7.fc6\")) flag++;\nif (rpm_check(release:\"FC6\", reference:\"firefox-devel-1.5.0.12-7.fc6\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"firefox / firefox-debuginfo / firefox-devel\");\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-01T03:48:48", "description": "The installed version of Firefox is affected by various security\nissues :\n\n - Three bugs that can result in crashes with traces \n of memory corruption\n\n - A cross-site scripting vulnerability involving\n support for the 'jar:' URI scheme\n\n - A timing issue when setting the 'window.location' \n property that could be leveraged to conduct\n cross-site request forgery attacks.", "edition": 26, "published": "2007-11-27T00:00:00", "title": "Firefox < 2.0.0.10 Multiple Vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-5947", "CVE-2007-5960", "CVE-2007-5959"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/a:mozilla:firefox"], "id": "MOZILLA_FIREFOX_20010.NASL", "href": "https://www.tenable.com/plugins/nessus/28329", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\n\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(28329);\n script_version(\"1.16\");\n\n script_cve_id(\"CVE-2007-5947\", \"CVE-2007-5959\", \"CVE-2007-5960\");\n script_bugtraq_id(26385, 26589, 26593);\n\n script_name(english:\"Firefox < 2.0.0.10 Multiple Vulnerabilities\");\n script_summary(english:\"Checks version of Firefox\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host contains a web browser that is affected by\nmultiple vulnerabilities.\" );\n script_set_attribute(attribute:\"description\", value:\n\"The installed version of Firefox is affected by various security\nissues :\n\n - Three bugs that can result in crashes with traces \n of memory corruption\n\n - A cross-site scripting vulnerability involving\n support for the 'jar:' URI scheme\n\n - A timing issue when setting the 'window.location' \n property that could be leveraged to conduct\n cross-site request forgery attacks.\" );\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2007-37/\" );\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2007-38/\" );\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2007-39/\" );\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Firefox 2.0.0.10 or later.\" );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(22, 79);\n\n script_set_attribute(attribute:\"plugin_publication_date\", value: \"2007/11/27\");\n script_set_attribute(attribute:\"vuln_publication_date\", value: \"2007/11/09\");\n script_set_attribute(attribute:\"patch_publication_date\", value: \"2007/11/26\");\n script_cvs_date(\"Date: 2018/07/16 14:09:14\");\nscript_set_attribute(attribute:\"plugin_type\", value:\"local\");\nscript_set_attribute(attribute:\"cpe\", value:\"cpe:/a:mozilla:firefox\");\nscript_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n script_copyright(english:\"This script is Copyright (C) 2007-2018 Tenable Network Security, Inc.\");\n script_dependencies(\"mozilla_org_installed.nasl\");\n script_require_keys(\"Mozilla/Firefox/Version\");\n exit(0);\n}\n\ninclude(\"mozilla_version.inc\");\nport = get_kb_item_or_exit(\"SMB/transport\"); \n\ninstalls = get_kb_list(\"SMB/Mozilla/Firefox/*\");\nif (isnull(installs)) audit(AUDIT_NOT_INST, \"Firefox\");\n\nmozilla_check_version(installs:installs, product:'firefox', esr:FALSE, fix:'2.0.0.10', severity:SECURITY_HOLE);", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-06T09:25:13", "description": "Updated thunderbird packages that fix several security issues are now\navailable for Red Hat Enterprise Linux 4 and 5.\n\nThis update has been rated as having moderate security impact by the\nRed Hat Security Response Team.\n\nMozilla Thunderbird is a standalone mail and newsgroup client.\n\nA cross-site scripting flaw was found in the way Thunderbird handled\nthe jar: URI scheme. It may be possible for a malicious HTML mail\nmessage to leverage this flaw, and conduct a cross-site scripting\nattack against a user running Thunderbird. (CVE-2007-5947)\n\nSeveral flaws were found in the way Thunderbird processed certain\nmalformed HTML mail content. A HTML mail message containing malicious\ncontent could cause Thunderbird to crash, or potentially execute\narbitrary code as the user running Thunderbird. (CVE-2007-5959)\n\nA race condition existed when Thunderbird set the 'window.location'\nproperty when displaying HTML mail content. This flaw could allow a\nHTML mail message to set an arbitrary Referer header, which may lead\nto a Cross-site Request Forgery (CSRF) attack against websites that\nrely only on the Referer header for protection. (CVE-2007-5960)\n\nAll users of thunderbird are advised to upgrade to these updated\npackages, which contain backported patches to resolve these issues.", "edition": 27, "published": "2007-12-24T00:00:00", "title": "CentOS 4 / 5 : thunderbird (CESA-2007:1083)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-5947", "CVE-2007-5960", "CVE-2007-5959"], "modified": "2007-12-24T00:00:00", "cpe": ["cpe:/o:centos:centos:4", "p-cpe:/a:centos:centos:thunderbird", "cpe:/o:centos:centos:5"], "id": "CENTOS_RHSA-2007-1083.NASL", "href": "https://www.tenable.com/plugins/nessus/29750", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2007:1083 and \n# CentOS Errata and Security Advisory 2007:1083 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(29750);\n script_version(\"1.19\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2007-5947\", \"CVE-2007-5959\", \"CVE-2007-5960\");\n script_bugtraq_id(26385, 26589, 26593);\n script_xref(name:\"RHSA\", value:\"2007:1083\");\n\n script_name(english:\"CentOS 4 / 5 : thunderbird (CESA-2007:1083)\");\n script_summary(english:\"Checks rpm output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated thunderbird packages that fix several security issues are now\navailable for Red Hat Enterprise Linux 4 and 5.\n\nThis update has been rated as having moderate security impact by the\nRed Hat Security Response Team.\n\nMozilla Thunderbird is a standalone mail and newsgroup client.\n\nA cross-site scripting flaw was found in the way Thunderbird handled\nthe jar: URI scheme. It may be possible for a malicious HTML mail\nmessage to leverage this flaw, and conduct a cross-site scripting\nattack against a user running Thunderbird. (CVE-2007-5947)\n\nSeveral flaws were found in the way Thunderbird processed certain\nmalformed HTML mail content. A HTML mail message containing malicious\ncontent could cause Thunderbird to crash, or potentially execute\narbitrary code as the user running Thunderbird. (CVE-2007-5959)\n\nA race condition existed when Thunderbird set the 'window.location'\nproperty when displaying HTML mail content. This flaw could allow a\nHTML mail message to set an arbitrary Referer header, which may lead\nto a Cross-site Request Forgery (CSRF) attack against websites that\nrely only on the Referer header for protection. (CVE-2007-5960)\n\nAll users of thunderbird are advised to upgrade to these updated\npackages, which contain backported patches to resolve these issues.\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2007-December/014547.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?87950687\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2007-December/014548.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?41bd4336\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2007-December/014552.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?6278c021\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2007-December/014557.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?05fa422a\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2007-December/014558.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?faf2053e\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected thunderbird package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:ND/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(22, 79);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:thunderbird\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:4\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:5\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2007/11/13\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2007/12/22\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2007/12/24\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2007-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(4|5)([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 4.x / 5.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-4\", reference:\"thunderbird-1.5.0.12-7.el4.centos\")) flag++;\n\nif (rpm_check(release:\"CentOS-5\", reference:\"thunderbird-1.5.0.12-7.el5.centos\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"thunderbird\");\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-20T15:44:06", "description": "USN-546-1 fixed vulnerabilities in Firefox. The upstream update\nincluded a faulty patch which caused the drawImage method of the\ncanvas element to fail. This update fixes the problem.\n\nWe apologize for the inconvenience.\n\nIt was discovered that Firefox incorrectly associated redirected sites\nas the origin of 'jar:' contents. A malicious website could exploit\nthis to modify or steal confidential data (such as passwords) from\nother web sites. (CVE-2007-5947)\n\nVarious flaws were discovered in the layout and JavaScript\nengines. By tricking a user into opening a malicious web\npage, an attacker could execute arbitrary code with the\nuser's privileges. (CVE-2007-5959)\n\nGregory Fleischer discovered that it was possible to use\nJavaScript to manipulate Firefox's Referer header. A\nmalicious website could exploit this to conduct cross-site\nrequest forgeries against sites that relied only on Referer\nheaders for protection from such attacks. (CVE-2007-5960).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 26, "published": "2007-12-07T00:00:00", "title": "Ubuntu 6.10 / 7.04 / 7.10 : firefox regression (USN-546-2)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-5947", "CVE-2007-5960", "CVE-2007-5959"], "modified": "2007-12-07T00:00:00", "cpe": ["cpe:/o:canonical:ubuntu_linux:7.10", "p-cpe:/a:canonical:ubuntu_linux:libnspr-dev", "p-cpe:/a:canonical:ubuntu_linux:firefox-dom-inspector", "p-cpe:/a:canonical:ubuntu_linux:firefox-gnome-support", "cpe:/o:canonical:ubuntu_linux:6.10", "p-cpe:/a:canonical:ubuntu_linux:firefox-libthai", "p-cpe:/a:canonical:ubuntu_linux:mozilla-firefox-dev", "p-cpe:/a:canonical:ubuntu_linux:libnspr4", "p-cpe:/a:canonical:ubuntu_linux:firefox-dev", "p-cpe:/a:canonical:ubuntu_linux:firefox", "p-cpe:/a:canonical:ubuntu_linux:mozilla-firefox", "p-cpe:/a:canonical:ubuntu_linux:mozilla-firefox-dom-inspector", "p-cpe:/a:canonical:ubuntu_linux:mozilla-firefox-gnome-support", "p-cpe:/a:canonical:ubuntu_linux:libnss-dev", "p-cpe:/a:canonical:ubuntu_linux:firefox-dbg", "p-cpe:/a:canonical:ubuntu_linux:libnss3", "cpe:/o:canonical:ubuntu_linux:7.04"], "id": "UBUNTU_USN-546-2.NASL", "href": "https://www.tenable.com/plugins/nessus/29236", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-546-2. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(29236);\n script_version(\"1.15\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2007-5947\", \"CVE-2007-5959\", \"CVE-2007-5960\");\n script_xref(name:\"USN\", value:\"546-2\");\n\n script_name(english:\"Ubuntu 6.10 / 7.04 / 7.10 : firefox regression (USN-546-2)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"USN-546-1 fixed vulnerabilities in Firefox. The upstream update\nincluded a faulty patch which caused the drawImage method of the\ncanvas element to fail. This update fixes the problem.\n\nWe apologize for the inconvenience.\n\nIt was discovered that Firefox incorrectly associated redirected sites\nas the origin of 'jar:' contents. A malicious website could exploit\nthis to modify or steal confidential data (such as passwords) from\nother web sites. (CVE-2007-5947)\n\nVarious flaws were discovered in the layout and JavaScript\nengines. By tricking a user into opening a malicious web\npage, an attacker could execute arbitrary code with the\nuser's privileges. (CVE-2007-5959)\n\nGregory Fleischer discovered that it was possible to use\nJavaScript to manipulate Firefox's Referer header. A\nmalicious website could exploit this to conduct cross-site\nrequest forgeries against sites that relied only on Referer\nheaders for protection from such attacks. (CVE-2007-5960).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/546-2/\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_cwe_id(22, 79);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-dom-inspector\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-gnome-support\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-libthai\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libnspr-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libnspr4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libnss-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libnss3\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mozilla-firefox\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mozilla-firefox-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mozilla-firefox-dom-inspector\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mozilla-firefox-gnome-support\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:6.10\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:7.04\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:7.10\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2007/12/04\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2007/12/07\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2007-2019 Canonical, Inc. / NASL script (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! ereg(pattern:\"^(6\\.10|7\\.04|7\\.10)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 6.10 / 7.04 / 7.10\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"6.10\", pkgname:\"firefox\", pkgver:\"2.0.0.11+0nobinonly-0ubuntu0.6.10\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"firefox-dbg\", pkgver:\"2.0.0.11+0nobinonly-0ubuntu0.6.10\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"firefox-dev\", pkgver:\"2.0.0.11+0nobinonly-0ubuntu0.6.10\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"firefox-dom-inspector\", pkgver:\"2.0.0.11+0nobinonly-0ubuntu0.6.10\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"firefox-gnome-support\", pkgver:\"2.0.0.11+0nobinonly-0ubuntu0.6.10\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"libnspr-dev\", pkgver:\"1.firefox2.0.0.11+0nobinonly-0ubuntu0.6.10\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"libnspr4\", pkgver:\"1.firefox2.0.0.11+0nobinonly-0ubuntu0.6.10\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"libnss-dev\", pkgver:\"1.firefox2.0.0.11+0nobinonly-0ubuntu0.6.10\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"libnss3\", pkgver:\"1.firefox2.0.0.11+0nobinonly-0ubuntu0.6.10\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"mozilla-firefox\", pkgver:\"2.0.0.11+0nobinonly-0ubuntu0.6.10\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"mozilla-firefox-dev\", pkgver:\"2.0.0.11+0nobinonly-0ubuntu0.6.10\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"mozilla-firefox-dom-inspector\", pkgver:\"2.0.0.11+0nobinonly-0ubuntu0.6.10\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"mozilla-firefox-gnome-support\", pkgver:\"2.0.0.11+0nobinonly-0ubuntu0.6.10\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"firefox\", pkgver:\"2.0.0.11+1nobinonly-0ubuntu0.7.4\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"firefox-dbg\", pkgver:\"2.0.0.11+1nobinonly-0ubuntu0.7.4\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"firefox-dev\", pkgver:\"2.0.0.11+1nobinonly-0ubuntu0.7.4\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"firefox-dom-inspector\", pkgver:\"2.0.0.11+1nobinonly-0ubuntu0.7.4\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"firefox-gnome-support\", pkgver:\"2.0.0.11+1nobinonly-0ubuntu0.7.4\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"firefox-libthai\", pkgver:\"2.0.0.11+1nobinonly-0ubuntu0.7.4\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"libnspr-dev\", pkgver:\"1.firefox2.0.0.11+1nobinonly-0ubuntu0.7.4\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"libnspr4\", pkgver:\"1.firefox2.0.0.11+1nobinonly-0ubuntu0.7.4\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"libnss-dev\", pkgver:\"1.firefox2.0.0.11+1nobinonly-0ubuntu0.7.4\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"libnss3\", pkgver:\"1.firefox2.0.0.11+1nobinonly-0ubuntu0.7.4\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"mozilla-firefox\", pkgver:\"2.0.0.11+1nobinonly-0ubuntu0.7.4\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"mozilla-firefox-dev\", pkgver:\"2.0.0.11+1nobinonly-0ubuntu0.7.4\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"mozilla-firefox-dom-inspector\", pkgver:\"2.0.0.11+1nobinonly-0ubuntu0.7.4\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"mozilla-firefox-gnome-support\", pkgver:\"2.0.0.11+1nobinonly-0ubuntu0.7.4\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"firefox\", pkgver:\"2.0.0.11+2nobinonly-0ubuntu0.7.10\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"firefox-dbg\", pkgver:\"2.0.0.11+2nobinonly-0ubuntu0.7.10\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"firefox-dev\", pkgver:\"2.0.0.11+2nobinonly-0ubuntu0.7.10\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"firefox-dom-inspector\", pkgver:\"2.0.0.11+2nobinonly-0ubuntu0.7.10\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"firefox-gnome-support\", pkgver:\"2.0.0.11+2nobinonly-0ubuntu0.7.10\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"firefox-libthai\", pkgver:\"2.0.0.11+2nobinonly-0ubuntu0.7.10\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"firefox / firefox-dbg / firefox-dev / firefox-dom-inspector / etc\");\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-17T14:14:09", "description": "This update brings Mozilla Firefox to security update version 2.0.0.10\n\nFollowing security problems were fixed: MFSA 2007-37 / CVE-2007-5947:\nThe jar protocol handler in Mozilla Firefox retrieves the inner URL\nregardless of its MIME type, and considers HTML documents within a jar\narchive to have the same origin as the inner URL, which allows remote\nattackers to conduct cross-site scripting (XSS) attacks via a jar:\nURI.\n\nMFSA 2007-38 / CVE-2007-5959: The Firefox 2.0.0.10 update contains\nfixes for three bugs that improve the stability of the product. These\ncrashes showed some evidence of memory corruption under certain\ncircumstances and we presume that with enough effort at least some of\nthese could be exploited to run arbitrary code.\n\nMFSA 2007-39 / CVE-2007-5960: Gregory Fleischer demonstrated that it\nwas possible to generate a fake HTTP Referer header by exploiting a\ntiming condition when setting the window.location property. This could\nbe used to conduct a Cross-site Request Forgery (CSRF) attack against\nwebsites that rely only on the Referer header as protection against\nsuch attacks.", "edition": 24, "published": "2007-11-30T00:00:00", "title": "openSUSE 10 Security Update : MozillaFirefox (MozillaFirefox-4758)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-5947", "CVE-2007-5960", "CVE-2007-5959"], "modified": "2007-11-30T00:00:00", "cpe": ["cpe:/o:novell:opensuse:10.3", "cpe:/o:novell:opensuse:10.2", "p-cpe:/a:novell:opensuse:MozillaFirefox-translations", "cpe:/o:novell:opensuse:10.1", "p-cpe:/a:novell:opensuse:MozillaFirefox"], "id": "SUSE_MOZILLAFIREFOX-4758.NASL", "href": "https://www.tenable.com/plugins/nessus/28369", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update MozillaFirefox-4758.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(28369);\n script_version(\"1.12\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2007-5947\", \"CVE-2007-5959\", \"CVE-2007-5960\");\n\n script_name(english:\"openSUSE 10 Security Update : MozillaFirefox (MozillaFirefox-4758)\");\n script_summary(english:\"Check for the MozillaFirefox-4758 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update brings Mozilla Firefox to security update version 2.0.0.10\n\nFollowing security problems were fixed: MFSA 2007-37 / CVE-2007-5947:\nThe jar protocol handler in Mozilla Firefox retrieves the inner URL\nregardless of its MIME type, and considers HTML documents within a jar\narchive to have the same origin as the inner URL, which allows remote\nattackers to conduct cross-site scripting (XSS) attacks via a jar:\nURI.\n\nMFSA 2007-38 / CVE-2007-5959: The Firefox 2.0.0.10 update contains\nfixes for three bugs that improve the stability of the product. These\ncrashes showed some evidence of memory corruption under certain\ncircumstances and we presume that with enough effort at least some of\nthese could be exploited to run arbitrary code.\n\nMFSA 2007-39 / CVE-2007-5960: Gregory Fleischer demonstrated that it\nwas possible to generate a fake HTTP Referer header by exploiting a\ntiming condition when setting the window.location property. This could\nbe used to conduct a Cross-site Request Forgery (CSRF) attack against\nwebsites that rely only on the Referer header as protection against\nsuch attacks.\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected MozillaFirefox packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_cwe_id(22, 79);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:MozillaFirefox\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:MozillaFirefox-translations\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:10.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:10.2\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:10.3\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2007/11/27\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2007/11/30\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2007-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE10\\.1|SUSE10\\.2|SUSE10\\.3)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"10.1 / 10.2 / 10.3\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE10.1\", reference:\"MozillaFirefox-2.0.0.10-0.2\") ) flag++;\nif ( rpm_check(release:\"SUSE10.1\", reference:\"MozillaFirefox-translations-2.0.0.10-0.2\") ) flag++;\nif ( rpm_check(release:\"SUSE10.2\", reference:\"MozillaFirefox-2.0.0.10-0.1\") ) flag++;\nif ( rpm_check(release:\"SUSE10.2\", reference:\"MozillaFirefox-translations-2.0.0.10-0.1\") ) flag++;\nif ( rpm_check(release:\"SUSE10.3\", reference:\"MozillaFirefox-2.0.0.10-0.1\") ) flag++;\nif ( rpm_check(release:\"SUSE10.3\", reference:\"MozillaFirefox-translations-2.0.0.10-0.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"MozillaFirefox\");\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}]}