ID RHSA-2006:0610 Type redhat Reporter RedHat Modified 2017-09-08T11:54:53
Description
Mozilla Firefox is an open source Web browser.
The Mozilla Foundation has discontinued support for the Mozilla Firefox
1.0 branch. This update deprecates the Mozilla Firefox 1.0 branch in
Red Hat Enterprise Linux 4 in favor of the supported Mozilla Firefox
1.5 branch.
This update also resolves a number of outstanding Firefox security issues:
Several flaws were found in the way Firefox processed certain javascript
actions. A malicious web page could execute arbitrary javascript
instructions with the permissions of "chrome", allowing the page to steal
sensitive information or install browser malware. (CVE-2006-2776,
CVE-2006-2784, CVE-2006-2785, CVE-2006-2787, CVE-2006-3807, CVE-2006-3809,
CVE-2006-3812)
Several denial of service flaws were found in the way Firefox processed
certain web content. A malicious web page could crash the browser or
possibly execute arbitrary code as the user running Firefox.
(CVE-2006-2779, CVE-2006-2780, CVE-2006-3801, CVE-2006-3677, CVE-2006-3113,
CVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3811)
A cross-site scripting flaw was found in the way Firefox processed
Unicode Byte-Order-Mark (BOM) markers in UTF-8 web pages. A malicious web
page could execute a script within the browser that a web input sanitizer
could miss due to a malformed "script" tag. (CVE-2006-2783)
Several flaws were found in the way Firefox processed certain javascript
actions. A malicious web page could conduct a cross-site scripting attack
or steal sensitive information (such as cookies owned by other domains).
(CVE-2006-3802, CVE-2006-3810)
A form file upload flaw was found in the way Firefox handled javascript
input object mutation. A malicious web page could upload an arbitrary local
file at form submission time without user interaction. (CVE-2006-2782)
A denial of service flaw was found in the way Firefox called the
crypto.signText() javascript function. A malicious web page could crash the
browser if the victim had a client certificate loaded. (CVE-2006-2778)
Two HTTP response smuggling flaws were found in the way Firefox processed
certain invalid HTTP response headers. A malicious web site could return
specially crafted HTTP response headers which may bypass HTTP proxy
restrictions. (CVE-2006-2786)
A flaw was found in the way Firefox processed Proxy AutoConfig scripts. A
malicious Proxy AutoConfig server could execute arbitrary javascript
instructions with the permissions of "chrome", allowing the page to steal
sensitive information or install browser malware. (CVE-2006-3808)
A double free flaw was found in the way the nsIX509::getRawDER method was
called. If a victim visited a carefully crafted web page, it was possible
to execute arbitrary code as the user running Firefox. (CVE-2006-2788)
Users of Firefox are advised to upgrade to this update, which contains
Firefox version 1.5.0.5 that corrects these issues.
{"id": "RHSA-2006:0610", "type": "redhat", "bulletinFamily": "unix", "title": "(RHSA-2006:0610) firefox security update", "description": "Mozilla Firefox is an open source Web browser.\r\n\r\nThe Mozilla Foundation has discontinued support for the Mozilla Firefox\r\n1.0 branch. This update deprecates the Mozilla Firefox 1.0 branch in\r\nRed Hat Enterprise Linux 4 in favor of the supported Mozilla Firefox\r\n1.5 branch.\r\n\r\nThis update also resolves a number of outstanding Firefox security issues:\r\n\r\nSeveral flaws were found in the way Firefox processed certain javascript\r\nactions. A malicious web page could execute arbitrary javascript\r\ninstructions with the permissions of \"chrome\", allowing the page to steal\r\nsensitive information or install browser malware. (CVE-2006-2776,\r\nCVE-2006-2784, CVE-2006-2785, CVE-2006-2787, CVE-2006-3807, CVE-2006-3809,\r\nCVE-2006-3812)\r\n\r\nSeveral denial of service flaws were found in the way Firefox processed\r\ncertain web content. A malicious web page could crash the browser or\r\npossibly execute arbitrary code as the user running Firefox.\r\n(CVE-2006-2779, CVE-2006-2780, CVE-2006-3801, CVE-2006-3677, CVE-2006-3113,\r\nCVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3811)\r\n\r\nA cross-site scripting flaw was found in the way Firefox processed\r\nUnicode Byte-Order-Mark (BOM) markers in UTF-8 web pages. A malicious web\r\npage could execute a script within the browser that a web input sanitizer\r\ncould miss due to a malformed \"script\" tag. (CVE-2006-2783)\r\n\r\nSeveral flaws were found in the way Firefox processed certain javascript\r\nactions. A malicious web page could conduct a cross-site scripting attack\r\nor steal sensitive information (such as cookies owned by other domains).\r\n(CVE-2006-3802, CVE-2006-3810)\r\n\r\nA form file upload flaw was found in the way Firefox handled javascript\r\ninput object mutation. A malicious web page could upload an arbitrary local\r\nfile at form submission time without user interaction. (CVE-2006-2782)\r\n\r\nA denial of service flaw was found in the way Firefox called the\r\ncrypto.signText() javascript function. A malicious web page could crash the\r\nbrowser if the victim had a client certificate loaded. (CVE-2006-2778)\r\n\r\nTwo HTTP response smuggling flaws were found in the way Firefox processed\r\ncertain invalid HTTP response headers. A malicious web site could return\r\nspecially crafted HTTP response headers which may bypass HTTP proxy\r\nrestrictions. (CVE-2006-2786)\r\n\r\nA flaw was found in the way Firefox processed Proxy AutoConfig scripts. A\r\nmalicious Proxy AutoConfig server could execute arbitrary javascript\r\ninstructions with the permissions of \"chrome\", allowing the page to steal\r\nsensitive information or install browser malware. (CVE-2006-3808)\r\n\r\nA double free flaw was found in the way the nsIX509::getRawDER method was\r\ncalled. If a victim visited a carefully crafted web page, it was possible\r\nto execute arbitrary code as the user running Firefox. (CVE-2006-2788)\r\n\r\nUsers of Firefox are advised to upgrade to this update, which contains\r\nFirefox version 1.5.0.5 that corrects these issues.", "published": "2006-07-28T04:00:00", "modified": "2017-09-08T11:54:53", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}, "href": "https://access.redhat.com/errata/RHSA-2006:0610", "reporter": "RedHat", "references": [], "cvelist": ["CVE-2006-2776", "CVE-2006-2778", "CVE-2006-2779", "CVE-2006-2780", "CVE-2006-2782", "CVE-2006-2783", "CVE-2006-2784", "CVE-2006-2785", "CVE-2006-2786", "CVE-2006-2787", "CVE-2006-2788", "CVE-2006-3113", "CVE-2006-3677", "CVE-2006-3801", "CVE-2006-3802", "CVE-2006-3803", "CVE-2006-3805", "CVE-2006-3806", "CVE-2006-3807", "CVE-2006-3808", "CVE-2006-3809", "CVE-2006-3810", "CVE-2006-3811", "CVE-2006-3812"], "lastseen": "2019-08-13T18:46:23", "viewCount": 4, "enchantments": {"score": {"value": 9.0, "vector": "NONE", "modified": "2019-08-13T18:46:23", "rev": 2}, "dependencies": {"references": [{"type": "nessus", "idList": ["CENTOS_RHSA-2006-0610.NASL", "CENTOS_RHSA-2006-0611.NASL", "GENTOO_GLSA-200608-03.NASL", "REDHAT-RHSA-2006-0594.NASL", "REDHAT-RHSA-2006-0609.NASL", "MOZILLA_FIREFOX_1505.NASL", "REDHAT-RHSA-2006-0610.NASL", "REDHAT-RHSA-2006-0611.NASL", "CENTOS_RHSA-2006-0609.NASL", "UBUNTU_USN-327-1.NASL"]}, {"type": "centos", "idList": ["CESA-2006:0594-02", "CESA-2006:0608", "CESA-2006:0610", "CESA-2006:0611", "CESA-2006:0609"]}, {"type": "oraclelinux", "idList": ["ELSA-2006-0610", "ELSA-2006-0611"]}, {"type": "redhat", "idList": ["RHSA-2006:0609", "RHSA-2006:0578", "RHSA-2006:0594", "RHSA-2006:0608", "RHSA-2006:0611"]}, {"type": "ubuntu", "idList": ["USN-297-1", "USN-296-1", "USN-329-1", "USN-296-2", "USN-297-3", "USN-327-1", "USN-323-1"]}, {"type": "gentoo", "idList": ["GLSA-200606-12", "GLSA-200608-02", "GLSA-200608-03", "GLSA-200606-21", "GLSA-200608-04"]}, {"type": "openvas", "idList": ["OPENVAS:57329", "OPENVAS:57302", "OPENVAS:57378", "OPENVAS:57852", "OPENVAS:57358", "OPENVAS:57854", "OPENVAS:57146", "OPENVAS:57328", "OPENVAS:57853", "OPENVAS:57380"]}, {"type": "suse", "idList": ["SUSE-SA:2006:048", "SUSE-SA:2006:035"]}, {"type": "freebsd", "idList": ["E2A92664-1D60-11DB-88CF-000C6EC775D9"]}, {"type": "debian", "idList": ["DEBIAN:DSA-1160-2:83BE0", "DEBIAN:DSA-1160-1:44864", "DEBIAN:DSA-1161-1:80103", "DEBIAN:DSA-1120-1:5AE40", "DEBIAN:DSA-1159-1:138F3", "DEBIAN:DSA-1161-2:1671F", "DEBIAN:DSA-1159-2:06228"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:DOC:13644", "SECURITYVULNS:DOC:13643", "SECURITYVULNS:DOC:13656"]}, {"type": "cve", "idList": ["CVE-2006-3803", "CVE-2006-3801", "CVE-2006-3802", "CVE-2006-3808", "CVE-2006-3677"]}], "modified": "2019-08-13T18:46:23", "rev": 2}, "vulnersScore": 9.0}, "affectedPackage": [{"OS": "RedHat", "OSVersion": "4", "arch": "i386", "packageName": "firefox", "packageVersion": "1.5.0.5-0.el4.1", "packageFilename": "firefox-1.5.0.5-0.el4.1.i386.rpm", "operator": "lt"}, {"OS": "RedHat", "OSVersion": "4", "arch": "s390", "packageName": "firefox", "packageVersion": "1.5.0.5-0.el4.1", "packageFilename": "firefox-1.5.0.5-0.el4.1.s390.rpm", "operator": "lt"}, {"OS": "RedHat", "OSVersion": "4", "arch": "s390x", "packageName": "firefox", "packageVersion": "1.5.0.5-0.el4.1", "packageFilename": "firefox-1.5.0.5-0.el4.1.s390x.rpm", "operator": "lt"}, {"OS": "RedHat", "OSVersion": "4", "arch": "src", "packageName": "firefox", "packageVersion": "1.5.0.5-0.el4.1", "packageFilename": "firefox-1.5.0.5-0.el4.1.src.rpm", "operator": "lt"}, {"OS": "RedHat", "OSVersion": "4", "arch": "ppc", "packageName": "firefox", "packageVersion": "1.5.0.5-0.el4.1", "packageFilename": "firefox-1.5.0.5-0.el4.1.ppc.rpm", "operator": "lt"}, {"OS": "RedHat", "OSVersion": "4", "arch": "ia64", "packageName": "firefox", "packageVersion": "1.5.0.5-0.el4.1", "packageFilename": "firefox-1.5.0.5-0.el4.1.ia64.rpm", "operator": "lt"}, {"OS": "RedHat", "OSVersion": "4", "arch": "x86_64", "packageName": "firefox", "packageVersion": "1.5.0.5-0.el4.1", "packageFilename": "firefox-1.5.0.5-0.el4.1.x86_64.rpm", "operator": "lt"}]}
{"nessus": [{"lastseen": "2021-01-06T09:25:00", "description": "Updated firefox packages that fix several security bugs are now\navailable for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having critical security impact by the\nRed Hat Security Response Team.\n\nMozilla Firefox is an open source Web browser.\n\nThe Mozilla Foundation has discontinued support for the Mozilla\nFirefox 1.0 branch. This update deprecates the Mozilla Firefox 1.0\nbranch in Red Hat Enterprise Linux 4 in favor of the supported Mozilla\nFirefox 1.5 branch.\n\nThis update also resolves a number of outstanding Firefox security\nissues :\n\nSeveral flaws were found in the way Firefox processed certain\nJavaScript actions. A malicious web page could execute arbitrary\nJavaScript instructions with the permissions of 'chrome', allowing the\npage to steal sensitive information or install browser malware.\n(CVE-2006-2776, CVE-2006-2784, CVE-2006-2785, CVE-2006-2787,\nCVE-2006-3807, CVE-2006-3809, CVE-2006-3812)\n\nSeveral denial of service flaws were found in the way Firefox\nprocessed certain web content. A malicious web page could crash the\nbrowser or possibly execute arbitrary code as the user running\nFirefox. (CVE-2006-2779, CVE-2006-2780, CVE-2006-3801, CVE-2006-3677,\nCVE-2006-3113, CVE-2006-3803, CVE-2006-3805, CVE-2006-3806,\nCVE-2006-3811)\n\nA cross-site scripting flaw was found in the way Firefox processed\nUnicode Byte-Order-Mark (BOM) markers in UTF-8 web pages. A malicious\nweb page could execute a script within the browser that a web input\nsanitizer could miss due to a malformed 'script' tag. (CVE-2006-2783)\n\nSeveral flaws were found in the way Firefox processed certain\nJavaScript actions. A malicious web page could conduct a cross-site\nscripting attack or steal sensitive information (such as cookies owned\nby other domains). (CVE-2006-3802, CVE-2006-3810)\n\nA form file upload flaw was found in the way Firefox handled\nJavaScript input object mutation. A malicious web page could upload an\narbitrary local file at form submission time without user interaction.\n(CVE-2006-2782)\n\nA denial of service flaw was found in the way Firefox called the\ncrypto.signText() JavaScript function. A malicious web page could\ncrash the browser if the victim had a client certificate loaded.\n(CVE-2006-2778)\n\nTwo HTTP response smuggling flaws were found in the way Firefox\nprocessed certain invalid HTTP response headers. A malicious website\ncould return specially crafted HTTP response headers which may bypass\nHTTP proxy restrictions. (CVE-2006-2786)\n\nA flaw was found in the way Firefox processed Proxy AutoConfig\nscripts. A malicious Proxy AutoConfig server could execute arbitrary\nJavaScript instructions with the permissions of 'chrome', allowing the\npage to steal sensitive information or install browser malware.\n(CVE-2006-3808)\n\nA double free flaw was found in the way the nsIX509::getRawDER method\nwas called. If a victim visited a carefully crafted web page, it was\npossible to execute arbitrary code as the user running Firefox.\n(CVE-2006-2788)\n\nUsers of Firefox are advised to upgrade to this update, which contains\nFirefox version 1.5.0.5 that corrects these issues.", "edition": 28, "published": "2006-08-04T00:00:00", "title": "CentOS 4 : Firefox (CESA-2006:0610)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2006-3806", "CVE-2006-3809", "CVE-2006-3803", "CVE-2006-2780", "CVE-2006-3807", "CVE-2006-3811", "CVE-2006-2784", "CVE-2006-3677", "CVE-2006-2785", "CVE-2006-2776", "CVE-2006-2778", "CVE-2006-3810", "CVE-2006-2779", "CVE-2006-3801", "CVE-2006-3812", "CVE-2006-2786", "CVE-2006-3113", "CVE-2006-2783", "CVE-2006-3805", "CVE-2006-2788", "CVE-2006-2787", "CVE-2006-3808", "CVE-2006-2782", "CVE-2006-3802"], "modified": "2006-08-04T00:00:00", "cpe": ["cpe:/o:centos:centos:4", "p-cpe:/a:centos:centos:firefox"], "id": "CENTOS_RHSA-2006-0610.NASL", "href": "https://www.tenable.com/plugins/nessus/22137", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2006:0610 and \n# CentOS Errata and Security Advisory 2006:0610 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(22137);\n script_version(\"1.23\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2006-2776\", \"CVE-2006-2778\", \"CVE-2006-2779\", \"CVE-2006-2780\", \"CVE-2006-2782\", \"CVE-2006-2783\", \"CVE-2006-2784\", \"CVE-2006-2785\", \"CVE-2006-2786\", \"CVE-2006-2787\", \"CVE-2006-2788\", \"CVE-2006-3113\", \"CVE-2006-3677\", \"CVE-2006-3801\", \"CVE-2006-3802\", \"CVE-2006-3803\", \"CVE-2006-3805\", \"CVE-2006-3806\", \"CVE-2006-3807\", \"CVE-2006-3808\", \"CVE-2006-3809\", \"CVE-2006-3810\", \"CVE-2006-3811\", \"CVE-2006-3812\");\n script_xref(name:\"RHSA\", value:\"2006:0610\");\n\n script_name(english:\"CentOS 4 : Firefox (CESA-2006:0610)\");\n script_summary(english:\"Checks rpm output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated firefox packages that fix several security bugs are now\navailable for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having critical security impact by the\nRed Hat Security Response Team.\n\nMozilla Firefox is an open source Web browser.\n\nThe Mozilla Foundation has discontinued support for the Mozilla\nFirefox 1.0 branch. This update deprecates the Mozilla Firefox 1.0\nbranch in Red Hat Enterprise Linux 4 in favor of the supported Mozilla\nFirefox 1.5 branch.\n\nThis update also resolves a number of outstanding Firefox security\nissues :\n\nSeveral flaws were found in the way Firefox processed certain\nJavaScript actions. A malicious web page could execute arbitrary\nJavaScript instructions with the permissions of 'chrome', allowing the\npage to steal sensitive information or install browser malware.\n(CVE-2006-2776, CVE-2006-2784, CVE-2006-2785, CVE-2006-2787,\nCVE-2006-3807, CVE-2006-3809, CVE-2006-3812)\n\nSeveral denial of service flaws were found in the way Firefox\nprocessed certain web content. A malicious web page could crash the\nbrowser or possibly execute arbitrary code as the user running\nFirefox. (CVE-2006-2779, CVE-2006-2780, CVE-2006-3801, CVE-2006-3677,\nCVE-2006-3113, CVE-2006-3803, CVE-2006-3805, CVE-2006-3806,\nCVE-2006-3811)\n\nA cross-site scripting flaw was found in the way Firefox processed\nUnicode Byte-Order-Mark (BOM) markers in UTF-8 web pages. A malicious\nweb page could execute a script within the browser that a web input\nsanitizer could miss due to a malformed 'script' tag. (CVE-2006-2783)\n\nSeveral flaws were found in the way Firefox processed certain\nJavaScript actions. A malicious web page could conduct a cross-site\nscripting attack or steal sensitive information (such as cookies owned\nby other domains). (CVE-2006-3802, CVE-2006-3810)\n\nA form file upload flaw was found in the way Firefox handled\nJavaScript input object mutation. A malicious web page could upload an\narbitrary local file at form submission time without user interaction.\n(CVE-2006-2782)\n\nA denial of service flaw was found in the way Firefox called the\ncrypto.signText() JavaScript function. A malicious web page could\ncrash the browser if the victim had a client certificate loaded.\n(CVE-2006-2778)\n\nTwo HTTP response smuggling flaws were found in the way Firefox\nprocessed certain invalid HTTP response headers. A malicious website\ncould return specially crafted HTTP response headers which may bypass\nHTTP proxy restrictions. (CVE-2006-2786)\n\nA flaw was found in the way Firefox processed Proxy AutoConfig\nscripts. A malicious Proxy AutoConfig server could execute arbitrary\nJavaScript instructions with the permissions of 'chrome', allowing the\npage to steal sensitive information or install browser malware.\n(CVE-2006-3808)\n\nA double free flaw was found in the way the nsIX509::getRawDER method\nwas called. If a victim visited a carefully crafted web page, it was\npossible to execute arbitrary code as the user running Firefox.\n(CVE-2006-2788)\n\nUsers of Firefox are advised to upgrade to this update, which contains\nFirefox version 1.5.0.5 that corrects these issues.\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2006-July/013071.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?944d3248\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2006-July/013072.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?2fc400b0\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2006-July/013084.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?deef7c43\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected firefox package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Mozilla Suite/Firefox Navigator Object Code Execution');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n script_cwe_id(20, 94, 119);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:firefox\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:4\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2006/06/02\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/07/31\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/08/04\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^4([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 4.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-4\", reference:\"firefox-1.5.0.5-0.el4.1.centos4\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"firefox\");\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-17T13:05:40", "description": "Updated firefox packages that fix several security bugs are now\navailable for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having critical security impact by the\nRed Hat Security Response Team.\n\nMozilla Firefox is an open source Web browser.\n\nThe Mozilla Foundation has discontinued support for the Mozilla\nFirefox 1.0 branch. This update deprecates the Mozilla Firefox 1.0\nbranch in Red Hat Enterprise Linux 4 in favor of the supported Mozilla\nFirefox 1.5 branch.\n\nThis update also resolves a number of outstanding Firefox security\nissues :\n\nSeveral flaws were found in the way Firefox processed certain\nJavaScript actions. A malicious web page could execute arbitrary\nJavaScript instructions with the permissions of 'chrome', allowing the\npage to steal sensitive information or install browser malware.\n(CVE-2006-2776, CVE-2006-2784, CVE-2006-2785, CVE-2006-2787,\nCVE-2006-3807, CVE-2006-3809, CVE-2006-3812)\n\nSeveral denial of service flaws were found in the way Firefox\nprocessed certain web content. A malicious web page could crash the\nbrowser or possibly execute arbitrary code as the user running\nFirefox. (CVE-2006-2779, CVE-2006-2780, CVE-2006-3801, CVE-2006-3677,\nCVE-2006-3113, CVE-2006-3803, CVE-2006-3805, CVE-2006-3806,\nCVE-2006-3811)\n\nA cross-site scripting flaw was found in the way Firefox processed\nUnicode Byte-Order-Mark (BOM) markers in UTF-8 web pages. A malicious\nweb page could execute a script within the browser that a web input\nsanitizer could miss due to a malformed 'script' tag. (CVE-2006-2783)\n\nSeveral flaws were found in the way Firefox processed certain\nJavaScript actions. A malicious web page could conduct a cross-site\nscripting attack or steal sensitive information (such as cookies owned\nby other domains). (CVE-2006-3802, CVE-2006-3810)\n\nA form file upload flaw was found in the way Firefox handled\nJavaScript input object mutation. A malicious web page could upload an\narbitrary local file at form submission time without user interaction.\n(CVE-2006-2782)\n\nA denial of service flaw was found in the way Firefox called the\ncrypto.signText() JavaScript function. A malicious web page could\ncrash the browser if the victim had a client certificate loaded.\n(CVE-2006-2778)\n\nTwo HTTP response smuggling flaws were found in the way Firefox\nprocessed certain invalid HTTP response headers. A malicious website\ncould return specially crafted HTTP response headers which may bypass\nHTTP proxy restrictions. (CVE-2006-2786)\n\nA flaw was found in the way Firefox processed Proxy AutoConfig\nscripts. A malicious Proxy AutoConfig server could execute arbitrary\nJavaScript instructions with the permissions of 'chrome', allowing the\npage to steal sensitive information or install browser malware.\n(CVE-2006-3808)\n\nA double free flaw was found in the way the nsIX509::getRawDER method\nwas called. If a victim visited a carefully crafted web page, it was\npossible to execute arbitrary code as the user running Firefox.\n(CVE-2006-2788)\n\nUsers of Firefox are advised to upgrade to this update, which contains\nFirefox version 1.5.0.5 that corrects these issues.", "edition": 28, "published": "2006-07-29T00:00:00", "title": "RHEL 4 : firefox (RHSA-2006:0610)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2006-3806", "CVE-2006-3809", "CVE-2006-3803", "CVE-2006-2780", "CVE-2006-3807", "CVE-2006-3811", "CVE-2006-2784", "CVE-2006-3677", "CVE-2006-2785", "CVE-2006-2776", "CVE-2006-2778", "CVE-2006-3810", "CVE-2006-2779", "CVE-2006-3801", "CVE-2006-3812", "CVE-2006-2786", "CVE-2006-3113", "CVE-2006-2783", "CVE-2006-3805", "CVE-2006-2788", "CVE-2006-2787", "CVE-2006-3808", "CVE-2006-2782", "CVE-2006-3802"], "modified": "2006-07-29T00:00:00", "cpe": ["cpe:/o:redhat:enterprise_linux:4", "p-cpe:/a:redhat:enterprise_linux:firefox"], "id": "REDHAT-RHSA-2006-0610.NASL", "href": "https://www.tenable.com/plugins/nessus/22121", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2006:0610. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(22121);\n script_version(\"1.30\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2006-2776\", \"CVE-2006-2778\", \"CVE-2006-2779\", \"CVE-2006-2780\", \"CVE-2006-2782\", \"CVE-2006-2783\", \"CVE-2006-2784\", \"CVE-2006-2785\", \"CVE-2006-2786\", \"CVE-2006-2787\", \"CVE-2006-2788\", \"CVE-2006-3113\", \"CVE-2006-3677\", \"CVE-2006-3801\", \"CVE-2006-3802\", \"CVE-2006-3803\", \"CVE-2006-3805\", \"CVE-2006-3806\", \"CVE-2006-3807\", \"CVE-2006-3808\", \"CVE-2006-3809\", \"CVE-2006-3810\", \"CVE-2006-3811\", \"CVE-2006-3812\");\n script_xref(name:\"RHSA\", value:\"2006:0610\");\n\n script_name(english:\"RHEL 4 : firefox (RHSA-2006:0610)\");\n script_summary(english:\"Checks the rpm output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated firefox packages that fix several security bugs are now\navailable for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having critical security impact by the\nRed Hat Security Response Team.\n\nMozilla Firefox is an open source Web browser.\n\nThe Mozilla Foundation has discontinued support for the Mozilla\nFirefox 1.0 branch. This update deprecates the Mozilla Firefox 1.0\nbranch in Red Hat Enterprise Linux 4 in favor of the supported Mozilla\nFirefox 1.5 branch.\n\nThis update also resolves a number of outstanding Firefox security\nissues :\n\nSeveral flaws were found in the way Firefox processed certain\nJavaScript actions. A malicious web page could execute arbitrary\nJavaScript instructions with the permissions of 'chrome', allowing the\npage to steal sensitive information or install browser malware.\n(CVE-2006-2776, CVE-2006-2784, CVE-2006-2785, CVE-2006-2787,\nCVE-2006-3807, CVE-2006-3809, CVE-2006-3812)\n\nSeveral denial of service flaws were found in the way Firefox\nprocessed certain web content. A malicious web page could crash the\nbrowser or possibly execute arbitrary code as the user running\nFirefox. (CVE-2006-2779, CVE-2006-2780, CVE-2006-3801, CVE-2006-3677,\nCVE-2006-3113, CVE-2006-3803, CVE-2006-3805, CVE-2006-3806,\nCVE-2006-3811)\n\nA cross-site scripting flaw was found in the way Firefox processed\nUnicode Byte-Order-Mark (BOM) markers in UTF-8 web pages. A malicious\nweb page could execute a script within the browser that a web input\nsanitizer could miss due to a malformed 'script' tag. (CVE-2006-2783)\n\nSeveral flaws were found in the way Firefox processed certain\nJavaScript actions. A malicious web page could conduct a cross-site\nscripting attack or steal sensitive information (such as cookies owned\nby other domains). (CVE-2006-3802, CVE-2006-3810)\n\nA form file upload flaw was found in the way Firefox handled\nJavaScript input object mutation. A malicious web page could upload an\narbitrary local file at form submission time without user interaction.\n(CVE-2006-2782)\n\nA denial of service flaw was found in the way Firefox called the\ncrypto.signText() JavaScript function. A malicious web page could\ncrash the browser if the victim had a client certificate loaded.\n(CVE-2006-2778)\n\nTwo HTTP response smuggling flaws were found in the way Firefox\nprocessed certain invalid HTTP response headers. A malicious website\ncould return specially crafted HTTP response headers which may bypass\nHTTP proxy restrictions. (CVE-2006-2786)\n\nA flaw was found in the way Firefox processed Proxy AutoConfig\nscripts. A malicious Proxy AutoConfig server could execute arbitrary\nJavaScript instructions with the permissions of 'chrome', allowing the\npage to steal sensitive information or install browser malware.\n(CVE-2006-3808)\n\nA double free flaw was found in the way the nsIX509::getRawDER method\nwas called. If a victim visited a carefully crafted web page, it was\npossible to execute arbitrary code as the user running Firefox.\n(CVE-2006-2788)\n\nUsers of Firefox are advised to upgrade to this update, which contains\nFirefox version 1.5.0.5 that corrects these issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2776\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2778\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2779\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2780\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2782\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2783\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2784\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2785\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2786\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2787\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2788\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3113\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3677\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3801\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3802\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3803\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3805\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3806\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3807\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3808\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3809\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3810\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3811\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3812\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2006:0610\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected firefox package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Mozilla Suite/Firefox Navigator Object Code Execution');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n script_cwe_id(20, 94, 119);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:firefox\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:4\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2006/06/02\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/07/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/07/29\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^4([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 4.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2006:0610\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL4\", reference:\"firefox-1.5.0.5-0.el4.1\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"firefox\");\n }\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-06T09:25:00", "description": "Updated thunderbird packages that fix several security bugs are now\navailable for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having critical security impact by the\nRed Hat Security Response Team.\n\nMozilla Thunderbird is a standalone mail and newsgroup client.\n\nThe Mozilla Foundation has discontinued support for the Mozilla\nThunderbird 1.0 branch. This update deprecates the Mozilla Thunderbird\n1.0 branch in Red Hat Enterprise Linux 4 in favor of the supported\nMozilla Thunderbird 1.5 branch.\n\nThis update also resolves a number of outstanding Thunderbird security\nissues :\n\nSeveral flaws were found in the way Thunderbird processed certain\nJavaScript actions. A malicious mail message could execute arbitrary\nJavaScript instructions with the permissions of 'chrome', allowing the\npage to steal sensitive information or install browser malware.\n(CVE-2006-2776, CVE-2006-2784, CVE-2006-2785, CVE-2006-2787,\nCVE-2006-3807, CVE-2006-3809)\n\nSeveral denial of service flaws were found in the way Thunderbird\nprocessed certain mail messages. A malicious web page could crash the\nbrowser or possibly execute arbitrary code as the user running\nThunderbird. (CVE-2006-2779, CVE-2006-2780, CVE-2006-3801,\nCVE-2006-3677, CVE-2006-3113, CVE-2006-3803, CVE-2006-3805,\nCVE-2006-3806, CVE-2006-3811)\n\nSeveral flaws were found in the way Thunderbird processed certain\nJavaScript actions. A malicious mail message could conduct a\ncross-site scripting attack or steal sensitive information (such as\ncookies owned by other domains). (CVE-2006-3802, CVE-2006-3810)\n\nA form file upload flaw was found in the way Thunderbird handled\nJavaScript input object mutation. A malicious mail message could\nupload an arbitrary local file at form submission time without user\ninteraction. (CVE-2006-2782)\n\nA denial of service flaw was found in the way Thunderbird called the\ncrypto.signText() JavaScript function. A malicious mail message could\ncrash the browser if the victim had a client certificate loaded.\n(CVE-2006-2778)\n\nA flaw was found in the way Thunderbird processed Proxy AutoConfig\nscripts. A malicious Proxy AutoConfig server could execute arbitrary\nJavaScript instructions with the permissions of 'chrome', allowing the\npage to steal sensitive information or install client malware.\n(CVE-2006-3808)\n\nNote: Please note that JavaScript support is disabled by default in\nThunderbird. The above issues are not exploitable with JavaScript\ndisabled.\n\nTwo flaws were found in the way Thunderbird displayed malformed inline\nvcard attachments. If a victim viewed an email message containing a\ncarefully crafted vcard it was possible to execute arbitrary code as\nthe user running Thunderbird. (CVE-2006-2781, CVE-2006-3804)\n\nA cross site scripting flaw was found in the way Thunderbird processed\nUnicode Byte-order-Mark (BOM) markers in UTF-8 mail messages. A\nmalicious web page could execute a script within the browser that a\nweb input sanitizer could miss due to a malformed 'script' tag.\n(CVE-2006-2783)\n\nTwo HTTP response smuggling flaws were found in the way Thunderbird\nprocessed certain invalid HTTP response headers. A malicious website\ncould return specially crafted HTTP response headers which may bypass\nHTTP proxy restrictions. (CVE-2006-2786)\n\nA double free flaw was found in the way the nsIX509::getRawDER method\nwas called. If a victim visited a carefully crafted web page, it was\npossible to crash Thunderbird. (CVE-2006-2788)\n\nUsers of Thunderbird are advised to upgrade to this update, which\ncontains Thunderbird version 1.5.0.5 that corrects these issues.", "edition": 28, "published": "2006-08-04T00:00:00", "title": "CentOS 4 : thunderbird (CESA-2006:0611)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2006-3806", "CVE-2006-3809", "CVE-2006-3803", "CVE-2006-2780", "CVE-2006-3807", "CVE-2006-3811", "CVE-2006-2784", "CVE-2006-3677", "CVE-2006-2785", "CVE-2006-2776", "CVE-2006-3804", "CVE-2006-2778", "CVE-2006-3810", "CVE-2006-2779", "CVE-2006-2781", "CVE-2006-3801", "CVE-2006-2786", "CVE-2006-3113", "CVE-2006-2783", "CVE-2006-3805", "CVE-2006-2788", "CVE-2006-2787", "CVE-2006-3808", "CVE-2006-2782", "CVE-2006-3802"], "modified": "2006-08-04T00:00:00", "cpe": ["cpe:/o:centos:centos:4", "p-cpe:/a:centos:centos:thunderbird"], "id": "CENTOS_RHSA-2006-0611.NASL", "href": "https://www.tenable.com/plugins/nessus/22138", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2006:0611 and \n# CentOS Errata and Security Advisory 2006:0611 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(22138);\n script_version(\"1.23\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2006-2776\", \"CVE-2006-2778\", \"CVE-2006-2779\", \"CVE-2006-2780\", \"CVE-2006-2781\", \"CVE-2006-2782\", \"CVE-2006-2783\", \"CVE-2006-2784\", \"CVE-2006-2785\", \"CVE-2006-2786\", \"CVE-2006-2787\", \"CVE-2006-2788\", \"CVE-2006-3113\", \"CVE-2006-3677\", \"CVE-2006-3801\", \"CVE-2006-3802\", \"CVE-2006-3803\", \"CVE-2006-3804\", \"CVE-2006-3805\", \"CVE-2006-3806\", \"CVE-2006-3807\", \"CVE-2006-3808\", \"CVE-2006-3809\", \"CVE-2006-3810\", \"CVE-2006-3811\");\n script_xref(name:\"RHSA\", value:\"2006:0611\");\n\n script_name(english:\"CentOS 4 : thunderbird (CESA-2006:0611)\");\n script_summary(english:\"Checks rpm output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated thunderbird packages that fix several security bugs are now\navailable for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having critical security impact by the\nRed Hat Security Response Team.\n\nMozilla Thunderbird is a standalone mail and newsgroup client.\n\nThe Mozilla Foundation has discontinued support for the Mozilla\nThunderbird 1.0 branch. This update deprecates the Mozilla Thunderbird\n1.0 branch in Red Hat Enterprise Linux 4 in favor of the supported\nMozilla Thunderbird 1.5 branch.\n\nThis update also resolves a number of outstanding Thunderbird security\nissues :\n\nSeveral flaws were found in the way Thunderbird processed certain\nJavaScript actions. A malicious mail message could execute arbitrary\nJavaScript instructions with the permissions of 'chrome', allowing the\npage to steal sensitive information or install browser malware.\n(CVE-2006-2776, CVE-2006-2784, CVE-2006-2785, CVE-2006-2787,\nCVE-2006-3807, CVE-2006-3809)\n\nSeveral denial of service flaws were found in the way Thunderbird\nprocessed certain mail messages. A malicious web page could crash the\nbrowser or possibly execute arbitrary code as the user running\nThunderbird. (CVE-2006-2779, CVE-2006-2780, CVE-2006-3801,\nCVE-2006-3677, CVE-2006-3113, CVE-2006-3803, CVE-2006-3805,\nCVE-2006-3806, CVE-2006-3811)\n\nSeveral flaws were found in the way Thunderbird processed certain\nJavaScript actions. A malicious mail message could conduct a\ncross-site scripting attack or steal sensitive information (such as\ncookies owned by other domains). (CVE-2006-3802, CVE-2006-3810)\n\nA form file upload flaw was found in the way Thunderbird handled\nJavaScript input object mutation. A malicious mail message could\nupload an arbitrary local file at form submission time without user\ninteraction. (CVE-2006-2782)\n\nA denial of service flaw was found in the way Thunderbird called the\ncrypto.signText() JavaScript function. A malicious mail message could\ncrash the browser if the victim had a client certificate loaded.\n(CVE-2006-2778)\n\nA flaw was found in the way Thunderbird processed Proxy AutoConfig\nscripts. A malicious Proxy AutoConfig server could execute arbitrary\nJavaScript instructions with the permissions of 'chrome', allowing the\npage to steal sensitive information or install client malware.\n(CVE-2006-3808)\n\nNote: Please note that JavaScript support is disabled by default in\nThunderbird. The above issues are not exploitable with JavaScript\ndisabled.\n\nTwo flaws were found in the way Thunderbird displayed malformed inline\nvcard attachments. If a victim viewed an email message containing a\ncarefully crafted vcard it was possible to execute arbitrary code as\nthe user running Thunderbird. (CVE-2006-2781, CVE-2006-3804)\n\nA cross site scripting flaw was found in the way Thunderbird processed\nUnicode Byte-order-Mark (BOM) markers in UTF-8 mail messages. A\nmalicious web page could execute a script within the browser that a\nweb input sanitizer could miss due to a malformed 'script' tag.\n(CVE-2006-2783)\n\nTwo HTTP response smuggling flaws were found in the way Thunderbird\nprocessed certain invalid HTTP response headers. A malicious website\ncould return specially crafted HTTP response headers which may bypass\nHTTP proxy restrictions. (CVE-2006-2786)\n\nA double free flaw was found in the way the nsIX509::getRawDER method\nwas called. If a victim visited a carefully crafted web page, it was\npossible to crash Thunderbird. (CVE-2006-2788)\n\nUsers of Thunderbird are advised to upgrade to this update, which\ncontains Thunderbird version 1.5.0.5 that corrects these issues.\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2006-July/013073.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?1644ce03\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2006-July/013074.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?58494fb6\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2006-July/013085.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?90ad4ee2\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected thunderbird package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Mozilla Suite/Firefox Navigator Object Code Execution');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n script_cwe_id(20, 94, 119);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:thunderbird\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:4\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2006/06/02\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/07/29\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/08/04\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^4([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 4.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-4\", reference:\"thunderbird-1.5.0.5-0.el4.1.centos4\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"thunderbird\");\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-17T13:05:40", "description": "Updated thunderbird packages that fix several security bugs are now\navailable for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having critical security impact by the\nRed Hat Security Response Team.\n\nMozilla Thunderbird is a standalone mail and newsgroup client.\n\nThe Mozilla Foundation has discontinued support for the Mozilla\nThunderbird 1.0 branch. This update deprecates the Mozilla Thunderbird\n1.0 branch in Red Hat Enterprise Linux 4 in favor of the supported\nMozilla Thunderbird 1.5 branch.\n\nThis update also resolves a number of outstanding Thunderbird security\nissues :\n\nSeveral flaws were found in the way Thunderbird processed certain\nJavaScript actions. A malicious mail message could execute arbitrary\nJavaScript instructions with the permissions of 'chrome', allowing the\npage to steal sensitive information or install browser malware.\n(CVE-2006-2776, CVE-2006-2784, CVE-2006-2785, CVE-2006-2787,\nCVE-2006-3807, CVE-2006-3809)\n\nSeveral denial of service flaws were found in the way Thunderbird\nprocessed certain mail messages. A malicious web page could crash the\nbrowser or possibly execute arbitrary code as the user running\nThunderbird. (CVE-2006-2779, CVE-2006-2780, CVE-2006-3801,\nCVE-2006-3677, CVE-2006-3113, CVE-2006-3803, CVE-2006-3805,\nCVE-2006-3806, CVE-2006-3811)\n\nSeveral flaws were found in the way Thunderbird processed certain\nJavaScript actions. A malicious mail message could conduct a\ncross-site scripting attack or steal sensitive information (such as\ncookies owned by other domains). (CVE-2006-3802, CVE-2006-3810)\n\nA form file upload flaw was found in the way Thunderbird handled\nJavaScript input object mutation. A malicious mail message could\nupload an arbitrary local file at form submission time without user\ninteraction. (CVE-2006-2782)\n\nA denial of service flaw was found in the way Thunderbird called the\ncrypto.signText() JavaScript function. A malicious mail message could\ncrash the browser if the victim had a client certificate loaded.\n(CVE-2006-2778)\n\nA flaw was found in the way Thunderbird processed Proxy AutoConfig\nscripts. A malicious Proxy AutoConfig server could execute arbitrary\nJavaScript instructions with the permissions of 'chrome', allowing the\npage to steal sensitive information or install client malware.\n(CVE-2006-3808)\n\nNote: Please note that JavaScript support is disabled by default in\nThunderbird. The above issues are not exploitable with JavaScript\ndisabled.\n\nTwo flaws were found in the way Thunderbird displayed malformed inline\nvcard attachments. If a victim viewed an email message containing a\ncarefully crafted vcard it was possible to execute arbitrary code as\nthe user running Thunderbird. (CVE-2006-2781, CVE-2006-3804)\n\nA cross site scripting flaw was found in the way Thunderbird processed\nUnicode Byte-order-Mark (BOM) markers in UTF-8 mail messages. A\nmalicious web page could execute a script within the browser that a\nweb input sanitizer could miss due to a malformed 'script' tag.\n(CVE-2006-2783)\n\nTwo HTTP response smuggling flaws were found in the way Thunderbird\nprocessed certain invalid HTTP response headers. A malicious website\ncould return specially crafted HTTP response headers which may bypass\nHTTP proxy restrictions. (CVE-2006-2786)\n\nA double free flaw was found in the way the nsIX509::getRawDER method\nwas called. If a victim visited a carefully crafted web page, it was\npossible to crash Thunderbird. (CVE-2006-2788)\n\nUsers of Thunderbird are advised to upgrade to this update, which\ncontains Thunderbird version 1.5.0.5 that corrects these issues.", "edition": 28, "published": "2006-07-29T00:00:00", "title": "RHEL 4 : thunderbird (RHSA-2006:0611)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2006-3806", "CVE-2006-3809", "CVE-2006-3803", "CVE-2006-2780", "CVE-2006-3807", "CVE-2006-3811", "CVE-2006-2784", "CVE-2006-3677", "CVE-2006-2785", "CVE-2006-2776", "CVE-2006-3804", "CVE-2006-2778", "CVE-2006-3810", "CVE-2006-2779", "CVE-2006-2781", "CVE-2006-3801", "CVE-2006-2786", "CVE-2006-3113", "CVE-2006-2783", "CVE-2006-3805", "CVE-2006-2788", "CVE-2006-2787", "CVE-2006-3808", "CVE-2006-2782", "CVE-2006-3802"], "modified": "2006-07-29T00:00:00", "cpe": ["cpe:/o:redhat:enterprise_linux:4", "p-cpe:/a:redhat:enterprise_linux:thunderbird"], "id": "REDHAT-RHSA-2006-0611.NASL", "href": "https://www.tenable.com/plugins/nessus/22122", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2006:0611. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(22122);\n script_version(\"1.30\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2006-2776\", \"CVE-2006-2778\", \"CVE-2006-2779\", \"CVE-2006-2780\", \"CVE-2006-2781\", \"CVE-2006-2782\", \"CVE-2006-2783\", \"CVE-2006-2784\", \"CVE-2006-2785\", \"CVE-2006-2786\", \"CVE-2006-2787\", \"CVE-2006-2788\", \"CVE-2006-3113\", \"CVE-2006-3677\", \"CVE-2006-3801\", \"CVE-2006-3802\", \"CVE-2006-3803\", \"CVE-2006-3804\", \"CVE-2006-3805\", \"CVE-2006-3806\", \"CVE-2006-3807\", \"CVE-2006-3808\", \"CVE-2006-3809\", \"CVE-2006-3810\", \"CVE-2006-3811\");\n script_xref(name:\"RHSA\", value:\"2006:0611\");\n\n script_name(english:\"RHEL 4 : thunderbird (RHSA-2006:0611)\");\n script_summary(english:\"Checks the rpm output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated thunderbird packages that fix several security bugs are now\navailable for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having critical security impact by the\nRed Hat Security Response Team.\n\nMozilla Thunderbird is a standalone mail and newsgroup client.\n\nThe Mozilla Foundation has discontinued support for the Mozilla\nThunderbird 1.0 branch. This update deprecates the Mozilla Thunderbird\n1.0 branch in Red Hat Enterprise Linux 4 in favor of the supported\nMozilla Thunderbird 1.5 branch.\n\nThis update also resolves a number of outstanding Thunderbird security\nissues :\n\nSeveral flaws were found in the way Thunderbird processed certain\nJavaScript actions. A malicious mail message could execute arbitrary\nJavaScript instructions with the permissions of 'chrome', allowing the\npage to steal sensitive information or install browser malware.\n(CVE-2006-2776, CVE-2006-2784, CVE-2006-2785, CVE-2006-2787,\nCVE-2006-3807, CVE-2006-3809)\n\nSeveral denial of service flaws were found in the way Thunderbird\nprocessed certain mail messages. A malicious web page could crash the\nbrowser or possibly execute arbitrary code as the user running\nThunderbird. (CVE-2006-2779, CVE-2006-2780, CVE-2006-3801,\nCVE-2006-3677, CVE-2006-3113, CVE-2006-3803, CVE-2006-3805,\nCVE-2006-3806, CVE-2006-3811)\n\nSeveral flaws were found in the way Thunderbird processed certain\nJavaScript actions. A malicious mail message could conduct a\ncross-site scripting attack or steal sensitive information (such as\ncookies owned by other domains). (CVE-2006-3802, CVE-2006-3810)\n\nA form file upload flaw was found in the way Thunderbird handled\nJavaScript input object mutation. A malicious mail message could\nupload an arbitrary local file at form submission time without user\ninteraction. (CVE-2006-2782)\n\nA denial of service flaw was found in the way Thunderbird called the\ncrypto.signText() JavaScript function. A malicious mail message could\ncrash the browser if the victim had a client certificate loaded.\n(CVE-2006-2778)\n\nA flaw was found in the way Thunderbird processed Proxy AutoConfig\nscripts. A malicious Proxy AutoConfig server could execute arbitrary\nJavaScript instructions with the permissions of 'chrome', allowing the\npage to steal sensitive information or install client malware.\n(CVE-2006-3808)\n\nNote: Please note that JavaScript support is disabled by default in\nThunderbird. The above issues are not exploitable with JavaScript\ndisabled.\n\nTwo flaws were found in the way Thunderbird displayed malformed inline\nvcard attachments. If a victim viewed an email message containing a\ncarefully crafted vcard it was possible to execute arbitrary code as\nthe user running Thunderbird. (CVE-2006-2781, CVE-2006-3804)\n\nA cross site scripting flaw was found in the way Thunderbird processed\nUnicode Byte-order-Mark (BOM) markers in UTF-8 mail messages. A\nmalicious web page could execute a script within the browser that a\nweb input sanitizer could miss due to a malformed 'script' tag.\n(CVE-2006-2783)\n\nTwo HTTP response smuggling flaws were found in the way Thunderbird\nprocessed certain invalid HTTP response headers. A malicious website\ncould return specially crafted HTTP response headers which may bypass\nHTTP proxy restrictions. (CVE-2006-2786)\n\nA double free flaw was found in the way the nsIX509::getRawDER method\nwas called. If a victim visited a carefully crafted web page, it was\npossible to crash Thunderbird. (CVE-2006-2788)\n\nUsers of Thunderbird are advised to upgrade to this update, which\ncontains Thunderbird version 1.5.0.5 that corrects these issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2776\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2778\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2779\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2780\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2781\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2782\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2783\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2784\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2785\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2786\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2787\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2788\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3113\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3677\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3801\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3802\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3803\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3804\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3805\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3806\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3807\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3808\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3809\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3810\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3811\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2006:0611\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected thunderbird package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Mozilla Suite/Firefox Navigator Object Code Execution');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n script_cwe_id(20, 94, 119);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:thunderbird\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:4\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2006/06/02\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/07/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/07/29\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^4([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 4.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2006:0611\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL4\", reference:\"thunderbird-1.5.0.5-0.el4.1\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"thunderbird\");\n }\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-06T09:25:00", "description": "Updated SeaMonkey packages that fix several security bugs in the\nmozilla package are now available for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having critical security impact by the\nRed Hat Security Response Team.\n\nSeaMonkey is an open source Web browser, advanced email and newsgroup\nclient, IRC chat client, and HTML editor.\n\nThe Mozilla Foundation has discontinued support for the Mozilla Suite.\nThis update deprecates the Mozilla Suite in Red Hat Enterprise Linux 4\nin favor of the supported SeaMonkey Suite.\n\nThis update also resolves a number of outstanding Mozilla security\nissues :\n\nSeveral flaws were found in the way SeaMonkey processed certain\nJavaScript actions. A malicious web page could execute arbitrary\nJavaScript instructions with the permissions of 'chrome', allowing the\npage to steal sensitive information or install browser malware.\n(CVE-2006-2776, CVE-2006-2784, CVE-2006-2785, CVE-2006-2787,\nCVE-2006-3807, CVE-2006-3809, CVE-2006-3812)\n\nSeveral denial of service flaws were found in the way SeaMonkey\nprocessed certain web content. A malicious web page could crash the\nbrowser or possibly execute arbitrary code as the user running\nSeaMonkey. (CVE-2006-2779, CVE-2006-2780, CVE-2006-3801,\nCVE-2006-3677, CVE-2006-3113, CVE-2006-3803, CVE-2006-3805,\nCVE-2006-3806, CVE-2006-3811)\n\nTwo flaws were found in the way SeaMonkey-mail displayed malformed\ninline vcard attachments. If a victim viewed an email message\ncontaining a carefully crafted vcard it was possible to execute\narbitrary code as the user running Mozilla-mail. (CVE-2006-2781,\nCVE-2006-3804)\n\nA cross-site scripting flaw was found in the way SeaMonkey processed\nUnicode Byte-Order-Mark (BOM) markers in UTF-8 web pages. A malicious\nweb page could execute a script within the browser that a web input\nsanitizer could miss due to a malformed 'script' tag. (CVE-2006-2783)\n\nSeveral flaws were found in the way SeaMonkey processed certain\nJavaScript actions. A malicious web page could conduct a cross-site\nscripting attack or steal sensitive information (such as cookies owned\nby other domains). (CVE-2006-3802, CVE-2006-3810)\n\nA form file upload flaw was found in the way SeaMonkey handled\nJavaScript input object mutation. A malicious web page could upload an\narbitrary local file at form submission time without user interaction.\n(CVE-2006-2782)\n\nA denial of service flaw was found in the way SeaMonkey called the\ncrypto.signText() JavaScript function. A malicious web page could\ncrash the browser if the victim had a client certificate loaded.\n(CVE-2006-2778)\n\nTwo HTTP response smuggling flaws were found in the way SeaMonkey\nprocessed certain invalid HTTP response headers. A malicious website\ncould return specially crafted HTTP response headers which may bypass\nHTTP proxy restrictions. (CVE-2006-2786)\n\nA flaw was found in the way SeaMonkey processed Proxy AutoConfig\nscripts. A malicious Proxy AutoConfig server could execute arbitrary\nJavaScript instructions with the permissions of 'chrome', allowing the\npage to steal sensitive information or install browser malware.\n(CVE-2006-3808)\n\nA double free flaw was found in the way the nsIX509::getRawDER method\nwas called. If a victim visited a carefully crafted web page, it was\npossible to execute arbitrary code as the user running Mozilla.\n(CVE-2006-2788)\n\nUsers of Mozilla are advised to upgrade to this update, which contains\nSeaMonkey version 1.0.3 that corrects these issues.", "edition": 28, "published": "2006-08-07T00:00:00", "title": "CentOS 4 : seamonkey (CESA-2006:0609)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2006-3806", "CVE-2006-3809", "CVE-2006-3803", "CVE-2006-2780", "CVE-2006-3807", "CVE-2006-3811", "CVE-2006-2784", "CVE-2006-3677", "CVE-2006-2785", "CVE-2006-2776", "CVE-2006-3804", "CVE-2006-2778", "CVE-2006-3810", "CVE-2006-2779", "CVE-2006-2781", "CVE-2006-3801", "CVE-2006-3812", "CVE-2006-2786", "CVE-2006-3113", "CVE-2006-2783", "CVE-2006-3805", "CVE-2006-2788", "CVE-2006-2787", "CVE-2006-3808", "CVE-2006-2782", "CVE-2006-3802"], "modified": "2006-08-07T00:00:00", "cpe": ["p-cpe:/a:centos:centos:devhelp-devel", "p-cpe:/a:centos:centos:seamonkey-nspr-devel", "p-cpe:/a:centos:centos:seamonkey-mail", "p-cpe:/a:centos:centos:seamonkey-nss-devel", "p-cpe:/a:centos:centos:seamonkey-dom-inspector", "p-cpe:/a:centos:centos:seamonkey-chat", "cpe:/o:centos:centos:4", "p-cpe:/a:centos:centos:seamonkey-nss", "p-cpe:/a:centos:centos:seamonkey-nspr", "p-cpe:/a:centos:centos:devhelp", "p-cpe:/a:centos:centos:seamonkey", "p-cpe:/a:centos:centos:seamonkey-js-debugger", "p-cpe:/a:centos:centos:seamonkey-devel"], "id": "CENTOS_RHSA-2006-0609.NASL", "href": "https://www.tenable.com/plugins/nessus/22163", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2006:0609 and \n# CentOS Errata and Security Advisory 2006:0609 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(22163);\n script_version(\"1.24\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2006-2776\", \"CVE-2006-2778\", \"CVE-2006-2779\", \"CVE-2006-2780\", \"CVE-2006-2781\", \"CVE-2006-2782\", \"CVE-2006-2783\", \"CVE-2006-2784\", \"CVE-2006-2785\", \"CVE-2006-2786\", \"CVE-2006-2787\", \"CVE-2006-2788\", \"CVE-2006-3113\", \"CVE-2006-3677\", \"CVE-2006-3801\", \"CVE-2006-3802\", \"CVE-2006-3803\", \"CVE-2006-3804\", \"CVE-2006-3805\", \"CVE-2006-3806\", \"CVE-2006-3807\", \"CVE-2006-3808\", \"CVE-2006-3809\", \"CVE-2006-3810\", \"CVE-2006-3811\", \"CVE-2006-3812\");\n script_xref(name:\"RHSA\", value:\"2006:0609\");\n\n script_name(english:\"CentOS 4 : seamonkey (CESA-2006:0609)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated SeaMonkey packages that fix several security bugs in the\nmozilla package are now available for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having critical security impact by the\nRed Hat Security Response Team.\n\nSeaMonkey is an open source Web browser, advanced email and newsgroup\nclient, IRC chat client, and HTML editor.\n\nThe Mozilla Foundation has discontinued support for the Mozilla Suite.\nThis update deprecates the Mozilla Suite in Red Hat Enterprise Linux 4\nin favor of the supported SeaMonkey Suite.\n\nThis update also resolves a number of outstanding Mozilla security\nissues :\n\nSeveral flaws were found in the way SeaMonkey processed certain\nJavaScript actions. A malicious web page could execute arbitrary\nJavaScript instructions with the permissions of 'chrome', allowing the\npage to steal sensitive information or install browser malware.\n(CVE-2006-2776, CVE-2006-2784, CVE-2006-2785, CVE-2006-2787,\nCVE-2006-3807, CVE-2006-3809, CVE-2006-3812)\n\nSeveral denial of service flaws were found in the way SeaMonkey\nprocessed certain web content. A malicious web page could crash the\nbrowser or possibly execute arbitrary code as the user running\nSeaMonkey. (CVE-2006-2779, CVE-2006-2780, CVE-2006-3801,\nCVE-2006-3677, CVE-2006-3113, CVE-2006-3803, CVE-2006-3805,\nCVE-2006-3806, CVE-2006-3811)\n\nTwo flaws were found in the way SeaMonkey-mail displayed malformed\ninline vcard attachments. If a victim viewed an email message\ncontaining a carefully crafted vcard it was possible to execute\narbitrary code as the user running Mozilla-mail. (CVE-2006-2781,\nCVE-2006-3804)\n\nA cross-site scripting flaw was found in the way SeaMonkey processed\nUnicode Byte-Order-Mark (BOM) markers in UTF-8 web pages. A malicious\nweb page could execute a script within the browser that a web input\nsanitizer could miss due to a malformed 'script' tag. (CVE-2006-2783)\n\nSeveral flaws were found in the way SeaMonkey processed certain\nJavaScript actions. A malicious web page could conduct a cross-site\nscripting attack or steal sensitive information (such as cookies owned\nby other domains). (CVE-2006-3802, CVE-2006-3810)\n\nA form file upload flaw was found in the way SeaMonkey handled\nJavaScript input object mutation. A malicious web page could upload an\narbitrary local file at form submission time without user interaction.\n(CVE-2006-2782)\n\nA denial of service flaw was found in the way SeaMonkey called the\ncrypto.signText() JavaScript function. A malicious web page could\ncrash the browser if the victim had a client certificate loaded.\n(CVE-2006-2778)\n\nTwo HTTP response smuggling flaws were found in the way SeaMonkey\nprocessed certain invalid HTTP response headers. A malicious website\ncould return specially crafted HTTP response headers which may bypass\nHTTP proxy restrictions. (CVE-2006-2786)\n\nA flaw was found in the way SeaMonkey processed Proxy AutoConfig\nscripts. A malicious Proxy AutoConfig server could execute arbitrary\nJavaScript instructions with the permissions of 'chrome', allowing the\npage to steal sensitive information or install browser malware.\n(CVE-2006-3808)\n\nA double free flaw was found in the way the nsIX509::getRawDER method\nwas called. If a victim visited a carefully crafted web page, it was\npossible to execute arbitrary code as the user running Mozilla.\n(CVE-2006-2788)\n\nUsers of Mozilla are advised to upgrade to this update, which contains\nSeaMonkey version 1.0.3 that corrects these issues.\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2006-August/013116.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?328dac8f\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2006-August/013117.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?5187bc75\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2006-August/013126.