CentOS Update for firefox CESA-2009:1674 centos5 i386. Update contains Firefox version 3.0.16 to fix multiple flaws including arbitrary code execution, SSL indicator display, and NTLM authentication weakness
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
OpenVAS | CentOS Update for firefox CESA-2009:1674 centos4 i386 | 9 Aug 201100:00 | – | openvas |
OpenVAS | RedHat Security Advisory RHSA-2009:1674 | 30 Dec 200900:00 | – | openvas |
OpenVAS | RedHat Security Advisory RHSA-2009:1674 | 30 Dec 200900:00 | – | openvas |
OpenVAS | Ubuntu: Security Advisory (USN-873-1) | 30 Dec 200900:00 | – | openvas |
OpenVAS | CentOS Update for firefox CESA-2009:1674 centos5 i386 | 9 Aug 201100:00 | – | openvas |
OpenVAS | Ubuntu: Security Advisory (USN-877-1) | 15 Jan 201000:00 | – | openvas |
OpenVAS | CentOS Security Advisory CESA-2009:1674 (firefox) | 30 Dec 200900:00 | – | openvas |
OpenVAS | Oracle: Security Advisory (ELSA-2009-1674) | 8 Oct 201500:00 | – | openvas |
OpenVAS | CentOS Security Advisory CESA-2009:1674 (firefox) | 30 Dec 200900:00 | – | openvas |
OpenVAS | Debian Security Advisory DSA 1956-1 (xulrunner) | 30 Dec 200900:00 | – | openvas |
###############################################################################
# OpenVAS Vulnerability Test
#
# CentOS Update for firefox CESA-2009:1674 centos5 i386
#
# Authors:
# System Generated Check
#
# Copyright:
# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################
include("revisions-lib.inc");
tag_insight = "Mozilla Firefox is an open source Web browser. XULRunner provides the XUL
Runtime environment for Mozilla Firefox.
Several flaws were found in the processing of malformed web content. A web
page containing malicious content could cause Firefox to crash or,
potentially, execute arbitrary code with the privileges of the user running
Firefox. (CVE-2009-3979, CVE-2009-3981, CVE-2009-3986)
A flaw was found in the Firefox NT Lan Manager (NTLM) authentication
protocol implementation. If an attacker could trick a local user that has
NTLM credentials into visiting a specially-crafted web page, they could
send arbitrary requests, authenticated with the user's NTLM credentials, to
other applications on the user's system. (CVE-2009-3983)
A flaw was found in the way Firefox displayed the SSL location bar
indicator. An attacker could create an unencrypted web page that appears to
be encrypted, possibly tricking the user into believing they are visiting a
secure page. (CVE-2009-3984)
A flaw was found in the way Firefox displayed blank pages after a user
navigates to an invalid address. If a user visits an attacker-controlled
web page that results in a blank page, the attacker could inject content
into that blank page, possibly tricking the user into believing they are
viewing a legitimate page. (CVE-2009-3985)
For technical details regarding these flaws, refer to the Mozilla security
advisories for Firefox 3.0.16. You can find a link to the Mozilla
advisories in the References section of this errata.
All Firefox users should upgrade to these updated packages, which contain
Firefox version 3.0.16, which corrects these issues. After installing the
update, Firefox must be restarted for the changes to take effect.";
tag_solution = "Please Install the Updated Packages.";
tag_affected = "firefox on CentOS 5";
if(description)
{
script_xref(name : "URL" , value : "http://lists.centos.org/pipermail/centos-announce/2009-December/016391.html");
script_id(880843);
script_version("$Revision: 6653 $");
script_tag(name:"last_modification", value:"$Date: 2017-07-10 13:46:53 +0200 (Mon, 10 Jul 2017) $");
script_tag(name:"creation_date", value:"2011-08-09 08:20:34 +0200 (Tue, 09 Aug 2011)");
script_tag(name:"cvss_base", value:"9.3");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:C/I:C/A:C");
script_xref(name: "CESA", value: "2009:1674");
script_cve_id("CVE-2009-3979", "CVE-2009-3981", "CVE-2009-3983", "CVE-2009-3984", "CVE-2009-3985", "CVE-2009-3986");
script_name("CentOS Update for firefox CESA-2009:1674 centos5 i386");
script_summary("Check for the Version of firefox");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
script_family("CentOS Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/centos", "ssh/login/rpms");
script_tag(name : "affected" , value : tag_affected);
script_tag(name : "insight" , value : tag_insight);
script_tag(name : "solution" , value : tag_solution);
script_tag(name:"qod_type", value:"package");
script_tag(name:"solution_type", value:"VendorFix");
exit(0);
}
include("pkg-lib-rpm.inc");
release = get_kb_item("ssh/login/release");
res = "";
if(release == NULL){
exit(0);
}
if(release == "CentOS5")
{
if ((res = isrpmvuln(pkg:"firefox", rpm:"firefox~3.0.16~1.el5.centos", rls:"CentOS5")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"xulrunner", rpm:"xulrunner~1.9.0.16~2.el5_4", rls:"CentOS5")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"xulrunner-devel", rpm:"xulrunner-devel~1.9.0.16~2.el5_4", rls:"CentOS5")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"xulrunner-devel-unstable", rpm:"xulrunner-devel-unstable~1.9.0.16~2.el5_4", rls:"CentOS5")) != NULL)
{
security_message(data:res);
exit(0);
}
if (__pkg_match) exit(99); # Not vulnerable.
exit(0);
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo