CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
AI Score
Confidence
High
EPSS
Percentile
95.5%
The remote host is missing an update for the
# SPDX-FileCopyrightText: 2021 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.1.4.2014.1120.2");
script_cve_id("CVE-2014-1562", "CVE-2014-1567");
script_tag(name:"creation_date", value:"2021-06-09 14:58:16 +0000 (Wed, 09 Jun 2021)");
script_version("2024-02-02T14:37:48+0000");
script_tag(name:"last_modification", value:"2024-02-02 14:37:48 +0000 (Fri, 02 Feb 2024)");
script_tag(name:"cvss_base", value:"10.0");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_name("SUSE: Security Advisory (SUSE-SU-2014:1120-2)");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2021 Greenbone AG");
script_family("SuSE Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/suse_sles", "ssh/login/rpms", re:"ssh/login/release=(SLES10\.0SP4)");
script_xref(name:"Advisory-ID", value:"SUSE-SU-2014:1120-2");
script_xref(name:"URL", value:"https://www.suse.com/support/update/announcement/2014/suse-su-20141120-2/");
script_xref(name:"URL", value:"https://www.mozilla.org/security/announce/");
script_tag(name:"summary", value:"The remote host is missing an update for the 'MozillaFirefox' package(s) announced via the SUSE-SU-2014:1120-2 advisory.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable package version is present on the target host.");
script_tag(name:"insight", value:"Mozilla Firefox was updated to the 24.8.0ESR release, fixing security issues and bugs.
Only some of the published security advisories affect the Mozilla Firefox 24ESR codestream:
* MFSA 2014-72 / CVE-2014-1567: Security researcher regenrecht
reported, via TippingPoint's Zero Day Initiative, a use-after-free
during text layout when interacting with the setting of text
direction. This results in a use-after-free which can lead to
arbitrary code execution.
* MFSA 2014-67: Mozilla developers and community identified and fixed
several memory safety bugs in the browser engine used in Firefox and
other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code.
* Jan de Mooij reported a memory safety problem that affects Firefox
ESR 24.7, ESR 31 and Firefox 31. (CVE-2014-1562)
More information is referenced on:
[link moved to references] .
Security Issues:
* CVE-2014-1567
* CVE-2014-1562");
script_tag(name:"affected", value:"'MozillaFirefox' package(s) on SUSE Linux Enterprise Server 10-SP4.");
script_tag(name:"solution", value:"Please install the updated package(s).");
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"qod_type", value:"package");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-rpm.inc");
release = rpm_get_ssh_release();
if(!release)
exit(0);
res = "";
report = "";
if(release == "SLES10.0SP4") {
if(!isnull(res = isrpmvuln(pkg:"MozillaFirefox", rpm:"MozillaFirefox~24.8.0esr~0.5.1", rls:"SLES10.0SP4"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"MozillaFirefox-translations", rpm:"MozillaFirefox-translations~24.8.0esr~0.5.1", rls:"SLES10.0SP4"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"firefox-gtk2", rpm:"firefox-gtk2~2.18.9~0.11.1", rls:"SLES10.0SP4"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"firefox-gtk2-32bit", rpm:"firefox-gtk2-32bit~2.18.9~0.11.1", rls:"SLES10.0SP4"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"firefox-gtk2-lang", rpm:"firefox-gtk2-lang~2.18.9~0.11.1", rls:"SLES10.0SP4"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"mozilla-nspr-32bit", rpm:"mozilla-nspr-32bit~4.10.7~0.5.1", rls:"SLES10.0SP4"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"mozilla-nspr", rpm:"mozilla-nspr~4.10.7~0.5.1", rls:"SLES10.0SP4"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"mozilla-nspr-devel", rpm:"mozilla-nspr-devel~4.10.7~0.5.1", rls:"SLES10.0SP4"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"mozilla-nss", rpm:"mozilla-nss~3.16.4~0.5.2", rls:"SLES10.0SP4"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"mozilla-nss-32bit", rpm:"mozilla-nss-32bit~3.16.4~0.5.2", rls:"SLES10.0SP4"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"mozilla-nss-devel", rpm:"mozilla-nss-devel~3.16.4~0.5.2", rls:"SLES10.0SP4"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"mozilla-nss-tools", rpm:"mozilla-nss-tools~3.16.4~0.5.2", rls:"SLES10.0SP4"))) {
report += res;
}
if(report != "") {
security_message(data:report);
} else if(__pkg_match) {
exit(99);
}
exit(0);
}
exit(0);