Debian Security Advisory DSA 2268-1 (iceweasel) describes multiple critical vulnerabilities in Iceweasel web browser based on Firefox
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
Tenable Nessus | Debian DSA-2269-1 : iceape - several vulnerabilities | 5 Jul 201100:00 | – | nessus |
Tenable Nessus | Debian DSA-2268-1 : iceweasel - several vulnerabilities | 5 Jul 201100:00 | – | nessus |
Tenable Nessus | Debian DSA-2273-1 : icedove - several vulnerabilities | 7 Jul 201100:00 | – | nessus |
Tenable Nessus | SuSE 10 Security Update : Mozilla Firefox (ZYPP Patch Number 7596) | 13 Dec 201100:00 | – | nessus |
Tenable Nessus | Ubuntu 10.04 LTS / 10.10 : firefox regression (USN-1149-2) | 30 Jun 201100:00 | – | nessus |
Tenable Nessus | Mozilla Thunderbird 3.1 < 3.1.11 Multiple Vulnerabilities | 21 Jun 201100:00 | – | nessus |
Tenable Nessus | openSUSE Security Update : mozilla-js192 (mozilla-js192-4771) | 13 Jun 201400:00 | – | nessus |
Tenable Nessus | Firefox 3.6 < 3.6.18 Multiple Vulnerabilities (Mac OS X) | 24 Jun 201100:00 | – | nessus |
Tenable Nessus | openSUSE Security Update : MozillaFirefox (MozillaFirefox-4761) | 13 Jun 201400:00 | – | nessus |
Tenable Nessus | openSUSE Security Update : MozillaThunderbird (MozillaThunderbird-4800) | 13 Jun 201400:00 | – | nessus |
# OpenVAS Vulnerability Test
# $Id: deb_2268_1.nasl 6613 2017-07-07 12:08:40Z cfischer $
# Description: Auto-generated from advisory DSA 2268-1 (iceweasel)
#
# Authors:
# Thomas Reinke <[email protected]>
#
# Copyright:
# Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com
# Text descriptions are largely excerpted from the referenced
# advisory, and are Copyright (c) the respective author(s)
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2,
# or at your option, GNU General Public License version 3,
# as published by the Free Software Foundation
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
#
include("revisions-lib.inc");
tag_insight = "Several vulnerabilities have been found in Iceweasel, a web browser
based on Firefox:
CVE-2011-0083 / CVE-2011-2363
regenrecht discovered two use-after-frees in SVG processing, which
could lead to the execution of arbitrary code.
CVE-2011-0085
regenrecht discovered a use-after-free in XUL processing, which
could lead to the execution of arbitrary code.
CVE-2011-2362
David Chan discovered that cookies were insufficiently isolated.
CVE-2011-2371
Chris Rohlf and Yan Ivnitskiy discovered an integer overflow in the
Javascript engine, which could lead to the execution of arbitrary
code.
CVE-2011-2373
Martin Barbella discovered a use-after-free in XUL processing,
which could lead to the execution of arbitrary code.
CVE-2011-2374
Bob Clary, Kevin Brosnan, Nils, Gary Kwong, Jesse Ruderman and
Christian Biesinger discovered memory corruption bugs, which may
lead to the execution of arbitrary code.
CVE-2011-2376
Luke Wagner and Gary Kwong discovered memory corruption bugs, which
may lead to the execution of arbitrary code.
For the oldstable distribution (lenny), this problem has been fixed in
version 1.9.0.19-12 of the xulrunner source package.
For the stable distribution (squeeze), this problem has been fixed in
version 3.5.16-9.
For the unstable distribution (sid), this problem has been fixed in
version 3.5.19-3
For the experimental distribution, this problem has been fixed in
version 5.0-1.
We recommend that you upgrade your iceweasel packages.";
tag_summary = "The remote host is missing an update to iceweasel
announced via advisory DSA 2268-1.";
tag_solution = "https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202268-1";
if(description)
{
script_id(69975);
script_version("$Revision: 6613 $");
script_tag(name:"last_modification", value:"$Date: 2017-07-07 14:08:40 +0200 (Fri, 07 Jul 2017) $");
script_tag(name:"creation_date", value:"2011-08-03 04:36:20 +0200 (Wed, 03 Aug 2011)");
script_cve_id("CVE-2011-0083", "CVE-2011-0085", "CVE-2011-2362", "CVE-2011-2363", "CVE-2011-2365", "CVE-2011-2371", "CVE-2011-2373", "CVE-2011-2374", "CVE-2011-2376");
script_tag(name:"cvss_base", value:"10.0");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_name("Debian Security Advisory DSA 2268-1 (iceweasel)");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com");
script_family("Debian Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/debian_linux", "ssh/login/packages");
script_tag(name : "solution" , value : tag_solution);
script_tag(name : "insight" , value : tag_insight);
script_tag(name : "summary" , value : tag_summary);
script_tag(name:"qod_type", value:"package");
script_tag(name:"solution_type", value:"VendorFix");
exit(0);
}
#
# The script code starts here
#
include("pkg-lib-deb.inc");
res = "";
report = "";
if ((res = isdpkgvuln(pkg:"iceweasel", ver:"3.5.16-8", rls:"DEB6.0")) != NULL) {
report += res;
}
if ((res = isdpkgvuln(pkg:"iceweasel-dbg", ver:"3.5.16-8", rls:"DEB6.0")) != NULL) {
report += res;
}
if ((res = isdpkgvuln(pkg:"libmozjs-dev", ver:"1.9.1.16-8", rls:"DEB6.0")) != NULL) {
report += res;
}
if ((res = isdpkgvuln(pkg:"libmozjs2d", ver:"1.9.1.16-8", rls:"DEB6.0")) != NULL) {
report += res;
}
if ((res = isdpkgvuln(pkg:"libmozjs2d-dbg", ver:"1.9.1.16-8", rls:"DEB6.0")) != NULL) {
report += res;
}
if ((res = isdpkgvuln(pkg:"spidermonkey-bin", ver:"1.9.1.16-8", rls:"DEB6.0")) != NULL) {
report += res;
}
if ((res = isdpkgvuln(pkg:"xulrunner-1.9.1", ver:"1.9.1.16-8", rls:"DEB6.0")) != NULL) {
report += res;
}
if ((res = isdpkgvuln(pkg:"xulrunner-1.9.1-dbg", ver:"1.9.1.16-8", rls:"DEB6.0")) != NULL) {
report += res;
}
if ((res = isdpkgvuln(pkg:"xulrunner-dev", ver:"1.9.1.16-8", rls:"DEB6.0")) != NULL) {
report += res;
}
if (report != "") {
security_message(data:report);
} else if (__pkg_match) {
exit(99); # Not vulnerable.
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo