Lucene search

K
openvasCopyright (c) 2012 Greenbone Networks GmbHOPENVAS:850250
HistoryDec 13, 2012 - 12:00 a.m.

SuSE Update for xulrunner openSUSE-SU-2012:0924-1 (xulrunner)

2012-12-1300:00:00
Copyright (c) 2012 Greenbone Networks GmbH
plugins.openvas.org
19

0.265 Low

EPSS

Percentile

96.3%

Check for the Version of xulrunner

###############################################################################
# OpenVAS Vulnerability Test
# $Id: gb_suse_2012_0924_1.nasl 8265 2018-01-01 06:29:23Z teissa $
#
# SuSE Update for xulrunner openSUSE-SU-2012:0924-1 (xulrunner)
#
# Authors:
# System Generated Check
#
# Copyright:
# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################

include("revisions-lib.inc");
tag_insight = "Mozilla XULRunner was updated to 14.0.1, fixing bugs and
  security issues:



  Following security issues were fixed: MFSA 2012-42: Mozilla
  developers identified and fixed several memory safety bugs
  in the browser engine used in Firefox and other
  Mozilla-based products. Some of these bugs showed evidence
  of memory corruption under certain circumstances, and we
  presume that with enough effort at least some of these
  could be exploited to run arbitrary code.

  CVE-2012-1949: Brian Smith, Gary Kwong, Christian Holler,
  Jesse Ruderman, Christoph Diehl, Chris Jones, Brad Lassey,
  and Kyle Huey reported memory safety problems and crashes
  that affect Firefox 13.

  CVE-2012-1948: Benoit Jacob, Jesse Ruderman, Christian
  Holler, and Bill McCloskey reported memory safety problems
  and crashes that affect Firefox ESR 10 and Firefox 13.


  MFSA 2012-43 / CVE-2012-1950: Security researcher Mario
  Gomes andresearch firm Code Audit Labs reported a mechanism
  to short-circuit page loads through drag and drop to the
  addressbar by canceling the page load. This causes the
  address of the previously site entered to be displayed in
  the addressbar instead of the currently loaded page. This
  could lead to potential phishing attacks on users.

  MFSA 2012-44

  Google security researcher Abhishek Arya used the Address
  Sanitizer tool to uncover four issues: two use-after-free
  problems, one out of bounds read bug, and a bad cast. The
  first use-after-free problem is caused when an array of
  nsSMILTimeValueSpec objects is destroyed but attempts are
  made to call into objects in this array later. The second
  use-after-free problem is in nsDocument::AdoptNode when it
  adopts into an empty document and then adopts into another
  document, emptying the first one. The heap buffer overflow
  is in ElementAnimations when data is read off of end of an
  array and then pointers are dereferenced. The bad cast
  happens when nsTableFrame::InsertFrames is called with
  frames in aFrameList that are a mix of row group frames and
  column group frames. AppendFrames is not able to handle
  this mix.

  All four of these issues are potentially exploitable.
  CVE-2012-1951: Heap-use-after-free in
  nsSMILTimeValueSpec::IsEventBased CVE-2012-1954:
  Heap-use-after-free in nsDocument::AdoptNode CVE-2012-1953:
  Out of bounds read in ElementAnimations::EnsureStyleRuleFor
  CVE-2012-1952: Bad cast in nsTableFrame::InsertFrames


  MFSA 2012-45 / CVE-2012-1955: Security researcher Mariusz
  Mlynski reported an issue with spoofing of the location
  property. In this issue, calls to history.forward  ... 

  Description truncated, for more information please check the Reference URL";

tag_affected = "xulrunner on openSUSE 12.1";
tag_solution = "Please Install the Updated Packages.";



if(description)
{
  script_id(850250);
  script_version("$Revision: 8265 $");
  script_tag(name:"last_modification", value:"$Date: 2018-01-01 07:29:23 +0100 (Mon, 01 Jan 2018) $");
  script_tag(name:"creation_date", value:"2012-12-13 17:01:28 +0530 (Thu, 13 Dec 2012)");
  script_cve_id("CVE-2012-1948", "CVE-2012-1949", "CVE-2012-1950", "CVE-2012-1951",
                "CVE-2012-1952", "CVE-2012-1953", "CVE-2012-1954", "CVE-2012-1955",
                "CVE-2012-1957", "CVE-2012-1958", "CVE-2012-1959", "CVE-2012-1960",
                "CVE-2012-1961", "CVE-2012-1962", "CVE-2012-1963", "CVE-2012-1965",
                "CVE-2012-1966", "CVE-2012-1967", "CVE-2012-1964");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_xref(name: "openSUSE-SU", value: "2012:0924_1");
  script_name("SuSE Update for xulrunner openSUSE-SU-2012:0924-1 (xulrunner)");

  script_tag(name: "summary" , value: "Check for the Version of xulrunner");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (c) 2012 Greenbone Networks GmbH");
  script_family("SuSE Local Security Checks");
  script_dependencies("gather-package-list.nasl");
  script_mandatory_keys("ssh/login/suse", "ssh/login/rpms");
  script_tag(name : "affected" , value : tag_affected);
  script_tag(name : "solution" , value : tag_solution);
  script_tag(name : "insight" , value : tag_insight);
  script_tag(name:"qod_type", value:"package");
  script_tag(name:"solution_type", value:"VendorFix");
  exit(0);
}


include("pkg-lib-rpm.inc");

release = get_kb_item("ssh/login/release");

res = "";
if(release == NULL){
  exit(0);
}

if(release == "openSUSE12.1")
{

  if ((res = isrpmvuln(pkg:"mozilla-js", rpm:"mozilla-js~14.0.1~2.32.2", rls:"openSUSE12.1")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isrpmvuln(pkg:"mozilla-js-debuginfo", rpm:"mozilla-js-debuginfo~14.0.1~2.32.2", rls:"openSUSE12.1")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isrpmvuln(pkg:"xulrunner", rpm:"xulrunner~14.0.1~2.32.2", rls:"openSUSE12.1")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isrpmvuln(pkg:"xulrunner-buildsymbols", rpm:"xulrunner-buildsymbols~14.0.1~2.32.2", rls:"openSUSE12.1")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isrpmvuln(pkg:"xulrunner-debuginfo", rpm:"xulrunner-debuginfo~14.0.1~2.32.2", rls:"openSUSE12.1")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isrpmvuln(pkg:"xulrunner-debugsource", rpm:"xulrunner-debugsource~14.0.1~2.32.2", rls:"openSUSE12.1")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isrpmvuln(pkg:"xulrunner-devel", rpm:"xulrunner-devel~14.0.1~2.32.2", rls:"openSUSE12.1")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isrpmvuln(pkg:"xulrunner-devel-debuginfo", rpm:"xulrunner-devel-debuginfo~14.0.1~2.32.2", rls:"openSUSE12.1")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isrpmvuln(pkg:"mozilla-js-32bit", rpm:"mozilla-js-32bit~14.0.1~2.32.2", rls:"openSUSE12.1")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isrpmvuln(pkg:"mozilla-js-debuginfo-32bit", rpm:"mozilla-js-debuginfo-32bit~14.0.1~2.32.2", rls:"openSUSE12.1")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isrpmvuln(pkg:"xulrunner-32bit", rpm:"xulrunner-32bit~14.0.1~2.32.2", rls:"openSUSE12.1")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isrpmvuln(pkg:"xulrunner-debuginfo-32bit", rpm:"xulrunner-debuginfo-32bit~14.0.1~2.32.2", rls:"openSUSE12.1")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isrpmvuln(pkg:"mozilla-js-debuginfo-x86", rpm:"mozilla-js-debuginfo-x86~14.0.1~2.32.2", rls:"openSUSE12.1")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isrpmvuln(pkg:"mozilla-js-x86", rpm:"mozilla-js-x86~14.0.1~2.32.2", rls:"openSUSE12.1")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isrpmvuln(pkg:"xulrunner-debuginfo-x86", rpm:"xulrunner-debuginfo-x86~14.0.1~2.32.2", rls:"openSUSE12.1")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isrpmvuln(pkg:"xulrunner-x86", rpm:"xulrunner-x86~14.0.1~2.32.2", rls:"openSUSE12.1")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if (__pkg_match) exit(99); # Not vulnerable.
  exit(0);
}

References