CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
Low
EPSS
Percentile
99.0%
The remote host is missing an update for the
# SPDX-FileCopyrightText: 2022 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.1.10.2013.0329");
script_cve_id("CVE-2013-1682", "CVE-2013-1683", "CVE-2013-1684", "CVE-2013-1685", "CVE-2013-1686", "CVE-2013-1687", "CVE-2013-1690", "CVE-2013-1692", "CVE-2013-1693", "CVE-2013-1694", "CVE-2013-1695", "CVE-2013-1696", "CVE-2013-1697", "CVE-2013-1699", "CVE-2013-1701", "CVE-2013-1702", "CVE-2013-1704", "CVE-2013-1705", "CVE-2013-1706", "CVE-2013-1707", "CVE-2013-1708", "CVE-2013-1709", "CVE-2013-1710", "CVE-2013-1711", "CVE-2013-1713", "CVE-2013-1714", "CVE-2013-1717", "CVE-2013-1718", "CVE-2013-1719", "CVE-2013-1720", "CVE-2013-1721", "CVE-2013-1722", "CVE-2013-1723", "CVE-2013-1724", "CVE-2013-1725", "CVE-2013-1728", "CVE-2013-1730", "CVE-2013-1732", "CVE-2013-1735", "CVE-2013-1736", "CVE-2013-1737", "CVE-2013-1738", "CVE-2013-5590", "CVE-2013-5591", "CVE-2013-5592", "CVE-2013-5593", "CVE-2013-5595", "CVE-2013-5596", "CVE-2013-5597", "CVE-2013-5599", "CVE-2013-5600", "CVE-2013-5601", "CVE-2013-5602", "CVE-2013-5603", "CVE-2013-5604");
script_tag(name:"creation_date", value:"2022-01-28 10:58:44 +0000 (Fri, 28 Jan 2022)");
script_version("2024-08-08T05:05:41+0000");
script_tag(name:"last_modification", value:"2024-08-08 05:05:41 +0000 (Thu, 08 Aug 2024)");
script_tag(name:"cvss_base", value:"10.0");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
script_tag(name:"severity_origin", value:"NVD");
script_tag(name:"severity_date", value:"2024-07-09 18:25:57 +0000 (Tue, 09 Jul 2024)");
script_name("Mageia: Security Advisory (MGASA-2013-0329)");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2022 Greenbone AG");
script_family("Mageia Linux Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/mageia_linux", "ssh/login/release", re:"ssh/login/release=MAGEIA(2|3)");
script_xref(name:"Advisory-ID", value:"MGASA-2013-0329");
script_xref(name:"URL", value:"https://advisories.mageia.org/MGASA-2013-0329.html");
script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2013/mfsa2013-49.html");
script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2013/mfsa2013-50.html");
script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2013/mfsa2013-51.html");
script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2013/mfsa2013-53.html");
script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2013/mfsa2013-54.html");
script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2013/mfsa2013-55.html");
script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2013/mfsa2013-56.html");
script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2013/mfsa2013-57.html");
script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2013/mfsa2013-58.html");
script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2013/mfsa2013-59.html");
script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2013/mfsa2013-61.html");
script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2013/mfsa2013-63.html");
script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2013/mfsa2013-64.html");
script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2013/mfsa2013-65.html");
script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2013/mfsa2013-66.html");
script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2013/mfsa2013-67.html");
script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2013/mfsa2013-68.html");
script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2013/mfsa2013-69.html");
script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2013/mfsa2013-70.html");
script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2013/mfsa2013-72.html");
script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2013/mfsa2013-73.html");
script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2013/mfsa2013-75.html");
script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2013/mfsa2013-76.html");
script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2013/mfsa2013-77.html");
script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2013/mfsa2013-78.html");
script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2013/mfsa2013-79.html");
script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2013/mfsa2013-80.html");
script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2013/mfsa2013-81.html");
script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2013/mfsa2013-82.html");
script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2013/mfsa2013-85.html");
script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2013/mfsa2013-88.html");
script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2013/mfsa2013-89.html");
script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2013/mfsa2013-90.html");
script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2013/mfsa2013-91.html");
script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2013/mfsa2013-92.html");
script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2013/mfsa2013-93.html");
script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2013/mfsa2013-94.html");
script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2013/mfsa2013-95.html");
script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2013/mfsa2013-96.html");
script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2013/mfsa2013-97.html");
script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2013/mfsa2013-98.html");
script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2013/mfsa2013-100.html");
script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2013/mfsa2013-101.html");
script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2013/mfsa2013-102.html");
script_xref(name:"URL", value:"https://bugs.mageia.org/show_bug.cgi?id=10707");
script_tag(name:"summary", value:"The remote host is missing an update for the 'iceape' package(s) announced via the MGASA-2013-0329 advisory.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable package version is present on the target host.");
script_tag(name:"insight", value:"Updated iceape packages fix security issues:
Multiple unspecified vulnerabilities in the browser engine in Mozilla
Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before
17.0.7, and Thunderbird ESR 17.x before 17.0.7 allow remote attackers to
cause a denial of service (memory corruption and application crash) or
possibly execute arbitrary code via unknown vectors. (CVE-2013-1682)
Multiple unspecified vulnerabilities in the browser engine in Mozilla
Firefox before 22.0 allow remote attackers to cause a denial of service
(memory corruption and application crash) or possibly execute arbitrary
code via unknown vectors. (CVE-2013-1683)
Use-after-free vulnerability in the
mozilla::dom::HTMLMediaElement::LookupMediaElementURITable function in
Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird
before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 allows remote
attackers to execute arbitrary code or cause a denial of service (heap
memory corruption) via a crafted web site. (CVE-2013-1684)
Use-after-free vulnerability in the nsIDocument::GetRootElement function in
Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird
before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 allows remote
attackers to execute arbitrary code or cause a denial of service (heap
memory corruption) via a crafted web site. (CVE-2013-1685)
Use-after-free vulnerability in the mozilla::ResetDir function in Mozilla
Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before
17.0.7, and Thunderbird ESR 17.x before 17.0.7 allows remote attackers to
execute arbitrary code or cause a denial of service (heap memory
corruption) via unspecified vectors. (CVE-2013-1686)
The System Only Wrapper (SOW) and Chrome Object Wrapper (COW)
implementations in Mozilla Firefox before 22.0, Firefox ESR 17.x before
17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7
do not properly restrict XBL user-defined functions, which allows remote
attackers to execute arbitrary JavaScript code with chrome privileges, or
conduct cross-site scripting (XSS) attacks, via a crafted web site.
(CVE-2013-1687)
Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird
before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 do not properly
handle onreadystatechange events in conjunction with page reloading, which
allows remote attackers to cause a denial of service (application crash) or
possibly execute arbitrary code via a crafted web site that triggers an
attempt to execute data at an unmapped memory location. (CVE-2013-1690)
Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird
before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 do not prevent the
inclusion of body data in an XMLHttpRequest HEAD request, which makes it
easier for remote attackers to conduct cross-site request forgery (CSRF)
attacks via a crafted web ... [Please see the references for more information on the vulnerabilities]");
script_tag(name:"affected", value:"'iceape' package(s) on Mageia 2, Mageia 3.");
script_tag(name:"solution", value:"Please install the updated package(s).");
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"qod_type", value:"package");
script_xref(name:"CISA", value:"Known Exploited Vulnerability (KEV) catalog");
script_xref(name:"URL", value:"https://www.cisa.gov/known-exploited-vulnerabilities-catalog");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-rpm.inc");
release = rpm_get_ssh_release();
if(!release)
exit(0);
res = "";
report = "";
if(release == "MAGEIA2") {
if(!isnull(res = isrpmvuln(pkg:"iceape", rpm:"iceape~2.22~1.mga2", rls:"MAGEIA2"))) {
report += res;
}
if(report != "") {
security_message(data:report);
} else if(__pkg_match) {
exit(99);
}
exit(0);
}
if(release == "MAGEIA3") {
if(!isnull(res = isrpmvuln(pkg:"iceape", rpm:"iceape~2.22~1.mga3", rls:"MAGEIA3"))) {
report += res;
}
if(report != "") {
security_message(data:report);
} else if(__pkg_match) {
exit(99);
}
exit(0);
}
exit(0);
www.mozilla.org/security/announce/2013/mfsa2013-100.html
www.mozilla.org/security/announce/2013/mfsa2013-101.html
www.mozilla.org/security/announce/2013/mfsa2013-102.html
www.mozilla.org/security/announce/2013/mfsa2013-49.html
www.mozilla.org/security/announce/2013/mfsa2013-50.html
www.mozilla.org/security/announce/2013/mfsa2013-51.html
www.mozilla.org/security/announce/2013/mfsa2013-53.html
www.mozilla.org/security/announce/2013/mfsa2013-54.html
www.mozilla.org/security/announce/2013/mfsa2013-55.html
www.mozilla.org/security/announce/2013/mfsa2013-56.html
www.mozilla.org/security/announce/2013/mfsa2013-57.html
www.mozilla.org/security/announce/2013/mfsa2013-58.html
www.mozilla.org/security/announce/2013/mfsa2013-59.html
www.mozilla.org/security/announce/2013/mfsa2013-61.html
www.mozilla.org/security/announce/2013/mfsa2013-63.html
www.mozilla.org/security/announce/2013/mfsa2013-64.html
www.mozilla.org/security/announce/2013/mfsa2013-65.html
www.mozilla.org/security/announce/2013/mfsa2013-66.html
www.mozilla.org/security/announce/2013/mfsa2013-67.html
www.mozilla.org/security/announce/2013/mfsa2013-68.html
www.mozilla.org/security/announce/2013/mfsa2013-69.html
www.mozilla.org/security/announce/2013/mfsa2013-70.html
www.mozilla.org/security/announce/2013/mfsa2013-72.html
www.mozilla.org/security/announce/2013/mfsa2013-73.html
www.mozilla.org/security/announce/2013/mfsa2013-75.html
www.mozilla.org/security/announce/2013/mfsa2013-76.html
www.mozilla.org/security/announce/2013/mfsa2013-77.html
www.mozilla.org/security/announce/2013/mfsa2013-78.html
www.mozilla.org/security/announce/2013/mfsa2013-79.html
www.mozilla.org/security/announce/2013/mfsa2013-80.html
www.mozilla.org/security/announce/2013/mfsa2013-81.html
www.mozilla.org/security/announce/2013/mfsa2013-82.html
www.mozilla.org/security/announce/2013/mfsa2013-85.html
www.mozilla.org/security/announce/2013/mfsa2013-88.html
www.mozilla.org/security/announce/2013/mfsa2013-89.html
www.mozilla.org/security/announce/2013/mfsa2013-90.html
www.mozilla.org/security/announce/2013/mfsa2013-91.html
www.mozilla.org/security/announce/2013/mfsa2013-92.html
www.mozilla.org/security/announce/2013/mfsa2013-93.html
www.mozilla.org/security/announce/2013/mfsa2013-94.html
www.mozilla.org/security/announce/2013/mfsa2013-95.html
www.mozilla.org/security/announce/2013/mfsa2013-96.html
www.mozilla.org/security/announce/2013/mfsa2013-97.html
www.mozilla.org/security/announce/2013/mfsa2013-98.html
advisories.mageia.org/MGASA-2013-0329.html
bugs.mageia.org/show_bug.cgi?id=10707
www.cisa.gov/known-exploited-vulnerabilities-catalog
Known Exploited Vulnerability (KEV) catalog
MGASA-2013-0329
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
Low
EPSS
Percentile
99.0%