Mozilla Thunderbird ESR Multiple Vulnerabilities -01 Apr13 (Windows)
2013-04-08T00:00:00
ID OPENVAS:803469 Type openvas Reporter Copyright (c) 2013 Greenbone Networks GmbH Modified 2017-05-10T00:00:00
Description
This host is installed with Mozilla Thunderbird ESR and is prone to multiple
vulnerabilities.
###############################################################################
# OpenVAS Vulnerability Test
# $Id: gb_mozilla_thunderbird_esr_mult_vuln01_apr13_win.nasl 6093 2017-05-10 09:03:18Z teissa $
#
# Mozilla Thunderbird ESR Multiple Vulnerabilities -01 Apr13 (Windows)
#
# Authors:
# Thanga Prakash S <tprakash@secpod.com>
#
# Copyright:
# Copyright (c) 2013 Greenbone Networks GmbH, http://www.greenbone.net
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################
tag_impact = "Successful exploitation will allow attackers to execute arbitrary code,
memory corruption, bypass certain security restrictions and compromise
a user's system.
Impact Level: System/Application";
tag_affected = "Mozilla Thunderbird ESR version 17.x before 17.0.5 on Windows";
tag_insight = "- Unspecified vulnerabilities in the browser engine
- Buffer overflow in the Mozilla Maintenance Service
- Untrusted search path vulnerability while handling dll files
- Improper validation of address bar during history navigation
- Integer signedness error in the 'pixman_fill_sse2' function in
'pixman-sse2.c' in Pixman
- Error in 'CERT_DecodeCertPackage' function in Mozilla Network Security
Services (NSS)
- The System Only Wrapper (SOW) implementation does not prevent use of the
cloneNode method for cloning a protected node";
tag_solution = "Upgrade to Mozilla Thunderbird ESR version 17.0.5 or later,
For updates refer to http://www.mozilla.com/en-US/thunderbird";
tag_summary = "This host is installed with Mozilla Thunderbird ESR and is prone to multiple
vulnerabilities.";
if(description)
{
script_id(803469);
script_version("$Revision: 6093 $");
script_cve_id("CVE-2013-0788", "CVE-2013-0791", "CVE-2013-0793", "CVE-2013-0795",
"CVE-2013-0797", "CVE-2013-0799", "CVE-2013-0800");
script_bugtraq_id(58818, 58819, 58826, 58837, 58836, 58827, 58824, 58825);
script_tag(name:"cvss_base", value:"10.0");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_tag(name:"last_modification", value:"$Date: 2017-05-10 11:03:18 +0200 (Wed, 10 May 2017) $");
script_tag(name:"creation_date", value:"2013-04-08 11:48:39 +0530 (Mon, 08 Apr 2013)");
script_name("Mozilla Thunderbird ESR Multiple Vulnerabilities -01 Apr13 (Windows)");
script_xref(name : "URL" , value : "http://secunia.com/advisories/52770");
script_xref(name : "URL" , value : "http://secunia.com/advisories/52293");
script_xref(name : "URL" , value : "https://bugzilla.mozilla.org/show_bug.cgi?id=825721");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (c) 2013 Greenbone Networks GmbH");
script_family("General");
script_dependencies("gb_thunderbird_detect_win.nasl");
script_mandatory_keys("Thunderbird-ESR/Win/Ver");
script_tag(name : "impact" , value : tag_impact);
script_tag(name : "affected" , value : tag_affected);
script_tag(name : "insight" , value : tag_insight);
script_tag(name : "solution" , value : tag_solution);
script_tag(name : "summary" , value : tag_summary);
script_tag(name:"qod_type", value:"registry");
script_tag(name:"solution_type", value:"VendorFix");
exit(0);
}
include("version_func.inc");
# Variable initialization
tbVer = "";
# Get the version from the kb
tbVer = get_kb_item("Thunderbird-ESR/Win/Ver");
if(tbVer && tbVer =~ "^(17.0)")
{
# Check for vulnerable version
if(version_in_range(version:tbVer, test_version:"17.0", test_version2:"17.0.4"))
{
security_message(0);
exit(0);
}
}
{"id": "OPENVAS:803469", "bulletinFamily": "scanner", "title": "Mozilla Thunderbird ESR Multiple Vulnerabilities -01 Apr13 (Windows)", "description": "This host is installed with Mozilla Thunderbird ESR and is prone to multiple\n vulnerabilities.", "published": "2013-04-08T00:00:00", "modified": "2017-05-10T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=803469", "reporter": "Copyright (c) 2013 Greenbone Networks GmbH", "references": ["https://bugzilla.mozilla.org/show_bug.cgi?id=825721", "http://secunia.com/advisories/52293", "http://secunia.com/advisories/52770"], "cvelist": ["CVE-2013-0797", "CVE-2013-0791", "CVE-2013-0795", "CVE-2013-0800", "CVE-2013-0788", "CVE-2013-0799", "CVE-2013-0793"], "type": "openvas", "lastseen": "2017-07-02T21:11:13", "history": [], "edition": 1, "hashmap": [{"key": "bulletinFamily", "hash": "bbdaea376f500d25f6b0c1050311dd07"}, {"key": "cvelist", "hash": "3500754ba792eb2dc888b5b1a6679c3b"}, {"key": "cvss", "hash": "2bdabeb49c44761f9565717ab0e38165"}, {"key": "description", "hash": "807588121c8b3ce014b03d7d179e29ee"}, {"key": "href", "hash": "3ed454556b2e2552957acb8e66f6b8cf"}, {"key": "modified", "hash": "251f7e82e99b45e17b6cf8e939e6b119"}, {"key": "naslFamily", "hash": "0db377921f4ce762c62526131097968f"}, {"key": "pluginID", "hash": "2f63fd21694de9274361178251c8604f"}, {"key": "published", "hash": "a6d9ab1dfb93fe354d81501476466a08"}, {"key": "references", "hash": "6d20ac7cde64b436fff045fbf7aeb057"}, {"key": "reporter", "hash": "1a99a5f9a50e5bac3b749d8558d5e46b"}, {"key": "sourceData", "hash": "ff7fcf59d5b74585a02a7fca77dee6a3"}, {"key": "title", "hash": "afe1c0e2066cdbc2cd6d6fc641203ab1"}, {"key": "type", "hash": "47c1f692ea47a21f716dad07043ade01"}], "hash": "cf43636b1e34130d223d5abd911360f17e02cc7cde730002b90679b690918d44", "viewCount": 0, "enchantments": {"vulnersScore": 2.8}, "objectVersion": "1.3", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_mozilla_thunderbird_esr_mult_vuln01_apr13_win.nasl 6093 2017-05-10 09:03:18Z teissa $\n#\n# Mozilla Thunderbird ESR Multiple Vulnerabilities -01 Apr13 (Windows)\n#\n# Authors:\n# Thanga Prakash S <tprakash@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_impact = \"Successful exploitation will allow attackers to execute arbitrary code,\n memory corruption, bypass certain security restrictions and compromise\n a user's system.\n Impact Level: System/Application\";\n\ntag_affected = \"Mozilla Thunderbird ESR version 17.x before 17.0.5 on Windows\";\ntag_insight = \"- Unspecified vulnerabilities in the browser engine\n - Buffer overflow in the Mozilla Maintenance Service\n - Untrusted search path vulnerability while handling dll files\n - Improper validation of address bar during history navigation\n - Integer signedness error in the 'pixman_fill_sse2' function in\n 'pixman-sse2.c' in Pixman\n - Error in 'CERT_DecodeCertPackage' function in Mozilla Network Security\n Services (NSS)\n - The System Only Wrapper (SOW) implementation does not prevent use of the\n cloneNode method for cloning a protected node\";\ntag_solution = \"Upgrade to Mozilla Thunderbird ESR version 17.0.5 or later,\n For updates refer to http://www.mozilla.com/en-US/thunderbird\";\ntag_summary = \"This host is installed with Mozilla Thunderbird ESR and is prone to multiple\n vulnerabilities.\";\n\nif(description)\n{\n script_id(803469);\n script_version(\"$Revision: 6093 $\");\n script_cve_id(\"CVE-2013-0788\", \"CVE-2013-0791\", \"CVE-2013-0793\", \"CVE-2013-0795\",\n \"CVE-2013-0797\", \"CVE-2013-0799\", \"CVE-2013-0800\");\n script_bugtraq_id(58818, 58819, 58826, 58837, 58836, 58827, 58824, 58825);\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-05-10 11:03:18 +0200 (Wed, 10 May 2017) $\");\n script_tag(name:\"creation_date\", value:\"2013-04-08 11:48:39 +0530 (Mon, 08 Apr 2013)\");\n script_name(\"Mozilla Thunderbird ESR Multiple Vulnerabilities -01 Apr13 (Windows)\");\n script_xref(name : \"URL\" , value : \"http://secunia.com/advisories/52770\");\n script_xref(name : \"URL\" , value : \"http://secunia.com/advisories/52293\");\n script_xref(name : \"URL\" , value : \"https://bugzilla.mozilla.org/show_bug.cgi?id=825721\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2013 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_thunderbird_detect_win.nasl\");\n script_mandatory_keys(\"Thunderbird-ESR/Win/Ver\");\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"registry\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\n# Variable initialization\ntbVer = \"\";\n\n# Get the version from the kb\ntbVer = get_kb_item(\"Thunderbird-ESR/Win/Ver\");\n\nif(tbVer && tbVer =~ \"^(17.0)\")\n{\n # Check for vulnerable version\n if(version_in_range(version:tbVer, test_version:\"17.0\", test_version2:\"17.0.4\"))\n {\n security_message(0);\n exit(0);\n }\n}\n", "naslFamily": "General", "pluginID": "803469"}
{"result": {"cve": [{"id": "CVE-2013-0797", "type": "cve", "title": "CVE-2013-0797", "description": "Untrusted search path vulnerability in the Mozilla Updater in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, and SeaMonkey before 2.17 allows local users to gain privileges via a Trojan horse DLL file in an unspecified directory.", "published": "2013-04-03T07:56:21", "cvss": {"score": 6.9, "vector": "AV:LOCAL/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-0797", "cvelist": ["CVE-2013-0797"], "lastseen": "2017-09-19T13:38:37"}, {"id": "CVE-2013-0791", "type": "cve", "title": "CVE-2013-0791", "description": "The CERT_DecodeCertPackage function in Mozilla Network Security Services (NSS), as used in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, SeaMonkey before 2.17, and other products, allows remote attackers to cause a denial of service (out-of-bounds read and memory corruption) via a crafted certificate.", "published": "2013-04-03T07:56:21", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-0791", "cvelist": ["CVE-2013-0791"], "lastseen": "2017-09-19T13:38:37"}, {"id": "CVE-2013-0795", "type": "cve", "title": "CVE-2013-0795", "description": "The System Only Wrapper (SOW) implementation in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, and SeaMonkey before 2.17 does not prevent use of the cloneNode method for cloning a protected node, which allows remote attackers to bypass the Same Origin Policy or possibly execute arbitrary JavaScript code with chrome privileges via a crafted web site.", "published": "2013-04-03T07:56:21", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-0795", "cvelist": ["CVE-2013-0795"], "lastseen": "2017-09-19T13:38:37"}, {"id": "CVE-2013-0800", "type": "cve", "title": "CVE-2013-0800", "description": "Integer signedness error in the pixman_fill_sse2 function in pixman-sse2.c in Pixman, as distributed with Cairo and used in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, SeaMonkey before 2.17, and other products, allows remote attackers to execute arbitrary code via crafted values that trigger attempted use of a (1) negative box boundary or (2) negative box size, leading to an out-of-bounds write operation.", "published": "2013-04-03T07:56:21", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-0800", "cvelist": ["CVE-2013-0800"], "lastseen": "2017-09-19T13:38:37"}, {"id": "CVE-2013-0788", "type": "cve", "title": "CVE-2013-0788", "description": "Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, and SeaMonkey before 2.17 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.", "published": "2013-04-03T07:56:21", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-0788", "cvelist": ["CVE-2013-0788"], "lastseen": "2017-09-19T13:38:37"}, {"id": "CVE-2013-0799", "type": "cve", "title": "CVE-2013-0799", "description": "Buffer overflow in the Mozilla Maintenance Service in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, and Thunderbird ESR 17.x before 17.0.5 on Windows allows local users to gain privileges via crafted arguments.", "published": "2013-04-03T07:56:21", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-0799", "cvelist": ["CVE-2013-0799"], "lastseen": "2017-09-19T13:38:37"}, {"id": "CVE-2013-0793", "type": "cve", "title": "CVE-2013-0793", "description": "Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, and SeaMonkey before 2.17 do not ensure the correctness of the address bar during history navigation, which allows remote attackers to conduct cross-site scripting (XSS) attacks or phishing attacks by leveraging control over navigation timing.", "published": "2013-04-03T07:56:21", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-0793", "cvelist": ["CVE-2013-0793"], "lastseen": "2017-09-19T13:38:37"}], "mozilla": [{"id": "MFSA2013-34", "type": "mozilla", "title": "Privilege escalation through Mozilla Updater", "description": "Security researcher Ash reported an issue with the Mozilla\nUpdater. The Mozilla Updater can be made to load a malicious local DLL file in a\nprivileged context through either the Mozilla Maintenance Service or\nindependently on systems that do not use the service. This occurs when the DLL\nfile is placed in a specific location on the local system before the Mozilla\nUpdater is run. Local file system access is necessary in order for this issue to\nbe exploitable.", "published": "2013-04-02T00:00:00", "cvss": {"score": 6.9, "vector": "AV:LOCAL/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://www.mozilla.org/en-US/security/advisories/mfsa2013-34/", "cvelist": ["CVE-2013-0797"], "lastseen": "2016-09-05T13:37:38"}, {"id": "MFSA2013-40", "type": "mozilla", "title": "Out-of-bounds array read in CERT_DecodeCertPackage", "description": "Mozilla community member Ambroz Bizjak reported an\nout-of-bounds array read in the CERT_DecodeCertPackage function of\nthe Network Security Services (NSS) libary when decoding a certificate. When\nthis occurs, it will lead to memory corruption and a non-exploitable crash.", "published": "2013-04-02T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "http://www.mozilla.org/en-US/security/advisories/mfsa2013-40/", "cvelist": ["CVE-2013-0791"], "lastseen": "2016-09-05T13:37:36"}, {"id": "MFSA2013-36", "type": "mozilla", "title": "Bypass of SOW protections allows cloning of protected nodes", "description": "Security researcher Cody Crews reported a mechanism to use the cloneNode method to bypass System Only Wrappers (SOW) and clone a protected node. This allows violation of the browser's same origin policy and could also lead to privilege escalation and the execution of arbitrary code.\n\nIn general these flaws cannot be exploited through email in the\nThunderbird and SeaMonkey products because scripting is disabled, but are\npotentially a risk in browser or browser-like contexts in those products.", "published": "2013-04-02T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://www.mozilla.org/en-US/security/advisories/mfsa2013-36/", "cvelist": ["CVE-2013-0795"], "lastseen": "2016-09-05T13:37:47"}, {"id": "MFSA2013-31", "type": "mozilla", "title": "Out-of-bounds write in Cairo library", "description": "Security researcher Abhishek Arya (Inferno) of the Google\nChrome Security Team used the Address Sanitizer tool to discover an out-of-bounds write in Cairo graphics library. When certain values are passed to it during rendering, Cairo attempts to use negative boundaries or sizes for boxes, leading to a potentially exploitable crash in some instances.", "published": "2013-04-02T00:00:00", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://www.mozilla.org/en-US/security/advisories/mfsa2013-31/", "cvelist": ["CVE-2013-0800"], "lastseen": "2016-09-05T13:37:53"}, {"id": "MFSA2013-30", "type": "mozilla", "title": "Miscellaneous memory safety hazards (rv:20.0 / rv:17.0.5)", "description": "Mozilla developers identified and fixed several memory safety bugs in the\nbrowser engine used in Firefox and other Mozilla-based products. Some of these\nbugs showed evidence of memory corruption under certain circumstances, and we\npresume that with enough effort at least some of these could be exploited to run\narbitrary code.\nIn general these flaws cannot be exploited through email in the\nThunderbird and SeaMonkey products because scripting is disabled, but are\npotentially a risk in browser or browser-like contexts in those products.", "published": "2013-04-02T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://www.mozilla.org/en-US/security/advisories/mfsa2013-30/", "cvelist": ["CVE-2013-0788", "CVE-2013-0789", "CVE-2013-0790"], "lastseen": "2016-09-05T13:37:50"}, {"id": "MFSA2013-32", "type": "mozilla", "title": "Privilege escalation through Mozilla Maintenance Service", "description": "Security researcher Fr\u00e9d\u00e9ric Hoguin discovered\nthat the Mozilla Maintenance Service on Windows was vulnerable to a buffer\noverflow. This system is used to update software without invoking the User\nAccount Control (UAC) prompt. The Mozilla Maintenance Service is configured to\nallow unprivileged users to start it with arbitrary arguments. By manipulating\nthe data passed in these arguments, an attacker can execute arbitrary code with\nthe system privileges used by the service. This issue requires local file system\naccess to be exploitable.", "published": "2013-04-02T00:00:00", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://www.mozilla.org/en-US/security/advisories/mfsa2013-32/", "cvelist": ["CVE-2013-0799"], "lastseen": "2016-09-05T13:37:49"}, {"id": "MFSA2013-38", "type": "mozilla", "title": "Cross-site scripting (XSS) using timed history navigations", "description": "Security researcher Mariusz Mlynski reported a method to use\nbrowser navigations through history to load an arbitrary website with that\npage's baseURI property pointing to another site instead of the seemingly loaded\none. The user will continue to see the incorrect site in the addressbar of the\nbrowser. This allows for a cross-site scripting (XSS) attack or the theft of\ndata through a phishing attack.\n\nIn general these flaws cannot be exploited through email in the\nThunderbird and SeaMonkey products because scripting is disabled, but are\npotentially a risk in browser or browser-like contexts in those products.", "published": "2013-04-02T00:00:00", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "href": "http://www.mozilla.org/en-US/security/advisories/mfsa2013-38/", "cvelist": ["CVE-2013-0793"], "lastseen": "2016-09-05T13:37:47"}], "nessus": [{"id": "SEAMONKEY_217.NASL", "type": "nessus", "title": "SeaMonkey < 2.17 Multiple Vulnerabilities", "description": "The installed version of SeaMonkey is earlier than 2.17 and thus, is potentially affected by the following vulnerabilities :\n\n - Various memory safety issues exist. (CVE-2013-0788, CVE-2013-0789)\n\n - An out-of-bounds memory read error exists related to 'CERT_DecodeCertPackage' and certificate decoding.\n (CVE-2013-0791)\n\n - A memory corruption error exists related to PNG image files when 'gfx.color_management.enablev4' is manually enabled in the application's configuration.\n (CVE-2013-0792)\n\n - An error exists related to navigation, history and improper 'baseURI' property values that could allow cross-site scripting attacks. (CVE-2013-0793)\n\n - An error exists related to tab-modal dialog boxes that could be used in phishing attacks. (CVE-2013-0794)\n\n - An error exists related to 'cloneNode' that can allow 'System Only Wrapper' (SOW) to be bypassed, thus violating the same origin policy and possibly leading to privilege escalation and code execution.\n (CVE-2013-0795)\n\n - A DLL loading vulnerability exists that could lead to code execution. (CVE-2013-0797)\n\n - An out-of-bounds write error exists related to the Cairo graphics library. (CVE-2013-0800)", "published": "2013-04-04T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=65809", "cvelist": ["CVE-2013-0797", "CVE-2013-0791", "CVE-2013-0794", "CVE-2013-0795", "CVE-2013-0800", "CVE-2013-0788", "CVE-2013-0789", "CVE-2013-0792", "CVE-2013-0793"], "lastseen": "2017-10-29T13:33:34"}, {"id": "MOZILLA_FIREFOX_1705_ESR.NASL", "type": "nessus", "title": "Firefox ESR 17.x < 17.0.5 Multiple Vulnerabilities", "description": "The installed version of Firefox ESR 17.x is earlier than 17.0.5, and thus, is potentially affected by the following vulnerabilities :\n\n - Various memory safety issue exist. (CVE-2013-0788)\n\n - An out-of-bounds memory read error exists related to 'CERT_DecodeCertPackage' and certificate decoding.\n (CVE-2013-0791)\n\n - An error exists related to navigation, history and improper 'baseURI' property values that could allow cross-site scripting attacks. (CVE-2013-0793)\n\n - A error exists related to 'cloneNode' that can allow 'System Only Wrapper' (SOW) to be bypassed thus violating the same origin policy and possibly leading to privilege escalation and code execution.\n (CVE-2013-0795)\n\n - A DLL loading vulnerability exists that could lead to code execution.(CVE-2013-0797)\n\n - A buffer overflow error exists related to the Mozilla Maintenance Service. (CVE-2013-0799)\n\n - An out-of-bounds write error exists related to the Cairo graphics library. (CVE-2013-0800)", "published": "2013-04-04T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=65805", "cvelist": ["CVE-2013-0797", "CVE-2013-0791", "CVE-2013-0795", "CVE-2013-0800", "CVE-2013-0788", "CVE-2013-0799", "CVE-2013-0793"], "lastseen": "2017-10-29T13:37:57"}, {"id": "MOZILLA_THUNDERBIRD_1705_ESR.NASL", "type": "nessus", "title": "Mozilla Thunderbird ESR 17.x < 17.0.5 Multiple Vulnerabilities", "description": "The installed version of Thunderbird ESR 17.x is earlier than 17.0.5 and is, therefore, potentially affected the following vulnerabilities:\n\n - Various memory safety issues exist. (CVE-2013-0788)\n\n - An out-of-bounds memory read error exists related to 'CERT_DecodeCertPackage' and certificate decoding.\n (CVE-2013-0791)\n\n - An error exists related to navigation, history and improper 'baseURI' property values that could allow cross-site scripting attacks. (CVE-2013-0793)\n\n - An error exists related to 'cloneNode' that can allow 'System Only Wrapper' (SOW) to be bypassed, thus violating the same origin policy and possibly leading to privilege escalation and code execution.\n (CVE-2013-0795)\n\n - A DLL loading vulnerability exists that could lead to code execution. (CVE-2013-0797)\n\n - A buffer overflow error exists related to the Mozilla Maintenance Service. (CVE-2013-0799)\n\n - An out-of-bounds write error exists related to the Cairo graphics library. (CVE-2013-0800)", "published": "2013-04-04T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=65808", "cvelist": ["CVE-2013-0797", "CVE-2013-0791", "CVE-2013-0795", "CVE-2013-0800", "CVE-2013-0788", "CVE-2013-0799", "CVE-2013-0793"], "lastseen": "2017-10-29T13:43:06"}, {"id": "SUSE_11_FIREFOX-20130516-130517.NASL", "type": "nessus", "title": "SuSE 11.2 Security Update : Mozilla Firefox (SAT Patch Number 7741)", "description": "Mozilla Firefox has been updated to the17.0.6ESR security release.\n\n - Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code. (MFSA 2013-30)\n\n Olli Pettay, Jesse Ruderman, Boris Zbarsky, Christian Holler, Milan Sreckovic, and Joe Drew reported memory safety problems and crashes that affect Firefox ESR 17, and Firefox 19. (CVE-2013-0788)\n\n - Security researcher Abhishek Arya (Inferno) of the Google Chrome Security Team used the Address Sanitizer tool to discover an out-of-bounds write in Cairo graphics library. When certain values are passed to it during rendering, Cairo attempts to use negative boundaries or sizes for boxes, leading to a potentially exploitable crash in some instances. (MFSA 2013-31 / CVE-2013-0800)\n\n - Security researcher Frederic Hoguin discovered that the Mozilla Maintenance Service on Windows was vulnerable to a buffer overflow. This system is used to update software without invoking the User Account Control (UAC) prompt. The Mozilla Maintenance Service is configured to allow unprivileged users to start it with arbitrary arguments. By manipulating the data passed in these arguments, an attacker can execute arbitrary code with the system privileges used by the service. This issue requires local file system access to be exploitable.\n (MFSA 2013-32 / CVE-2013-0799)\n\n - Security researcher Ash reported an issue with the Mozilla Updater. The Mozilla Updater can be made to load a malicious local DLL file in a privileged context through either the Mozilla Maintenance Service or independently on systems that do not use the service.\n This occurs when the DLL file is placed in a specific location on the local system before the Mozilla Updater is run. Local file system access is necessary in order for this issue to be exploitable. (MFSA 2013-34 / CVE-2013-0797)\n\n - Security researcher miaubiz used the Address Sanitizer tool to discover a crash in WebGL rendering when memory is freed that has not previously been allocated. This issue only affects Linux users who have Intel Mesa graphics drivers. The resulting crash could be potentially exploitable. (MFSA 2013-35 / CVE-2013-0796)\n\n - Security researcher Cody Crews reported a mechanism to use the cloneNode method to bypass System Only Wrappers (SOW) and clone a protected node. This allows violation of the browser's same origin policy and could also lead to privilege escalation and the execution of arbitrary code. (MFSA 2013-36 / CVE-2013-0795)\n\n - Security researcher shutdown reported a method for removing the origin indication on tab-modal dialog boxes in combination with browser navigation. This could allow an attacker's dialog to overlay a page and show another site's content. This can be used for phishing by allowing users to enter data into a modal prompt dialog on an attacking, site while appearing to be from the displayed site. (MFSA 2013-37 / CVE-2013-0794)\n\n - Security researcher Mariusz Mlynski reported a method to use browser navigations through history to load an arbitrary website with that page's baseURI property pointing to another site instead of the seemingly loaded one. The user will continue to see the incorrect site in the addressbar of the browser. This allows for a cross-site scripting (XSS) attack or the theft of data through a phishing attack. (MFSA 2013-38 / CVE-2013-0793)\n\n - Mozilla community member Tobias Schula reported that if gfx.color_management.enablev4 preference is enabled manually in about:config, some grayscale PNG images will be rendered incorrectly and cause memory corruption during PNG decoding when certain color profiles are in use. A crafted PNG image could use this flaw to leak data through rendered images drawing from random memory.\n By default, this preference is not enabled. (MFSA 2013-39 / CVE-2013-0792)\n\n - Mozilla community member Ambroz Bizjak reported an out-of-bounds array read in the CERT_DecodeCertPackage function of the Network Security Services (NSS) libary when decoding a certificate. When this occurs, it will lead to memory corruption and a non-exploitable crash.\n (MFSA 2013-40 / CVE-2013-0791)", "published": "2013-05-29T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=66667", "cvelist": ["CVE-2013-0797", "CVE-2013-0791", "CVE-2013-0794", "CVE-2013-0795", "CVE-2013-0796", "CVE-2013-0800", "CVE-2013-0788", "CVE-2013-0799", "CVE-2013-0792", "CVE-2013-0793"], "lastseen": "2017-10-29T13:38:55"}, {"id": "SUSE_SU-2013-0850-1.NASL", "type": "nessus", "title": "SUSE SLES11 Security Update : Mozilla Firefox (SUSE-SU-2013:0850-1)", "description": "Mozilla Firefox has been updated to the17.0.6ESR security version upgrade as a LTSS roll up release.\n\nMFSA 2013-30: Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code.\n\nOlli Pettay, Jesse Ruderman, Boris Zbarsky, Christian Holler, Milan Sreckovic, and Joe Drew reported memory safety problems and crashes that affect Firefox ESR 17, and Firefox 19. (CVE-2013-0788)\n\nMFSA 2013-31 / CVE-2013-0800: Security researcher Abhishek Arya (Inferno) of the Google Chrome Security Team used the Address Sanitizer tool to discover an out-of-bounds write in Cairo graphics library. When certain values are passed to it during rendering, Cairo attempts to use negative boundaries or sizes for boxes, leading to a potentially exploitable crash in some instances.\n\nMFSA 2013-32 / CVE-2013-0799: Security researcher Frederic Hoguin discovered that the Mozilla Maintenance Service on Windows was vulnerable to a buffer overflow. This system is used to update software without invoking the User Account Control (UAC) prompt. The Mozilla Maintenance Service is configured to allow unprivileged users to start it with arbitrary arguments. By manipulating the data passed in these arguments, an attacker can execute arbitrary code with the system privileges used by the service. This issue requires local file system access to be exploitable.\n\nMFSA 2013-34 / CVE-2013-0797: Security researcher Ash reported an issue with the Mozilla Updater. The Mozilla Updater can be made to load a malicious local DLL file in a privileged context through either the Mozilla Maintenance Service or independently on systems that do not use the service. This occurs when the DLL file is placed in a specific location on the local system before the Mozilla Updater is run. Local file system access is necessary in order for this issue to be exploitable.\n\nMFSA 2013-35 / CVE-2013-0796: Security researcher miaubiz used the Address Sanitizer tool to discover a crash in WebGL rendering when memory is freed that has not previously been allocated. This issue only affects Linux users who have Intel Mesa graphics drivers. The resulting crash could be potentially exploitable.\n\nMFSA 2013-36 / CVE-2013-0795: Security researcher Cody Crews reported a mechanism to use the cloneNode method to bypass System Only Wrappers (SOW) and clone a protected node. This allows violation of the browser's same origin policy and could also lead to privilege escalation and the execution of arbitrary code.\n\nMFSA 2013-37 / CVE-2013-0794: Security researcher shutdown reported a method for removing the origin indication on tab-modal dialog boxes in combination with browser navigation. This could allow an attacker's dialog to overlay a page and show another site's content. This can be used for phishing by allowing users to enter data into a modal prompt dialog on an attacking, site while appearing to be from the displayed site.\n\nMFSA 2013-38 / CVE-2013-0793: Security researcher Mariusz Mlynski reported a method to use browser navigations through history to load an arbitrary website with that page's baseURI property pointing to another site instead of the seemingly loaded one. The user will continue to see the incorrect site in the addressbar of the browser. This allows for a cross-site scripting (XSS) attack or the theft of data through a phishing attack.\n\nMFSA 2013-39 / CVE-2013-0792: Mozilla community member Tobias Schula reported that if gfx.color_management.enablev4 preference is enabled manually in about:config, some grayscale PNG images will be rendered incorrectly and cause memory corruption during PNG decoding when certain color profiles are in use. A crafted PNG image could use this flaw to leak data through rendered images drawing from random memory. By default, this preference is not enabled.\n\nMFSA 2013-40 / CVE-2013-0791: Mozilla community member Ambroz Bizjak reported an out-of-bounds array read in the CERT_DecodeCertPackage function of the Network Security Services (NSS) libary when decoding a certificate. When this occurs, it will lead to memory corruption and a non-exploitable crash.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "published": "2015-05-20T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=83585", "cvelist": ["CVE-2013-0797", "CVE-2013-0791", "CVE-2013-0794", "CVE-2013-0795", "CVE-2013-0796", "CVE-2013-0800", "CVE-2013-0788", "CVE-2013-0799", "CVE-2013-0792", "CVE-2013-0793"], "lastseen": "2017-10-29T13:45:16"}, {"id": "SUSE_FIREFOX-20130404-8537.NASL", "type": "nessus", "title": "SuSE 10 Security Update : Mozilla Firefox (ZYPP Patch Number 8537)", "description": "MozillaFirefox has been updated to the 17.0.5ESR release fixing bugs and security issues.\n\nAlso Mozilla NSS has been updated to version 3.14.3 and Mozilla NSPR to 4.9.6.\n\n - Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code. (MFSA 2013-30)\n\n Olli Pettay, Jesse Ruderman, Boris Zbarsky, Christian Holler, Milan Sreckovic, and Joe Drew reported memory safety problems and crashes that affect Firefox ESR 17, and Firefox 19. (CVE-2013-0788)\n\n Andrew McCreight, Randell Jesup, Gary Kwong, Jesse Ruderman, Christian Holler, and Mats Palmgren reported memory safety problems and crashes that affect Firefox 19. (CVE-2013-0789)\n\n Jim Chen reported a memory safety problem that affects Firefox for Android 19. (CVE-2013-0790)\n\n - Security researcher Abhishek Arya (Inferno) of the Google Chrome Security Team used the Address Sanitizer tool to discover an out-of-bounds write in Cairo graphics library. When certain values are passed to it during rendering, Cairo attempts to use negative boundaries or sizes for boxes, leading to a potentially exploitable crash in some instances. (MFSA 2013-31 / CVE-2013-0800)\n\n - Security researcher Frederic Hoguin discovered that the Mozilla Maintenance Service on Windows was vulnerable to a buffer overflow. This system is used to update software without invoking the User Account Control (UAC) prompt. The Mozilla Maintenance Service is configured to allow unprivileged users to start it with arbitrary arguments. By manipulating the data passed in these arguments, an attacker can execute arbitrary code with the system privileges used by the service. This issue requires local file system access to be exploitable.\n (MFSA 2013-32 / CVE-2013-0799)\n\n - Security researcher Shuichiro Suzuki of the Fourteenforty Research Institute reported the app_tmp directory is set to be world readable and writeable by Firefox for Android. This potentially allows for third-party applications to replace or alter Firefox add-ons when downloaded because they are temporarily stored in the app_tmp directory before installation.\n (MFSA 2013-33 / CVE-2013-0798)\n\n This vulnerability only affects Firefox for Android.\n\n - Security researcher Ash reported an issue with the Mozilla Updater. The Mozilla Updater can be made to load a malicious local DLL file in a privileged context through either the Mozilla Maintenance Service or independently on systems that do not use the service.\n This occurs when the DLL file is placed in a specific location on the local system before the Mozilla Updater is run. Local file system access is necessary in order for this issue to be exploitable. (MFSA 2013-34 / CVE-2013-0797)\n\n - Security researcher miaubiz used the Address Sanitizer tool to discover a crash in WebGL rendering when memory is freed that has not previously been allocated. This issue only affects Linux users who have Intel Mesa graphics drivers. The resulting crash could be potentially exploitable. (MFSA 2013-35 / CVE-2013-0796)\n\n - Security researcher Cody Crews reported a mechanism to use the cloneNode method to bypass System Only Wrappers (SOW) and clone a protected node. This allows violation of the browser's same origin policy and could also lead to privilege escalation and the execution of arbitrary code. (MFSA 2013-36 / CVE-2013-0795)\n\n - Security researcher shutdown reported a method for removing the origin indication on tab-modal dialog boxes in combination with browser navigation. This could allow an attacker's dialog to overlay a page and show another site's content. This can be used for phishing by allowing users to enter data into a modal prompt dialog on an attacking, site while appearing to be from the displayed site. (MFSA 2013-37 / CVE-2013-0794)\n\n - / CVE-2013-079: Security researcher Mariusz Mlynski reported a method to use browser navigations through history to load an arbitrary website with that page's baseURI property pointing to another site instead of the seemingly loaded one. The user will continue to see the incorrect site in the addressbar of the browser. This allows for a cross-site scripting (XSS) attack or the theft of data through a phishing attack. (MFSA 2013-38)\n\n - Mozilla community member Tobias Schula reported that if gfx.color_management.enablev4 preference is enabled manually in about:config, some grayscale PNG images will be rendered incorrectly and cause memory corruption during PNG decoding when certain color profiles are in use. A crafted PNG image could use this flaw to leak data through rendered images drawing from random memory.\n By default, this preference is not enabled. (MFSA 2013-39 / CVE-2013-0792)\n\n - Mozilla community member Ambroz Bizjak reported an out-of-bounds array read in the CERT_DecodeCertPackage function of the Network Security Services (NSS) libary when decoding a certificate. When this occurs, it will lead to memory corruption and a non-exploitable crash.\n (MFSA 2013-40 / CVE-2013-0791)", "published": "2013-04-09T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=65866", "cvelist": ["CVE-2013-0797", "CVE-2013-0791", "CVE-2013-0794", "CVE-2013-0795", "CVE-2013-0798", "CVE-2013-0796", "CVE-2013-0800", "CVE-2013-0788", "CVE-2013-0789", "CVE-2013-0799", "CVE-2013-0792", "CVE-2013-0790"], "lastseen": "2017-10-29T13:37:53"}, {"id": "FREEBSD_PKG_949764339C7411E2A9FCD43D7E0C7C02.NASL", "type": "nessus", "title": "FreeBSD : mozilla -- multiple vulnerabilities (94976433-9c74-11e2-a9fc-d43d7e0c7c02)", "description": "The Mozilla Project reports :\n\nMFSA 2013-30 Miscellaneous memory safety hazards (rv:20.0 / rv:17.0.5)\n\nMFSA 2013-31 Out-of-bounds write in Cairo library\n\nMFSA 2013-32 Privilege escalation through Mozilla Maintenance Service\n\nMFSA 2013-33 World read and write access to app_tmp directory on Android\n\nMFSA 2013-34 Privilege escalation through Mozilla Updater\n\nMFSA 2013-35 WebGL crash with Mesa graphics driver on Linux\n\nMFSA 2013-36 Bypass of SOW protections allows cloning of protected nodes\n\nMFSA 2013-37 Bypass of tab-modal dialog origin disclosure\n\nMFSA 2013-38 Cross-site scripting (XSS) using timed history navigations\n\nMFSA 2013-39 Memory corruption while rendering grayscale PNG images\n\nMFSA 2013-40 Out-of-bounds array read in CERT_DecodeCertPackage", "published": "2013-04-08T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=65847", "cvelist": ["CVE-2013-0797", "CVE-2013-0791", "CVE-2013-0794", "CVE-2013-0795", "CVE-2013-0798", "CVE-2013-0796", "CVE-2013-0800", "CVE-2013-0788", "CVE-2013-0789", "CVE-2013-0799", "CVE-2013-0792", "CVE-2013-0790", "CVE-2013-0793"], "lastseen": "2017-10-29T13:39:11"}, {"id": "SUSE_11_FIREFOX-20130516-130516.NASL", "type": "nessus", "title": "SuSE 11.2 Security Update : Mozilla Firefox (SAT Patch Number 7741)", "description": "Mozilla Firefox has been updated to the17.0.6ESR security release.\n\n - Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code. (MFSA 2013-30)\n\n Olli Pettay, Jesse Ruderman, Boris Zbarsky, Christian Holler, Milan Sreckovic, and Joe Drew reported memory safety problems and crashes that affect Firefox ESR 17, and Firefox 19. (CVE-2013-0788)\n\n - Security researcher Abhishek Arya (Inferno) of the Google Chrome Security Team used the Address Sanitizer tool to discover an out-of-bounds write in Cairo graphics library. When certain values are passed to it during rendering, Cairo attempts to use negative boundaries or sizes for boxes, leading to a potentially exploitable crash in some instances. (MFSA 2013-31 / CVE-2013-0800)\n\n - Security researcher Frederic Hoguin discovered that the Mozilla Maintenance Service on Windows was vulnerable to a buffer overflow. This system is used to update software without invoking the User Account Control (UAC) prompt. The Mozilla Maintenance Service is configured to allow unprivileged users to start it with arbitrary arguments. By manipulating the data passed in these arguments, an attacker can execute arbitrary code with the system privileges used by the service. This issue requires local file system access to be exploitable.\n (MFSA 2013-32 / CVE-2013-0799)\n\n - Security researcher Ash reported an issue with the Mozilla Updater. The Mozilla Updater can be made to load a malicious local DLL file in a privileged context through either the Mozilla Maintenance Service or independently on systems that do not use the service.\n This occurs when the DLL file is placed in a specific location on the local system before the Mozilla Updater is run. Local file system access is necessary in order for this issue to be exploitable. (MFSA 2013-34 / CVE-2013-0797)\n\n - Security researcher miaubiz used the Address Sanitizer tool to discover a crash in WebGL rendering when memory is freed that has not previously been allocated. This issue only affects Linux users who have Intel Mesa graphics drivers. The resulting crash could be potentially exploitable. (MFSA 2013-35 / CVE-2013-0796)\n\n - Security researcher Cody Crews reported a mechanism to use the cloneNode method to bypass System Only Wrappers (SOW) and clone a protected node. This allows violation of the browser's same origin policy and could also lead to privilege escalation and the execution of arbitrary code. (MFSA 2013-36 / CVE-2013-0795)\n\n - Security researcher shutdown reported a method for removing the origin indication on tab-modal dialog boxes in combination with browser navigation. This could allow an attacker's dialog to overlay a page and show another site's content. This can be used for phishing by allowing users to enter data into a modal prompt dialog on an attacking, site while appearing to be from the displayed site. (MFSA 2013-37 / CVE-2013-0794)\n\n - Security researcher Mariusz Mlynski reported a method to use browser navigations through history to load an arbitrary website with that page's baseURI property pointing to another site instead of the seemingly loaded one. The user will continue to see the incorrect site in the addressbar of the browser. This allows for a cross-site scripting (XSS) attack or the theft of data through a phishing attack. (MFSA 2013-38 / CVE-2013-0793)\n\n - Mozilla community member Tobias Schula reported that if gfx.color_management.enablev4 preference is enabled manually in about:config, some grayscale PNG images will be rendered incorrectly and cause memory corruption during PNG decoding when certain color profiles are in use. A crafted PNG image could use this flaw to leak data through rendered images drawing from random memory.\n By default, this preference is not enabled. (MFSA 2013-39 / CVE-2013-0792)\n\n - Mozilla community member Ambroz Bizjak reported an out-of-bounds array read in the CERT_DecodeCertPackage function of the Network Security Services (NSS) libary when decoding a certificate. When this occurs, it will lead to memory corruption and a non-exploitable crash.\n (MFSA 2013-40 / CVE-2013-0791)", "published": "2013-05-29T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=66666", "cvelist": ["CVE-2013-0797", "CVE-2013-0791", "CVE-2013-0794", "CVE-2013-0795", "CVE-2013-0796", "CVE-2013-0800", "CVE-2013-0788", "CVE-2013-0799", "CVE-2013-0792", "CVE-2013-0793"], "lastseen": "2017-10-29T13:41:25"}, {"id": "MOZILLA_FIREFOX_20.NASL", "type": "nessus", "title": "Firefox < 20 Multiple Vulnerabilities", "description": "The installed version of Firefox is earlier than 20 and is, therefore, potentially affected by the following vulnerabilities :\n\n - Various memory safety issues exist. (CVE-2013-0788, CVE-2013-0789)\n\n - An out-of-bounds memory read error exists related to 'CERT_DecodeCertPackage' and certificate decoding.\n (CVE-2013-0791)\n\n - A memory corruption error exists related to PNG image files when 'gfx.color_management.enablev4' is manually enabled in the application's configuration.\n (CVE-2013-0792)\n\n - An error exists related to navigation, history and improper 'baseURI' property values that could allow cross-site scripting attacks. (CVE-2013-0793)\n\n - An error exists related to tab-modal dialog boxes that could be used in phishing attacks. (CVE-2013-0794)\n\n - An error exists related to 'cloneNode' that can allow 'System Only Wrapper' (SOW) to be bypassed, thus violating the same origin policy and possibly leading to privilege escalation and code execution.\n (CVE-2013-0795)\n\n - A DLL loading vulnerability exists that could lead to code execution. (CVE-2013-0797)\n\n - A buffer overflow error exists related to the Mozilla Maintenance Service. (CVE-2013-0799)\n\n - An out-of-bounds write error exists related to the Cairo graphics library. (CVE-2013-0800)", "published": "2013-04-04T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=65806", "cvelist": ["CVE-2013-0797", "CVE-2013-0791", "CVE-2013-0794", "CVE-2013-0795", "CVE-2013-0800", "CVE-2013-0788", "CVE-2013-0789", "CVE-2013-0799", "CVE-2013-0792", "CVE-2013-0793"], "lastseen": "2017-10-29T13:35:56"}, {"id": "SUSE_FIREFOX-20130516-8578.NASL", "type": "nessus", "title": "SuSE 10 Security Update : Mozilla Firefox (ZYPP Patch Number 8578)", "description": "Mozilla Firefox has been updated to the 17.0.6ESR security release.\n\n - Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code. (MFSA 2013-30)\n\n Olli Pettay, Jesse Ruderman, Boris Zbarsky, Christian Holler, Milan Sreckovic, and Joe Drew reported memory safety problems and crashes that affect Firefox ESR 17, and Firefox 19. (CVE-2013-0788)\n\n - Security researcher Abhishek Arya (Inferno) of the Google Chrome Security Team used the Address Sanitizer tool to discover an out-of-bounds write in Cairo graphics library. When certain values are passed to it during rendering, Cairo attempts to use negative boundaries or sizes for boxes, leading to a potentially exploitable crash in some instances. (MFSA 2013-31 / CVE-2013-0800)\n\n - Security researcher Frederic Hoguin discovered that the Mozilla Maintenance Service on Windows was vulnerable to a buffer overflow. This system is used to update software without invoking the User Account Control (UAC) prompt. The Mozilla Maintenance Service is configured to allow unprivileged users to start it with arbitrary arguments. By manipulating the data passed in these arguments, an attacker can execute arbitrary code with the system privileges used by the service. This issue requires local file system access to be exploitable.\n (MFSA 2013-32 / CVE-2013-0799)\n\n - Security researcher Ash reported an issue with the Mozilla Updater. The Mozilla Updater can be made to load a malicious local DLL file in a privileged context through either the Mozilla Maintenance Service or independently on systems that do not use the service.\n This occurs when the DLL file is placed in a specific location on the local system before the Mozilla Updater is run. Local file system access is necessary in order for this issue to be exploitable. (MFSA 2013-34 / CVE-2013-0797)\n\n - Security researcher miaubiz used the Address Sanitizer tool to discover a crash in WebGL rendering when memory is freed that has not previously been allocated. This issue only affects Linux users who have Intel Mesa graphics drivers. The resulting crash could be potentially exploitable. (MFSA 2013-35 / CVE-2013-0796)\n\n - Security researcher Cody Crews reported a mechanism to use the cloneNode method to bypass System Only Wrappers (SOW) and clone a protected node. This allows violation of the browser's same origin policy and could also lead to privilege escalation and the execution of arbitrary code. (MFSA 2013-36 / CVE-2013-0795)\n\n - Security researcher shutdown reported a method for removing the origin indication on tab-modal dialog boxes in combination with browser navigation. This could allow an attacker's dialog to overlay a page and show another site's content. This can be used for phishing by allowing users to enter data into a modal prompt dialog on an attacking, site while appearing to be from the displayed site. (MFSA 2013-37 / CVE-2013-0794)\n\n - Security researcher Mariusz Mlynski reported a method to use browser navigations through history to load an arbitrary website with that page's baseURI property pointing to another site instead of the seemingly loaded one. The user will continue to see the incorrect site in the addressbar of the browser. This allows for a cross-site scripting (XSS) attack or the theft of data through a phishing attack. (MFSA 2013-38 / CVE-2013-0793)\n\n - Mozilla community member Tobias Schula reported that if gfx.color_management.enablev4 preference is enabled manually in about:config, some grayscale PNG images will be rendered incorrectly and cause memory corruption during PNG decoding when certain color profiles are in use. A crafted PNG image could use this flaw to leak data through rendered images drawing from random memory.\n By default, this preference is not enabled. (MFSA 2013-39 / CVE-2013-0792)\n\n - Mozilla community member Ambroz Bizjak reported an out-of-bounds array read in the CERT_DecodeCertPackage function of the Network Security Services (NSS) libary when decoding a certificate. When this occurs, it will lead to memory corruption and a non-exploitable crash.\n (MFSA 2013-40 / CVE-2013-0791)", "published": "2013-05-29T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=66668", "cvelist": ["CVE-2013-0797", "CVE-2013-0791", "CVE-2013-0794", "CVE-2013-0795", "CVE-2013-0796", "CVE-2013-0800", "CVE-2013-0788", "CVE-2013-0799", "CVE-2013-0792", "CVE-2013-0793"], "lastseen": "2017-10-29T13:37:21"}], "openvas": [{"id": "OPENVAS:803468", "type": "openvas", "title": "Mozilla Thunderbird Multiple Vulnerabilities -01 Apr13 (Mac OS X)", "description": "This host is installed with Mozilla Thunderbird and is prone to multiple\n vulnerabilities.", "published": "2013-04-08T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=803468", "cvelist": ["CVE-2013-0797", "CVE-2013-0791", "CVE-2013-0795", "CVE-2013-0800", "CVE-2013-0788", "CVE-2013-0799", "CVE-2013-0793"], "lastseen": "2017-07-02T21:11:24"}, {"id": "OPENVAS:803467", "type": "openvas", "title": "Mozilla Thunderbird Multiple Vulnerabilities -01 Apr13 (Windows)", "description": "This host is installed with Mozilla Thunderbird and is prone to multiple\n vulnerabilities.", "published": "2013-04-08T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=803467", "cvelist": ["CVE-2013-0797", "CVE-2013-0791", "CVE-2013-0795", "CVE-2013-0800", "CVE-2013-0788", "CVE-2013-0799", "CVE-2013-0793"], "lastseen": "2017-07-02T21:11:22"}, {"id": "OPENVAS:1361412562310803472", "type": "openvas", "title": "Mozilla SeaMonkey Multiple Vulnerabilities -01 Apr13 (Mac OS X)", "description": "This host is installed with Mozilla SeaMonkey and is prone to multiple\n vulnerabilities.", "published": "2013-04-08T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310803472", "cvelist": ["CVE-2013-0797", "CVE-2013-0791", "CVE-2013-0794", "CVE-2013-0795", "CVE-2013-0800", "CVE-2013-0788", "CVE-2013-0789", "CVE-2013-0792", "CVE-2013-0793"], "lastseen": "2018-04-06T11:23:00"}, {"id": "OPENVAS:1361412562310803470", "type": "openvas", "title": "Mozilla Thunderbird ESR Multiple Vulnerabilities -01 Apr13 (Mac OS X)", "description": "This host is installed with Mozilla Thunderbird ESR and is prone to multiple\n vulnerabilities.", "published": "2013-04-08T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310803470", "cvelist": ["CVE-2013-0797", "CVE-2013-0791", "CVE-2013-0795", "CVE-2013-0800", "CVE-2013-0788", "CVE-2013-0799", "CVE-2013-0793"], "lastseen": "2018-04-06T11:23:14"}, {"id": "OPENVAS:1361412562310803471", "type": "openvas", "title": "Mozilla SeaMonkey Multiple Vulnerabilities -01 Apr13 (Windows)", "description": "This host is installed with Mozilla SeaMonkey and is prone to multiple\n vulnerabilities.", "published": "2013-04-08T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310803471", "cvelist": ["CVE-2013-0797", "CVE-2013-0791", "CVE-2013-0794", "CVE-2013-0795", "CVE-2013-0800", "CVE-2013-0788", "CVE-2013-0789", "CVE-2013-0792", "CVE-2013-0793"], "lastseen": "2018-04-06T11:22:10"}, {"id": "OPENVAS:803471", "type": "openvas", "title": "Mozilla SeaMonkey Multiple Vulnerabilities -01 Apr13 (Windows)", "description": "This host is installed with Mozilla SeaMonkey and is prone to multiple\n vulnerabilities.", "published": "2013-04-08T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=803471", "cvelist": ["CVE-2013-0797", "CVE-2013-0791", "CVE-2013-0794", "CVE-2013-0795", "CVE-2013-0800", "CVE-2013-0788", "CVE-2013-0789", "CVE-2013-0792", "CVE-2013-0793"], "lastseen": "2017-07-02T21:11:10"}, {"id": "OPENVAS:803466", "type": "openvas", "title": "Mozilla Firefox ESR Multiple Vulnerabilities -01 Apr13 (Mac OS X)", "description": "This host is installed with Mozilla Firefox ESR and is prone to multiple\n vulnerabilities.", "published": "2013-04-08T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=803466", "cvelist": ["CVE-2013-0797", "CVE-2013-0791", "CVE-2013-0795", "CVE-2013-0800", "CVE-2013-0788", "CVE-2013-0799", "CVE-2013-0793"], "lastseen": "2017-07-02T21:11:14"}, {"id": "OPENVAS:803465", "type": "openvas", "title": "Mozilla Firefox ESR Multiple Vulnerabilities -01 Apr13 (Windows)", "description": "This host is installed with Mozilla Firefox ESR and is prone to multiple\n vulnerabilities.", "published": "2013-04-08T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=803465", "cvelist": ["CVE-2013-0797", "CVE-2013-0791", "CVE-2013-0795", "CVE-2013-0800", "CVE-2013-0788", "CVE-2013-0799", "CVE-2013-0793"], "lastseen": "2017-07-02T21:11:14"}, {"id": "OPENVAS:1361412562310803467", "type": "openvas", "title": "Mozilla Thunderbird Multiple Vulnerabilities -01 Apr13 (Windows)", "description": "This host is installed with Mozilla Thunderbird and is prone to multiple\n vulnerabilities.", "published": "2013-04-08T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310803467", "cvelist": ["CVE-2013-0797", "CVE-2013-0791", "CVE-2013-0795", "CVE-2013-0800", "CVE-2013-0788", "CVE-2013-0799", "CVE-2013-0793"], "lastseen": "2018-04-06T11:23:39"}, {"id": "OPENVAS:1361412562310803469", "type": "openvas", "title": "Mozilla Thunderbird ESR Multiple Vulnerabilities -01 Apr13 (Windows)", "description": "This host is installed with Mozilla Thunderbird ESR and is prone to multiple\n vulnerabilities.", "published": "2013-04-08T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310803469", "cvelist": ["CVE-2013-0797", "CVE-2013-0791", "CVE-2013-0795", "CVE-2013-0800", "CVE-2013-0788", "CVE-2013-0799", "CVE-2013-0793"], "lastseen": "2018-04-06T11:22:32"}], "freebsd": [{"id": "94976433-9C74-11E2-A9FC-D43D7E0C7C02", "type": "freebsd", "title": "mozilla -- multiple vulnerabilities", "description": "\nThe Mozilla Project reports:\n\nMFSA 2013-30 Miscellaneous memory safety hazards (rv:20.0 /\n\t rv:17.0.5)\nMFSA 2013-31 Out-of-bounds write in Cairo library\nMFSA 2013-32 Privilege escalation through Mozilla Maintenance\n\t Service\nMFSA 2013-33 World read and write access to app_tmp directory on\n\t Android\nMFSA 2013-34 Privilege escalation through Mozilla Updater\nMFSA 2013-35 WebGL crash with Mesa graphics driver on Linux\nMFSA 2013-36 Bypass of SOW protections allows cloning of protected\n\t nodes\nMFSA 2013-37 Bypass of tab-modal dialog origin disclosure\nMFSA 2013-38 Cross-site scripting (XSS) using timed history\n\t navigations\nMFSA 2013-39 Memory corruption while rendering grayscale PNG\n\t images\nMFSA 2013-40 Out-of-bounds array read in CERT_DecodeCertPackage\n\n", "published": "2013-04-02T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://vuxml.freebsd.org/freebsd/94976433-9c74-11e2-a9fc-d43d7e0c7c02.html", "cvelist": ["CVE-2013-0797", "CVE-2013-0791", "CVE-2013-0794", "CVE-2013-0795", "CVE-2013-0798", "CVE-2013-0796", "CVE-2013-0800", "CVE-2013-0788", "CVE-2013-0789", "CVE-2013-0799", "CVE-2013-0792", "CVE-2013-0790", "CVE-2013-0793"], "lastseen": "2016-09-26T17:24:32"}], "suse": [{"id": "SUSE-SU-2013:0850-1", "type": "suse", "title": "Security update for Mozilla Firefox (important)", "description": "Mozilla Firefox has been updated to the17.0.6ESR security\n version upgrade as a LTSS roll up release.\n\n *\n\n MFSA 2013-30: Mozilla developers identified and fixed\n several memory safety bugs in the browser engine used in\n Firefox and other Mozilla-based products. Some of these\n bugs showed evidence of memory corruption under certain\n circumstances, and we presume that with enough effort at\n least some of these could be exploited to run arbitrary\n code.\n\n Olli Pettay, Jesse Ruderman, Boris Zbarsky, Christian\n Holler, Milan Sreckovic, and Joe Drew reported memory\n safety problems and crashes that affect Firefox ESR 17, and\n Firefox 19. (CVE-2013-0788)\n\n *\n\n MFSA 2013-31 / CVE-2013-0800: Security researcher\n Abhishek Arya (Inferno) of the Google Chrome Security Team\n used the Address Sanitizer tool to discover an\n out-of-bounds write in Cairo graphics library. When certain\n values are passed to it during rendering, Cairo attempts to\n use negative boundaries or sizes for boxes, leading to a\n potentially exploitable crash in some instances.\n\n *\n\n MFSA 2013-32 / CVE-2013-0799: Security researcher\n Frederic Hoguin discovered that the Mozilla Maintenance\n Service on Windows was vulnerable to a buffer overflow.\n This system is used to update software without invoking the\n User Account Control (UAC) prompt. The Mozilla Maintenance\n Service is configured to allow unprivileged users to start\n it with arbitrary arguments. By manipulating the data\n passed in these arguments, an attacker can execute\n arbitrary code with the system privileges used by the\n service. This issue requires local file system access to be\n exploitable.\n\n *\n\n MFSA 2013-34 / CVE-2013-0797: Security researcher Ash\n reported an issue with the Mozilla Updater. The Mozilla\n Updater can be made to load a malicious local DLL file in a\n privileged context through either the Mozilla Maintenance\n Service or independently on systems that do not use the\n service. This occurs when the DLL file is placed in a\n specific location on the local system before the Mozilla\n Updater is run. Local file system access is necessary in\n order for this issue to be exploitable.\n\n *\n\n MFSA 2013-35 / CVE-2013-0796: Security researcher\n miaubiz used the Address Sanitizer tool to discover a crash\n in WebGL rendering when memory is freed that has not\n previously been allocated. This issue only affects Linux\n users who have Intel Mesa graphics drivers. The resulting\n crash could be potentially exploitable.\n\n *\n\n MFSA 2013-36 / CVE-2013-0795: Security researcher\n Cody Crews reported a mechanism to use the cloneNode method\n to bypass System Only Wrappers (SOW) and clone a protected\n node. This allows violation of the browser's same origin\n policy and could also lead to privilege escalation and the\n execution of arbitrary code.\n\n *\n\n MFSA 2013-37 / CVE-2013-0794: Security researcher\n shutdown reported a method for removing the origin\n indication on tab-modal dialog boxes in combination with\n browser navigation. This could allow an attacker's dialog\n to overlay a page and show another site's content. This can\n be used for phishing by allowing users to enter data into a\n modal prompt dialog on an attacking, site while appearing\n to be from the displayed site.\n\n *\n\n MFSA 2013-38 / CVE-2013-0793: Security researcher\n Mariusz Mlynski reported a method to use browser\n navigations through history to load an arbitrary website\n with that page's baseURI property pointing to another site\n instead of the seemingly loaded one. The user will continue\n to see the incorrect site in the addressbar of the browser.\n This allows for a cross-site scripting (XSS) attack or the\n theft of data through a phishing attack.\n\n *\n\n MFSA 2013-39 / CVE-2013-0792: Mozilla community\n member Tobias Schula reported that if\n gfx.color_management.enablev4 preference is enabled\n manually in about:config, some grayscale PNG images will be\n rendered incorrectly and cause memory corruption during PNG\n decoding when certain color profiles are in use. A crafted\n PNG image could use this flaw to leak data through rendered\n images drawing from random memory. By default, this\n preference is not enabled.\n\n *\n\n MFSA 2013-40 / CVE-2013-0791: Mozilla community\n member Ambroz Bizjak reported an out-of-bounds array read\n in the CERT_DecodeCertPackage function of the Network\n Security Services (NSS) libary when decoding a certificate.\n When this occurs, it will lead to memory corruption and a\n non-exploitable crash.\n\n", "published": "2013-05-31T19:04:12", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00019.html", "cvelist": ["CVE-2013-0797", "CVE-2013-0791", "CVE-2013-0794", "CVE-2013-0795", "CVE-2013-0796", "CVE-2013-0800", "CVE-2013-0788", "CVE-2013-0799", "CVE-2013-0792", "CVE-2013-0793"], "lastseen": "2016-09-04T12:09:50"}, {"id": "SUSE-SU-2013:0843-1", "type": "suse", "title": "Security update for Mozilla Firefox (important)", "description": "Mozilla Firefox has been updated to the 17.0.6ESR security\n release.\n\n *\n\n MFSA 2013-30: Mozilla developers identified and fixed\n several memory safety bugs in the browser engine used in\n Firefox and other Mozilla-based products. Some of these\n bugs showed evidence of memory corruption under certain\n circumstances, and we presume that with enough effort at\n least some of these could be exploited to run arbitrary\n code.\n\n Olli Pettay, Jesse Ruderman, Boris Zbarsky, Christian\n Holler, Milan Sreckovic, and Joe Drew reported memory\n safety problems and crashes that affect Firefox ESR 17, and\n Firefox 19. (CVE-2013-0788)\n\n *\n\n MFSA 2013-31 / CVE-2013-0800: Security researcher\n Abhishek Arya (Inferno) of the Google Chrome Security Team\n used the Address Sanitizer tool to discover an\n out-of-bounds write in Cairo graphics library. When certain\n values are passed to it during rendering, Cairo attempts to\n use negative boundaries or sizes for boxes, leading to a\n potentially exploitable crash in some instances.\n\n *\n\n MFSA 2013-32 / CVE-2013-0799: Security researcher\n Frederic Hoguin discovered that the Mozilla Maintenance\n Service on Windows was vulnerable to a buffer overflow.\n This system is used to update software without invoking the\n User Account Control (UAC) prompt. The Mozilla Maintenance\n Service is configured to allow unprivileged users to start\n it with arbitrary arguments. By manipulating the data\n passed in these arguments, an attacker can execute\n arbitrary code with the system privileges used by the\n service. This issue requires local file system access to be\n exploitable.\n\n *\n\n MFSA 2013-34 / CVE-2013-0797: Security researcher Ash\n reported an issue with the Mozilla Updater. The Mozilla\n Updater can be made to load a malicious local DLL file in a\n privileged context through either the Mozilla Maintenance\n Service or independently on systems that do not use the\n service. This occurs when the DLL file is placed in a\n specific location on the local system before the Mozilla\n Updater is run. Local file system access is necessary in\n order for this issue to be exploitable.\n\n *\n\n MFSA 2013-35 / CVE-2013-0796: Security researcher\n miaubiz used the Address Sanitizer tool to discover a crash\n in WebGL rendering when memory is freed that has not\n previously been allocated. This issue only affects Linux\n users who have Intel Mesa graphics drivers. The resulting\n crash could be potentially exploitable.\n\n *\n\n MFSA 2013-36 / CVE-2013-0795: Security researcher\n Cody Crews reported a mechanism to use the cloneNode method\n to bypass System Only Wrappers (SOW) and clone a protected\n node. This allows violation of the browser's same origin\n policy and could also lead to privilege escalation and the\n execution of arbitrary code.\n\n *\n\n MFSA 2013-37 / CVE-2013-0794: Security researcher\n shutdown reported a method for removing the origin\n indication on tab-modal dialog boxes in combination with\n browser navigation. This could allow an attacker's dialog\n to overlay a page and show another site's content. This can\n be used for phishing by allowing users to enter data into a\n modal prompt dialog on an attacking, site while appearing\n to be from the displayed site.\n\n *\n\n MFSA 2013-38 / CVE-2013-0793: Security researcher\n Mariusz Mlynski reported a method to use browser\n navigations through history to load an arbitrary website\n with that page's baseURI property pointing to another site\n instead of the seemingly loaded one. The user will continue\n to see the incorrect site in the addressbar of the browser.\n This allows for a cross-site scripting (XSS) attack or the\n theft of data through a phishing attack.\n\n *\n\n MFSA 2013-39 / CVE-2013-0792: Mozilla community\n member Tobias Schula reported that if\n gfx.color_management.enablev4 preference is enabled\n manually in about:config, some grayscale PNG images will be\n rendered incorrectly and cause memory corruption during PNG\n decoding when certain color profiles are in use. A crafted\n PNG image could use this flaw to leak data through rendered\n images drawing from random memory. By default, this\n preference is not enabled.\n\n *\n\n MFSA 2013-40 / CVE-2013-0791: Mozilla community\n member Ambroz Bizjak reported an out-of-bounds array read\n in the CERT_DecodeCertPackage function of the Network\n Security Services (NSS) libary when decoding a certificate.\n When this occurs, it will lead to memory corruption and a\n non-exploitable crash.\n", "published": "2013-05-28T22:04:36", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00016.html", "cvelist": ["CVE-2013-0797", "CVE-2013-0791", "CVE-2013-0794", "CVE-2013-0795", "CVE-2013-0796", "CVE-2013-0800", "CVE-2013-0788", "CVE-2013-0799", "CVE-2013-0792", "CVE-2013-0793"], "lastseen": "2016-09-04T11:55:38"}, {"id": "SUSE-SU-2013:0842-1", "type": "suse", "title": "Security update for Mozilla Firefox (important)", "description": "Mozilla Firefox has been updated to the17.0.6ESR security\n release.\n\n *\n\n MFSA 2013-30: Mozilla developers identified and fixed\n several memory safety bugs in the browser engine used in\n Firefox and other Mozilla-based products. Some of these\n bugs showed evidence of memory corruption under certain\n circumstances, and we presume that with enough effort at\n least some of these could be exploited to run arbitrary\n code.\n\n Olli Pettay, Jesse Ruderman, Boris Zbarsky, Christian\n Holler, Milan Sreckovic, and Joe Drew reported memory\n safety problems and crashes that affect Firefox ESR 17, and\n Firefox 19. (CVE-2013-0788)\n\n *\n\n MFSA 2013-31 / CVE-2013-0800: Security researcher\n Abhishek Arya (Inferno) of the Google Chrome Security Team\n used the Address Sanitizer tool to discover an\n out-of-bounds write in Cairo graphics library. When certain\n values are passed to it during rendering, Cairo attempts to\n use negative boundaries or sizes for boxes, leading to a\n potentially exploitable crash in some instances.\n\n *\n\n MFSA 2013-32 / CVE-2013-0799: Security researcher\n Frederic Hoguin discovered that the Mozilla Maintenance\n Service on Windows was vulnerable to a buffer overflow.\n This system is used to update software without invoking the\n User Account Control (UAC) prompt. The Mozilla Maintenance\n Service is configured to allow unprivileged users to start\n it with arbitrary arguments. By manipulating the data\n passed in these arguments, an attacker can execute\n arbitrary code with the system privileges used by the\n service. This issue requires local file system access to be\n exploitable.\n\n *\n\n MFSA 2013-34 / CVE-2013-0797: Security researcher Ash\n reported an issue with the Mozilla Updater. The Mozilla\n Updater can be made to load a malicious local DLL file in a\n privileged context through either the Mozilla Maintenance\n Service or independently on systems that do not use the\n service. This occurs when the DLL file is placed in a\n specific location on the local system before the Mozilla\n Updater is run. Local file system access is necessary in\n order for this issue to be exploitable.\n\n *\n\n MFSA 2013-35 / CVE-2013-0796: Security researcher\n miaubiz used the Address Sanitizer tool to discover a crash\n in WebGL rendering when memory is freed that has not\n previously been allocated. This issue only affects Linux\n users who have Intel Mesa graphics drivers. The resulting\n crash could be potentially exploitable.\n\n *\n\n MFSA 2013-36 / CVE-2013-0795: Security researcher\n Cody Crews reported a mechanism to use the cloneNode method\n to bypass System Only Wrappers (SOW) and clone a protected\n node. This allows violation of the browser's same origin\n policy and could also lead to privilege escalation and the\n execution of arbitrary code.\n\n *\n\n MFSA 2013-37 / CVE-2013-0794: Security researcher\n shutdown reported a method for removing the origin\n indication on tab-modal dialog boxes in combination with\n browser navigation. This could allow an attacker's dialog\n to overlay a page and show another site's content. This can\n be used for phishing by allowing users to enter data into a\n modal prompt dialog on an attacking, site while appearing\n to be from the displayed site.\n\n *\n\n MFSA 2013-38 / CVE-2013-0793: Security researcher\n Mariusz Mlynski reported a method to use browser\n navigations through history to load an arbitrary website\n with that page's baseURI property pointing to another site\n instead of the seemingly loaded one. The user will continue\n to see the incorrect site in the addressbar of the browser.\n This allows for a cross-site scripting (XSS) attack or the\n theft of data through a phishing attack.\n\n *\n\n MFSA 2013-39 / CVE-2013-0792: Mozilla community\n member Tobias Schula reported that if\n gfx.color_management.enablev4 preference is enabled\n manually in about:config, some grayscale PNG images will be\n rendered incorrectly and cause memory corruption during PNG\n decoding when certain color profiles are in use. A crafted\n PNG image could use this flaw to leak data through rendered\n images drawing from random memory. By default, this\n preference is not enabled.\n\n *\n\n MFSA 2013-40 / CVE-2013-0791: Mozilla community\n member Ambroz Bizjak reported an out-of-bounds array read\n in the CERT_DecodeCertPackage function of the Network\n Security Services (NSS) libary when decoding a certificate.\n When this occurs, it will lead to memory corruption and a\n non-exploitable crash.\n", "published": "2013-05-28T21:04:38", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00015.html", "cvelist": ["CVE-2013-0797", "CVE-2013-0791", "CVE-2013-0794", "CVE-2013-0795", "CVE-2013-0796", "CVE-2013-0800", "CVE-2013-0788", "CVE-2013-0799", "CVE-2013-0792", "CVE-2013-0793"], "lastseen": "2016-09-04T11:50:34"}, {"id": "SUSE-SU-2013:0645-1", "type": "suse", "title": "Security update for Mozilla Firefox (important)", "description": "MozillaFirefox has been updated to the 17.0.5ESR release\n fixing bugs and security issues.\n\n Also Mozilla NSS has been updated to version 3.14.3 and\n Mozilla NSPR to 4.9.6.\n\n *\n\n MFSA 2013-30: Mozilla developers identified and fixed\n several memory safety bugs in the browser engine used in\n Firefox and other Mozilla-based products. Some of these\n bugs showed evidence of memory corruption under certain\n circumstances, and we presume that with enough effort at\n least some of these could be exploited to run arbitrary\n code.\n\n Olli Pettay, Jesse Ruderman, Boris Zbarsky, Christian\n Holler, Milan Sreckovic, and Joe Drew reported memory\n safety problems and crashes that affect Firefox ESR 17, and\n Firefox 19. (CVE-2013-0788)\n\n Andrew McCreight, Randell Jesup, Gary Kwong, Jesse\n Ruderman, Christian Holler, and Mats Palmgren reported\n memory safety problems and crashes that affect Firefox 19.\n (CVE-2013-0789)\n\n Jim Chen reported a memory safety problem that\n affects Firefox for Android\n\n *\n\n (CVE-2013-0790)\n\n *\n\n MFSA 2013-31 / CVE-2013-0800: Security researcher\n Abhishek Arya (Inferno) of the Google Chrome Security Team\n used the Address Sanitizer tool to discover an\n out-of-bounds write in Cairo graphics library. When certain\n values are passed to it during rendering, Cairo attempts to\n use negative boundaries or sizes for boxes, leading to a\n potentially exploitable crash in some instances.\n\n *\n\n MFSA 2013-32 / CVE-2013-0799: Security researcher\n Frederic Hoguin discovered that the Mozilla Maintenance\n Service on Windows was vulnerable to a buffer overflow.\n This system is used to update software without invoking the\n User Account Control (UAC) prompt. The Mozilla Maintenance\n Service is configured to allow unprivileged users to start\n it with arbitrary arguments. By manipulating the data\n passed in these arguments, an attacker can execute\n arbitrary code with the system privileges used by the\n service. This issue requires local file system access to be\n exploitable.\n\n *\n\n MFSA 2013-33 / CVE-2013-0798: Security researcher\n Shuichiro Suzuki of the Fourteenforty Research Institute\n reported the app_tmp directory is set to be world readable\n and writeable by Firefox for Android. This potentially\n allows for third party applications to replace or alter\n Firefox add-ons when downloaded because they are\n temporarily stored in the app_tmp directory before\n installation.\n\n This vulnerability only affects Firefox for Android.\n\n *\n\n MFSA 2013-34 / CVE-2013-0797: Security researcher Ash\n reported an issue with the Mozilla Updater. The Mozilla\n Updater can be made to load a malicious local DLL file in a\n privileged context through either the Mozilla Maintenance\n Service or independently on systems that do not use the\n service. This occurs when the DLL file is placed in a\n specific location on the local system before the Mozilla\n Updater is run. Local file system access is necessary in\n order for this issue to be exploitable.\n\n *\n\n MFSA 2013-35 / CVE-2013-0796: Security researcher\n miaubiz used the Address Sanitizer tool to discover a crash\n in WebGL rendering when memory is freed that has not\n previously been allocated. This issue only affects Linux\n users who have Intel Mesa graphics drivers. The resulting\n crash could be potentially exploitable.\n\n *\n\n MFSA 2013-36 / CVE-2013-0795: Security researcher\n Cody Crews reported a mechanism to use the cloneNode method\n to bypass System Only Wrappers (SOW) and clone a protected\n node. This allows violation of the browser's same origin\n policy and could also lead to privilege escalation and the\n execution of arbitrary code.\n\n *\n\n MFSA 2013-37 / CVE-2013-0794: Security researcher\n shutdown reported a method for removing the origin\n indication on tab-modal dialog boxes in combination with\n browser navigation. This could allow an attacker's dialog\n to overlay a page and show another site's content. This can\n be used for phishing by allowing users to enter data into a\n modal prompt dialog on an attacking, site while appearing\n to be from the displayed site.\n\n *\n\n MFSA 2013-38 / CVE-2013-079: Security researcher\n Mariusz Mlynski reported a method to use browser\n navigations through history to load an arbitrary website\n with that page's baseURI property pointing to another site\n instead of the seemingly loaded one. The user will continue\n to see the incorrect site in the addressbar of the browser.\n This allows for a cross-site scripting (XSS) attack or the\n theft of data through a phishing attack.\n\n *\n\n MFSA 2013-39 / CVE-2013-0792: Mozilla community\n member Tobias Schula reported that if\n gfx.color_management.enablev4 preference is enabled\n manually in about:config, some grayscale PNG images will be\n rendered incorrectly and cause memory corruption during PNG\n decoding when certain color profiles are in use. A crafted\n PNG image could use this flaw to leak data through rendered\n images drawing from random memory. By default, this\n preference is not enabled.\n\n *\n\n MFSA 2013-40 / CVE-2013-0791: Mozilla community\n member Ambroz Bizjak reported an out-of-bounds array read\n in the CERT_DecodeCertPackage function of the Network\n Security Services (NSS) libary when decoding a certificate.\n When this occurs, it will lead to memory corruption and a\n non-exploitable crash.\n", "published": "2013-04-08T21:04:33", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00013.html", "cvelist": ["CVE-2013-0797", "CVE-2013-0791", "CVE-2013-0794", "CVE-2013-0795", "CVE-2013-0798", "CVE-2013-0796", "CVE-2013-0800", "CVE-2013-0788", "CVE-2013-0789", "CVE-2013-0799", "CVE-2013-0792", "CVE-2013-0790"], "lastseen": "2016-09-04T11:40:21"}, {"id": "SUSE-SU-2013:1152-1", "type": "suse", "title": "Security update for Mozilla Firefox (important)", "description": "Mozilla Firefox has been updated to the 17.0.7 ESR version,\n which fixes bugs and security fixes.\n\n *\n\n MFSA 2013-49: Mozilla developers identified and fixed\n several memory safety bugs in the browser engine used in\n Firefox and other Mozilla-based products. Some of these\n bugs showed evidence of memory corruption under certain\n circumstances, and we presume that with enough effort at\n least some of these could be exploited to run arbitrary\n code.\n\n Gary Kwong, Jesse Ruderman, and Andrew McCreight\n reported memory safety problems and crashes that affect\n Firefox ESR 17, and Firefox 21. (CVE-2013-1682)\n\n *\n\n MFSA 2013-50: Security researcher Abhishek Arya\n (Inferno) of the Google Chrome Security Team used the\n Address Sanitizer tool to discover a series of\n use-after-free problems rated critical as security issues\n in shipped software. Some of these issues are potentially\n exploitable, allowing for remote code execution. We would\n also like to thank Abhishek for reporting additional\n use-after-free and buffer overflow flaws in code introduced\n during Firefox development. These were fixed before general\n release.\n\n o Heap-use-after-free in\n mozilla::dom::HTMLMediaElement::LookupMediaElementURITable\n (CVE-2013-1684) o Heap-use-after-free in\n nsIDocument::GetRootElement (CVE-2013-1685) o\n Heap-use-after-free in mozilla::ResetDir (CVE-2013-1686)\n *\n\n MFSA 2013-51 / CVE-2013-1687: Security researcher\n Mariusz Mlynski reported that it is possible to compile a\n user-defined function in the XBL scope of a specific\n element and then trigger an event within this scope to run\n code. In some circumstances, when this code is run, it can\n access content protected by System Only Wrappers (SOW) and\n chrome-privileged pages. This could potentially lead to\n arbitrary code execution. Additionally, Chrome Object\n Wrappers (COW) can be bypassed by web content to access\n privileged methods, leading to a cross-site scripting (XSS)\n attack from privileged pages.\n\n *\n\n MFSA 2013-53 / CVE-2013-1690: Security researcher\n Nils reported that specially crafted web content using the\n onreadystatechange event and reloading of pages could\n sometimes cause a crash when unmapped memory is executed.\n This crash is potentially exploitable.\n\n *\n\n MFSA 2013-54 / CVE-2013-1692: Security researcher\n Johnathan Kuskos reported that Firefox is sending data in\n the body of XMLHttpRequest (XHR) HEAD requests, which goes\n agains the XHR specification. This can potentially be used\n for Cross-Site Request Forgery (CSRF) attacks against sites\n which do not distinguish between HEAD and POST requests.\n\n *\n\n MFSA 2013-55 / CVE-2013-1693: Security researcher\n Paul Stone of Context Information Security discovered that\n timing differences in the processing of SVG format images\n with filters could allow for pixel values to be read. This\n could potentially allow for text values to be read across\n domains, leading to information disclosure.\n\n *\n\n MFSA 2013-59 / CVE-2013-1697: Mozilla security\n researcher moz_bug_r_a4 reported that XrayWrappers can be\n bypassed to call content-defined toString and valueOf\n methods through DefaultValue. This can lead to unexpected\n behavior when privileged code acts on the incorrect values.\n\n *\n\n MFSA 2013-30: Mozilla developers identified and fixed\n several memory safety bugs in the browser engine used in\n Firefox and other Mozilla-based products. Some of these\n bugs showed evidence of memory corruption under certain\n circumstances, and we presume that with enough effort at\n least some of these could be exploited to run arbitrary\n code.\n\n Olli Pettay, Jesse Ruderman, Boris Zbarsky, Christian\n Holler, Milan Sreckovic, and Joe Drew reported memory\n safety problems and crashes that affect Firefox ESR 17, and\n Firefox 19. (CVE-2013-0788)\n\n *\n\n MFSA 2013-31 / CVE-2013-0800: Security researcher\n Abhishek Arya (Inferno) of the Google Chrome Security Team\n used the Address Sanitizer tool to discover an\n out-of-bounds write in Cairo graphics library. When certain\n values are passed to it during rendering, Cairo attempts to\n use negative boundaries or sizes for boxes, leading to a\n potentially exploitable crash in some instances.\n\n *\n\n MFSA 2013-32 / CVE-2013-0799: Security researcher\n Frederic Hoguin discovered that the Mozilla Maintenance\n Service on Windows was vulnerable to a buffer overflow.\n This system is used to update software without invoking the\n User Account Control (UAC) prompt. The Mozilla Maintenance\n Service is configured to allow unprivileged users to start\n it with arbitrary arguments. By manipulating the data\n passed in these arguments, an attacker can execute\n arbitrary code with the system privileges used by the\n service. This issue requires local file system access to be\n exploitable.\n\n *\n\n MFSA 2013-34 / CVE-2013-0797: Security researcher Ash\n reported an issue with the Mozilla Updater. The Mozilla\n Updater can be made to load a malicious local DLL file in a\n privileged context through either the Mozilla Maintenance\n Service or independently on systems that do not use the\n service. This occurs when the DLL file is placed in a\n specific location on the local system before the Mozilla\n Updater is run. Local file system access is necessary in\n order for this issue to be exploitable.\n\n *\n\n MFSA 2013-35 / CVE-2013-0796: Security researcher\n miaubiz used the Address Sanitizer tool to discover a crash\n in WebGL rendering when memory is freed that has not\n previously been allocated. This issue only affects Linux\n users who have Intel Mesa graphics drivers. The resulting\n crash could be potentially exploitable.\n\n *\n\n MFSA 2013-36 / CVE-2013-0795: Security researcher\n Cody Crews reported a mechanism to use the cloneNode method\n to bypass System Only Wrappers (SOW) and clone a protected\n node. This allows violation of the browser's same origin\n policy and could also lead to privilege escalation and the\n execution of arbitrary code.\n\n *\n\n MFSA 2013-37 / CVE-2013-0794: Security researcher\n shutdown reported a method for removing the origin\n indication on tab-modal dialog boxes in combination with\n browser navigation. This could allow an attacker's dialog\n to overlay a page and show another site's content. This can\n be used for phishing by allowing users to enter data into a\n modal prompt dialog on an attacking, site while appearing\n to be from the displayed site.\n\n *\n\n MFSA 2013-38 / CVE-2013-0793: Security researcher\n Mariusz Mlynski reported a method to use browser\n navigations through history to load an arbitrary website\n with that page's baseURI property pointing to another site\n instead of the seemingly loaded one. The user will continue\n to see the incorrect site in the addressbar of the browser.\n This allows for a cross-site scripting (XSS) attack or the\n theft of data through a phishing attack.\n\n *\n\n MFSA 2013-39 / CVE-2013-0792: Mozilla community\n member Tobias Schula reported that if\n gfx.color_management.enablev4 preference is enabled\n manually in about:config, some grayscale PNG images will be\n rendered incorrectly and cause memory corruption during PNG\n decoding when certain color profiles are in use. A crafted\n PNG image could use this flaw to leak data through rendered\n images drawing from random memory. By default, this\n preference is not enabled.\n\n *\n\n MFSA 2013-40 / CVE-2013-0791: Mozilla community\n member Ambroz Bizjak reported an out-of-bounds array read\n in the CERT_DecodeCertPackage function of the Network\n Security Services (NSS) libary when decoding a certificate.\n When this occurs, it will lead to memory corruption and a\n non-exploitable crash.\n\n *\n\n MFSA 2013-41: Mozilla developers identified and fixed\n several memory safety bugs in the browser engine used in\n Firefox and other Mozilla-based products. Some of these\n bugs showed evidence of memory corruption under certain\n circumstances, and we presume that with enough effort at\n least some of these could be exploited to run arbitrary\n code.\n\n References\n\n o Christoph Diehl, Christian Holler, Jesse\n Ruderman, Timothy Nikkel, and Jeff Walden reported memory\n safety problems and crashes that affect Firefox ESR 17, and\n Firefox 20. o Bob Clary, Ben Turner, Benoit Jacob, Bobby\n Holley, Christoph Diehl, Christian Holler, Andrew\n McCreight, Gary Kwong, Jason Orendorff, Jesse Ruderman,\n Matt Wobensmith, and Mats Palmgren reported memory safety\n problems and crashes that affect Firefox 20.\n *\n\n MFSA 2013-42 / CVE-2013-1670: Security researcher\n Cody Crews reported a method to call a content level\n constructor that allows for this constructor to have chrome\n privileged accesss. This affects chrome object wrappers\n (COW) and allows for write actions on objects when only\n read actions should be allowed. This can lead to cross-site\n scripting (XSS) attacks.\n\n *\n\n MFSA 2013-43 / CVE-2013-1671: Mozilla security\n researcher moz_bug_r_a4 reported a mechanism to exploit the\n control when set to the file type in order to get the full\n path. This can lead to information leakage and could be\n combined with other exploits to target attacks on the local\n file system.\n\n *\n\n MFSA 2013-44 / CVE-2013-1672: Security researcher Seb\n Patane reported an issue with the Mozilla Maintenance\n Service on Windows. This issue allows unprivileged users to\n local privilege escalation through the system privileges\n used by the service when interacting with local malicious\n software. This allows the user to bypass integrity checks\n leading to local privilege escalation. Local file system\n access is necessary in order for this issue to be\n exploitable and it cannot be triggered through web content.\n\n *\n\n MFSA 2013-45: Security researcher Robert Kugler\n discovered that in some instances the Mozilla Maintenance\n Service on Windows will be vulnerable to some previously\n fixed privilege escalation attacks that allowed for local\n privilege escalation. This was caused by the Mozilla\n Updater not updating Windows Registry entries for the\n Mozilla Maintenance Service, which fixed the earlier issues\n present if Firefox 12 had been installed. New installations\n of Firefox after version 12 are not affected by this issue.\n Local file system access is necessary in order for this\n issue to be exploitable and it cannot be triggered through\n web content. References: - old MozillaMaintenance Service\n registry entry not updated leading to Trusted Path\n Privilege Escalation (CVE-2013-1673) - Possible Arbitrary\n Code Execution by Update Service (CVE-2012-1942)\n\n *\n\n MFSA 2013-46 / CVE-2013-1674: Security researcher\n Nils reported a use-after-free when resizing video while\n playing. This could allow for arbitrary code execution.\n\n *\n\n MFSA 2013-47 / CVE-2013-1675: Mozilla community\n member Ms2ger discovered that some DOMSVGZoomEvent\n functions are used without being properly initialized,\n causing uninitialized memory to be used when they are\n called by web content. This could lead to a information\n leakage to sites depending on the contents of this\n uninitialized memory.\n\n *\n\n MFSA 2013-48: Security researcher Abhishek Arya\n (Inferno) of the Google Chrome Security Team used the\n Address Sanitizer tool to discover a series of\n use-after-free, out of bounds read, and invalid write\n problems rated as moderate to critical as security issues\n in shipped software. Some of these issues are potentially\n exploitable, allowing for remote code execution. We would\n also like to thank Abhishek for reporting additional\n use-after-free flaws in dir=auto code introduced during\n Firefox development. These were fixed before general\n release.\n\n References\n\n o Out of Bounds Read in\n SelectionIterator::GetNextSegment (CVE-2013-1676) o\n Out-of-bound read in gfxSkipCharsIterator::SetOffsets\n (CVE-2013-1677)) o Invalid write in\n _cairo_xlib_surface_add_glyph (CVE-2013-1678) o\n Heap-use-after-free in\n mozilla::plugins::child::_geturlnotify (CVE-2013-1679) o\n Heap-use-after-free in nsFrameList::FirstChild\n (CVE-2013-1680) o Heap-use-after-free in\n nsContentUtils::RemoveScriptBlocker (CVE-2013-1681)\n *\n\n CVE-2012-1942\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1942\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1942</a>\n >\n\n * CVE-2013-0788\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0788\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0788</a>\n >\n * CVE-2013-0791\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0791\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0791</a>\n >\n * CVE-2013-0792\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0792\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0792</a>\n >\n * CVE-2013-0793\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0793\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0793</a>\n >\n * CVE-2013-0794\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0794\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0794</a>\n >\n * CVE-2013-0795\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0795\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0795</a>\n >\n * CVE-2013-0796\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0796\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0796</a>\n >\n * CVE-2013-0797\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0797\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0797</a>\n >\n * CVE-2013-0798\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0798\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0798</a>\n >\n * CVE-2013-0799\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0799\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0799</a>\n >\n * CVE-2013-0800\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0800\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0800</a>\n >\n * CVE-2013-0801\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0801\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0801</a>\n >\n * CVE-2013-1669\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1669\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1669</a>\n >\n * CVE-2013-1670\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1670\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1670</a>\n >\n * CVE-2013-1671\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1671\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1671</a>\n >\n * CVE-2013-1672\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1672\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1672</a>\n >\n * CVE-2013-1673\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1673\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1673</a>\n >\n * CVE-2013-1674\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1674\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1674</a>\n >\n * CVE-2013-1675\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1675\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1675</a>\n >\n * CVE-2013-1676\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1676\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1676</a>\n >\n * CVE-2013-1677\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1677\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1677</a>\n >\n * CVE-2013-1678\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1678\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1678</a>\n >\n * CVE-2013-1679\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1679\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1679</a>\n >\n * CVE-2013-1680\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1680\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1680</a>\n >\n * CVE-2013-1681\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1681\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1681</a>\n >\n * CVE-2013-1682\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1682\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1682</a>\n >\n * CVE-2013-1684\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1684\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1684</a>\n >\n * CVE-2013-1685\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1685\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1685</a>\n >\n * CVE-2013-1686\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1686\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1686</a>\n >\n * CVE-2013-1687\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1687\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1687</a>\n >\n * CVE-2013-1690\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1690\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1690</a>\n >\n * CVE-2013-1692\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1692\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1692</a>\n >\n * CVE-2013-1693\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1693\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1693</a>\n >\n * CVE-2013-1697\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1697\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1697</a>\n >\n\n", "published": "2013-07-05T22:04:14", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html", "cvelist": ["CVE-2013-1687", "CVE-2013-1692", "CVE-2013-0797", "CVE-2013-1671", "CVE-2013-1678", "CVE-2013-1670", "CVE-2013-0791", "CVE-2013-1685", "CVE-2013-1697", "CVE-2013-0794", "CVE-2013-1680", "CVE-2013-0795", "CVE-2013-1679", "CVE-2013-0798", "CVE-2013-0796", "CVE-2013-0800", "CVE-2013-1672", "CVE-2013-1681", "CVE-2013-0788", "CVE-2013-1673", "CVE-2013-1690", "CVE-2013-0801", "CVE-2013-1669", "CVE-2013-1684", "CVE-2013-1676", "CVE-2013-0799", "CVE-2013-1675", "CVE-2013-1686", "CVE-2012-1942", "CVE-2013-1682", "CVE-2013-1674", "CVE-2013-0792", "CVE-2013-1693", "CVE-2013-1677", "CVE-2013-0793"], "lastseen": "2016-09-04T11:21:38"}, {"id": "OPENSUSE-SU-2013:0631-1", "type": "suse", "title": "Mozilla Firefox and others: Update to 20.0/17.0.5 releases (important)", "description": "The Mozilla suite received security and bugfix updates:\n\n Firefox was updated to version 20.0. Thunderbird was\n updated to version 17.0.5. Seamonkey was updated to version\n 2.17 mozilla-nss was updated to version 3.14.3.\n mozilla-nspr was updated to version 4.9.6.\n\n mozilla-nspr was updated to version 4.9.6:\n * aarch64 support\n * added PL_SizeOfArenaPoolExcludingPool function\n (bmo#807883)\n * Auto detect android api version for x86 (bmo#782214)\n * Initialize Windows CRITICAL_SECTIONs without debug info\n and with nonzero spin count (bmo#812085) Previous update\n to version 4.9.5\n * bmo#634793: define NSPR's exact-width integer types\n PRInt{N} and PRUint{N} types to match the <stdint.h>\n exact-width integer types int{N}_t and uint{N}_t.\n * bmo#782815: passing 'int *' to parameter of type\n 'unsigned int *' in setsockopt().\n * bmo#822932: Port bmo#802527 (NDK r8b support for x86) to\n NSPR.\n * bmo#824742: NSPR shouldn't require librt on Android.\n * bmo#831793: data race on lib->refCount in\n PR_UnloadLibrary.\n\n mozilla-nss was updated to version 3.14.3:\n * disable tests with expired certificates\n * add SEC_PKCS7VerifyDetachedSignatureAtTime using patch\n from mozilla tree to fulfill Firefox 21 requirements\n\n * No new major functionality is introduced in this release.\n This release is a patch release to address CVE-2013-1620\n (bmo#822365)\n * "certutil -a" was not correctly producing ASCII output as\n requested. (bmo#840714)\n * NSS 3.14.2 broke compilation with older versions of\n sqlite that lacked the SQLITE_FCNTL_TEMPFILENAME file\n control. NSS 3.14.3 now properly compiles when used with\n older versions of sqlite (bmo#837799) - remove\n system-sqlite.patch\n * add aarch64 support\n\n * added system-sqlite.patch (bmo#837799)\n * do not depend on latest sqlite just for a #define\n * enable system sqlite usage again\n\n * update to 3.14.2\n * required for Firefox >= 20\n * removed obsolete nssckbi update patch\n * MFSA 2013-40/CVE-2013-0791 (bmo#629816) Out-of-bounds\n array read in CERT_DecodeCertPackage\n * disable system sqlite usage since we depend on 3.7.15\n which is not provided in any openSUSE distribution\n * add nss-sqlitename.patch to avoid any name clash\n\n Changes in MozillaFirefox:\n - update to Firefox 20.0 (bnc#813026)\n * requires NSPR 4.9.5 and NSS 3.14.3\n * MFSA 2013-30/CVE-2013-0788/CVE-2013-0789 Miscellaneous\n memory safety hazards\n * MFSA 2013-31/CVE-2013-0800 (bmo#825721) Out-of-bounds\n write in Cairo library\n * MFSA 2013-35/CVE-2013-0796 (bmo#827106) WebGL crash\n with Mesa graphics driver on Linux\n * MFSA 2013-36/CVE-2013-0795 (bmo#825697) Bypass of SOW\n protections allows cloning of protected nodes\n * MFSA 2013-37/CVE-2013-0794 (bmo#626775) Bypass of\n tab-modal dialog origin disclosure\n * MFSA 2013-38/CVE-2013-0793 (bmo#803870) Cross-site\n scripting (XSS) using timed history navigations\n * MFSA 2013-39/CVE-2013-0792 (bmo#722831) Memory\n corruption while rendering grayscale PNG images\n - use GStreamer 1.0 starting with 12.3\n (mozilla-gstreamer-1.patch)\n - build fixes for armv7hl:\n * disable debug build as armv7hl does not have enough\n memory\n * disable webrtc on armv7hl as it is non-compiling\n\n Changes in MozillaThunderbird:\n - update to Thunderbird 17.0.5 (bnc#813026)\n * requires NSPR 4.9.5 and NSS 3.14.3\n * MFSA 2013-30/CVE-2013-0788/CVE-2013-0789 Miscellaneous\n memory safety hazards\n * MFSA 2013-31/CVE-2013-0800 (bmo#825721) Out-of-bounds\n write in Cairo library\n * MFSA 2013-35/CVE-2013-0796 (bmo#827106) WebGL crash\n with Mesa graphics driver on Linux\n * MFSA 2013-36/CVE-2013-0795 (bmo#825697) Bypass of SOW\n protections allows cloning of protected nodes\n * MFSA 2013-38/CVE-2013-0793 (bmo#803870) Cross-site\n scripting (XSS) using timed history navigations\n\n Changes in seamonkey:\n - update to SeaMonkey 2.17 (bnc#813026)\n * requires NSPR 4.9.5 and NSS 3.14.3\n * MFSA 2013-30/CVE-2013-0788/CVE-2013-0789 Miscellaneous\n memory safety hazards\n * MFSA 2013-31/CVE-2013-0800 (bmo#825721) Out-of-bounds\n write in Cairo library\n * MFSA 2013-35/CVE-2013-0796 (bmo#827106) WebGL crash\n with Mesa graphics driver on Linux\n * MFSA 2013-36/CVE-2013-0795 (bmo#825697) Bypass of SOW\n protections allows cloning of protected nodes\n * MFSA 2013-37/CVE-2013-0794 (bmo#626775) Bypass of\n tab-modal dialog origin disclosure\n * MFSA 2013-38/CVE-2013-0793 (bmo#803870) Cross-site\n scripting (XSS) using timed history navigations\n * MFSA 2013-39/CVE-2013-0792 (bmo#722831) Memory\n corruption while rendering grayscale PNG images\n - use GStreamer 1.0 starting with 12.3\n (mozilla-gstreamer-1.patch)\n\n", "published": "2013-04-05T18:06:10", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00010.html", "cvelist": ["CVE-2013-0791", "CVE-2013-0794", "CVE-2013-0795", "CVE-2013-0796", "CVE-2013-0800", "CVE-2013-0788", "CVE-2013-0789", "CVE-2013-0792", "CVE-2013-0793", "CVE-2013-1620"], "lastseen": "2016-09-04T11:38:24"}, {"id": "OPENSUSE-SU-2013:0630-1", "type": "suse", "title": "Mozilla Firefox and others: Update to Firefox 20.0 release (important)", "description": "The Mozilla suite received security and bugfix updates:\n\n Mozilla Firefox was updated to version 20.0. Mozilla\n Thunderbird was updated to version 17.0.5. Mozilla\n Seamonkey was updated to version 17.0.5. Mozilla XULRunner\n was updated to version 17.0.5. mozilla-nss was updated to\n version 3.14.3. mozilla-nspr was updated to version 4.9.6.\n\n mozilla-nspr was updated to version 4.9.6:\n * aarch64 support\n * added PL_SizeOfArenaPoolExcludingPool function\n (bmo#807883)\n * Auto detect android api version for x86 (bmo#782214)\n * Initialize Windows CRITICAL_SECTIONs without debug info\n and with nonzero spin count (bmo#812085) Previous update\n to version 4.9.5\n * bmo#634793: define NSPR's exact-width integer types\n PRInt{N} and PRUint{N} types to match the <stdint.h>\n exact-width integer types int{N}_t and uint{N}_t.\n * bmo#782815: passing 'int *' to parameter of type\n 'unsigned int *' in setsockopt().\n * bmo#822932: Port bmo#802527 (NDK r8b support for x86) to\n NSPR.\n * bmo#824742: NSPR shouldn't require librt on Android.\n * bmo#831793: data race on lib->refCount in\n PR_UnloadLibrary.\n\n mozilla-nss was updated to version 3.14.3:\n * disable tests with expired certificates\n * add SEC_PKCS7VerifyDetachedSignatureAtTime using patch\n from mozilla tree to fulfill Firefox 21 requirements\n\n * No new major functionality is introduced in this release.\n This release is a patch release to address CVE-2013-1620\n (bmo#822365)\n * "certutil -a" was not correctly producing ASCII output as\n requested. (bmo#840714)\n * NSS 3.14.2 broke compilation with older versions of\n sqlite that lacked the SQLITE_FCNTL_TEMPFILENAME file\n control. NSS 3.14.3 now properly compiles when used with\n older versions of sqlite (bmo#837799) - remove\n system-sqlite.patch\n * add arm aarch64 support\n\n * added system-sqlite.patch (bmo#837799)\n * do not depend on latest sqlite just for a #define\n * enable system sqlite usage again\n\n * update to 3.14.2\n * required for Firefox >= 20\n * removed obsolete nssckbi update patch\n * MFSA 2013-40/CVE-2013-0791 (bmo#629816) Out-of-bounds\n array read in CERT_DecodeCertPackage\n * disable system sqlite usage since we depend on 3.7.15\n which is not provided in any openSUSE distribution\n * add nss-sqlitename.patch to avoid any name clash\n\n Changes in MozillaFirefox:\n - update to Firefox 20.0 (bnc#813026)\n * requires NSPR 4.9.5 and NSS 3.14.3\n * MFSA 2013-30/CVE-2013-0788/CVE-2013-0789 Miscellaneous\n memory safety hazards\n * MFSA 2013-31/CVE-2013-0800 (bmo#825721) Out-of-bounds\n write in Cairo library\n * MFSA 2013-35/CVE-2013-0796 (bmo#827106) WebGL crash\n with Mesa graphics driver on Linux\n * MFSA 2013-36/CVE-2013-0795 (bmo#825697) Bypass of SOW\n protections allows cloning of protected nodes\n * MFSA 2013-37/CVE-2013-0794 (bmo#626775) Bypass of\n tab-modal dialog origin disclosure\n * MFSA 2013-38/CVE-2013-0793 (bmo#803870) Cross-site\n scripting (XSS) using timed history navigations\n * MFSA 2013-39/CVE-2013-0792 (bmo#722831) Memory\n corruption while rendering grayscale PNG images\n - use GStreamer 1.0 starting with 12.3\n (mozilla-gstreamer-1.patch)\n - build fixes for armv7hl:\n * disable debug build as armv7hl does not have enough\n memory\n * disable webrtc on armv7hl as it is non-compiling\n\n Changes in MozillaThunderbird:\n - update to Thunderbird 17.0.5 (bnc#813026)\n * requires NSPR 4.9.5 and NSS 3.14.3\n * MFSA 2013-30/CVE-2013-0788/CVE-2013-0789 Miscellaneous\n memory safety hazards\n * MFSA 2013-31/CVE-2013-0800 (bmo#825721) Out-of-bounds\n write in Cairo library\n * MFSA 2013-35/CVE-2013-0796 (bmo#827106) WebGL crash\n with Mesa graphics driver on Linux\n * MFSA 2013-36/CVE-2013-0795 (bmo#825697) Bypass of SOW\n protections allows cloning of protected nodes\n * MFSA 2013-38/CVE-2013-0793 (bmo#803870) Cross-site\n scripting (XSS) using timed history navigations\n\n Changes in seamonkey:\n - update to SeaMonkey 2.17 (bnc#813026)\n * requires NSPR 4.9.5 and NSS 3.14.3\n * MFSA 2013-30/CVE-2013-0788/CVE-2013-0789 Miscellaneous\n memory safety hazards\n * MFSA 2013-31/CVE-2013-0800 (bmo#825721) Out-of-bounds\n write in Cairo library\n * MFSA 2013-35/CVE-2013-0796 (bmo#827106) WebGL crash\n with Mesa graphics driver on Linux\n * MFSA 2013-36/CVE-2013-0795 (bmo#825697) Bypass of SOW\n protections allows cloning of protected nodes\n * MFSA 2013-37/CVE-2013-0794 (bmo#626775) Bypass of\n tab-modal dialog origin disclosure\n * MFSA 2013-38/CVE-2013-0793 (bmo#803870) Cross-site\n scripting (XSS) using timed history navigations\n * MFSA 2013-39/CVE-2013-0792 (bmo#722831) Memory\n corruption while rendering grayscale PNG images\n - use GStreamer 1.0 starting with 12.3\n (mozilla-gstreamer-1.patch)\n\n Changes in xulrunner:\n - update to 17.0.5esr (bnc#813026)\n * requires NSPR 4.9.5 and NSS 3.14.3\n * MFSA 2013-30/CVE-2013-0788 Miscellaneous memory safety\n hazards\n * MFSA 2013-31/CVE-2013-0800 (bmo#825721) Out-of-bounds\n write in Cairo library\n * MFSA 2013-35/CVE-2013-0796 (bmo#827106) WebGL crash\n with Mesa graphics driver on Linux\n * MFSA 2013-36/CVE-2013-0795 (bmo#825697) Bypass of SOW\n protections allows cloning of protected nodes\n * MFSA 2013-37/CVE-2013-0794 (bmo#626775) Bypass of\n tab-modal dialog origin disclosure\n * MFSA 2013-38/CVE-2013-0793 (bmo#803870) Cross-site\n scripting (XSS) using timed history navigations\n\n", "published": "2013-04-05T15:06:14", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html", "cvelist": ["CVE-2013-0791", "CVE-2013-0794", "CVE-2013-0795", "CVE-2013-0796", "CVE-2013-0800", "CVE-2013-0788", "CVE-2013-0789", "CVE-2013-0792", "CVE-2013-0793", "CVE-2013-1620"], "lastseen": "2016-09-04T11:48:10"}, {"id": "OPENSUSE-SU-2014:1100-1", "type": "suse", "title": "Firefox update to 31.1esr (important)", "description": "This patch contains security updates for\n\n * mozilla-nss 3.16.4\n - The following 1024-bit root CA certificate was restored to allow more\n time to develop a better transition strategy for affected sites. It\n was removed in NSS 3.16.3, but discussion in the\n mozilla.dev.security.policy forum led to the decision to keep this\n root included longer in order to give website administrators more time\n to update their web servers.\n - CN = GTE CyberTrust Global Root\n * In NSS 3.16.3, the 1024-bit "Entrust.net Secure Server Certification\n Authority" root CA certificate was removed. In NSS 3.16.4, a 2048-bit\n intermediate CA certificate has been included, without explicit trust.\n The intention is to mitigate the effects of the previous removal of\n the 1024-bit Entrust.net root certificate, because many public\n Internet sites still use the "USERTrust Legacy Secure Server CA"\n intermediate certificate that is signed by the 1024-bit Entrust.net\n root certificate. The inclusion of the intermediate certificate is a\n temporary measure to allow those sites to function, by allowing them\n to find a trust path to another 2048-bit root CA certificate. The\n temporarily included intermediate certificate expires November 1, 2015.\n\n * Firefox 31.1esr Firefox is updated from 24esr to 31esr as maintenance\n for version 24 stopped\n\n", "published": "2014-09-09T18:04:16", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html", "cvelist": ["CVE-2012-1945", "CVE-2011-3648", "CVE-2014-1505", "CVE-2014-1536", "CVE-2011-0061", "CVE-2011-0077", "CVE-2014-1513", "CVE-2012-0478", "CVE-2012-4193", "CVE-2012-0442", "CVE-2013-5601", "CVE-2013-1687", "CVE-2013-5612", "CVE-2013-1692", "CVE-2010-0654", "CVE-2012-1962", "CVE-2013-0743", "CVE-2012-0443", "CVE-2012-5842", "CVE-2012-4212", "CVE-2013-5595", "CVE-2010-0176", "CVE-2014-1530", "CVE-2011-0083", "CVE-2010-1203", "CVE-2013-1737", "CVE-2012-4214", "CVE-2008-1236", "CVE-2013-5611", "CVE-2012-1970", "CVE-2008-3835", "CVE-2013-1709", "CVE-2007-3738", "CVE-2012-3989", "CVE-2013-5616", "CVE-2013-1678", "CVE-2010-2762", "CVE-2012-5830", "CVE-2013-0763", "CVE-2014-1510", "CVE-2011-3026", "CVE-2012-0460", "CVE-2013-5613", "CVE-2012-1973", "CVE-2014-1522", "CVE-2011-3654", "CVE-2014-1567", "CVE-2012-1974", "CVE-2010-2766", "CVE-2012-4195", "CVE-2012-3986", "CVE-2013-0783", "CVE-2007-3734", "CVE-2011-2371", "CVE-2014-1481", "CVE-2013-1670", "CVE-2012-4185", "CVE-2010-3777", "CVE-2012-3991", "CVE-2013-1719", "CVE-2012-3968", "CVE-2013-1725", "CVE-2012-3963", "CVE-2014-1539", "CVE-2010-0174", "CVE-2012-0452", "CVE-2013-1735", "CVE-2012-1956", "CVE-2014-1487", "CVE-2012-3978", "CVE-2012-3985", "CVE-2013-0746", "CVE-2012-5829", "CVE-2009-1571", "CVE-2012-1944", "CVE-2012-5838", "CVE-2011-2986", "CVE-2010-1205", "CVE-2014-1538", "CVE-2012-4213", "CVE-2013-1685", "CVE-2012-0479", "CVE-2013-5609", "CVE-2007-3737", "CVE-2013-0766", "CVE-2007-3736", "CVE-2012-1940", "CVE-2013-1697", "CVE-2014-1484", "CVE-2014-1525", "CVE-2012-3993", "CVE-2013-5619", "CVE-2012-5837", "CVE-2008-5500", "CVE-2012-5836", "CVE-2014-1509", "CVE-2009-0772", "CVE-2013-0787", "CVE-2012-3995", "CVE-2012-4201", "CVE-2010-0159", "CVE-2009-0773", "CVE-2011-3659", "CVE-2011-3663", "CVE-2014-1494", "CVE-2014-1559", "CVE-2013-0747", "CVE-2012-0470", "CVE-2012-0446", "CVE-2008-4063", "CVE-2014-1537", "CVE-2013-1694", "CVE-2014-1523", "CVE-2012-1972", "CVE-2010-1200", "CVE-2010-0175", "CVE-2012-3988", "CVE-2012-0457", "CVE-2010-3778", "CVE-2012-3994", "CVE-2013-5615", "CVE-2013-1680", "CVE-2012-3962", "CVE-2012-0459", "CVE-2011-2362", "CVE-2014-1529", "CVE-2013-1724", "CVE-2010-1213", "CVE-2013-5597", "CVE-2012-5843", "CVE-2014-1543", "CVE-2014-1486", "CVE-2011-0085", "CVE-2013-5590", "CVE-2008-5510", "CVE-2011-0080", "CVE-2013-0780", "CVE-2008-5502", "CVE-2010-3765", "CVE-2013-1732", "CVE-2013-0744", "CVE-2013-0795", "CVE-2008-1237", "CVE-2013-1720", "CVE-2008-4070", "CVE-2013-0748", "CVE-2012-4183", "CVE-2010-3178", "CVE-2013-1679", "CVE-2007-3285", "CVE-2013-5610", "CVE-2013-0768", "CVE-2011-3661", "CVE-2012-4181", "CVE-2014-1532", "CVE-2013-6671", "CVE-2009-0040", "CVE-2011-3652", "CVE-2013-0755", "CVE-2008-4067", "CVE-2014-1548", "CVE-2011-2364", "CVE-2014-1531", "CVE-2013-0752", "CVE-2012-4186", "CVE-2014-1508", "CVE-2012-1948", "CVE-2008-5012", "CVE-2012-1938", "CVE-2013-0796", "CVE-2012-0449", "CVE-2010-3769", "CVE-2012-3969", "CVE-2014-1502", "CVE-2013-1723", "CVE-2013-0782", "CVE-2012-1953", "CVE-2012-1949", "CVE-2014-1542", "CVE-2012-0456", "CVE-2011-2372", "CVE-2010-3169", "CVE-2012-3970", "CVE-2011-0053", "CVE-2012-5840", "CVE-2010-3176", "CVE-2012-4191", "CVE-2010-3174", "CVE-2010-3768", "CVE-2014-1477", "CVE-2013-0800", "CVE-2010-1212", "CVE-2013-1681", "CVE-2010-1211", "CVE-2010-1121", "CVE-2013-0773", "CVE-2013-0754", "CVE-2010-3167", "CVE-2012-4202", "CVE-2010-3180", "CVE-2012-3957", "CVE-2011-3660", "CVE-2014-1540", "CVE-2014-1534", "CVE-2012-1941", "CVE-2013-1738", "CVE-2014-1482", "CVE-2014-1479", "CVE-2008-4066", "CVE-2008-5018", "CVE-2012-3984", "CVE-2014-1504", "CVE-2012-0444", "CVE-2011-3650", "CVE-2014-1511", "CVE-2010-2753", "CVE-2012-1946", "CVE-2010-3776", "CVE-2012-4182", "CVE-2008-1233", "CVE-2012-4187", "CVE-2012-3983", "CVE-2011-0062", "CVE-2008-0016", "CVE-2011-3101", "CVE-2010-3168", "CVE-2013-0788", "CVE-2013-1728", "CVE-2014-1545", "CVE-2010-0173", "CVE-2012-0472", "CVE-2013-5592", "CVE-2013-1730", "CVE-2008-4059", "CVE-2010-2764", "CVE-2014-1492", "CVE-2011-0081", "CVE-2009-0771", "CVE-2007-3670", "CVE-2012-1954", "CVE-2009-0774", "CVE-2014-1556", "CVE-2012-0461", "CVE-2011-2376", "CVE-2012-3958", "CVE-2012-0469", "CVE-2014-1563", "CVE-2014-1524", "CVE-2014-1512", "CVE-2012-1975", "CVE-2011-0075", "CVE-2013-1690", "CVE-2012-0464", "CVE-2013-0775", "CVE-2012-1967", "CVE-2013-5604", "CVE-2014-1514", "CVE-2010-3166", "CVE-2011-0074", "CVE-2013-0801", "CVE-2012-3956", "CVE-2010-2769", "CVE-2012-3982", "CVE-2009-3555", "CVE-2013-1714", "CVE-2011-2989", "CVE-2010-1196", "CVE-2008-5021", "CVE-2008-5017", "CVE-2013-0769", "CVE-2012-3966", "CVE-2013-0771", "CVE-2014-1490", "CVE-2012-5839", "CVE-2013-0757", "CVE-2014-1498", "CVE-2012-1961", "CVE-2010-3173", "CVE-2012-4216", "CVE-2008-4062", "CVE-2010-3179", "CVE-2010-0182", "CVE-2014-1565", "CVE-2012-3967", "CVE-2013-0749", "CVE-2011-3651", "CVE-2008-4060", "CVE-2007-3656", "CVE-2008-1234", "CVE-2012-1951", "CVE-2012-0475", "CVE-2014-1555", "CVE-2014-1564", "CVE-2012-1952", "CVE-2010-1201", "CVE-2013-0761", "CVE-2013-1669", "CVE-2010-1585", "CVE-2012-3959", "CVE-2012-0455", "CVE-2014-1558", "CVE-2011-0084", "CVE-2012-0759", "CVE-2007-3089", "CVE-2014-1519", "CVE-2013-1701", "CVE-2012-0474", "CVE-2012-3975", "CVE-2010-2768", "CVE-2008-5014", "CVE-2013-1684", "CVE-2008-4058", "CVE-2012-4184", "CVE-2012-0447", "CVE-2014-1547", "CVE-2011-3232", "CVE-2012-4205", "CVE-2014-1480", "CVE-2014-1500", "CVE-2011-0069", "CVE-2013-6630", "CVE-2008-5022", "CVE-2008-5512", "CVE-2014-1497", "CVE-2013-5596", "CVE-2012-3992", "CVE-2008-1235", "CVE-2013-1676", "CVE-2013-0789", "CVE-2008-5501", "CVE-2008-4068", "CVE-2008-5016", "CVE-2013-1675", "CVE-2014-1478", "CVE-2012-3980", "CVE-2008-5503", "CVE-2011-2374", "CVE-2012-1955", "CVE-2012-1960", "CVE-2012-0445", "CVE-2012-0462", "CVE-2012-4217", "CVE-2013-1686", "CVE-2013-0745", "CVE-2013-0756", "CVE-2012-4218", "CVE-2013-0760", "CVE-2011-2377", "CVE-2014-1485", "CVE-2014-1493", "CVE-2007-3735", "CVE-2011-3000", "CVE-2010-2765", "CVE-2014-1544", "CVE-2010-2767", "CVE-2011-0078", "CVE-2012-3960", "CVE-2010-3175", "CVE-2012-0451", "CVE-2011-3655", "CVE-2012-4180", "CVE-2013-0767", "CVE-2010-3182", "CVE-2009-0776", "CVE-2013-5603", "CVE-2012-1959", "CVE-2011-2363", "CVE-2011-0070", "CVE-2013-1682", "CVE-2012-1947", "CVE-2013-6673", "CVE-2013-1674", "CVE-2013-0762", "CVE-2014-1562", "CVE-2010-3170", "CVE-2011-3005", "CVE-2012-4208", "CVE-2011-3658", "CVE-2014-1541", "CVE-2011-2373", "CVE-2008-5511", "CVE-2011-2992", "CVE-2014-1488", "CVE-2012-1957", "CVE-2012-1958", "CVE-2008-4064", "CVE-2012-1976", "CVE-2011-1187", "CVE-2012-5835", "CVE-2014-1552", "CVE-2010-3183", "CVE-2010-1202", "CVE-2012-0468", "CVE-2013-5599", "CVE-2014-1553", "CVE-2014-1549", "CVE-2013-1713", "CVE-2008-5508", "CVE-2012-3972", "CVE-2012-4207", "CVE-2011-2988", "CVE-2008-4061", "CVE-2013-5591", "CVE-2010-1199", "CVE-2012-4204", "CVE-2013-5602", "CVE-2011-2985", "CVE-2012-4192", "CVE-2011-2987", "CVE-2012-4188", "CVE-2012-0441", "CVE-2013-0774", "CVE-2008-5024", "CVE-2013-0753", "CVE-2012-5833", "CVE-2014-1557", "CVE-2013-1736", "CVE-2014-1526", "CVE-2013-0776", "CVE-2012-3964", "CVE-2013-5593", "CVE-2014-1550", "CVE-2013-1718", "CVE-2012-5841", "CVE-2014-1533", "CVE-2013-1717", "CVE-2010-2754", "CVE-2008-5507", "CVE-2012-3990", "CVE-2014-1491", "CVE-2013-6672", "CVE-2013-5614", "CVE-2008-4065", "CVE-2013-1693", "CVE-2010-2760", "CVE-2013-0750", "CVE-2012-1937", "CVE-2014-1560", "CVE-2012-4215", "CVE-2013-6629", "CVE-2012-0463", "CVE-2013-1677", "CVE-2011-2991", "CVE-2013-0770", "CVE-2013-0793", "CVE-2012-4179", "CVE-2011-3001", "CVE-2014-1483", "CVE-2014-1489", "CVE-2011-3062", "CVE-2012-0477", "CVE-2013-1722", "CVE-2012-0473", "CVE-2012-4194", "CVE-2011-2365", "CVE-2012-4209", "CVE-2012-1963", "CVE-2012-4196", "CVE-2008-5506", "CVE-2013-1710", "CVE-2012-0467", "CVE-2012-0458", "CVE-2013-0758", "CVE-2013-5600", "CVE-2010-2752", "CVE-2014-1499", "CVE-2014-1518", "CVE-2012-0471", "CVE-2012-3961", "CVE-2014-1561", "CVE-2012-3971", "CVE-2013-0764", "CVE-2014-1528", "CVE-2013-5618", "CVE-2011-0072"], "lastseen": "2016-09-04T12:21:58"}], "gentoo": [{"id": "GLSA-201309-23", "type": "gentoo", "title": "Mozilla Products: Multiple vulnerabilities", "description": "### Background\n\nMozilla Firefox is an open-source web browser and Mozilla Thunderbird an open-source email client, both from the Mozilla Project. The SeaMonkey project is a community effort to deliver production-quality releases of code derived from the application formerly known as the \u2018Mozilla Application Suite\u2019. \n\n### Description\n\nMultiple vulnerabilities have been discovered in Mozilla Firefox, Thunderbird, and SeaMonkey. Please review the CVE identifiers referenced below for details. \n\n### Impact\n\nA remote attacker could entice a user to view a specially crafted web page or email, possibly resulting in execution of arbitrary code or a Denial of Service condition. Further, a remote attacker could conduct XSS attacks, spoof URLs, bypass address space layout randomization, conduct clickjacking attacks, obtain potentially sensitive information, bypass access restrictions, modify the local filesystem, or conduct other unspecified attacks. \n\n### Workaround\n\nThere is no known workaround at this time.\n\n### Resolution\n\nAll Mozilla Firefox users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=www-client/firefox-17.0.9\"\n \n\nAll users of the Mozilla Firefox binary package should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=www-client/firefox-bin-17.0.9\"\n \n\nAll Mozilla Thunderbird users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=mail-client/thunderbird-17.0.9\"\n \n\nAll users of the Mozilla Thunderbird binary package should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose\n \">=mail-client/thunderbird-bin-17.0.9\"\n \n\nAll SeaMonkey users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=www-client/seamonkey-2.21\"\n \n\nAll users of the Mozilla SeaMonkey binary package should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=www-client/seamonkey-bin-2.21\"", "published": "2013-09-27T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://security.gentoo.org/glsa/201309-23", "cvelist": ["CVE-2013-1687", "CVE-2013-1692", "CVE-2013-0797", "CVE-2013-1671", "CVE-2013-1737", "CVE-2013-1709", "CVE-2013-1678", "CVE-2013-0763", "CVE-2013-0777", "CVE-2013-0765", "CVE-2013-0783", "CVE-2013-1670", "CVE-2013-1719", "CVE-2013-1725", "CVE-2013-1735", "CVE-2013-0746", "CVE-2013-0791", "CVE-2013-0766", "CVE-2013-1707", "CVE-2013-1697", "CVE-2013-1705", "CVE-2013-0787", "CVE-2013-0794", "CVE-2013-0747", "CVE-2013-1694", "CVE-2013-1680", "CVE-2013-1724", "CVE-2013-0751", "CVE-2013-0780", "CVE-2013-1732", "CVE-2013-0744", "CVE-2013-0795", "CVE-2013-1720", "CVE-2013-0748", "CVE-2013-1679", "CVE-2013-0778", "CVE-2013-0768", "CVE-2013-0755", "CVE-2013-0752", "CVE-2013-1702", "CVE-2013-0796", "CVE-2013-1723", "CVE-2013-0782", "CVE-2013-1726", "CVE-2013-0800", "CVE-2013-1681", "CVE-2013-0773", "CVE-2013-0754", "CVE-2013-1708", "CVE-2013-1738", "CVE-2013-1712", "CVE-2013-0788", "CVE-2013-1728", "CVE-2013-1730", "CVE-2013-0784", "CVE-2013-1690", "CVE-2013-0775", "CVE-2013-0801", "CVE-2013-1714", "CVE-2013-0769", "CVE-2013-1704", "CVE-2013-0771", "CVE-2013-0757", "CVE-2013-0749", "CVE-2013-0761", "CVE-2013-0779", "CVE-2013-1701", "CVE-2013-1684", "CVE-2013-1676", "CVE-2013-0789", "CVE-2013-0799", "CVE-2013-1675", "CVE-2013-0745", "CVE-2013-0756", "CVE-2013-0760", "CVE-2013-0767", "CVE-2013-1682", "CVE-2013-1674", "CVE-2013-0762", "CVE-2013-0792", "CVE-2013-1713", "CVE-2013-0774", "CVE-2013-0753", "CVE-2013-1736", "CVE-2013-0776", "CVE-2013-1718", "CVE-2013-1717", "CVE-2013-1693", "CVE-2013-0750", "CVE-2013-1677", "CVE-2013-0759", "CVE-2013-0770", "CVE-2013-0793", "CVE-2013-0781", "CVE-2013-0772", "CVE-2013-1722", "CVE-2013-1711", "CVE-2013-1710", "CVE-2013-0758", "CVE-2013-0764"], "lastseen": "2016-09-06T19:47:05"}], "oraclelinux": [{"id": "ELSA-2013-1144", "type": "oraclelinux", "title": "nss, nss-util, nss-softokn, and nspr security update", "description": "nspr\n[4.9.5-2] \n- Update to NSPR_4_9_5_RTM \n- Resolves: rhbz#927186 - Rebase to nspr-4.9.5 \n- Add upstream URL for an existing patch per packaging guidelines \n[4.9.5-1] \n- Resolves: Rebase to nspr-4.9.5 \n[4.9.2-1] \n- Update to nspr-4.9.2 \n- Related: rhbz#863286 \nnss \n[3.14.3-4.0.1.el6_4] \n- Added nss-vendor.patch to change vendor \n[3.14.3-4] \n- Revert to accepting MD5 on digital signatures by default \n- Resolves: rhbz#957603 - nss 3.14 - MD5 hash algorithm disabled \n[3.14.3-3] \n- Ensure pem uses system freebl as with this update freebl brings in new API's \n- Resolves: rhbz#927157 - [RFE][RHEL6] Rebase to nss-3.14.3 to fix the lucky-13 issue \n[3.14.3-2] \n- Install sechash.h and secmodt.h which are now provided by nss-devel \n- Resolves: rhbz#927157 - [RFE][RHEL6] Rebase to nss-3.14.3 to fix the lucky-13 issue \n- Remove unsafe -r option from commands that remove headers already shipped by nss-util and nss-softoken \n[3.14.3-1] \n- Update to NSS_3.14.3_RTM \n- Resolves: rhbz#927157 - [RFE][RHEL6] Rebase to nss-3.14.3 to fix the lucky-13 issue \n- Update expired test certificates (fixed in upstream bug 852781) \n- Sync up pem module's rsawrapr.c with softoken's upstream changes for nss-3.14.3 \n- Reactivate the aia tests \nnss-softokn \n[3.14.3-3] \n- Add patch to conditionally compile according to old or new sqlite api \n- new is used on rhel-6 while rhel-5 uses old but we need the same code for both \n- Resolves: rhbz#927158 - Rebase to nss-softokn 3.14.3 to fix the lucky-13 issue \n[3.14.3-2] \n- Revert to using a code patch for relro support \n- Related: rhbz#927158 \n[3.14.3-1] \n- Update to NSS_3_14_3_RTM \n- Resolves: rhbz#927158 - Rebase to nss-softokn 3.14.3 to fix the lucky-13 issue \n- Add export LD_LIBRARY_PATH=//usr/lib before the signing commands in __spec_install_post scriplet \nto ensure signing tool links with in-tree freebl so verification uses same algorithm as in signing \n- Add %check section to run the upstream crypto reqression test suite as per packaging guidelines \n- Don't install sechash.h or secmodt.h which as per 3.14 are provided by nss-devel \n- Update the licence to MPLv2.0 \n[3.12.9-12] \n- Bootstrapping of the builroot in preparation for rebase to 3.14.3 \n- Remove hasht.h from the %files devel list to prevent update conflicts with nss-util \n- With 3.14.3 hasht.h will be provided by nss-util-devel \n- Related: rhbz#927158 - rebase nss-softokn to 3.14.3 \nnss-util \n[3.14.3-3] \n- Resolves: rhbz#984967 - nssutil_ReadSecmodDB leaks memory \n[3.14.3-2] \n- Revert to accepting MD5 on digital signatures by default \n- Resolves: rhbz#957603 - nss 3.14 - MD5 hash algorithm disabled \n[3.14.3-1] \n- Update to NSS_3_14_3_RTM \n- Resolves: rhbz#927171 - Rebase to 3.14.3 as part of the fix for the lucky-13 issue", "published": "2013-08-07T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "http://linux.oracle.com/errata/ELSA-2013-1144.html", "cvelist": ["CVE-2013-0791", "CVE-2013-1620"], "lastseen": "2016-09-04T11:16:03"}, {"id": "ELSA-2013-1135", "type": "oraclelinux", "title": "nss and nspr security, bug fix, and enhancement update", "description": "nspr\n[4.9.2-4]\n- Resolves: rhbz#924741 - Rebase to nspr-4.9.5\nnss\n[3.14.3-6]\n- Resolves: rhbz#986969 - nssutil_ReadSecmodDB() leaks memory\n[3.14.3-5]\n- Define -DNO_FORK_CHECK when compiling softoken for ABI compatibility\n- Remove the unused and obsolete nss-nochktest.patch\n- Resolves: rhbz#949845 - [RFE][RHEL5] Rebase to nss-3.14.3 to fix the lucky-13 issue\n[3.14.3-4]\n- Fix rpmdiff test reported failures and remove other unwanted changes\n- Resolves: rhbz#949845 - [RFE][RHEL5] Rebase to nss-3.14.3 to fix the lucky-13 issue\n[3.14.3-3]\n- Update to NSS_3_14_3_RTM\n- Rework the rebase to preserve needed idiosynchracies\n- Ensure we install frebl/softoken from the extra build tree\n- Don't include freebl static library or its private headers\n- Add patch to deal with system sqlite not being recent enough\n- Don't install nss-sysinit nor sharedb\n- Resolves: rhbz#949845 - [RFE][RHEL5] Rebase to nss-3.14.3 to fix the lucky-13 issue\n[3.14.3-2]\n- Restore the freebl-softoken source tar ball updated to 3.14.3\n- Renumbering of some sources for clarity\n- Resolves: rhbz#918870 - [RFE][RHEL5] Rebase to nss-3.14.3 to fix the lucky-13 issue\n[3.14.3-1]\n- Update to NSS_3_14_3_RTM\n- Resolves: rhbz#918870 - [RFE][RHEL5] Rebase to nss-3.14.3 to fix the lucky-13 issue", "published": "2013-08-05T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "http://linux.oracle.com/errata/ELSA-2013-1135.html", "cvelist": ["CVE-2013-0791", "CVE-2013-1620"], "lastseen": "2016-09-04T11:17:03"}, {"id": "ELSA-2013-0696", "type": "oraclelinux", "title": "firefox security update", "description": "firefox\n[17.0.5-1.0.1]\n- Add firefox-oracle-default-prefs.js and remove the corresponding Red Hat ones\n[17.0.5-1]\n- Update to 17.0.5 ESR\nxulrunner\n[17.0.5-1.0.1.el6_4]\n- Replaced xulrunner-redhat-default-prefs.js with xulrunner-oracle-default-prefs.js\n- Removed XULRUNNER_VERSION from SOURCE21\n[17.0.5-1]\n- Update to 17.0.5 ESR\n[17.0.3-3]\n- Added fix for rhbz#916180 - Wrong library directory reference\n in /usr/bin/xulrunner", "published": "2013-04-02T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://linux.oracle.com/errata/ELSA-2013-0696.html", "cvelist": ["CVE-2013-0795", "CVE-2013-0796", "CVE-2013-0800", "CVE-2013-0788", "CVE-2013-0793"], "lastseen": "2016-09-04T11:16:38"}, {"id": "ELSA-2013-0697", "type": "oraclelinux", "title": "thunderbird security update", "description": "[17.0.5-1.0.1.el6_4]\n- Replaced thunderbird-redhat-default-prefs.js with thunderbird-oracle-default-prefs.js\n[17.0.5-1]\n- Update to 17.0.5 ESR", "published": "2013-04-02T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://linux.oracle.com/errata/ELSA-2013-0697.html", "cvelist": ["CVE-2013-0795", "CVE-2013-0796", "CVE-2013-0800", "CVE-2013-0788", "CVE-2013-0793"], "lastseen": "2016-09-04T11:16:39"}], "redhat": [{"id": "RHSA-2013:1135", "type": "redhat", "title": "(RHSA-2013:1135) Moderate: nss and nspr security, bug fix, and enhancement update", "description": "Network Security Services (NSS) is a set of libraries designed to support\nthe cross-platform development of security-enabled client and server\napplications. Netscape Portable Runtime (NSPR) provides platform\nindependence for non-GUI operating system facilities.\n\nIt was discovered that NSS leaked timing information when decrypting\nTLS/SSL and DTLS protocol encrypted records when CBC-mode cipher suites\nwere used. A remote attacker could possibly use this flaw to retrieve plain\ntext from the encrypted packets by using a TLS/SSL or DTLS server as a\npadding oracle. (CVE-2013-1620)\n\nAn out-of-bounds memory read flaw was found in the way NSS decoded certain\ncertificates. If an application using NSS decoded a malformed certificate,\nit could cause the application to crash. (CVE-2013-0791)\n\nRed Hat would like to thank the Mozilla project for reporting\nCVE-2013-0791. Upstream acknowledges Ambroz Bizjak as the original reporter\nof CVE-2013-0791.\n\nThis update also fixes the following bugs:\n\n* A defect in the FreeBL library implementation of the Diffie-Hellman (DH)\nprotocol previously caused Openswan to drop connections. (BZ#958023)\n\n * A memory leak in the nssutil_ReadSecmodDB() function has been fixed.\n(BZ#986969)\n\nIn addition, the nss package has been upgraded to upstream version 3.14.3,\nand the nspr package has been upgraded to upstream version 4.9.5. These\nupdates provide a number of bug fixes and enhancements over the previous\nversions. (BZ#949845, BZ#924741)\n\nNote that while upstream NSS version 3.14 prevents the use of certificates\nthat have an MD5 signature, this erratum includes a patch that allows such\ncertificates by default. To prevent the use of certificates that have an\nMD5 signature, set the \"NSS_HASH_ALG_SUPPORT\" environment variable\nto \"-MD5\".\n\nUsers of NSS and NSPR are advised to upgrade to these updated packages,\nwhich fix these issues and add these enhancements. After installing this\nupdate, applications using NSS or NSPR must be restarted for this update to\ntake effect.\n", "published": "2013-08-05T04:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "https://access.redhat.com/errata/RHSA-2013:1135", "cvelist": ["CVE-2013-0791", "CVE-2013-1620"], "lastseen": "2017-09-09T07:19:14"}, {"id": "RHSA-2013:1144", "type": "redhat", "title": "(RHSA-2013:1144) Moderate: nss, nss-util, nss-softokn, and nspr security update", "description": "Network Security Services (NSS) is a set of libraries designed to support\nthe cross-platform development of security-enabled client and server\napplications. Netscape Portable Runtime (NSPR) provides platform\nindependence for non-GUI operating system facilities. nss-softokn provides\nan NSS softoken cryptographic module.\n\nIt was discovered that NSS leaked timing information when decrypting\nTLS/SSL and DTLS protocol encrypted records when CBC-mode cipher suites\nwere used. A remote attacker could possibly use this flaw to retrieve plain\ntext from the encrypted packets by using a TLS/SSL or DTLS server as a\npadding oracle. (CVE-2013-1620)\n\nAn out-of-bounds memory read flaw was found in the way NSS decoded certain\ncertificates. If an application using NSS decoded a malformed certificate,\nit could cause the application to crash. (CVE-2013-0791)\n\nRed Hat would like to thank the Mozilla project for reporting\nCVE-2013-0791. Upstream acknowledges Ambroz Bizjak as the original reporter\nof CVE-2013-0791.\n\nThis update also fixes the following bugs:\n\n* The RHBA-2013:0445 update (which upgraded NSS to version 3.14) prevented\nthe use of certificates that have an MD5 signature. This caused problems in\ncertain environments. With this update, certificates that have an MD5\nsignature are once again allowed. To prevent the use of certificates that\nhave an MD5 signature, set the \"NSS_HASH_ALG_SUPPORT\" environment variable\nto \"-MD5\". (BZ#957603)\n\n* Previously, the sechash.h header file was missing, preventing certain\nsource RPMs (such as firefox and xulrunner) from building. (BZ#948715)\n\n* A memory leak in the nssutil_ReadSecmodDB() function has been fixed.\n(BZ#984967)\n\nIn addition, the nss package has been upgraded to upstream version 3.14.3,\nthe nss-util package has been upgraded to upstream version 3.14.3, the\nnss-softokn package has been upgraded to upstream version 3.14.3, and the\nnspr package has been upgraded to upstream version 4.9.5. These updates\nprovide a number of bug fixes and enhancements over the previous versions.\n(BZ#927157, BZ#927171, BZ#927158, BZ#927186)\n\nUsers of NSS, NSPR, nss-util, and nss-softokn are advised to upgrade to\nthese updated packages, which fix these issues and add these enhancements.\nAfter installing this update, applications using NSS, NSPR, nss-util, or\nnss-softokn must be restarted for this update to take effect.\n", "published": "2013-08-07T04:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "https://access.redhat.com/errata/RHSA-2013:1144", "cvelist": ["CVE-2013-0791", "CVE-2013-1620"], "lastseen": "2017-11-24T20:01:32"}, {"id": "RHSA-2013:1181", "type": "redhat", "title": "(RHSA-2013:1181) Moderate: rhev-hypervisor6 security and bug fix update", "description": "The rhev-hypervisor6 package provides a Red Hat Enterprise Virtualization\nHypervisor ISO disk image. The Red Hat Enterprise Virtualization Hypervisor\nis a dedicated Kernel-based Virtual Machine (KVM) hypervisor. It includes\neverything necessary to run and manage virtual machines: A subset of the\nRed Hat Enterprise Linux operating environment and the Red Hat Enterprise\nVirtualization Agent.\n\nNote: Red Hat Enterprise Virtualization Hypervisor is only available for\nthe Intel 64 and AMD64 architectures with virtualization extensions.\n\nUpgrade Note: If you upgrade the Red Hat Enterprise Virtualization\nHypervisor through the 3.2 Manager administration portal, the Host may\nappear with the status of \"Install Failed\". If this happens, place the host\ninto maintenance mode, then activate it again to get the host back to an\n\"Up\" state.\n\nIt was discovered that NSS leaked timing information when decrypting\nTLS/SSL and DTLS protocol encrypted records when CBC-mode cipher suites\nwere used. A remote attacker could possibly use this flaw to retrieve plain\ntext from the encrypted packets by using a TLS/SSL or DTLS server as a\npadding oracle. (CVE-2013-1620)\n\nIt was found that the fix for CVE-2013-0167 released via RHSA-2013:0907\nwas incomplete. A privileged guest user could potentially use this flaw to\nmake the host the guest is running on unavailable to the management\nserver. (CVE-2013-4236)\n\nAn out-of-bounds memory read flaw was found in the way NSS decoded certain\ncertificates. If an application using NSS decoded a malformed certificate,\nit could cause the application to crash. (CVE-2013-0791)\n\nRed Hat would like to thank the Mozilla project for reporting\nCVE-2013-0791. Upstream acknowledges Ambroz Bizjak as the original reporter\nof CVE-2013-0791. The CVE-2013-4236 issue was found by David Gibson of Red\nHat.\n\nThis updated package provides updated components that include fixes for\nvarious security issues. These issues have no security impact on Red Hat\nEnterprise Virtualization Hypervisor itself, however. The security fixes\nincluded in this update address the following CVE numbers:\n\nCVE-2013-4854 (bind issue)\n\nCVE-2012-6544, CVE-2013-2146, CVE-2013-2206, CVE-2013-2224, CVE-2013-2232,\nand CVE-2013-2237 (kernel issues)\n\nThis update also contains the fixes from the following errata:\n\n* vdsm: RHSA-2013:1155 and RHBA-2013:1158\n\nUsers of the Red Hat Enterprise Virtualization Hypervisor are advised to\nupgrade to this updated package, which corrects these issues.\n", "published": "2013-08-27T04:00:00", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}, "href": "https://access.redhat.com/errata/RHSA-2013:1181", "cvelist": ["CVE-2013-2206", "CVE-2013-0791", "CVE-2013-4236", "CVE-2013-0167", "CVE-2013-2232", "CVE-2012-6544", "CVE-2013-2146", "CVE-2013-2237", "CVE-2013-4854", "CVE-2013-2224", "CVE-2013-1620"], "lastseen": "2017-03-10T07:18:45"}, {"id": "RHSA-2013:0696", "type": "redhat", "title": "(RHSA-2013:0696) Critical: firefox security update", "description": "Mozilla Firefox is an open source web browser. XULRunner provides the XUL\nRuntime environment for Mozilla Firefox.\n\nSeveral flaws were found in the processing of malformed web content. A web\npage containing malicious content could cause Firefox to crash or,\npotentially, execute arbitrary code with the privileges of the user running\nFirefox. (CVE-2013-0788)\n\nA flaw was found in the way Same Origin Wrappers were implemented in\nFirefox. A malicious site could use this flaw to bypass the same-origin\npolicy and execute arbitrary code with the privileges of the user running\nFirefox. (CVE-2013-0795)\n\nA flaw was found in the embedded WebGL library in Firefox. A web page\ncontaining malicious content could cause Firefox to crash or, potentially,\nexecute arbitrary code with the privileges of the user running Firefox.\nNote: This issue only affected systems using the Intel Mesa graphics\ndrivers. (CVE-2013-0796)\n\nAn out-of-bounds write flaw was found in the embedded Cairo library in\nFirefox. A web page containing malicious content could cause Firefox to\ncrash or, potentially, execute arbitrary code with the privileges of the\nuser running Firefox. (CVE-2013-0800)\n\nA flaw was found in the way Firefox handled the JavaScript history\nfunctions. A malicious site could cause a web page to be displayed that has\na baseURI pointing to a different site, allowing cross-site scripting (XSS)\nand phishing attacks. (CVE-2013-0793)\n\nRed Hat would like to thank the Mozilla project for reporting these issues.\nUpstream acknowledges Olli Pettay, Jesse Ruderman, Boris Zbarsky, Christian\nHoller, Milan Sreckovic, Joe Drew, Cody Crews, miaubiz, Abhishek Arya, and\nMariusz Mlynski as the original reporters of these issues.\n\nFor technical details regarding these flaws, refer to the Mozilla security\nadvisories for Firefox 17.0.5 ESR. You can find a link to the Mozilla\nadvisories in the References section of this erratum.\n\nAll Firefox users should upgrade to these updated packages, which contain\nFirefox version 17.0.5 ESR, which corrects these issues. After installing\nthe update, Firefox must be restarted for the changes to take effect.\n", "published": "2013-04-02T04:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://access.redhat.com/errata/RHSA-2013:0696", "cvelist": ["CVE-2013-0788", "CVE-2013-0793", "CVE-2013-0795", "CVE-2013-0796", "CVE-2013-0800"], "lastseen": "2017-12-25T20:06:14"}, {"id": "RHSA-2013:0697", "type": "redhat", "title": "(RHSA-2013:0697) Important: thunderbird security update", "description": "Mozilla Thunderbird is a standalone mail and newsgroup client.\n\nSeveral flaws were found in the processing of malformed content. Malicious\ncontent could cause Thunderbird to crash or, potentially, execute arbitrary\ncode with the privileges of the user running Thunderbird. (CVE-2013-0788)\n\nA flaw was found in the way Same Origin Wrappers were implemented in\nThunderbird. Malicious content could use this flaw to bypass the\nsame-origin policy and execute arbitrary code with the privileges of the\nuser running Thunderbird. (CVE-2013-0795)\n\nA flaw was found in the embedded WebGL library in Thunderbird. Malicious\ncontent could cause Thunderbird to crash or, potentially, execute arbitrary\ncode with the privileges of the user running Thunderbird. Note: This issue\nonly affected systems using the Intel Mesa graphics drivers.\n(CVE-2013-0796)\n\nAn out-of-bounds write flaw was found in the embedded Cairo library in\nThunderbird. Malicious content could cause Thunderbird to crash or,\npotentially, execute arbitrary code with the privileges of the user running\nThunderbird. (CVE-2013-0800)\n\nA flaw was found in the way Thunderbird handled the JavaScript history\nfunctions. Malicious content could cause a page to be displayed that\nhas a baseURI pointing to a different site, allowing cross-site scripting\n(XSS) and phishing attacks. (CVE-2013-0793)\n\nRed Hat would like to thank the Mozilla project for reporting these issues.\nUpstream acknowledges Olli Pettay, Jesse Ruderman, Boris Zbarsky, Christian\nHoller, Milan Sreckovic, Joe Drew, Cody Crews, miaubiz, Abhishek Arya, and\nMariusz Mlynski as the original reporters of these issues.\n\nNote: All issues except CVE-2013-0800 cannot be exploited by a\nspecially-crafted HTML mail message as JavaScript is disabled by default\nfor mail messages. They could be exploited another way in Thunderbird, for\nexample, when viewing the full remote content of an RSS feed.\n\nAll Thunderbird users should upgrade to this updated package, which\ncontains Thunderbird version 17.0.5 ESR, which corrects these issues. After\ninstalling the update, Thunderbird must be restarted for the changes to\ntake effect.\n", "published": "2013-04-02T04:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://access.redhat.com/errata/RHSA-2013:0697", "cvelist": ["CVE-2013-0788", "CVE-2013-0793", "CVE-2013-0795", "CVE-2013-0796", "CVE-2013-0800"], "lastseen": "2017-09-09T07:20:33"}], "amazon": [{"id": "ALAS-2013-216", "type": "amazon", "title": "Medium: nspr", "description": "**Issue Overview:**\n\nIt was discovered that NSS leaked timing information when decrypting TLS/SSL and DTLS protocol encrypted records when CBC-mode cipher suites were used. A remote attacker could possibly use this flaw to retrieve plain text from the encrypted packets by using a TLS/SSL or DTLS server as a padding oracle. ([CVE-2013-1620 __](<https://access.redhat.com/security/cve/CVE-2013-1620>))\n\nAn out-of-bounds memory read flaw was found in the way NSS decoded certain certificates. If an application using NSS decoded a malformed certificate, it could cause the application to crash. ([CVE-2013-0791 __](<https://access.redhat.com/security/cve/CVE-2013-0791>))\n\n \n**Affected Packages:** \n\n\nnspr\n\n \n**Issue Correction:** \nRun _yum update nspr_ to update your system. \n\n \n**New Packages:**\n \n \n i686: \n nspr-4.9.5-2.17.amzn1.i686 \n nspr-devel-4.9.5-2.17.amzn1.i686 \n nspr-debuginfo-4.9.5-2.17.amzn1.i686 \n \n src: \n nspr-4.9.5-2.17.amzn1.src \n \n x86_64: \n nspr-devel-4.9.5-2.17.amzn1.x86_64 \n nspr-debuginfo-4.9.5-2.17.amzn1.x86_64 \n nspr-4.9.5-2.17.amzn1.x86_64 \n \n \n", "published": "2013-08-07T21:23:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "https://alas.aws.amazon.com/ALAS-2013-216.html", "cvelist": ["CVE-2013-0791", "CVE-2013-1620"], "lastseen": "2016-09-28T21:04:06"}, {"id": "ALAS-2013-217", "type": "amazon", "title": "Medium: nss", "description": "**Issue Overview:**\n\nIt was discovered that NSS leaked timing information when decrypting TLS/SSL and DTLS protocol encrypted records when CBC-mode cipher suites were used. A remote attacker could possibly use this flaw to retrieve plain text from the encrypted packets by using a TLS/SSL or DTLS server as a padding oracle. ([CVE-2013-1620 __](<https://access.redhat.com/security/cve/CVE-2013-1620>))\n\nAn out-of-bounds memory read flaw was found in the way NSS decoded certain certificates. If an application using NSS decoded a malformed certificate, it could cause the application to crash. ([CVE-2013-0791 __](<https://access.redhat.com/security/cve/CVE-2013-0791>))\n\n \n**Affected Packages:** \n\n\nnss\n\n \n**Issue Correction:** \nRun _yum update nss_ to update your system. \n\n \n**New Packages:**\n \n \n i686: \n nss-3.14.3-4.29.amzn1.i686 \n nss-tools-3.14.3-4.29.amzn1.i686 \n nss-devel-3.14.3-4.29.amzn1.i686 \n nss-debuginfo-3.14.3-4.29.amzn1.i686 \n nss-sysinit-3.14.3-4.29.amzn1.i686 \n nss-pkcs11-devel-3.14.3-4.29.amzn1.i686 \n \n src: \n nss-3.14.3-4.29.amzn1.src \n \n x86_64: \n nss-debuginfo-3.14.3-4.29.amzn1.x86_64 \n nss-sysinit-3.14.3-4.29.amzn1.x86_64 \n nss-3.14.3-4.29.amzn1.x86_64 \n nss-devel-3.14.3-4.29.amzn1.x86_64 \n nss-pkcs11-devel-3.14.3-4.29.amzn1.x86_64 \n nss-tools-3.14.3-4.29.amzn1.x86_64 \n \n \n", "published": "2013-08-07T21:23:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "https://alas.aws.amazon.com/ALAS-2013-217.html", "cvelist": ["CVE-2013-0791", "CVE-2013-1620"], "lastseen": "2016-09-28T21:04:05"}], "centos": [{"id": "CESA-2013:1135", "type": "centos", "title": "nspr, nss security update", "description": "**CentOS Errata and Security Advisory** CESA-2013:1135\n\n\nNetwork Security Services (NSS) is a set of libraries designed to support\nthe cross-platform development of security-enabled client and server\napplications. Netscape Portable Runtime (NSPR) provides platform\nindependence for non-GUI operating system facilities.\n\nIt was discovered that NSS leaked timing information when decrypting\nTLS/SSL and DTLS protocol encrypted records when CBC-mode cipher suites\nwere used. A remote attacker could possibly use this flaw to retrieve plain\ntext from the encrypted packets by using a TLS/SSL or DTLS server as a\npadding oracle. (CVE-2013-1620)\n\nAn out-of-bounds memory read flaw was found in the way NSS decoded certain\ncertificates. If an application using NSS decoded a malformed certificate,\nit could cause the application to crash. (CVE-2013-0791)\n\nRed Hat would like to thank the Mozilla project for reporting\nCVE-2013-0791. Upstream acknowledges Ambroz Bizjak as the original reporter\nof CVE-2013-0791.\n\nThis update also fixes the following bugs:\n\n* A defect in the FreeBL library implementation of the Diffie-Hellman (DH)\nprotocol previously caused Openswan to drop connections. (BZ#958023)\n\n * A memory leak in the nssutil_ReadSecmodDB() function has been fixed.\n(BZ#986969)\n\nIn addition, the nss package has been upgraded to upstream version 3.14.3,\nand the nspr package has been upgraded to upstream version 4.9.5. These\nupdates provide a number of bug fixes and enhancements over the previous\nversions. (BZ#949845, BZ#924741)\n\nNote that while upstream NSS version 3.14 prevents the use of certificates\nthat have an MD5 signature, this erratum includes a patch that allows such\ncertificates by default. To prevent the use of certificates that have an\nMD5 signature, set the \"NSS_HASH_ALG_SUPPORT\" environment variable\nto \"-MD5\".\n\nUsers of NSS and NSPR are advised to upgrade to these updated packages,\nwhich fix these issues and add these enhancements. After installing this\nupdate, applications using NSS or NSPR must be restarted for this update to\ntake effect.\n\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2013-August/019892.html\n\n**Affected packages:**\nnspr\nnspr-devel\nnss\nnss-devel\nnss-pkcs11-devel\nnss-tools\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2013-1135.html", "published": "2013-08-05T19:56:06", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "http://lists.centos.org/pipermail/centos-announce/2013-August/019892.html", "cvelist": ["CVE-2013-0791", "CVE-2013-1620"], "lastseen": "2017-10-03T18:26:16"}, {"id": "CESA-2013:1144", "type": "centos", "title": "nspr, nss security update", "description": "**CentOS Errata and Security Advisory** CESA-2013:1144\n\n\nNetwork Security Services (NSS) is a set of libraries designed to support\nthe cross-platform development of security-enabled client and server\napplications. Netscape Portable Runtime (NSPR) provides platform\nindependence for non-GUI operating system facilities. nss-softokn provides\nan NSS softoken cryptographic module.\n\nIt was discovered that NSS leaked timing information when decrypting\nTLS/SSL and DTLS protocol encrypted records when CBC-mode cipher suites\nwere used. A remote attacker could possibly use this flaw to retrieve plain\ntext from the encrypted packets by using a TLS/SSL or DTLS server as a\npadding oracle. (CVE-2013-1620)\n\nAn out-of-bounds memory read flaw was found in the way NSS decoded certain\ncertificates. If an application using NSS decoded a malformed certificate,\nit could cause the application to crash. (CVE-2013-0791)\n\nRed Hat would like to thank the Mozilla project for reporting\nCVE-2013-0791. Upstream acknowledges Ambroz Bizjak as the original reporter\nof CVE-2013-0791.\n\nThis update also fixes the following bugs:\n\n* The RHBA-2013:0445 update (which upgraded NSS to version 3.14) prevented\nthe use of certificates that have an MD5 signature. This caused problems in\ncertain environments. With this update, certificates that have an MD5\nsignature are once again allowed. To prevent the use of certificates that\nhave an MD5 signature, set the \"NSS_HASH_ALG_SUPPORT\" environment variable\nto \"-MD5\". (BZ#957603)\n\n* Previously, the sechash.h header file was missing, preventing certain\nsource RPMs (such as firefox and xulrunner) from building. (BZ#948715)\n\n* A memory leak in the nssutil_ReadSecmodDB() function has been fixed.\n(BZ#984967)\n\nIn addition, the nss package has been upgraded to upstream version 3.14.3,\nthe nss-util package has been upgraded to upstream version 3.14.3, the\nnss-softokn package has been upgraded to upstream version 3.14.3, and the\nnspr package has been upgraded to upstream version 4.9.5. These updates\nprovide a number of bug fixes and enhancements over the previous versions.\n(BZ#927157, BZ#927171, BZ#927158, BZ#927186)\n\nUsers of NSS, NSPR, nss-util, and nss-softokn are advised to upgrade to\nthese updated packages, which fix these issues and add these enhancements.\nAfter installing this update, applications using NSS, NSPR, nss-util, or\nnss-softokn must be restarted for this update to take effect.\n\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2013-August/019896.html\n\n**Affected packages:**\nnspr\nnspr-devel\nnss\nnss-devel\nnss-pkcs11-devel\nnss-softokn\nnss-softokn-devel\nnss-softokn-freebl\nnss-softokn-freebl-devel\nnss-sysinit\nnss-tools\nnss-util\nnss-util-devel\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2013-1144.html", "published": "2013-08-07T22:22:50", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "http://lists.centos.org/pipermail/centos-announce/2013-August/019896.html", "cvelist": ["CVE-2013-0791", "CVE-2013-1620"], "lastseen": "2017-10-03T18:25:44"}, {"id": "CESA-2013:0697", "type": "centos", "title": "thunderbird security update", "description": "**CentOS Errata and Security Advisory** CESA-2013:0697\n\n\nMozilla Thunderbird is a standalone mail and newsgroup client.\n\nSeveral flaws were found in the processing of malformed content. Malicious\ncontent could cause Thunderbird to crash or, potentially, execute arbitrary\ncode with the privileges of the user running Thunderbird. (CVE-2013-0788)\n\nA flaw was found in the way Same Origin Wrappers were implemented in\nThunderbird. Malicious content could use this flaw to bypass the\nsame-origin policy and execute arbitrary code with the privileges of the\nuser running Thunderbird. (CVE-2013-0795)\n\nA flaw was found in the embedded WebGL library in Thunderbird. Malicious\ncontent could cause Thunderbird to crash or, potentially, execute arbitrary\ncode with the privileges of the user running Thunderbird. Note: This issue\nonly affected systems using the Intel Mesa graphics drivers.\n(CVE-2013-0796)\n\nAn out-of-bounds write flaw was found in the embedded Cairo library in\nThunderbird. Malicious content could cause Thunderbird to crash or,\npotentially, execute arbitrary code with the privileges of the user running\nThunderbird. (CVE-2013-0800)\n\nA flaw was found in the way Thunderbird handled the JavaScript history\nfunctions. Malicious content could cause a page to be displayed that\nhas a baseURI pointing to a different site, allowing cross-site scripting\n(XSS) and phishing attacks. (CVE-2013-0793)\n\nRed Hat would like to thank the Mozilla project for reporting these issues.\nUpstream acknowledges Olli Pettay, Jesse Ruderman, Boris Zbarsky, Christian\nHoller, Milan Sreckovic, Joe Drew, Cody Crews, miaubiz, Abhishek Arya, and\nMariusz Mlynski as the original reporters of these issues.\n\nNote: All issues except CVE-2013-0800 cannot be exploited by a\nspecially-crafted HTML mail message as JavaScript is disabled by default\nfor mail messages. They could be exploited another way in Thunderbird, for\nexample, when viewing the full remote content of an RSS feed.\n\nAll Thunderbird users should upgrade to this updated package, which\ncontains Thunderbird version 17.0.5 ESR, which corrects these issues. After\ninstalling the update, Thunderbird must be restarted for the changes to\ntake effect.\n\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2013-April/019675.html\nhttp://lists.centos.org/pipermail/centos-announce/2013-April/019678.html\n\n**Affected packages:**\nthunderbird\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2013-0697.html", "published": "2013-04-03T04:39:37", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://lists.centos.org/pipermail/centos-announce/2013-April/019675.html", "cvelist": ["CVE-2013-0795", "CVE-2013-0796", "CVE-2013-0800", "CVE-2013-0788", "CVE-2013-0793"], "lastseen": "2017-10-03T18:26:28"}, {"id": "CESA-2013:0696", "type": "centos", "title": "firefox, xulrunner security update", "description": "**CentOS Errata and Security Advisory** CESA-2013:0696\n\n\nMozilla Firefox is an open source web browser. XULRunner provides the XUL\nRuntime environment for Mozilla Firefox.\n\nSeveral flaws were found in the processing of malformed web content. A web\npage containing malicious content could cause Firefox to crash or,\npotentially, execute arbitrary code with the privileges of the user running\nFirefox. (CVE-2013-0788)\n\nA flaw was found in the way Same Origin Wrappers were implemented in\nFirefox. A malicious site could use this flaw to bypass the same-origin\npolicy and execute arbitrary code with the privileges of the user running\nFirefox. (CVE-2013-0795)\n\nA flaw was found in the embedded WebGL library in Firefox. A web page\ncontaining malicious content could cause Firefox to crash or, potentially,\nexecute arbitrary code with the privileges of the user running Firefox.\nNote: This issue only affected systems using the Intel Mesa graphics\ndrivers. (CVE-2013-0796)\n\nAn out-of-bounds write flaw was found in the embedded Cairo library in\nFirefox. A web page containing malicious content could cause Firefox to\ncrash or, potentially, execute arbitrary code with the privileges of the\nuser running Firefox. (CVE-2013-0800)\n\nA flaw was found in the way Firefox handled the JavaScript history\nfunctions. A malicious site could cause a web page to be displayed that has\na baseURI pointing to a different site, allowing cross-site scripting (XSS)\nand phishing attacks. (CVE-2013-0793)\n\nRed Hat would like to thank the Mozilla project for reporting these issues.\nUpstream acknowledges Olli Pettay, Jesse Ruderman, Boris Zbarsky, Christian\nHoller, Milan Sreckovic, Joe Drew, Cody Crews, miaubiz, Abhishek Arya, and\nMariusz Mlynski as the original reporters of these issues.\n\nFor technical details regarding these flaws, refer to the Mozilla security\nadvisories for Firefox 17.0.5 ESR. You can find a link to the Mozilla\nadvisories in the References section of this erratum.\n\nAll Firefox users should upgrade to these updated packages, which contain\nFirefox version 17.0.5 ESR, which corrects these issues. After installing\nthe update, Firefox must be restarted for the changes to take effect.\n\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2013-April/019674.html\nhttp://lists.centos.org/pipermail/centos-announce/2013-April/019676.html\nhttp://lists.centos.org/pipermail/centos-announce/2013-April/019677.html\nhttp://lists.centos.org/pipermail/centos-announce/2013-April/019679.html\n\n**Affected packages:**\nfirefox\nxulrunner\nxulrunner-devel\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2013-0696.html", "published": "2013-04-03T04:34:09", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://lists.centos.org/pipermail/centos-announce/2013-April/019674.html", "cvelist": ["CVE-2013-0795", "CVE-2013-0796", "CVE-2013-0800", "CVE-2013-0788", "CVE-2013-0793"], "lastseen": "2017-10-03T18:24:35"}], "ubuntu": [{"id": "USN-1791-1", "type": "ubuntu", "title": "Thunderbird vulnerabilities", "description": "Olli Pettay, Jesse Ruderman, Boris Zbarsky, Christian Holler, Milan Sreckovic and Joe Drew discovered multiple memory safety issues affecting Thunderbird. If the user were tricked into opening a specially crafted message with scripting enabled, an attacker could possibly exploit these to cause a denial of service via application crash, or potentially execute code with the privileges of the user invoking Thunderbird. (CVE-2013-0788)\n\nAmbroz Bizjak discovered an out-of-bounds array read in the CERT_DecodeCertPackage function of the Network Security Services (NSS) libary when decoding certain certificates. An attacker could potentially exploit this to cause a denial of service via application crash. (CVE-2013-0791)\n\nMariusz Mlynski discovered that timed history navigations could be used to load arbitrary websites with the wrong URL displayed in the addressbar. An attacker could exploit this to conduct cross-site scripting (XSS) or phishing attacks if scripting were enabled. (CVE-2013-0793)\n\nCody Crews discovered that the cloneNode method could be used to bypass System Only Wrappers (SOW) to clone a protected node and bypass same-origin policy checks. If a user had enabled scripting, an attacker could potentially exploit this to steal confidential data or execute code with the privileges of the user invoking Thunderbird. (CVE-2013-0795)\n\nA crash in WebGL rendering was discovered in Thunderbird. An attacker could potentially exploit this to execute code with the privileges of the user invoking Thunderbird if scripting were enabled. This issue only affects users with Intel graphics drivers. (CVE-2013-0796)\n\nAbhishek Arya discovered an out-of-bounds write in the Cairo graphics library. An attacker could potentially exploit this to execute code with the privileges of the user invoking Thunderbird. (CVE-2013-0800)", "published": "2013-04-08T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://usn.ubuntu.com/1791-1/", "cvelist": ["CVE-2013-0791", "CVE-2013-0795", "CVE-2013-0796", "CVE-2013-0800", "CVE-2013-0788", "CVE-2013-0793"], "lastseen": "2018-03-29T18:20:34"}, {"id": "USN-1786-2", "type": "ubuntu", "title": "Unity Firefox Extension update", "description": "USN-1786-1 fixed vulnerabilities in Firefox. This update provides the corresponding update for Unity Firefox Extension.\n\nOriginal advisory details:\n\nOlli Pettay, Jesse Ruderman, Boris Zbarsky, Christian Holler, Milan Sreckovic, Joe Drew, Andrew McCreight, Randell Jesup, Gary Kwong and Mats Palmgren discovered multiple memory safety issues affecting Firefox. If the user were tricked into opening a specially crafted page, an attacker could possibly exploit these to cause a denial of service via application crash, or potentially execute code with the privileges of the user invoking Firefox. (CVE-2013-0788, CVE-2013-0789)\n\nAmbroz Bizjak discovered an out-of-bounds array read in the CERT_DecodeCertPackage function of the Network Security Services (NSS) libary when decoding certain certificates. An attacker could potentially exploit this to cause a denial of service via application crash. (CVE-2013-0791)\n\nTobias Schula discovered an information leak in Firefox when the gfx.color_management.enablev4 preference is enabled. If the user were tricked into opening a specially crafted image, an attacker could potentially exploit this to steal confidential data. By default, the gfx.color_management.enablev4 preference is not enabled in Ubuntu. (CVE-2013-0792)\n\nMariusz Mlynski discovered that timed history navigations could be used to load arbitrary websites with the wrong URL displayed in the addressbar. An attacker could exploit this to conduct cross-site scripting (XSS) or phishing attacks. (CVE-2013-0793)\n\nIt was discovered that the origin indication on tab-modal dialog boxes could be removed, which could allow an attacker\u2019s dialog to be displayed over another sites content. An attacker could exploit this to conduct phishing attacks. (CVE-2013-0794)\n\nCody Crews discovered that the cloneNode method could be used to bypass System Only Wrappers (SOW) to clone a protected node and bypass same-origin policy checks. An attacker could potentially exploit this to steal confidential data or execute code with the privileges of the user invoking Firefox. (CVE-2013-0795)\n\nA crash in WebGL rendering was discovered in Firefox. An attacker could potentially exploit this to execute code with the privileges of the user invoking Firefox. This issue only affects users with Intel graphics drivers. (CVE-2013-0796)\n\nAbhishek Arya discovered an out-of-bounds write in the Cairo graphics library. An attacker could potentially exploit this to execute code with the privileges of the user invoking Firefox. (CVE-2013-0800)", "published": "2013-04-04T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://usn.ubuntu.com/1786-2/", "cvelist": ["CVE-2013-0791", "CVE-2013-0794", "CVE-2013-0795", "CVE-2013-0796", "CVE-2013-0800", "CVE-2013-0788", "CVE-2013-0789", "CVE-2013-0792", "CVE-2013-0793"], "lastseen": "2018-03-29T18:20:12"}, {"id": "USN-1786-1", "type": "ubuntu", "title": "Firefox vulnerabilities", "description": "Olli Pettay, Jesse Ruderman, Boris Zbarsky, Christian Holler, Milan Sreckovic, Joe Drew, Andrew McCreight, Randell Jesup, Gary Kwong and Mats Palmgren discovered multiple memory safety issues affecting Firefox. If the user were tricked into opening a specially crafted page, an attacker could possibly exploit these to cause a denial of service via application crash, or potentially execute code with the privileges of the user invoking Firefox. (CVE-2013-0788, CVE-2013-0789)\n\nAmbroz Bizjak discovered an out-of-bounds array read in the CERT_DecodeCertPackage function of the Network Security Services (NSS) libary when decoding certain certificates. An attacker could potentially exploit this to cause a denial of service via application crash. (CVE-2013-0791)\n\nTobias Schula discovered an information leak in Firefox when the gfx.color_management.enablev4 preference is enabled. If the user were tricked into opening a specially crafted image, an attacker could potentially exploit this to steal confidential data. By default, the gfx.color_management.enablev4 preference is not enabled in Ubuntu. (CVE-2013-0792)\n\nMariusz Mlynski discovered that timed history navigations could be used to load arbitrary websites with the wrong URL displayed in the addressbar. An attacker could exploit this to conduct cross-site scripting (XSS) or phishing attacks. (CVE-2013-0793)\n\nIt was discovered that the origin indication on tab-modal dialog boxes could be removed, which could allow an attacker\u2019s dialog to be displayed over another sites content. An attacker could exploit this to conduct phishing attacks. (CVE-2013-0794)\n\nCody Crews discovered that the cloneNode method could be used to bypass System Only Wrappers (SOW) to clone a protected node and bypass same-origin policy checks. An attacker could potentially exploit this to steal confidential data or execute code with the privileges of the user invoking Firefox. (CVE-2013-0795)\n\nA crash in WebGL rendering was discovered in Firefox. An attacker could potentially exploit this to execute code with the privileges of the user invoking Firefox. This issue only affects users with Intel graphics drivers. (CVE-2013-0796)\n\nAbhishek Arya discovered an out-of-bounds write in the Cairo graphics library. An attacker could potentially exploit this to execute code with the privileges of the user invoking Firefox. (CVE-2013-0800)", "published": "2013-04-04T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://usn.ubuntu.com/1786-1/", "cvelist": ["CVE-2013-0791", "CVE-2013-0794", "CVE-2013-0795", "CVE-2013-0796", "CVE-2013-0800", "CVE-2013-0788", "CVE-2013-0789", "CVE-2013-0792", "CVE-2013-0793"], "lastseen": "2018-03-29T18:17:12"}], "vmware": [{"id": "VMSA-2013-0015", "type": "vmware", "title": "VMware ESX updates to third party libraries", "description": "a. Update to ESX service console kernel \n\n\nThe ESX service console kernel is updated to resolve multiple \nsecurity issues.\n\nThe Common Vulnerabilities and Exposures project (cve.mitre.org) \nhas assigned the names CVE-2012-2372, CVE-2012-3552, CVE-2013-2147, \nCVE-2013-2164, CVE-2013-2206, CVE-2013-2224, CVE-2013-2234, \nCVE-2013-2237, CVE-2013-2232 to these issues. \n \nColumn 4 of the following table lists the action required to \nremediate the vulnerability in each release, if a solution is \navailable. \n \n\n", "published": "2013-12-05T00:00:00", "cvss": {"score": 6.9, "vector": "AV:LOCAL/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://www.vmware.com/security/advisories/VMSA-2013-0015.html", "cvelist": ["CVE-2013-2234", "CVE-2013-2206", "CVE-2013-0791", "CVE-2013-2147", "CVE-2013-2232", "CVE-2013-2237", "CVE-2012-3552", "CVE-2013-2224", "CVE-2012-2372", "CVE-2013-2164", "CVE-2013-1620"], "lastseen": "2016-09-04T11:19:35"}], "debian": [{"id": "DSA-2720", "type": "debian", "title": "icedove -- several vulnerabilities", "description": "Multiple security issues have been found in Icedove, Debian's version of the Mozilla Thunderbird mail and news client. Multiple memory safety errors, use-after-free vulnerabilities, missing permission checks, incorrect memory handling and other implementation errors may lead to the execution of arbitrary code, privilege escalation, information disclosure or cross-site request forgery.\n\nAs already announced for Iceweasel: we're changing the approach for security updates for Icedove in stable-security: instead of backporting security fixes, we now provide releases based on the Extended Support Release branch. As such, this update introduces packages based on Thunderbird 17 and at some point in the future we will switch to the next ESR branch once ESR 17 has reached it's end of life.\n\nSome Icedove extensions currently packaged in the Debian archive are not compatible with the new browser engine. Up-to-date and compatible versions can be retrieved from <http://addons.mozilla.org> as a short term solution.\n\nAn updated and compatible version of Enigmail is included with this update.\n\nThe Icedove version in the oldstable distribution (squeeze) is no longer supported with full security updates. However, it should be noted that almost all security issues in Icedove stem from the included browser engine. These security problems only affect Icedove if scripting and HTML mails are enabled. If there are security issues specific to Icedove (e.g. a hypothetical buffer overflow in the IMAP implementation) we'll make an effort to backport such fixes to oldstable.\n\nFor the stable distribution (wheezy), these problems have been fixed in version 17.0.7-1~deb7u1.\n\nFor the unstable distribution (sid), these problems have been fixed in version 17.0.7-1.\n\nWe recommend that you upgrade your icedove packages.", "published": "2013-07-06T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://www.debian.org/security/dsa-2720", "cvelist": ["CVE-2013-1687", "CVE-2013-1692", "CVE-2013-1678", "CVE-2013-1670", "CVE-2013-1685", "CVE-2013-1697", "CVE-2013-1694", "CVE-2013-1680", "CVE-2013-0795", "CVE-2013-1679", "CVE-2013-1681", "CVE-2013-1690", "CVE-2013-0801", "CVE-2013-1684", "CVE-2013-1676", "CVE-2013-1675", "CVE-2013-1686", "CVE-2013-1682", "CVE-2013-1674", "CVE-2013-1693", "CVE-2013-1677"], "lastseen": "2017-11-11T14:45:42"}, {"id": "DSA-2699", "type": "debian", "title": "iceweasel -- several vulnerabilities", "description": "Multiple security issues have been found in Iceweasel, Debian's version of the Mozilla Firefox web browser: Multiple memory safety errors, missing input sanitising vulnerabilities, use-after-free vulnerabilities, buffer overflows and other programming errors may lead to the execution of arbitrary code, privilege escalation, information leaks or cross-site-scripting.\n\nWe're changing the approach for security updates for Iceweasel, Icedove and Iceape in stable-security: Instead of backporting security fixes, we now provide releases based on the Extended Support Release branch. As such, this update introduces packages based on Firefox 17 and at some point in the future we will switch to the next ESR branch once ESR 17 has reached it's end of life.\n\nSome Xul extensions currently packaged in the Debian archive are not compatible with the new browser engine. Up-to-date and compatible versions can be retrieved from <http://addons.mozilla.org> as a short term solution. A solution to keep packaged extensions compatible with the Mozilla releases is still being sorted out.\n\nWe don't have the resources to backport security fixes to the Iceweasel release in oldstable-security any longer. If you're up to the task and want to help, please get in touch with team@security.debian.org. Otherwise, we'll announce the end of security support for Iceweasel, Icedove and Iceape in Squeeze in the next update round.\n\nFor the stable distribution (wheezy), these problems have been fixed in version 17.0.6esr-1~deb7u1.\n\nFor the unstable distribution (sid), these problems have been fixed in version 17.0.6esr-1.\n\nWe recommend that you upgrade your iceweasel packages.", "published": "2013-06-02T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://www.debian.org/security/dsa-2699", "cvelist": ["CVE-2013-1678", "CVE-2013-0783", "CVE-2013-1670", "CVE-2013-0787", "CVE-2013-1680", "CVE-2013-0780", "CVE-2013-0795", "CVE-2013-1679", "CVE-2013-0796", "CVE-2013-0782", "CVE-2013-0800", "CVE-2013-1681", "CVE-2013-0773", "CVE-2013-0788", "CVE-2013-0775", "CVE-2013-0801", "CVE-2013-1676", "CVE-2013-1675", "CVE-2013-1674", "CVE-2013-0776", "CVE-2013-1677", "CVE-2013-0793"], "lastseen": "2016-09-02T18:29:56"}]}}