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?c986fe5f\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected seamonkey packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Mozilla Suite/Firefox Navigator Object Code Execution');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n script_cwe_id(20, 94, 119);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:devhelp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:devhelp-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:seamonkey\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:seamonkey-chat\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:seamonkey-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:seamonkey-dom-inspector\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:seamonkey-js-debugger\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:seamonkey-mail\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:seamonkey-nspr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:seamonkey-nspr-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:seamonkey-nss\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:seamonkey-nss-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:4\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2006/06/02\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/08/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/08/07\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^4([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 4.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-4\", cpu:\"i386\", reference:\"devhelp-0.10-0.2.el4\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"x86_64\", reference:\"devhelp-0.10-0.2.el4\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"i386\", reference:\"devhelp-devel-0.10-0.2.el4\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"x86_64\", reference:\"devhelp-devel-0.10-0.2.el4\")) flag++;\nif (rpm_check(release:\"CentOS-4\", reference:\"seamonkey-1.0.3-0.el4.1.centos4\")) flag++;\nif (rpm_check(release:\"CentOS-4\", reference:\"seamonkey-chat-1.0.3-0.el4.1.centos4\")) flag++;\nif (rpm_check(release:\"CentOS-4\", reference:\"seamonkey-devel-1.0.3-0.el4.1.centos4\")) flag++;\nif (rpm_check(release:\"CentOS-4\", reference:\"seamonkey-dom-inspector-1.0.3-0.el4.1.centos4\")) flag++;\nif (rpm_check(release:\"CentOS-4\", reference:\"seamonkey-js-debugger-1.0.3-0.el4.1.centos4\")) flag++;\nif (rpm_check(release:\"CentOS-4\", reference:\"seamonkey-mail-1.0.3-0.el4.1.centos4\")) flag++;\nif (rpm_check(release:\"CentOS-4\", reference:\"seamonkey-nspr-1.0.3-0.el4.1.centos4\")) flag++;\nif (rpm_check(release:\"CentOS-4\", reference:\"seamonkey-nspr-devel-1.0.3-0.el4.1.centos4\")) flag++;\nif (rpm_check(release:\"CentOS-4\", reference:\"seamonkey-nss-1.0.3-0.el4.1.centos4\")) flag++;\nif (rpm_check(release:\"CentOS-4\", reference:\"seamonkey-nss-devel-1.0.3-0.el4.1.centos4\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"devhelp / devhelp-devel / seamonkey / seamonkey-chat / etc\");\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-17T13:05:39", "description": "Updated SeaMonkey packages that fix several security bugs in the\nmozilla packages are now available for Red Hat Enterprise Linux 2.1.\n\nThis update has been rated as having critical security impact by the\nRed Hat Security Response Team.\n\nSeaMonkey is an open source Web browser, advanced email and newsgroup\nclient, IRC chat client, and HTML editor.\n\nThe Mozilla Foundation has discontinued support for the Mozilla Suite.\nThis update deprecates the Mozilla Suite in Red Hat Enterprise Linux\n2.1 in favor of the supported SeaMonkey Suite.\n\nThis update also resolves a number of outstanding Mozilla security\nissues :\n\nSeveral flaws were found in the way SeaMonkey processed certain\nJavaScript actions. A malicious web page could execute arbitrary\nJavaScript instructions with the permissions of 'chrome', allowing the\npage to steal sensitive information or install browser malware.\n(CVE-2006-2776, CVE-2006-2784, CVE-2006-2785, CVE-2006-2787,\nCVE-2006-3807, CVE-2006-3809, CVE-2006-3812)\n\nSeveral denial of service flaws were found in the way SeaMonkey\nprocessed certain web content. A malicious web page could crash the\nbrowser or possibly execute arbitrary code as the user running\nSeaMonkey. (CVE-2006-2779, CVE-2006-2780, CVE-2006-3801,\nCVE-2006-3677, CVE-2006-3113, CVE-2006-3803, CVE-2006-3805,\nCVE-2006-3806, CVE-2006-3811)\n\nTwo flaws were found in the way SeaMonkey Messenger displayed\nmalformed inline vcard attachments. If a victim viewed an email\nmessage containing a carefully crafted vcard it was possible to\nexecute arbitrary code as the user running SeaMonkey Messenger.\n(CVE-2006-2781, CVE-2006-3804)\n\nA cross-site scripting flaw was found in the way SeaMonkey processed\nUnicode Byte-Order-Mark (BOM) markers in UTF-8 web pages. A malicious\nweb page could execute a script within the browser that a web input\nsanitizer could miss due to a malformed 'script' tag. (CVE-2006-2783)\n\nSeveral flaws were found in the way SeaMonkey processed certain\nJavaScript actions. A malicious web page could conduct a cross-site\nscripting attack or steal sensitive information (such as cookies owned\nby other domains). (CVE-2006-3802, CVE-2006-3810)\n\nA form file upload flaw was found in the way SeaMonkey handled\nJavaScript input object mutation. A malicious web page could upload an\narbitrary local file at form submission time without user interaction.\n(CVE-2006-2782)\n\nA denial of service flaw was found in the way SeaMonkey called the\ncrypto.signText() JavaScript function. A malicious web page could\ncrash the browser if the victim had a client certificate loaded.\n(CVE-2006-2778)\n\nTwo HTTP response smuggling flaws were found in the way SeaMonkey\nprocessed certain invalid HTTP response headers. A malicious website\ncould return specially crafted HTTP response headers which may bypass\nHTTP proxy restrictions. (CVE-2006-2786)\n\nA flaw was found in the way SeaMonkey processed Proxy AutoConfig\nscripts. A malicious Proxy AutoConfig server could execute arbitrary\nJavaScript instructions with the permissions of 'chrome', allowing the\npage to steal sensitive information or install browser malware.\n(CVE-2006-3808)\n\nA double free flaw was found in the way the nsIX509::getRawDER method\nwas called. If a victim visited a carefully crafted web page it was\npossible to execute arbitrary code as the user running SeaMonkey.\n(CVE-2006-2788)\n\nUsers of Mozilla are advised to upgrade to this update, which contains\nSeaMonkey version 1.0.3 that corrects these issues.", "edition": 28, "published": "2006-08-30T00:00:00", "title": "RHEL 2.1 : seamonkey (RHSA-2006:0594)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2006-3806", "CVE-2006-3809", "CVE-2006-3803", "CVE-2006-2780", "CVE-2006-3807", "CVE-2006-3811", "CVE-2006-2784", "CVE-2006-3677", "CVE-2006-2785", "CVE-2006-2776", "CVE-2006-3804", "CVE-2006-2778", "CVE-2006-3810", "CVE-2006-2779", "CVE-2006-2781", "CVE-2006-3801", "CVE-2006-3812", "CVE-2006-2786", "CVE-2006-3113", "CVE-2006-2783", "CVE-2006-3805", "CVE-2006-2788", "CVE-2006-2787", "CVE-2006-3808", "CVE-2006-2782", "CVE-2006-3802"], "modified": "2006-08-30T00:00:00", "cpe": ["cpe:/o:redhat:enterprise_linux:2.1", "p-cpe:/a:redhat:enterprise_linux:seamonkey", "p-cpe:/a:redhat:enterprise_linux:seamonkey-nss-devel", "p-cpe:/a:redhat:enterprise_linux:seamonkey-nspr", "p-cpe:/a:redhat:enterprise_linux:seamonkey-js-debugger", "p-cpe:/a:redhat:enterprise_linux:seamonkey-devel", "p-cpe:/a:redhat:enterprise_linux:seamonkey-nss", "p-cpe:/a:redhat:enterprise_linux:seamonkey-mail", "p-cpe:/a:redhat:enterprise_linux:seamonkey-nspr-devel", "p-cpe:/a:redhat:enterprise_linux:seamonkey-chat", "p-cpe:/a:redhat:enterprise_linux:seamonkey-dom-inspector"], "id": "REDHAT-RHSA-2006-0594.NASL", "href": "https://www.tenable.com/plugins/nessus/22291", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2006:0594. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(22291);\n script_version(\"1.31\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2006-2776\", \"CVE-2006-2778\", \"CVE-2006-2779\", \"CVE-2006-2780\", \"CVE-2006-2781\", \"CVE-2006-2782\", \"CVE-2006-2783\", \"CVE-2006-2784\", \"CVE-2006-2785\", \"CVE-2006-2786\", \"CVE-2006-2787\", \"CVE-2006-2788\", \"CVE-2006-3113\", \"CVE-2006-3677\", \"CVE-2006-3801\", \"CVE-2006-3802\", \"CVE-2006-3803\", \"CVE-2006-3804\", \"CVE-2006-3805\", \"CVE-2006-3806\", \"CVE-2006-3807\", \"CVE-2006-3808\", \"CVE-2006-3809\", \"CVE-2006-3810\", \"CVE-2006-3811\", \"CVE-2006-3812\");\n script_xref(name:\"RHSA\", value:\"2006:0594\");\n\n script_name(english:\"RHEL 2.1 : seamonkey (RHSA-2006:0594)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated SeaMonkey packages that fix several security bugs in the\nmozilla packages are now available for Red Hat Enterprise Linux 2.1.\n\nThis update has been rated as having critical security impact by the\nRed Hat Security Response Team.\n\nSeaMonkey is an open source Web browser, advanced email and newsgroup\nclient, IRC chat client, and HTML editor.\n\nThe Mozilla Foundation has discontinued support for the Mozilla Suite.\nThis update deprecates the Mozilla Suite in Red Hat Enterprise Linux\n2.1 in favor of the supported SeaMonkey Suite.\n\nThis update also resolves a number of outstanding Mozilla security\nissues :\n\nSeveral flaws were found in the way SeaMonkey processed certain\nJavaScript actions. A malicious web page could execute arbitrary\nJavaScript instructions with the permissions of 'chrome', allowing the\npage to steal sensitive information or install browser malware.\n(CVE-2006-2776, CVE-2006-2784, CVE-2006-2785, CVE-2006-2787,\nCVE-2006-3807, CVE-2006-3809, CVE-2006-3812)\n\nSeveral denial of service flaws were found in the way SeaMonkey\nprocessed certain web content. A malicious web page could crash the\nbrowser or possibly execute arbitrary code as the user running\nSeaMonkey. (CVE-2006-2779, CVE-2006-2780, CVE-2006-3801,\nCVE-2006-3677, CVE-2006-3113, CVE-2006-3803, CVE-2006-3805,\nCVE-2006-3806, CVE-2006-3811)\n\nTwo flaws were found in the way SeaMonkey Messenger displayed\nmalformed inline vcard attachments. If a victim viewed an email\nmessage containing a carefully crafted vcard it was possible to\nexecute arbitrary code as the user running SeaMonkey Messenger.\n(CVE-2006-2781, CVE-2006-3804)\n\nA cross-site scripting flaw was found in the way SeaMonkey processed\nUnicode Byte-Order-Mark (BOM) markers in UTF-8 web pages. A malicious\nweb page could execute a script within the browser that a web input\nsanitizer could miss due to a malformed 'script' tag. (CVE-2006-2783)\n\nSeveral flaws were found in the way SeaMonkey processed certain\nJavaScript actions. A malicious web page could conduct a cross-site\nscripting attack or steal sensitive information (such as cookies owned\nby other domains). (CVE-2006-3802, CVE-2006-3810)\n\nA form file upload flaw was found in the way SeaMonkey handled\nJavaScript input object mutation. A malicious web page could upload an\narbitrary local file at form submission time without user interaction.\n(CVE-2006-2782)\n\nA denial of service flaw was found in the way SeaMonkey called the\ncrypto.signText() JavaScript function. A malicious web page could\ncrash the browser if the victim had a client certificate loaded.\n(CVE-2006-2778)\n\nTwo HTTP response smuggling flaws were found in the way SeaMonkey\nprocessed certain invalid HTTP response headers. A malicious website\ncould return specially crafted HTTP response headers which may bypass\nHTTP proxy restrictions. (CVE-2006-2786)\n\nA flaw was found in the way SeaMonkey processed Proxy AutoConfig\nscripts. A malicious Proxy AutoConfig server could execute arbitrary\nJavaScript instructions with the permissions of 'chrome', allowing the\npage to steal sensitive information or install browser malware.\n(CVE-2006-3808)\n\nA double free flaw was found in the way the nsIX509::getRawDER method\nwas called. If a victim visited a carefully crafted web page it was\npossible to execute arbitrary code as the user running SeaMonkey.\n(CVE-2006-2788)\n\nUsers of Mozilla are advised to upgrade to this update, which contains\nSeaMonkey version 1.0.3 that corrects these issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2776\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2778\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2779\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2780\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2781\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2782\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2783\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2784\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2785\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2786\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2787\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2788\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3113\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3677\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3801\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3802\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3803\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3804\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3805\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3806\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3807\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3808\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3809\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3810\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3811\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3812\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2006:0594\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Mozilla Suite/Firefox Navigator Object Code Execution');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n script_cwe_id(20, 94, 119);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:seamonkey\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:seamonkey-chat\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:seamonkey-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:seamonkey-dom-inspector\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:seamonkey-js-debugger\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:seamonkey-mail\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:seamonkey-nspr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:seamonkey-nspr-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:seamonkey-nss\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:seamonkey-nss-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:2.1\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2006/06/02\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/08/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/08/30\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^2\\.1([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 2.1\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\nif (cpu !~ \"^i[3-6]86$\") audit(AUDIT_ARCH_NOT, \"i386\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2006:0594\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL2.1\", cpu:\"i386\", reference:\"seamonkey-1.0.3-0.0.1.5.EL2\")) flag++;\n if (rpm_check(release:\"RHEL2.1\", cpu:\"i386\", reference:\"seamonkey-chat-1.0.3-0.0.1.5.EL2\")) flag++;\n if (rpm_check(release:\"RHEL2.1\", cpu:\"i386\", reference:\"seamonkey-devel-1.0.3-0.0.1.5.EL2\")) flag++;\n if (rpm_check(release:\"RHEL2.1\", cpu:\"i386\", reference:\"seamonkey-dom-inspector-1.0.3-0.0.1.5.EL2\")) flag++;\n if (rpm_check(release:\"RHEL2.1\", cpu:\"i386\", reference:\"seamonkey-js-debugger-1.0.3-0.0.1.5.EL2\")) flag++;\n if (rpm_check(release:\"RHEL2.1\", cpu:\"i386\", reference:\"seamonkey-mail-1.0.3-0.0.1.5.EL2\")) flag++;\n if (rpm_check(release:\"RHEL2.1\", cpu:\"i386\", reference:\"seamonkey-nspr-1.0.3-0.0.1.5.EL2\")) flag++;\n if (rpm_check(release:\"RHEL2.1\", cpu:\"i386\", reference:\"seamonkey-nspr-devel-1.0.3-0.0.1.5.EL2\")) flag++;\n if (rpm_check(release:\"RHEL2.1\", cpu:\"i386\", reference:\"seamonkey-nss-1.0.3-0.0.1.5.EL2\")) flag++;\n if (rpm_check(release:\"RHEL2.1\", cpu:\"i386\", reference:\"seamonkey-nss-devel-1.0.3-0.0.1.5.EL2\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"seamonkey / seamonkey-chat / seamonkey-devel / etc\");\n }\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-17T13:05:40", "description": "Updated SeaMonkey packages that fix several security bugs in the\nmozilla package are now available for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having critical security impact by the\nRed Hat Security Response Team.\n\nSeaMonkey is an open source Web browser, advanced email and newsgroup\nclient, IRC chat client, and HTML editor.\n\nThe Mozilla Foundation has discontinued support for the Mozilla Suite.\nThis update deprecates the Mozilla Suite in Red Hat Enterprise Linux 4\nin favor of the supported SeaMonkey Suite.\n\nThis update also resolves a number of outstanding Mozilla security\nissues :\n\nSeveral flaws were found in the way SeaMonkey processed certain\nJavaScript actions. A malicious web page could execute arbitrary\nJavaScript instructions with the permissions of 'chrome', allowing the\npage to steal sensitive information or install browser malware.\n(CVE-2006-2776, CVE-2006-2784, CVE-2006-2785, CVE-2006-2787,\nCVE-2006-3807, CVE-2006-3809, CVE-2006-3812)\n\nSeveral denial of service flaws were found in the way SeaMonkey\nprocessed certain web content. A malicious web page could crash the\nbrowser or possibly execute arbitrary code as the user running\nSeaMonkey. (CVE-2006-2779, CVE-2006-2780, CVE-2006-3801,\nCVE-2006-3677, CVE-2006-3113, CVE-2006-3803, CVE-2006-3805,\nCVE-2006-3806, CVE-2006-3811)\n\nTwo flaws were found in the way SeaMonkey-mail displayed malformed\ninline vcard attachments. If a victim viewed an email message\ncontaining a carefully crafted vcard it was possible to execute\narbitrary code as the user running Mozilla-mail. (CVE-2006-2781,\nCVE-2006-3804)\n\nA cross-site scripting flaw was found in the way SeaMonkey processed\nUnicode Byte-Order-Mark (BOM) markers in UTF-8 web pages. A malicious\nweb page could execute a script within the browser that a web input\nsanitizer could miss due to a malformed 'script' tag. (CVE-2006-2783)\n\nSeveral flaws were found in the way SeaMonkey processed certain\nJavaScript actions. A malicious web page could conduct a cross-site\nscripting attack or steal sensitive information (such as cookies owned\nby other domains). (CVE-2006-3802, CVE-2006-3810)\n\nA form file upload flaw was found in the way SeaMonkey handled\nJavaScript input object mutation. A malicious web page could upload an\narbitrary local file at form submission time without user interaction.\n(CVE-2006-2782)\n\nA denial of service flaw was found in the way SeaMonkey called the\ncrypto.signText() JavaScript function. A malicious web page could\ncrash the browser if the victim had a client certificate loaded.\n(CVE-2006-2778)\n\nTwo HTTP response smuggling flaws were found in the way SeaMonkey\nprocessed certain invalid HTTP response headers. A malicious website\ncould return specially crafted HTTP response headers which may bypass\nHTTP proxy restrictions. (CVE-2006-2786)\n\nA flaw was found in the way SeaMonkey processed Proxy AutoConfig\nscripts. A malicious Proxy AutoConfig server could execute arbitrary\nJavaScript instructions with the permissions of 'chrome', allowing the\npage to steal sensitive information or install browser malware.\n(CVE-2006-3808)\n\nA double free flaw was found in the way the nsIX509::getRawDER method\nwas called. If a victim visited a carefully crafted web page, it was\npossible to execute arbitrary code as the user running Mozilla.\n(CVE-2006-2788)\n\nUsers of Mozilla are advised to upgrade to this update, which contains\nSeaMonkey version 1.0.3 that corrects these issues.", "edition": 28, "published": "2006-08-04T00:00:00", "title": "RHEL 4 : seamonkey (RHSA-2006:0609)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2006-3806", "CVE-2006-3809", "CVE-2006-3803", "CVE-2006-2780", "CVE-2006-3807", "CVE-2006-3811", "CVE-2006-2784", "CVE-2006-3677", "CVE-2006-2785", "CVE-2006-2776", "CVE-2006-3804", "CVE-2006-2778", "CVE-2006-3810", "CVE-2006-2779", "CVE-2006-2781", "CVE-2006-3801", "CVE-2006-3812", "CVE-2006-2786", "CVE-2006-3113", "CVE-2006-2783", "CVE-2006-3805", "CVE-2006-2788", "CVE-2006-2787", "CVE-2006-3808", "CVE-2006-2782", "CVE-2006-3802"], "modified": "2006-08-04T00:00:00", "cpe": ["cpe:/o:redhat:enterprise_linux:4", "p-cpe:/a:redhat:enterprise_linux:seamonkey", "p-cpe:/a:redhat:enterprise_linux:seamonkey-nss-devel", "p-cpe:/a:redhat:enterprise_linux:seamonkey-nspr", "p-cpe:/a:redhat:enterprise_linux:seamonkey-js-debugger", "p-cpe:/a:redhat:enterprise_linux:seamonkey-devel", "p-cpe:/a:redhat:enterprise_linux:seamonkey-nss", "p-cpe:/a:redhat:enterprise_linux:devhelp-devel", "p-cpe:/a:redhat:enterprise_linux:seamonkey-mail", "p-cpe:/a:redhat:enterprise_linux:devhelp", "p-cpe:/a:redhat:enterprise_linux:seamonkey-nspr-devel", "p-cpe:/a:redhat:enterprise_linux:seamonkey-chat", "p-cpe:/a:redhat:enterprise_linux:seamonkey-dom-inspector"], "id": "REDHAT-RHSA-2006-0609.NASL", "href": "https://www.tenable.com/plugins/nessus/22150", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2006:0609. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(22150);\n script_version(\"1.32\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2006-2776\", \"CVE-2006-2778\", \"CVE-2006-2779\", \"CVE-2006-2780\", \"CVE-2006-2781\", \"CVE-2006-2782\", \"CVE-2006-2783\", \"CVE-2006-2784\", \"CVE-2006-2785\", \"CVE-2006-2786\", \"CVE-2006-2787\", \"CVE-2006-2788\", \"CVE-2006-3113\", \"CVE-2006-3677\", \"CVE-2006-3801\", \"CVE-2006-3802\", \"CVE-2006-3803\", \"CVE-2006-3804\", \"CVE-2006-3805\", \"CVE-2006-3806\", \"CVE-2006-3807\", \"CVE-2006-3808\", \"CVE-2006-3809\", \"CVE-2006-3810\", \"CVE-2006-3811\", \"CVE-2006-3812\");\n script_xref(name:\"RHSA\", value:\"2006:0609\");\n\n script_name(english:\"RHEL 4 : seamonkey (RHSA-2006:0609)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated SeaMonkey packages that fix several security bugs in the\nmozilla package are now available for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having critical security impact by the\nRed Hat Security Response Team.\n\nSeaMonkey is an open source Web browser, advanced email and newsgroup\nclient, IRC chat client, and HTML editor.\n\nThe Mozilla Foundation has discontinued support for the Mozilla Suite.\nThis update deprecates the Mozilla Suite in Red Hat Enterprise Linux 4\nin favor of the supported SeaMonkey Suite.\n\nThis update also resolves a number of outstanding Mozilla security\nissues :\n\nSeveral flaws were found in the way SeaMonkey processed certain\nJavaScript actions. A malicious web page could execute arbitrary\nJavaScript instructions with the permissions of 'chrome', allowing the\npage to steal sensitive information or install browser malware.\n(CVE-2006-2776, CVE-2006-2784, CVE-2006-2785, CVE-2006-2787,\nCVE-2006-3807, CVE-2006-3809, CVE-2006-3812)\n\nSeveral denial of service flaws were found in the way SeaMonkey\nprocessed certain web content. A malicious web page could crash the\nbrowser or possibly execute arbitrary code as the user running\nSeaMonkey. (CVE-2006-2779, CVE-2006-2780, CVE-2006-3801,\nCVE-2006-3677, CVE-2006-3113, CVE-2006-3803, CVE-2006-3805,\nCVE-2006-3806, CVE-2006-3811)\n\nTwo flaws were found in the way SeaMonkey-mail displayed malformed\ninline vcard attachments. If a victim viewed an email message\ncontaining a carefully crafted vcard it was possible to execute\narbitrary code as the user running Mozilla-mail. (CVE-2006-2781,\nCVE-2006-3804)\n\nA cross-site scripting flaw was found in the way SeaMonkey processed\nUnicode Byte-Order-Mark (BOM) markers in UTF-8 web pages. A malicious\nweb page could execute a script within the browser that a web input\nsanitizer could miss due to a malformed 'script' tag. (CVE-2006-2783)\n\nSeveral flaws were found in the way SeaMonkey processed certain\nJavaScript actions. A malicious web page could conduct a cross-site\nscripting attack or steal sensitive information (such as cookies owned\nby other domains). (CVE-2006-3802, CVE-2006-3810)\n\nA form file upload flaw was found in the way SeaMonkey handled\nJavaScript input object mutation. A malicious web page could upload an\narbitrary local file at form submission time without user interaction.\n(CVE-2006-2782)\n\nA denial of service flaw was found in the way SeaMonkey called the\ncrypto.signText() JavaScript function. A malicious web page could\ncrash the browser if the victim had a client certificate loaded.\n(CVE-2006-2778)\n\nTwo HTTP response smuggling flaws were found in the way SeaMonkey\nprocessed certain invalid HTTP response headers. A malicious website\ncould return specially crafted HTTP response headers which may bypass\nHTTP proxy restrictions. (CVE-2006-2786)\n\nA flaw was found in the way SeaMonkey processed Proxy AutoConfig\nscripts. A malicious Proxy AutoConfig server could execute arbitrary\nJavaScript instructions with the permissions of 'chrome', allowing the\npage to steal sensitive information or install browser malware.\n(CVE-2006-3808)\n\nA double free flaw was found in the way the nsIX509::getRawDER method\nwas called. If a victim visited a carefully crafted web page, it was\npossible to execute arbitrary code as the user running Mozilla.\n(CVE-2006-2788)\n\nUsers of Mozilla are advised to upgrade to this update, which contains\nSeaMonkey version 1.0.3 that corrects these issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2776\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2778\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2779\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2780\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2781\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2782\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2783\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2784\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2785\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2786\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2787\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-2788\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3113\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3677\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3801\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3802\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3803\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3804\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3805\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3806\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3807\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3808\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3809\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3810\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3811\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-3812\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2006:0609\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Mozilla Suite/Firefox Navigator Object Code Execution');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n script_cwe_id(20, 94, 119);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:devhelp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:devhelp-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:seamonkey\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:seamonkey-chat\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:seamonkey-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:seamonkey-dom-inspector\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:seamonkey-js-debugger\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:seamonkey-mail\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:seamonkey-nspr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:seamonkey-nspr-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:seamonkey-nss\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:seamonkey-nss-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:4\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2006/06/02\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/08/02\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/08/04\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^4([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 4.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2006:0609\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL4\", cpu:\"i386\", reference:\"devhelp-0.10-0.2.el4\")) flag++;\n if (rpm_check(release:\"RHEL4\", cpu:\"x86_64\", reference:\"devhelp-0.10-0.2.el4\")) flag++;\n if (rpm_check(release:\"RHEL4\", cpu:\"i386\", reference:\"devhelp-devel-0.10-0.2.el4\")) flag++;\n if (rpm_check(release:\"RHEL4\", cpu:\"x86_64\", reference:\"devhelp-devel-0.10-0.2.el4\")) flag++;\n if (rpm_check(release:\"RHEL4\", reference:\"seamonkey-1.0.3-0.el4.1\")) flag++;\n if (rpm_check(release:\"RHEL4\", reference:\"seamonkey-chat-1.0.3-0.el4.1\")) flag++;\n if (rpm_check(release:\"RHEL4\", reference:\"seamonkey-devel-1.0.3-0.el4.1\")) flag++;\n if (rpm_check(release:\"RHEL4\", reference:\"seamonkey-dom-inspector-1.0.3-0.el4.1\")) flag++;\n if (rpm_check(release:\"RHEL4\", reference:\"seamonkey-js-debugger-1.0.3-0.el4.1\")) flag++;\n if (rpm_check(release:\"RHEL4\", reference:\"seamonkey-mail-1.0.3-0.el4.1\")) flag++;\n if (rpm_check(release:\"RHEL4\", reference:\"seamonkey-nspr-1.0.3-0.el4.1\")) flag++;\n if (rpm_check(release:\"RHEL4\", reference:\"seamonkey-nspr-devel-1.0.3-0.el4.1\")) flag++;\n if (rpm_check(release:\"RHEL4\", reference:\"seamonkey-nss-1.0.3-0.el4.1\")) flag++;\n if (rpm_check(release:\"RHEL4\", reference:\"seamonkey-nss-devel-1.0.3-0.el4.1\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"devhelp / devhelp-devel / seamonkey / seamonkey-chat / etc\");\n }\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-01T03:48:34", "description": "The installed version of Firefox is affected by various security\nissues, some of which may lead to execution of arbitrary code on the\naffected host subject to the user's privileges.", "edition": 25, "published": "2006-07-27T00:00:00", "title": "Firefox < 1.5.0.5 Multiple Vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2006-3806", "CVE-2006-3809", "CVE-2006-3803", "CVE-2006-3807", "CVE-2006-3811", "CVE-2006-3677", "CVE-2006-3810", "CVE-2006-3801", "CVE-2006-3812", "CVE-2006-3113", "CVE-2006-3805", "CVE-2006-3808", "CVE-2006-3802"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/a:mozilla:firefox"], "id": "MOZILLA_FIREFOX_1505.NASL", "href": "https://www.tenable.com/plugins/nessus/22095", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\n\nif (NASL_LEVEL < 3004) exit(0);\n\n\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(22095);\n script_version(\"1.23\");\n script_cvs_date(\"Date: 2018/07/16 14:09:14\");\n\n script_cve_id(\"CVE-2006-3113\", \"CVE-2006-3677\", \"CVE-2006-3801\", \"CVE-2006-3802\", \"CVE-2006-3803\",\n \"CVE-2006-3805\", \"CVE-2006-3806\", \"CVE-2006-3807\", \"CVE-2006-3808\", \"CVE-2006-3809\",\n \"CVE-2006-3810\", \"CVE-2006-3811\", \"CVE-2006-3812\");\n script_bugtraq_id(19181, 19192, 19197);\n script_xref(name:\"CERT\", value:\"655892\");\n\n script_name(english:\"Firefox < 1.5.0.5 Multiple Vulnerabilities\");\n script_summary(english:\"Checks version of Firefox\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host contains a web browser that is affected by\nmultiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The installed version of Firefox is affected by various security\nissues, some of which may lead to execution of arbitrary code on the\naffected host subject to the user's privileges.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-44/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-45/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-46/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-47/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-48/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-50/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-51/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-52/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-53/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-54/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-55/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2006-56/\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Firefox 1.5.0.5 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Mozilla Suite/Firefox Navigator Object Code Execution');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/07/27\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/07/25\");\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2006/07/25\");\nscript_set_attribute(attribute:\"plugin_type\", value:\"local\");\nscript_set_attribute(attribute:\"cpe\", value:\"cpe:/a:mozilla:firefox\");\nscript_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n script_copyright(english:\"This script is Copyright (C) 2006-2018 Tenable Network Security, Inc.\");\n script_dependencies(\"mozilla_org_installed.nasl\");\n script_require_keys(\"Mozilla/Firefox/Version\");\n exit(0);\n}\n\ninclude(\"mozilla_version.inc\");\nport = get_kb_item_or_exit(\"SMB/transport\");\n\ninstalls = get_kb_list(\"SMB/Mozilla/Firefox/*\");\nif (isnull(installs)) audit(AUDIT_NOT_INST, \"Firefox\");\n\nmozilla_check_version(installs:installs, product:'firefox', esr:FALSE, fix:'1.5.0.5', severity:SECURITY_HOLE);", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-07T10:52:06", "description": "The remote host is affected by the vulnerability described in GLSA-200608-03\n(Mozilla Firefox: Multiple vulnerabilities)\n\n The following vulnerabilities have been reported:\n Benjamin Smedberg discovered that chrome URL's could be made to\n reference remote files.\n Developers in the Mozilla community\n looked for and fixed several crash bugs to improve the stability of\n Mozilla clients.\n 'shutdown' reports that cross-site scripting\n (XSS) attacks could be performed using the construct\n XPCNativeWrapper(window).Function(...), which created a function that\n appeared to belong to the window in question even after it had been\n navigated to the target site.\n 'shutdown' reports that scripts\n granting the UniversalBrowserRead privilege can leverage that into the\n equivalent of the far more powerful UniversalXPConnect since they are\n allowed to 'read' into a privileged context.\n 'moz_bug_r_a4'\n reports that A malicious Proxy AutoConfig (PAC) server could serve a\n PAC script that can execute code with elevated privileges by setting\n the required FindProxyForURL function to the eval method on a\n privileged object that leaked into the PAC sandbox.\n 'moz_bug_r_a4' discovered that Named JavaScript functions have a\n parent object created using the standard Object() constructor\n (ECMA-specified behavior) and that this constructor can be redefined by\n script (also ECMA-specified behavior).\n Igor Bukanov and\n shutdown found additional places where an untimely garbage collection\n could delete a temporary object that was in active use.\n Georgi\n Guninski found potential integer overflow issues with long strings in\n the toSource() methods of the Object, Array and String objects as well\n as string function arguments.\n H. D. Moore reported a testcase\n that was able to trigger a race condition where JavaScript garbage\n collection deleted a temporary variable still being used in the\n creation of a new Function object.\n A malicious page can hijack\n native DOM methods on a document object in another domain, which will\n run the attacker's script when called by the victim page.\n Secunia Research has discovered a vulnerability which is caused due\n to an memory corruption error within the handling of simultaneously\n happening XPCOM events. This leads to use of a deleted timer\n object.\n An anonymous researcher for TippingPoint and the Zero\n Day Initiative showed that when used in a web page Java would reference\n properties of the window.navigator object as it started up.\n Thilo Girmann discovered that in certain circumstances a JavaScript\n reference to a frame or window was not properly cleared when the\n referenced content went away.\n \nImpact :\n\n A user can be enticed to open specially crafted URLs, visit webpages\n containing malicious JavaScript or execute a specially crafted script.\n These events could lead to the execution of arbitrary code, or the\n installation of malware on the user's computer.\n \nWorkaround :\n\n There is no known workaround at this time.", "edition": 25, "published": "2006-08-04T00:00:00", "title": "GLSA-200608-03 : Mozilla Firefox: Multiple vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2006-3806", "CVE-2006-3809", "CVE-2006-3803", "CVE-2006-3807", "CVE-2006-3811", "CVE-2006-3677", "CVE-2006-3810", "CVE-2006-3801", "CVE-2006-3812", "CVE-2006-3113", "CVE-2006-3805", "CVE-2006-3808", "CVE-2006-3802"], "modified": "2006-08-04T00:00:00", "cpe": ["p-cpe:/a:gentoo:linux:mozilla-firefox-bin", "cpe:/o:gentoo:linux", "p-cpe:/a:gentoo:linux:mozilla-firefox"], "id": "GENTOO_GLSA-200608-03.NASL", "href": "https://www.tenable.com/plugins/nessus/22145", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Gentoo Linux Security Advisory GLSA 200608-03.\n#\n# The advisory text is Copyright (C) 2001-2016 Gentoo Foundation, Inc.\n# and licensed under the Creative Commons - Attribution / Share Alike \n# license. See http://creativecommons.org/licenses/by-sa/3.0/\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(22145);\n script_version(\"1.19\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2006-3113\", \"CVE-2006-3677\", \"CVE-2006-3801\", \"CVE-2006-3802\", \"CVE-2006-3803\", \"CVE-2006-3805\", \"CVE-2006-3806\", \"CVE-2006-3807\", \"CVE-2006-3808\", \"CVE-2006-3809\", \"CVE-2006-3810\", \"CVE-2006-3811\", \"CVE-2006-3812\");\n script_xref(name:\"GLSA\", value:\"200608-03\");\n\n script_name(english:\"GLSA-200608-03 : Mozilla Firefox: Multiple vulnerabilities\");\n script_summary(english:\"Checks for updated package(s) in /var/db/pkg\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Gentoo host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote host is affected by the vulnerability described in GLSA-200608-03\n(Mozilla Firefox: Multiple vulnerabilities)\n\n The following vulnerabilities have been reported:\n Benjamin Smedberg discovered that chrome URL's could be made to\n reference remote files.\n Developers in the Mozilla community\n looked for and fixed several crash bugs to improve the stability of\n Mozilla clients.\n 'shutdown' reports that cross-site scripting\n (XSS) attacks could be performed using the construct\n XPCNativeWrapper(window).Function(...), which created a function that\n appeared to belong to the window in question even after it had been\n navigated to the target site.\n 'shutdown' reports that scripts\n granting the UniversalBrowserRead privilege can leverage that into the\n equivalent of the far more powerful UniversalXPConnect since they are\n allowed to 'read' into a privileged context.\n 'moz_bug_r_a4'\n reports that A malicious Proxy AutoConfig (PAC) server could serve a\n PAC script that can execute code with elevated privileges by setting\n the required FindProxyForURL function to the eval method on a\n privileged object that leaked into the PAC sandbox.\n 'moz_bug_r_a4' discovered that Named JavaScript functions have a\n parent object created using the standard Object() constructor\n (ECMA-specified behavior) and that this constructor can be redefined by\n script (also ECMA-specified behavior).\n Igor Bukanov and\n shutdown found additional places where an untimely garbage collection\n could delete a temporary object that was in active use.\n Georgi\n Guninski found potential integer overflow issues with long strings in\n the toSource() methods of the Object, Array and String objects as well\n as string function arguments.\n H. D. Moore reported a testcase\n that was able to trigger a race condition where JavaScript garbage\n collection deleted a temporary variable still being used in the\n creation of a new Function object.\n A malicious page can hijack\n native DOM methods on a document object in another domain, which will\n run the attacker's script when called by the victim page.\n Secunia Research has discovered a vulnerability which is caused due\n to an memory corruption error within the handling of simultaneously\n happening XPCOM events. This leads to use of a deleted timer\n object.\n An anonymous researcher for TippingPoint and the Zero\n Day Initiative showed that when used in a web page Java would reference\n properties of the window.navigator object as it started up.\n Thilo Girmann discovered that in certain circumstances a JavaScript\n reference to a frame or window was not properly cleared when the\n referenced content went away.\n \nImpact :\n\n A user can be enticed to open specially crafted URLs, visit webpages\n containing malicious JavaScript or execute a specially crafted script.\n These events could lead to the execution of arbitrary code, or the\n installation of malware on the user's computer.\n \nWorkaround :\n\n There is no known workaround at this time.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.gentoo.org/glsa/200608-03\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"All Mozilla Firefox users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=www-client/mozilla-firefox-1.5.0.5'\n Users of the binary package should upgrade as well:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=www-client/mozilla-firefox-bin-1.5.0.5'\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Mozilla Suite/Firefox Navigator Object Code Execution');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:mozilla-firefox\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:mozilla-firefox-bin\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:gentoo:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/08/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/08/04\");\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2006/07/25\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Gentoo Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Gentoo/release\", \"Host/Gentoo/qpkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"qpkg.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Gentoo/release\")) audit(AUDIT_OS_NOT, \"Gentoo\");\nif (!get_kb_item(\"Host/Gentoo/qpkg-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (qpkg_check(package:\"www-client/mozilla-firefox-bin\", unaffected:make_list(\"ge 1.5.0.5\"), vulnerable:make_list(\"lt 1.5.0.5\"))) flag++;\nif (qpkg_check(package:\"www-client/mozilla-firefox\", unaffected:make_list(\"ge 1.5.0.5\"), vulnerable:make_list(\"lt 1.5.0.5\"))) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = qpkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"Mozilla Firefox\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-07T10:52:06", "description": "The remote host is affected by the vulnerability described in GLSA-200608-02\n(Mozilla SeaMonkey: Multiple vulnerabilities)\n\n The following vulnerabilities have been reported:\n Benjamin Smedberg discovered that chrome URL's could be made to\n reference remote files.\n Developers in the Mozilla community\n looked for and fixed several crash bugs to improve the stability of\n Mozilla clients, which could lead to the execution of arbitrary code by\n a remote attacker.\n 'shutdown' reports that cross-site\n scripting (XSS) attacks could be performed using the construct\n XPCNativeWrapper(window).Function(...), which created a function that\n appeared to belong to the window in question even after it had been\n navigated to the target site.\n 'shutdown' reports that scripts\n granting the UniversalBrowserRead privilege can leverage that into the\n equivalent of the far more powerful UniversalXPConnect since they are\n allowed to 'read' into a privileged context.\n 'moz_bug_r_a4'\n reports that A malicious Proxy AutoConfig (PAC) server could serve a\n PAC script that can execute code with elevated privileges by setting\n the required FindProxyForURL function to the eval method on a\n privileged object that leaked into the PAC sandbox.\n 'moz_bug_r_a4' discovered that Named JavaScript functions have a\n parent object created using the standard Object() constructor\n (ECMA-specified behavior) and that this constructor can be redefined by\n script (also ECMA-specified behavior).\n Igor Bukanov and\n shutdown found additional places where an untimely garbage collection\n could delete a temporary object that was in active use.\n Georgi\n Guninski found potential integer overflow issues with long strings in\n the toSource() methods of the Object, Array and String objects as well\n as string function arguments.\n H. D. Moore reported a testcase\n that was able to trigger a race condition where JavaScript garbage\n collection deleted a temporary variable still being used in the\n creation of a new Function object.\n A malicious page can hijack\n native DOM methods on a document object in another domain, which will\n run the attacker's script when called by the victim page.\n Secunia Research has discovered a vulnerability which is caused due\n to an memory corruption error within the handling of simultaneously\n happening XPCOM events. This leads to use of a deleted timer\n object.\n An anonymous researcher for TippingPoint and the Zero\n Day Initiative showed that when used in a web page Java would reference\n properties of the window.navigator object as it started up.\n Thilo Girmann discovered that in certain circumstances a JavaScript\n reference to a frame or window was not properly cleared when the\n referenced content went away.\n \nImpact :\n\n A user can be enticed to open specially crafted URLs, visit webpages\n containing malicious JavaScript or execute a specially crafted script.\n These events could lead to the execution of arbitrary code, or the\n installation of malware on the user's computer.\n \nWorkaround :\n\n There is no known workaround at this time.", "edition": 25, "published": "2006-08-04T00:00:00", "title": "GLSA-200608-02 : Mozilla SeaMonkey: Multiple vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2006-3806", "CVE-2006-3809", "CVE-2006-3803", "CVE-2006-3807", "CVE-2006-3811", "CVE-2006-3677", "CVE-2006-3804", "CVE-2006-3810", "CVE-2006-3801", "CVE-2006-3812", "CVE-2006-3113", "CVE-2006-3805", "CVE-2006-3808", "CVE-2006-3802"], "modified": "2006-08-04T00:00:00", "cpe": ["cpe:/o:gentoo:linux", "p-cpe:/a:gentoo:linux:seamonkey"], "id": "GENTOO_GLSA-200608-02.NASL", "href": "https://www.tenable.com/plugins/nessus/22144", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Gentoo Linux Security Advisory GLSA 200608-02.\n#\n# The advisory text is Copyright (C) 2001-2016 Gentoo Foundation, Inc.\n# and licensed under the Creative Commons - Attribution / Share Alike \n# license. See http://creativecommons.org/licenses/by-sa/3.0/\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(22144);\n script_version(\"1.19\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2006-3113\", \"CVE-2006-3677\", \"CVE-2006-3801\", \"CVE-2006-3802\", \"CVE-2006-3803\", \"CVE-2006-3804\", \"CVE-2006-3805\", \"CVE-2006-3806\", \"CVE-2006-3807\", \"CVE-2006-3808\", \"CVE-2006-3809\", \"CVE-2006-3810\", \"CVE-2006-3811\", \"CVE-2006-3812\");\n script_xref(name:\"GLSA\", value:\"200608-02\");\n\n script_name(english:\"GLSA-200608-02 : Mozilla SeaMonkey: Multiple vulnerabilities\");\n script_summary(english:\"Checks for updated package(s) in /var/db/pkg\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Gentoo host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote host is affected by the vulnerability described in GLSA-200608-02\n(Mozilla SeaMonkey: Multiple vulnerabilities)\n\n The following vulnerabilities have been reported:\n Benjamin Smedberg discovered that chrome URL's could be made to\n reference remote files.\n Developers in the Mozilla community\n looked for and fixed several crash bugs to improve the stability of\n Mozilla clients, which could lead to the execution of arbitrary code by\n a remote attacker.\n 'shutdown' reports that cross-site\n scripting (XSS) attacks could be performed using the construct\n XPCNativeWrapper(window).Function(...), which created a function that\n appeared to belong to the window in question even after it had been\n navigated to the target site.\n 'shutdown' reports that scripts\n granting the UniversalBrowserRead privilege can leverage that into the\n equivalent of the far more powerful UniversalXPConnect since they are\n allowed to 'read' into a privileged context.\n 'moz_bug_r_a4'\n reports that A malicious Proxy AutoConfig (PAC) server could serve a\n PAC script that can execute code with elevated privileges by setting\n the required FindProxyForURL function to the eval method on a\n privileged object that leaked into the PAC sandbox.\n 'moz_bug_r_a4' discovered that Named JavaScript functions have a\n parent object created using the standard Object() constructor\n (ECMA-specified behavior) and that this constructor can be redefined by\n script (also ECMA-specified behavior).\n Igor Bukanov and\n shutdown found additional places where an untimely garbage collection\n could delete a temporary object that was in active use.\n Georgi\n Guninski found potential integer overflow issues with long strings in\n the toSource() methods of the Object, Array and String objects as well\n as string function arguments.\n H. D. Moore reported a testcase\n that was able to trigger a race condition where JavaScript garbage\n collection deleted a temporary variable still being used in the\n creation of a new Function object.\n A malicious page can hijack\n native DOM methods on a document object in another domain, which will\n run the attacker's script when called by the victim page.\n Secunia Research has discovered a vulnerability which is caused due\n to an memory corruption error within the handling of simultaneously\n happening XPCOM events. This leads to use of a deleted timer\n object.\n An anonymous researcher for TippingPoint and the Zero\n Day Initiative showed that when used in a web page Java would reference\n properties of the window.navigator object as it started up.\n Thilo Girmann discovered that in certain circumstances a JavaScript\n reference to a frame or window was not properly cleared when the\n referenced content went away.\n \nImpact :\n\n A user can be enticed to open specially crafted URLs, visit webpages\n containing malicious JavaScript or execute a specially crafted script.\n These events could lead to the execution of arbitrary code, or the\n installation of malware on the user's computer.\n \nWorkaround :\n\n There is no known workaround at this time.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.gentoo.org/glsa/200608-02\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"All Thunderbird users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=www-client/seamonkey-1.0.3'\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Mozilla Suite/Firefox Navigator Object Code Execution');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:seamonkey\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:gentoo:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/08/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/08/04\");\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2006/07/25\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Gentoo Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Gentoo/release\", \"Host/Gentoo/qpkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"qpkg.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Gentoo/release\")) audit(AUDIT_OS_NOT, \"Gentoo\");\nif (!get_kb_item(\"Host/Gentoo/qpkg-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (qpkg_check(package:\"www-client/seamonkey\", unaffected:make_list(\"ge 1.0.3\"), vulnerable:make_list(\"lt 1.0.3\"))) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = qpkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"Mozilla SeaMonkey\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "oraclelinux": [{"lastseen": "2019-05-29T18:39:33", "bulletinFamily": "unix", "cvelist": ["CVE-2006-3806", "CVE-2006-3809", "CVE-2006-3803", "CVE-2006-2780", "CVE-2006-3807", "CVE-2006-3811", "CVE-2006-2784", "CVE-2006-3677", "CVE-2006-2785", "CVE-2006-2776", "CVE-2006-2778", "CVE-2006-3810", "CVE-2006-2779", "CVE-2006-3801", "CVE-2006-3812", "CVE-2006-2786", "CVE-2006-3113", "CVE-2006-2783", "CVE-2006-3805", "CVE-2006-2788", "CVE-2006-2787", "CVE-2006-3808", "CVE-2006-2782", "CVE-2006-3802"], "description": " [1.5.0.8-0.1.1.el4]\n - Replace default-bookmarks.html and default-prefs.js\n \n [1.5.0.8-0.1.el4]\n - Update to 1.5.0.8 (RC)\n \n [1.5.0.7-0.1.el4]\n - Update to 1.5.0.7\n \n [1.5.0.5-0.el4.1]\n - Update to 1.5.0.5 ", "edition": 4, "modified": "2006-12-07T00:00:00", "published": "2006-12-07T00:00:00", "id": "ELSA-2006-0610", "href": "http://linux.oracle.com/errata/ELSA-2006-0610.html", "title": "Critical firefox security update ", "type": "oraclelinux", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:35:02", "bulletinFamily": "unix", "cvelist": ["CVE-2006-3806", "CVE-2006-3809", "CVE-2006-3803", "CVE-2006-2780", "CVE-2006-3807", "CVE-2006-3811", "CVE-2006-2784", "CVE-2006-3677", "CVE-2006-2785", "CVE-2006-2776", "CVE-2006-3804", "CVE-2006-2778", "CVE-2006-3810", "CVE-2006-2779", "CVE-2006-2781", "CVE-2006-3801", "CVE-2006-2786", "CVE-2006-3113", "CVE-2006-2783", "CVE-2006-3805", "CVE-2006-2788", "CVE-2006-2787", "CVE-2006-3808", "CVE-2006-2782", "CVE-2006-3802"], "description": " [1.5.0.8-0.1.1.el4]\n - defaults changed to oracle...\n \n [1.5.0.8-0.1.el4]\n - Update to 1.5.0.8 (RC)\n \n [1.5.0.7-0.1.el4]\n - Update to 1.5.0.7\n \n [1.5.0.5-0.el4.2]\n - Fix the launcher and icons\n \n [1.5.0.5-0.el4.1]\n - Update to 1.5.0.5 ", "edition": 4, "modified": "2006-12-07T00:00:00", "published": "2006-12-07T00:00:00", "id": "ELSA-2006-0611", "href": "http://linux.oracle.com/errata/ELSA-2006-0611.html", "title": "Critical thunderbird security update ", "type": "oraclelinux", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "centos": [{"lastseen": "2020-08-15T11:38:01", "bulletinFamily": "unix", "cvelist": ["CVE-2006-3806", "CVE-2006-3809", "CVE-2006-3803", "CVE-2006-2780", "CVE-2006-3807", "CVE-2006-3811", "CVE-2006-2784", "CVE-2006-3677", "CVE-2006-2785", "CVE-2006-2776", "CVE-2006-2778", "CVE-2006-3810", "CVE-2006-2779", "CVE-2006-3801", "CVE-2006-3812", "CVE-2006-2786", "CVE-2006-3113", "CVE-2006-2783", "CVE-2006-3805", "CVE-2006-2788", "CVE-2006-2787", "CVE-2006-3808", "CVE-2006-2782", "CVE-2006-3802"], "description": "**CentOS Errata and Security Advisory** CESA-2006:0610\n\n\nMozilla Firefox is an open source Web browser.\r\n\r\nThe Mozilla Foundation has discontinued support for the Mozilla Firefox\r\n1.0 branch. This update deprecates the Mozilla Firefox 1.0 branch in\r\nRed Hat Enterprise Linux 4 in favor of the supported Mozilla Firefox\r\n1.5 branch.\r\n\r\nThis update also resolves a number of outstanding Firefox security issues:\r\n\r\nSeveral flaws were found in the way Firefox processed certain javascript\r\nactions. A malicious web page could execute arbitrary javascript\r\ninstructions with the permissions of \"chrome\", allowing the page to steal\r\nsensitive information or install browser malware. (CVE-2006-2776,\r\nCVE-2006-2784, CVE-2006-2785, CVE-2006-2787, CVE-2006-3807, CVE-2006-3809,\r\nCVE-2006-3812)\r\n\r\nSeveral denial of service flaws were found in the way Firefox processed\r\ncertain web content. A malicious web page could crash the browser or\r\npossibly execute arbitrary code as the user running Firefox.\r\n(CVE-2006-2779, CVE-2006-2780, CVE-2006-3801, CVE-2006-3677, CVE-2006-3113,\r\nCVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3811)\r\n\r\nA cross-site scripting flaw was found in the way Firefox processed\r\nUnicode Byte-Order-Mark (BOM) markers in UTF-8 web pages. A malicious web\r\npage could execute a script within the browser that a web input sanitizer\r\ncould miss due to a malformed \"script\" tag. (CVE-2006-2783)\r\n\r\nSeveral flaws were found in the way Firefox processed certain javascript\r\nactions. A malicious web page could conduct a cross-site scripting attack\r\nor steal sensitive information (such as cookies owned by other domains).\r\n(CVE-2006-3802, CVE-2006-3810)\r\n\r\nA form file upload flaw was found in the way Firefox handled javascript\r\ninput object mutation. A malicious web page could upload an arbitrary local\r\nfile at form submission time without user interaction. (CVE-2006-2782)\r\n\r\nA denial of service flaw was found in the way Firefox called the\r\ncrypto.signText() javascript function. A malicious web page could crash the\r\nbrowser if the victim had a client certificate loaded. (CVE-2006-2778)\r\n\r\nTwo HTTP response smuggling flaws were found in the way Firefox processed\r\ncertain invalid HTTP response headers. A malicious web site could return\r\nspecially crafted HTTP response headers which may bypass HTTP proxy\r\nrestrictions. (CVE-2006-2786)\r\n\r\nA flaw was found in the way Firefox processed Proxy AutoConfig scripts. A\r\nmalicious Proxy AutoConfig server could execute arbitrary javascript\r\ninstructions with the permissions of \"chrome\", allowing the page to steal\r\nsensitive information or install browser malware. (CVE-2006-3808)\r\n\r\nA double free flaw was found in the way the nsIX509::getRawDER method was\r\ncalled. If a victim visited a carefully crafted web page, it was possible\r\nto execute arbitrary code as the user running Firefox. (CVE-2006-2788)\r\n\r\nUsers of Firefox are advised to upgrade to this update, which contains\r\nFirefox version 1.5.0.5 that corrects these issues.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2006-August/025125.html\nhttp://lists.centos.org/pipermail/centos-announce/2006-July/025109.html\nhttp://lists.centos.org/pipermail/centos-announce/2006-July/025110.html\nhttp://lists.centos.org/pipermail/centos-announce/2006-July/025121.html\nhttp://lists.centos.org/pipermail/centos-announce/2006-July/025122.html\n\n**Affected packages:**\nfirefox\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2006-0610.html", "edition": 7, "modified": "2006-08-01T01:49:26", "published": "2006-07-29T11:51:13", "href": "http://lists.centos.org/pipermail/centos-announce/2006-July/025109.html", "id": "CESA-2006:0610", "title": "firefox security update", "type": "centos", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-08-15T11:37:25", "bulletinFamily": "unix", "cvelist": ["CVE-2006-3806", "CVE-2006-3809", "CVE-2006-3803", "CVE-2006-2780", "CVE-2006-3807", "CVE-2006-3811", "CVE-2006-2784", "CVE-2006-3677", "CVE-2006-2785", "CVE-2006-2776", "CVE-2006-3804", "CVE-2006-2778", "CVE-2006-3810", "CVE-2006-2779", "CVE-2006-2781", "CVE-2006-3801", "CVE-2006-2786", "CVE-2006-3113", "CVE-2006-2783", "CVE-2006-3805", "CVE-2006-2788", "CVE-2006-2787", "CVE-2006-3808", "CVE-2006-2782", "CVE-2006-3802"], "description": "**CentOS Errata and Security Advisory** CESA-2006:0611\n\n\nMozilla Thunderbird is a standalone mail and newsgroup client.\r\n\r\nThe Mozilla Foundation has discontinued support for the Mozilla Thunderbird\r\n1.0 branch. This update deprecates the Mozilla Thunderbird 1.0 branch in\r\nRed Hat Enterprise Linux 4 in favor of the supported Mozilla Thunderbird\r\n1.5 branch.\r\n\r\nThis update also resolves a number of outstanding Thunderbird security issues:\r\n\r\nSeveral flaws were found in the way Thunderbird processed certain\r\njavascript actions. A malicious mail message could execute arbitrary\r\njavascript instructions with the permissions of \"chrome\", allowing the page\r\nto steal sensitive information or install browser malware. (CVE-2006-2776,\r\nCVE-2006-2784, CVE-2006-2785, CVE-2006-2787, CVE-2006-3807, CVE-2006-3809)\r\n\r\nSeveral denial of service flaws were found in the way Thunderbird processed\r\ncertain mail messages. A malicious web page could crash the browser or\r\npossibly execute arbitrary code as the user running Thunderbird.\r\n(CVE-2006-2779, CVE-2006-2780, CVE-2006-3801, CVE-2006-3677,\r\nCVE-2006-3113, CVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3811)\r\n\r\nSeveral flaws were found in the way Thunderbird processed certain\r\njavascript actions. A malicious mail message could conduct a cross-site\r\nscripting attack or steal sensitive information (such as cookies owned by\r\nother domains). (CVE-2006-3802, CVE-2006-3810)\r\n\r\nA form file upload flaw was found in the way Thunderbird handled javascript\r\ninput object mutation. A malicious mail message could upload an arbitrary\r\nlocal file at form submission time without user interaction. (CVE-2006-2782)\r\n\r\nA denial of service flaw was found in the way Thunderbird called the\r\ncrypto.signText() javascript function. A malicious mail message could crash\r\nthe browser if the victim had a client certificate loaded. (CVE-2006-2778)\r\n\r\nA flaw was found in the way Thunderbird processed Proxy AutoConfig scripts.\r\nA malicious Proxy AutoConfig server could execute arbitrary javascript\r\ninstructions with the permissions of \"chrome\", allowing the page to steal\r\nsensitive information or install client malware. (CVE-2006-3808)\r\n\r\nNote: Please note that JavaScript support is disabled by default in\r\nThunderbird. The above issues are not exploitable with JavaScript disabled. \r\n\r\nTwo flaws were found in the way Thunderbird displayed malformed inline\r\nvcard attachments. If a victim viewed an email message containing a\r\ncarefully crafted vcard it was possible to execute arbitrary code as the\r\nuser running Thunderbird. (CVE-2006-2781, CVE-2006-3804)\r\n\r\nA cross site scripting flaw was found in the way Thunderbird processed\r\nUnicode Byte-order-Mark (BOM) markers in UTF-8 mail messages. A malicious\r\nweb page could execute a script within the browser that a web input\r\nsanitizer could miss due to a malformed \"script\" tag. (CVE-2006-2783)\r\n\r\nTwo HTTP response smuggling flaws were found in the way Thunderbird\r\nprocessed certain invalid HTTP response headers. A malicious web site could\r\nreturn specially crafted HTTP response headers which may bypass HTTP proxy\r\nrestrictions. (CVE-2006-2786)\r\n\r\nA double free flaw was found in the way the nsIX509::getRawDER method was\r\ncalled. If a victim visited a carefully crafted web page, it was possible\r\nto crash Thunderbird. (CVE-2006-2788)\r\n\r\nUsers of Thunderbird are advised to upgrade to this update, which contains\r\nThunderbird version 1.5.0.5 that corrects these issues.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2006-August/025128.html\nhttp://lists.centos.org/pipermail/centos-announce/2006-July/025111.html\nhttp://lists.centos.org/pipermail/centos-announce/2006-July/025112.html\nhttp://lists.centos.org/pipermail/centos-announce/2006-July/025123.html\nhttp://lists.centos.org/pipermail/centos-announce/2006-July/025124.html\n\n**Affected packages:**\nthunderbird\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2006-0611.html", "edition": 7, "modified": "2006-08-01T12:35:08", "published": "2006-07-29T11:51:27", "href": "http://lists.centos.org/pipermail/centos-announce/2006-July/025111.html", "id": "CESA-2006:0611", "title": "thunderbird security update", "type": "centos", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-12-20T18:27:59", "bulletinFamily": "unix", "cvelist": ["CVE-2006-3806", "CVE-2006-3809", "CVE-2006-3803", "CVE-2006-2780", "CVE-2006-3807", "CVE-2006-3811", "CVE-2006-2784", "CVE-2006-3677", "CVE-2006-2785", "CVE-2006-2776", "CVE-2006-3804", "CVE-2006-2778", "CVE-2006-3810", "CVE-2006-2779", "CVE-2006-2781", "CVE-2006-3801", "CVE-2006-3812", "CVE-2006-2786", "CVE-2006-3113", "CVE-2006-2783", "CVE-2006-3805", "CVE-2006-2788", "CVE-2006-2787", "CVE-2006-3808", "CVE-2006-2782", "CVE-2006-3802"], "description": "**CentOS Errata and Security Advisory** CESA-2006:0594-02\n\n\nSeaMonkey is an open source Web browser, advanced email and newsgroup\r\nclient, IRC chat client, and HTML editor.\r\n\r\nThe Mozilla Foundation has discontinued support for the Mozilla Suite. This\r\nupdate deprecates the Mozilla Suite in Red Hat Enterprise Linux 2.1 in\r\nfavor of the supported SeaMonkey Suite.\r\n\r\nThis update also resolves a number of outstanding Mozilla security issues:\r\n\r\nSeveral flaws were found in the way SeaMonkey processed certain javascript\r\nactions. A malicious web page could execute arbitrary javascript\r\ninstructions with the permissions of \"chrome\", allowing the page to steal\r\nsensitive information or install browser malware. (CVE-2006-2776,\r\nCVE-2006-2784, CVE-2006-2785, CVE-2006-2787, CVE-2006-3807, CVE-2006-3809,\r\nCVE-2006-3812)\r\n\r\nSeveral denial of service flaws were found in the way SeaMonkey processed\r\ncertain web content. A malicious web page could crash the browser or\r\npossibly execute arbitrary code as the user running SeaMonkey.\r\n(CVE-2006-2779, CVE-2006-2780, CVE-2006-3801, CVE-2006-3677, CVE-2006-3113,\r\nCVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3811)\r\n\r\nTwo flaws were found in the way SeaMonkey Messenger displayed malformed\r\ninline vcard attachments. If a victim viewed an email message containing\r\na carefully crafted vcard it was possible to execute arbitrary code as the\r\nuser running SeaMonkey Messenger. (CVE-2006-2781, CVE-2006-3804)\r\n\r\nA cross-site scripting flaw was found in the way SeaMonkey processed\r\nUnicode Byte-Order-Mark (BOM) markers in UTF-8 web pages. A malicious web\r\npage could execute a script within the browser that a web input sanitizer\r\ncould miss due to a malformed \"script\" tag. (CVE-2006-2783)\r\n\r\nSeveral flaws were found in the way SeaMonkey processed certain javascript\r\nactions. A malicious web page could conduct a cross-site scripting attack\r\nor steal sensitive information (such as cookies owned by other domains).\r\n(CVE-2006-3802, CVE-2006-3810)\r\n\r\nA form file upload flaw was found in the way SeaMonkey handled javascript\r\ninput object mutation. A malicious web page could upload an arbitrary local\r\nfile at form submission time without user interaction. (CVE-2006-2782)\r\n\r\nA denial of service flaw was found in the way SeaMonkey called the\r\ncrypto.signText() javascript function. A malicious web page could crash the\r\nbrowser if the victim had a client certificate loaded. (CVE-2006-2778)\r\n\r\nTwo HTTP response smuggling flaws were found in the way SeaMonkey processed\r\ncertain invalid HTTP response headers. A malicious web site could return\r\nspecially crafted HTTP response headers which may bypass HTTP proxy\r\nrestrictions. (CVE-2006-2786)\r\n\r\nA flaw was found in the way SeaMonkey processed Proxy AutoConfig scripts. A\r\nmalicious Proxy AutoConfig server could execute arbitrary javascript\r\ninstructions with the permissions of \"chrome\", allowing the page to steal\r\nsensitive information or install browser malware. (CVE-2006-3808)\r\n\r\nA double free flaw was found in the way the nsIX509::getRawDER method was\r\ncalled. If a victim visited a carefully crafted web page it was possible to\r\nexecute arbitrary code as the user running SeaMonkey. (CVE-2006-2788)\r\n\r\nUsers of Mozilla are advised to upgrade to this update, which contains\r\nSeaMonkey version 1.0.3 that corrects these issues.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2006-September/025226.html\n\n**Affected packages:**\nseamonkey\nseamonkey-chat\nseamonkey-devel\nseamonkey-dom-inspector\nseamonkey-js-debugger\nseamonkey-mail\nseamonkey-nspr\nseamonkey-nspr-devel\nseamonkey-nss\nseamonkey-nss-devel\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/rh21as-errata.html", "edition": 5, "modified": "2006-09-05T00:01:38", "published": "2006-09-05T00:01:38", "href": "http://lists.centos.org/pipermail/centos-announce/2006-September/025226.html", "id": "CESA-2006:0594-02", "title": "seamonkey security update", "type": "centos", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-12-20T18:24:34", "bulletinFamily": "unix", "cvelist": ["CVE-2006-3806", "CVE-2006-3809", "CVE-2006-3803", "CVE-2006-2780", "CVE-2006-3807", "CVE-2006-3811", "CVE-2006-2784", "CVE-2006-3677", "CVE-2006-2785", "CVE-2006-2776", "CVE-2006-3804", "CVE-2006-2778", "CVE-2006-3810", "CVE-2006-2779", "CVE-2006-2781", "CVE-2006-3801", "CVE-2006-3812", "CVE-2006-2786", "CVE-2006-3113", "CVE-2006-2783", "CVE-2006-3805", "CVE-2006-2788", "CVE-2006-2787", "CVE-2006-3808", "CVE-2006-2782", "CVE-2006-3802"], "description": "**CentOS Errata and Security Advisory** CESA-2006:0609\n\n\nSeamonkey is an open source Web browser, advanced email and newsgroup\r\nclient, IRC chat client, and HTML editor.\r\n\r\nThe Mozilla Foundation has discontinued support for the Mozilla Suite. This\r\nupdate deprecates the Mozilla Suite in Red Hat Enterprise Linux 4 in\r\nfavor of the supported Seamonkey Suite.\r\n\r\nThis update also resolves a number of outstanding Mozilla security issues:\r\n\r\nSeveral flaws were found in the way Seamonkey processed certain javascript\r\nactions. A malicious web page could execute arbitrary javascript\r\ninstructions with the permissions of \"chrome\", allowing the page to steal\r\nsensitive information or install browser malware. (CVE-2006-2776,\r\nCVE-2006-2784, CVE-2006-2785, CVE-2006-2787, CVE-2006-3807, CVE-2006-3809,\r\nCVE-2006-3812)\r\n\r\nSeveral denial of service flaws were found in the way Seamonkey processed\r\ncertain web content. A malicious web page could crash the browser or\r\npossibly execute arbitrary code as the user running Seamonkey.\r\n(CVE-2006-2779, CVE-2006-2780, CVE-2006-3801, CVE-2006-3677, CVE-2006-3113,\r\nCVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3811)\r\n\r\nTwo flaws were found in the way Seamonkey-mail displayed malformed\r\ninline vcard attachments. If a victim viewed an email message containing\r\na carefully crafted vcard it was possible to execute arbitrary code as the\r\nuser running Mozilla-mail. (CVE-2006-2781, CVE-2006-3804)\r\n\r\nA cross-site scripting flaw was found in the way Seamonkey processed\r\nUnicode Byte-Order-Mark (BOM) markers in UTF-8 web pages. A malicious web\r\npage could execute a script within the browser that a web input sanitizer\r\ncould miss due to a malformed \"script\" tag. (CVE-2006-2783)\r\n\r\nSeveral flaws were found in the way Seamonkey processed certain javascript\r\nactions. A malicious web page could conduct a cross-site scripting attack\r\nor steal sensitive information (such as cookies owned by other domains).\r\n(CVE-2006-3802, CVE-2006-3810)\r\n\r\nA form file upload flaw was found in the way Seamonkey handled javascript\r\ninput object mutation. A malicious web page could upload an arbitrary local\r\nfile at form submission time without user interaction. (CVE-2006-2782)\r\n\r\nA denial of service flaw was found in the way Seamonkey called the\r\ncrypto.signText() javascript function. A malicious web page could crash the\r\nbrowser if the victim had a client certificate loaded. (CVE-2006-2778)\r\n\r\nTwo HTTP response smuggling flaws were found in the way Seamonkey processed\r\ncertain invalid HTTP response headers. A malicious web site could return\r\nspecially crafted HTTP response headers which may bypass HTTP proxy\r\nrestrictions. (CVE-2006-2786)\r\n\r\nA flaw was found in the way Seamonkey processed Proxy AutoConfig scripts. A\r\nmalicious Proxy AutoConfig server could execute arbitrary javascript\r\ninstructions with the permissions of \"chrome\", allowing the page to steal\r\nsensitive information or install browser malware. (CVE-2006-3808)\r\n\r\nA double free flaw was found in the way the nsIX509::getRawDER method was\r\ncalled. If a victim visited a carefully crafted web page, it was possible\r\nto execute arbitrary code as the user running Mozilla. (CVE-2006-2788)\r\n\r\nUsers of Mozilla are advised to upgrade to this update, which contains\r\nSeamonkey version 1.0.3 that corrects these issues.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2006-August/025154.html\nhttp://lists.centos.org/pipermail/centos-announce/2006-August/025155.html\nhttp://lists.centos.org/pipermail/centos-announce/2006-August/025163.html\nhttp://lists.centos.org/pipermail/centos-announce/2006-August/025164.html\nhttp://lists.centos.org/pipermail/centos-announce/2006-August/025165.html\n\n**Affected packages:**\ndevhelp\ndevhelp-devel\nseamonkey\nseamonkey-chat\nseamonkey-devel\nseamonkey-dom-inspector\nseamonkey-js-debugger\nseamonkey-mail\nseamonkey-nspr\nseamonkey-nspr-devel\nseamonkey-nss\nseamonkey-nss-devel\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2006-0609.html", "edition": 3, "modified": "2006-08-06T16:11:30", "published": "2006-08-05T15:16:05", "href": "http://lists.centos.org/pipermail/centos-announce/2006-August/025154.html", "id": "CESA-2006:0609", "title": "devhelp, seamonkey security update", "type": "centos", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-12-20T18:26:07", "bulletinFamily": "unix", "cvelist": ["CVE-2006-3806", "CVE-2006-3809", "CVE-2006-3803", "CVE-2006-3807", "CVE-2006-3811", "CVE-2006-3677", "CVE-2006-3804", "CVE-2006-3810", "CVE-2006-3801", "CVE-2006-3812", "CVE-2006-3113", "CVE-2006-3805", "CVE-2006-3808", "CVE-2006-3802"], "description": "**CentOS Errata and Security Advisory** CESA-2006:0608\n\n\nSeaMonkey is an open source Web browser, advanced email and newsgroup\r\nclient, IRC chat client, and HTML editor.\r\n\r\nSeveral flaws were found in the way SeaMonkey processed certain javascript\r\nactions. A malicious web page could execute arbitrary javascript\r\ninstructions with the permissions of \"chrome\", allowing the page to steal\r\nsensitive information or install browser malware. (CVE-2006-3807,\r\nCVE-2006-3809, CVE-2006-3812)\r\n\r\nSeveral denial of service flaws were found in the way SeaMonkey processed\r\ncertain web content. A malicious web page could crash the browser or\r\npossibly execute arbitrary code as the user running SeaMonkey.\r\n(CVE-2006-3801, CVE-2006-3677, CVE-2006-3113, CVE-2006-3803, CVE-2006-3805,\r\nCVE-2006-3806, CVE-2006-3811)\r\n\r\nA buffer overflow flaw was found in the way SeaMonkey Messenger displayed\r\nmalformed inline vcard attachments. If a victim viewed an email message\r\ncontaining a carefully crafted vcard, it was possible to execute arbitrary\r\ncode as the user running SeaMonkey Messenger. (CVE-2006-3804)\r\n\r\nSeveral flaws were found in the way SeaMonkey processed certain javascript\r\nactions. A malicious web page could conduct a cross-site scripting attack\r\nor steal sensitive information (such as cookies owned by other domains).\r\n(CVE-2006-3802, CVE-2006-3810)\r\n\r\nA flaw was found in the way SeaMonkey processed Proxy AutoConfig scripts. A\r\nmalicious Proxy AutoConfig server could execute arbitrary javascript\r\ninstructions with the permissions of \"chrome\", allowing the page to steal\r\nsensitive information or install browser malware. (CVE-2006-3808)\r\n\r\nUsers of SeaMonkey are advised to upgrade to this update, which contains\r\nSeaMonkey version 1.0.3 that corrects these issues.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2006-August/025153.html\nhttp://lists.centos.org/pipermail/centos-announce/2006-August/025160.html\nhttp://lists.centos.org/pipermail/centos-announce/2006-August/025161.html\nhttp://lists.centos.org/pipermail/centos-announce/2006-August/025162.html\n\n**Affected packages:**\nseamonkey\nseamonkey-chat\nseamonkey-devel\nseamonkey-dom-inspector\nseamonkey-js-debugger\nseamonkey-mail\nseamonkey-nspr\nseamonkey-nspr-devel\nseamonkey-nss\nseamonkey-nss-devel\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2006-0608.html", "edition": 3, "modified": "2006-08-05T21:06:29", "published": "2006-08-04T20:56:41", "href": "http://lists.centos.org/pipermail/centos-announce/2006-August/025153.html", "id": "CESA-2006:0608", "title": "seamonkey security update", "type": "centos", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "redhat": [{"lastseen": "2019-08-13T18:46:37", "bulletinFamily": "unix", "cvelist": ["CVE-2006-2776", "CVE-2006-2778", "CVE-2006-2779", "CVE-2006-2780", "CVE-2006-2781", "CVE-2006-2782", "CVE-2006-2783", "CVE-2006-2784", "CVE-2006-2785", "CVE-2006-2786", "CVE-2006-2787", "CVE-2006-2788", "CVE-2006-3113", "CVE-2006-3677", "CVE-2006-3801", "CVE-2006-3802", "CVE-2006-3803", "CVE-2006-3804", "CVE-2006-3805", "CVE-2006-3806", "CVE-2006-3807", "CVE-2006-3808", "CVE-2006-3809", "CVE-2006-3810", "CVE-2006-3811"], "description": "Mozilla Thunderbird is a standalone mail and newsgroup client.\r\n\r\nThe Mozilla Foundation has discontinued support for the Mozilla Thunderbird\r\n1.0 branch. This update deprecates the Mozilla Thunderbird 1.0 branch in\r\nRed Hat Enterprise Linux 4 in favor of the supported Mozilla Thunderbird\r\n1.5 branch.\r\n\r\nThis update also resolves a number of outstanding Thunderbird security issues:\r\n\r\nSeveral flaws were found in the way Thunderbird processed certain\r\njavascript actions. A malicious mail message could execute arbitrary\r\njavascript instructions with the permissions of \"chrome\", allowing the page\r\nto steal sensitive information or install browser malware. (CVE-2006-2776,\r\nCVE-2006-2784, CVE-2006-2785, CVE-2006-2787, CVE-2006-3807, CVE-2006-3809)\r\n\r\nSeveral denial of service flaws were found in the way Thunderbird processed\r\ncertain mail messages. A malicious web page could crash the browser or\r\npossibly execute arbitrary code as the user running Thunderbird.\r\n(CVE-2006-2779, CVE-2006-2780, CVE-2006-3801, CVE-2006-3677,\r\nCVE-2006-3113, CVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3811)\r\n\r\nSeveral flaws were found in the way Thunderbird processed certain\r\njavascript actions. A malicious mail message could conduct a cross-site\r\nscripting attack or steal sensitive information (such as cookies owned by\r\nother domains). (CVE-2006-3802, CVE-2006-3810)\r\n\r\nA form file upload flaw was found in the way Thunderbird handled javascript\r\ninput object mutation. A malicious mail message could upload an arbitrary\r\nlocal file at form submission time without user interaction. (CVE-2006-2782)\r\n\r\nA denial of service flaw was found in the way Thunderbird called the\r\ncrypto.signText() javascript function. A malicious mail message could crash\r\nthe browser if the victim had a client certificate loaded. (CVE-2006-2778)\r\n\r\nA flaw was found in the way Thunderbird processed Proxy AutoConfig scripts.\r\nA malicious Proxy AutoConfig server could execute arbitrary javascript\r\ninstructions with the permissions of \"chrome\", allowing the page to steal\r\nsensitive information or install client malware. (CVE-2006-3808)\r\n\r\nNote: Please note that JavaScript support is disabled by default in\r\nThunderbird. The above issues are not exploitable with JavaScript disabled. \r\n\r\nTwo flaws were found in the way Thunderbird displayed malformed inline\r\nvcard attachments. If a victim viewed an email message containing a\r\ncarefully crafted vcard it was possible to execute arbitrary code as the\r\nuser running Thunderbird. (CVE-2006-2781, CVE-2006-3804)\r\n\r\nA cross site scripting flaw was found in the way Thunderbird processed\r\nUnicode Byte-order-Mark (BOM) markers in UTF-8 mail messages. A malicious\r\nweb page could execute a script within the browser that a web input\r\nsanitizer could miss due to a malformed \"script\" tag. (CVE-2006-2783)\r\n\r\nTwo HTTP response smuggling flaws were found in the way Thunderbird\r\nprocessed certain invalid HTTP response headers. A malicious web site could\r\nreturn specially crafted HTTP response headers which may bypass HTTP proxy\r\nrestrictions. (CVE-2006-2786)\r\n\r\nA double free flaw was found in the way the nsIX509::getRawDER method was\r\ncalled. If a victim visited a carefully crafted web page, it was possible\r\nto crash Thunderbird. (CVE-2006-2788)\r\n\r\nUsers of Thunderbird are advised to upgrade to this update, which contains\r\nThunderbird version 1.5.0.5 that corrects these issues.", "modified": "2017-09-08T12:12:04", "published": "2006-07-28T04:00:00", "id": "RHSA-2006:0611", "href": "https://access.redhat.com/errata/RHSA-2006:0611", "type": "redhat", "title": "(RHSA-2006:0611) thunderbird security update", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-08-13T18:44:49", "bulletinFamily": "unix", "cvelist": ["CVE-2006-2776", "CVE-2006-2778", "CVE-2006-2779", "CVE-2006-2780", "CVE-2006-2781", "CVE-2006-2782", "CVE-2006-2783", "CVE-2006-2784", "CVE-2006-2785", "CVE-2006-2786", "CVE-2006-2787", "CVE-2006-2788", "CVE-2006-3113", "CVE-2006-3677", "CVE-2006-3801", "CVE-2006-3802", "CVE-2006-3803", "CVE-2006-3804", "CVE-2006-3805", "CVE-2006-3806", "CVE-2006-3807", "CVE-2006-3808", "CVE-2006-3809", "CVE-2006-3810", "CVE-2006-3811", "CVE-2006-3812"], "description": "SeaMonkey is an open source Web browser, advanced email and newsgroup\r\nclient, IRC chat client, and HTML editor.\r\n\r\nThe Mozilla Foundation has discontinued support for the Mozilla Suite. This\r\nupdate deprecates the Mozilla Suite in Red Hat Enterprise Linux 2.1 in\r\nfavor of the supported SeaMonkey Suite.\r\n\r\nThis update also resolves a number of outstanding Mozilla security issues:\r\n\r\nSeveral flaws were found in the way SeaMonkey processed certain javascript\r\nactions. A malicious web page could execute arbitrary javascript\r\ninstructions with the permissions of \"chrome\", allowing the page to steal\r\nsensitive information or install browser malware. (CVE-2006-2776,\r\nCVE-2006-2784, CVE-2006-2785, CVE-2006-2787, CVE-2006-3807, CVE-2006-3809,\r\nCVE-2006-3812)\r\n\r\nSeveral denial of service flaws were found in the way SeaMonkey processed\r\ncertain web content. A malicious web page could crash the browser or\r\npossibly execute arbitrary code as the user running SeaMonkey.\r\n(CVE-2006-2779, CVE-2006-2780, CVE-2006-3801, CVE-2006-3677, CVE-2006-3113,\r\nCVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3811)\r\n\r\nTwo flaws were found in the way SeaMonkey Messenger displayed malformed\r\ninline vcard attachments. If a victim viewed an email message containing\r\na carefully crafted vcard it was possible to execute arbitrary code as the\r\nuser running SeaMonkey Messenger. (CVE-2006-2781, CVE-2006-3804)\r\n\r\nA cross-site scripting flaw was found in the way SeaMonkey processed\r\nUnicode Byte-Order-Mark (BOM) markers in UTF-8 web pages. A malicious web\r\npage could execute a script within the browser that a web input sanitizer\r\ncould miss due to a malformed \"script\" tag. (CVE-2006-2783)\r\n\r\nSeveral flaws were found in the way SeaMonkey processed certain javascript\r\nactions. A malicious web page could conduct a cross-site scripting attack\r\nor steal sensitive information (such as cookies owned by other domains).\r\n(CVE-2006-3802, CVE-2006-3810)\r\n\r\nA form file upload flaw was found in the way SeaMonkey handled javascript\r\ninput object mutation. A malicious web page could upload an arbitrary local\r\nfile at form submission time without user interaction. (CVE-2006-2782)\r\n\r\nA denial of service flaw was found in the way SeaMonkey called the\r\ncrypto.signText() javascript function. A malicious web page could crash the\r\nbrowser if the victim had a client certificate loaded. (CVE-2006-2778)\r\n\r\nTwo HTTP response smuggling flaws were found in the way SeaMonkey processed\r\ncertain invalid HTTP response headers. A malicious web site could return\r\nspecially crafted HTTP response headers which may bypass HTTP proxy\r\nrestrictions. (CVE-2006-2786)\r\n\r\nA flaw was found in the way SeaMonkey processed Proxy AutoConfig scripts. A\r\nmalicious Proxy AutoConfig server could execute arbitrary javascript\r\ninstructions with the permissions of \"chrome\", allowing the page to steal\r\nsensitive information or install browser malware. (CVE-2006-3808)\r\n\r\nA double free flaw was found in the way the nsIX509::getRawDER method was\r\ncalled. If a victim visited a carefully crafted web page it was possible to\r\nexecute arbitrary code as the user running SeaMonkey. (CVE-2006-2788)\r\n\r\nUsers of Mozilla are advised to upgrade to this update, which contains\r\nSeaMonkey version 1.0.3 that corrects these issues.", "modified": "2018-03-14T19:28:05", "published": "2006-08-28T04:00:00", "id": "RHSA-2006:0594", "href": "https://access.redhat.com/errata/RHSA-2006:0594", "type": "redhat", "title": "(RHSA-2006:0594) seamonkey security update (was mozilla)", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-08-13T18:46:27", "bulletinFamily": "unix", "cvelist": ["CVE-2006-2776", "CVE-2006-2778", "CVE-2006-2779", "CVE-2006-2780", "CVE-2006-2781", "CVE-2006-2782", "CVE-2006-2783", "CVE-2006-2784", "CVE-2006-2785", "CVE-2006-2786", "CVE-2006-2787", "CVE-2006-2788", "CVE-2006-3113", "CVE-2006-3677", "CVE-2006-3801", "CVE-2006-3802", "CVE-2006-3803", "CVE-2006-3804", "CVE-2006-3805", "CVE-2006-3806", "CVE-2006-3807", "CVE-2006-3808", "CVE-2006-3809", "CVE-2006-3810", "CVE-2006-3811", "CVE-2006-3812"], "description": "Seamonkey is an open source Web browser, advanced email and newsgroup\r\nclient, IRC chat client, and HTML editor.\r\n\r\nThe Mozilla Foundation has discontinued support for the Mozilla Suite. This\r\nupdate deprecates the Mozilla Suite in Red Hat Enterprise Linux 4 in\r\nfavor of the supported Seamonkey Suite.\r\n\r\nThis update also resolves a number of outstanding Mozilla security issues:\r\n\r\nSeveral flaws were found in the way Seamonkey processed certain javascript\r\nactions. A malicious web page could execute arbitrary javascript\r\ninstructions with the permissions of \"chrome\", allowing the page to steal\r\nsensitive information or install browser malware. (CVE-2006-2776,\r\nCVE-2006-2784, CVE-2006-2785, CVE-2006-2787, CVE-2006-3807, CVE-2006-3809,\r\nCVE-2006-3812)\r\n\r\nSeveral denial of service flaws were found in the way Seamonkey processed\r\ncertain web content. A malicious web page could crash the browser or\r\npossibly execute arbitrary code as the user running Seamonkey.\r\n(CVE-2006-2779, CVE-2006-2780, CVE-2006-3801, CVE-2006-3677, CVE-2006-3113,\r\nCVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3811)\r\n\r\nTwo flaws were found in the way Seamonkey-mail displayed malformed\r\ninline vcard attachments. If a victim viewed an email message containing\r\na carefully crafted vcard it was possible to execute arbitrary code as the\r\nuser running Mozilla-mail. (CVE-2006-2781, CVE-2006-3804)\r\n\r\nA cross-site scripting flaw was found in the way Seamonkey processed\r\nUnicode Byte-Order-Mark (BOM) markers in UTF-8 web pages. A malicious web\r\npage could execute a script within the browser that a web input sanitizer\r\ncould miss due to a malformed \"script\" tag. (CVE-2006-2783)\r\n\r\nSeveral flaws were found in the way Seamonkey processed certain javascript\r\nactions. A malicious web page could conduct a cross-site scripting attack\r\nor steal sensitive information (such as cookies owned by other domains).\r\n(CVE-2006-3802, CVE-2006-3810)\r\n\r\nA form file upload flaw was found in the way Seamonkey handled javascript\r\ninput object mutation. A malicious web page could upload an arbitrary local\r\nfile at form submission time without user interaction. (CVE-2006-2782)\r\n\r\nA denial of service flaw was found in the way Seamonkey called the\r\ncrypto.signText() javascript function. A malicious web page could crash the\r\nbrowser if the victim had a client certificate loaded. (CVE-2006-2778)\r\n\r\nTwo HTTP response smuggling flaws were found in the way Seamonkey processed\r\ncertain invalid HTTP response headers. A malicious web site could return\r\nspecially crafted HTTP response headers which may bypass HTTP proxy\r\nrestrictions. (CVE-2006-2786)\r\n\r\nA flaw was found in the way Seamonkey processed Proxy AutoConfig scripts. A\r\nmalicious Proxy AutoConfig server could execute arbitrary javascript\r\ninstructions with the permissions of \"chrome\", allowing the page to steal\r\nsensitive information or install browser malware. (CVE-2006-3808)\r\n\r\nA double free flaw was found in the way the nsIX509::getRawDER method was\r\ncalled. If a victim visited a carefully crafted web page, it was possible\r\nto execute arbitrary code as the user running Mozilla. (CVE-2006-2788)\r\n\r\nUsers of Mozilla are advised to upgrade to this update, which contains\r\nSeamonkey version 1.0.3 that corrects these issues.", "modified": "2017-09-08T11:49:07", "published": "2006-08-02T04:00:00", "id": "RHSA-2006:0609", "href": "https://access.redhat.com/errata/RHSA-2006:0609", "type": "redhat", "title": "(RHSA-2006:0609) seamonkey security update", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-08-13T18:46:17", "bulletinFamily": "unix", "cvelist": ["CVE-2006-3113", "CVE-2006-3677", "CVE-2006-3801", "CVE-2006-3802", "CVE-2006-3803", "CVE-2006-3804", "CVE-2006-3805", "CVE-2006-3806", "CVE-2006-3807", "CVE-2006-3808", "CVE-2006-3809", "CVE-2006-3810", "CVE-2006-3811", "CVE-2006-3812"], "description": "SeaMonkey is an open source Web browser, advanced email and newsgroup\r\nclient, IRC chat client, and HTML editor.\r\n\r\nSeveral flaws were found in the way SeaMonkey processed certain javascript\r\nactions. A malicious web page could execute arbitrary javascript\r\ninstructions with the permissions of \"chrome\", allowing the page to steal\r\nsensitive information or install browser malware. (CVE-2006-3807,\r\nCVE-2006-3809, CVE-2006-3812)\r\n\r\nSeveral denial of service flaws were found in the way SeaMonkey processed\r\ncertain web content. A malicious web page could crash the browser or\r\npossibly execute arbitrary code as the user running SeaMonkey.\r\n(CVE-2006-3801, CVE-2006-3677, CVE-2006-3113, CVE-2006-3803, CVE-2006-3805,\r\nCVE-2006-3806, CVE-2006-3811)\r\n\r\nA buffer overflow flaw was found in the way SeaMonkey Messenger displayed\r\nmalformed inline vcard attachments. If a victim viewed an email message\r\ncontaining a carefully crafted vcard, it was possible to execute arbitrary\r\ncode as the user running SeaMonkey Messenger. (CVE-2006-3804)\r\n\r\nSeveral flaws were found in the way SeaMonkey processed certain javascript\r\nactions. A malicious web page could conduct a cross-site scripting attack\r\nor steal sensitive information (such as cookies owned by other domains).\r\n(CVE-2006-3802, CVE-2006-3810)\r\n\r\nA flaw was found in the way SeaMonkey processed Proxy AutoConfig scripts. A\r\nmalicious Proxy AutoConfig server could execute arbitrary javascript\r\ninstructions with the permissions of \"chrome\", allowing the page to steal\r\nsensitive information or install browser malware. (CVE-2006-3808)\r\n\r\nUsers of SeaMonkey are advised to upgrade to this update, which contains\r\nSeaMonkey version 1.0.3 that corrects these issues.", "modified": "2017-07-29T20:33:39", "published": "2006-07-27T04:00:00", "id": "RHSA-2006:0608", "href": "https://access.redhat.com/errata/RHSA-2006:0608", "type": "redhat", "title": "(RHSA-2006:0608) seamonkey security update", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-08-13T18:46:37", "bulletinFamily": "unix", "cvelist": ["CVE-2006-2776", "CVE-2006-2778", "CVE-2006-2779", "CVE-2006-2780", "CVE-2006-2781", "CVE-2006-2782", "CVE-2006-2783", "CVE-2006-2784", "CVE-2006-2785", "CVE-2006-2786", "CVE-2006-2787", "CVE-2006-2788"], "description": "SeaMonkey is an open source Web browser, advanced email and newsgroup\r\nclient, IRC chat client, and HTML editor.\r\n\r\nThe Mozilla Foundation has discontinued support for the Mozilla Suite. This\r\nupdate deprecates the Mozilla Suite in Red Hat Enterprise Linux 3 in favor\r\nof the supported SeaMonkey Suite.\r\n\r\nThis update also resolves a number of outstanding Mozilla security issues:\r\n\r\nSeveral flaws were found in the way Mozilla processed certain javascript\r\nactions. A malicious web page could execute arbitrary javascript\r\ninstructions with the permissions of \"chrome\", allowing the page to steal\r\nsensitive information or install browser malware. (CVE-2006-2776,\r\nCVE-2006-2784, CVE-2006-2785, CVE-2006-2787)\r\n\r\nSeveral denial of service flaws were found in the way Mozilla processed\r\ncertain web content. A malicious web page could crash firefox or possibly\r\nexecute arbitrary code. These issues to date were not proven to be\r\nexploitable, but do show evidence of memory corruption. (CVE-2006-2779,\r\nCVE-2006-2780)\r\n\r\nA double-free flaw was found in the way Mozilla-mail displayed malformed\r\ninline vcard attachments. If a victim viewed an email message containing\r\na carefully crafted vcard it could execute arbitrary code as the user\r\nrunning Mozilla-mail. (CVE-2006-2781) \r\n\r\nA cross site scripting flaw was found in the way Mozilla processed Unicode\r\nByte-order-Mark (BOM) markers in UTF-8 web pages. A malicious web page\r\ncould execute a script within the browser that a web input sanitizer could\r\nmiss due to a malformed \"script\" tag. (CVE-2006-2783)\r\n\r\nA form file upload flaw was found in the way Mozilla handled javascript\r\ninput object mutation. A malicious web page could upload an arbitrary local\r\nfile at form submission time without user interaction. (CVE-2006-2782)\r\n\r\nA denial of service flaw was found in the way Mozilla called the\r\ncrypto.signText() javascript function. A malicious web page could crash the\r\nbrowser if the victim had a client certificate loaded. (CVE-2006-2778)\r\n\r\nTwo HTTP response smuggling flaws were found in the way Mozilla processed\r\ncertain invalid HTTP response headers. A malicious web site could return\r\nspecially crafted HTTP response headers which may bypass HTTP proxy\r\nrestrictions. (CVE-2006-2786)\r\n\r\nA double free flaw was found in the way the nsIX509::getRawDER method was\r\ncalled. If a victim visited a carefully crafted web page it could execute\r\narbitrary code as the user running Mozilla. (CVE-2006-2788)\r\n\r\nUsers of Mozilla are advised to upgrade to this update, which contains\r\nSeaMonkey version 1.0.2 that is not vulnerable to these issues.", "modified": "2017-07-29T20:27:13", "published": "2006-07-20T04:00:00", "id": "RHSA-2006:0578", "href": "https://access.redhat.com/errata/RHSA-2006:0578", "type": "redhat", "title": "(RHSA-2006:0578) seamonkey security update (was mozilla)", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "ubuntu": [{"lastseen": "2020-07-09T00:27:44", "bulletinFamily": "unix", "cvelist": ["CVE-2006-3806", "CVE-2006-3809", "CVE-2006-3803", "CVE-2006-3807", "CVE-2006-3811", "CVE-2006-3677", "CVE-2006-3810", "CVE-2006-3801", "CVE-2006-3812", "CVE-2006-3113", "CVE-2006-3805", "CVE-2006-3808", "CVE-2006-3802"], "description": "Various flaws have been reported that allow an attacker to execute \narbitrary code with user privileges by tricking the user into opening \na malicious URL. (CVE-2006-3113, CVE-2006-3677, CVE-2006-3801, \nCVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3807, \nCVE-2006-3809, CVE-2006-3811, CVE-2006-3812)\n\ncross-site scripting vulnerabilities were found in the \nXPCNativeWrapper() function and native DOM method handlers. A \nmalicious web site could exploit these to modify the contents or steal \nconfidential data (such as passwords) from other opened web pages. \n(CVE-2006-3802, CVE-2006-3810)\n\nA bug was found in the script handler for automatic proxy \nconfiguration. A malicious proxy could send scripts which could \nexecute arbitrary code with the user's privileges. (CVE-2006-3808)\n\nPlease see\n\n<http://www.mozilla.org/projects/security/known-vulnerabilities.html#Firefox>\n\nfor technical details of these vulnerabilities.", "edition": 6, "modified": "2006-07-28T00:00:00", "published": "2006-07-28T00:00:00", "id": "USN-327-1", "href": "https://ubuntu.com/security/notices/USN-327-1", "title": "firefox vulnerabilities", "type": "ubuntu", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-07-09T01:45:29", "bulletinFamily": "unix", "cvelist": ["CVE-2006-3806", "CVE-2006-3809", "CVE-2006-3803", "CVE-2006-3807", "CVE-2006-3811", "CVE-2006-3804", "CVE-2006-3810", "CVE-2006-3812", "CVE-2006-3113", "CVE-2006-3805", "CVE-2006-3084", "CVE-2006-3802"], "description": "Various flaws have been reported that allow an attacker to execute \narbitrary code with user privileges by tricking the user into opening \na malicious email containing JavaScript. Please note that JavaScript \nis disabled by default for emails, and it is not recommended to enable \nit. (CVE-2006-3113, CVE-2006-3802, CVE-2006-3803, CVE-2006-3805, \nCVE-2006-3806, CVE-2006-3807, CVE-2006-3809, CVE-2006-3810, \nCVE-2006-3811, CVE-2006-3812)\n\nA buffer overflow has been discovered in the handling of .vcard files. \nBy tricking a user into importing a malicious vcard into his contacts, \nthis could be exploited to execute arbitrary code with the user's \nprivileges. (CVE-2006-3084)\n\nThe \"enigmail\" plugin has been updated to work with the new \nThunderbird version.", "edition": 6, "modified": "2006-07-29T00:00:00", "published": "2006-07-29T00:00:00", "id": "USN-329-1", "href": "https://ubuntu.com/security/notices/USN-329-1", "title": "Thunderbird vulnerabilities", "type": "ubuntu", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-07-09T00:27:33", "bulletinFamily": "unix", "cvelist": ["CVE-2006-2780", "CVE-2006-2784", "CVE-2006-2785", "CVE-2006-2776", "CVE-2006-2778", "CVE-2006-2779", "CVE-2005-0752", "CVE-2006-2786", "CVE-2006-1729", "CVE-2006-2783", "CVE-2006-2788", "CVE-2006-2787", "CVE-2006-2777", "CVE-2006-2775", "CVE-2006-2782"], "description": "Jonas Sicking discovered that under some circumstances persisted XUL \nattributes are associated with the wrong URL. A malicious web site \ncould exploit this to execute arbitrary code with the privileges of \nthe user. (MFSA 2006-35, CVE-2006-2775)\n\nPaul Nickerson discovered that content-defined setters on an object \nprototype were getting called by privileged UI code. It was \ndemonstrated that this could be exploited to run arbitrary web script \nwith full user privileges (MFSA 2006-37, CVE-2006-2776). A similar \nattack was discovered by moz_bug_r_a4 that leveraged SelectionObject \nnotifications that were called in privileged context. (MFSA 2006-43, \nCVE-2006-2777)\n\nMikolaj Habryn discovered a buffer overflow in the crypto.signText() \nfunction. By tricking a user to visit a site with an SSL certificate \nwith specially crafted optional Certificate Authority name \narguments, this could potentially be exploited to execute arbitrary \ncode with the user's privileges. (MFSA 2006-38, CVE-2006-2778)\n\nThe Mozilla developer team discovered several bugs that lead to \ncrashes with memory corruption. These might be exploitable by \nmalicious web sites to execute arbitrary code with the privileges of \nthe user. (MFSA 2006-32, CVE-2006-2779, CVE-2006-2780, CVE-2006-2788)\n\nChuck McAuley reported that the fix for CVE-2006-1729 (file stealing \nby changing input type) was not sufficient to prevent all variants of \nexploitation. (MFSA 2006-41, CVE-2006-2782)\n\nMasatoshi Kimura found a way to bypass web input sanitizers which \nfilter out JavaScript. By inserting 'Unicode Byte-order-Mark (BOM)' \ncharacters into the HTML code (e. g. ''), these filters \nmight not recognize the tags anymore; however, Firefox would still \nexecute them since BOM markers are filtered out before processing the \npage. (MFSA 2006-42, CVE-2006-2783)\n\nPaul Nickerson noticed that the fix for CVE-2005-0752 (JavaScript \nprivilege escalation on the plugins page) was not sufficient to \nprevent all variants of exploitation. (MFSA 2006-36, CVE-2006-2784)\n\nPaul Nickerson demonstrated that if an attacker could convince a user \nto right-click on a broken image and choose \"View Image\" from the \ncontext menu then he could get JavaScript to run on a site of the \nattacker's choosing. This could be used to steal login cookies or \nother confidential information from the target site. (MFSA 2006-34, \nCVE-2006-2785)\n\nKazuho Oku discovered various ways to perform HTTP response smuggling \nwhen used with certain proxy servers. Due to different interpretation \nof nonstandard HTTP headers in Firefox and the proxy server, a \nmalicious web site can exploit this to send back two responses to one \nrequest. The second response could be used to steal login cookies or \nother sensitive data from another opened web site. (MFSA 2006-33, \nCVE-2006-2786)", "edition": 6, "modified": "2006-06-09T00:00:00", "published": "2006-06-09T00:00:00", "id": "USN-296-1", "href": "https://ubuntu.com/security/notices/USN-296-1", "title": "firefox vulnerabilities", "type": "ubuntu", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-07-08T23:38:16", "bulletinFamily": "unix", "cvelist": ["CVE-2006-2780", "CVE-2006-2784", "CVE-2006-2785", "CVE-2006-2776", "CVE-2006-2778", "CVE-2006-2779", "CVE-2005-0752", "CVE-2006-2786", "CVE-2006-1729", "CVE-2006-2783", "CVE-2006-2788", "CVE-2006-2787", "CVE-2006-2777", "CVE-2006-2775", "CVE-2006-2782"], "description": "USN-296-1 fixed several vulnerabilities in Firefox for the Ubuntu 6.06 \nLTS release. This update provides the corresponding fixes for Ubuntu \n5.04 and Ubuntu 5.10.\n\nFor reference, these are the details of the original USN:\n\nJonas Sicking discovered that under some circumstances persisted XUL \nattributes are associated with the wrong URL. A malicious web site \ncould exploit this to execute arbitrary code with the privileges of \nthe user. (MFSA 2006-35, CVE-2006-2775)\n\nPaul Nickerson discovered that content-defined setters on an object \nprototype were getting called by privileged UI code. It was \ndemonstrated that this could be exploited to run arbitrary web script \nwith full user privileges (MFSA 2006-37, CVE-2006-2776). A similar \nattack was discovered by moz_bug_r_a4 that leveraged SelectionObject \nnotifications that were called in privileged context. (MFSA 2006-43, \nCVE-2006-2777)\n\nMikolaj Habryn discovered a buffer overflow in the crypto.signText() \nfunction. By tricking a user to visit a site with an SSL certificate \nwith specially crafted optional Certificate Authority name \narguments, this could potentially be exploited to execute arbitrary \ncode with the user's privileges. (MFSA 2006-38, CVE-2006-2778)\n\nThe Mozilla developer team discovered several bugs that lead to \ncrashes with memory corruption. These might be exploitable by \nmalicious web sites to execute arbitrary code with the privileges of \nthe user. (MFSA 2006-32, CVE-2006-2779, CVE-2006-2780, CVE-2006-2788)\n\nChuck McAuley reported that the fix for CVE-2006-1729 (file stealing \nby changing input type) was not sufficient to prevent all variants of \nexploitation. (MFSA 2006-41, CVE-2006-2782)\n\nMasatoshi Kimura found a way to bypass web input sanitizers which \nfilter out JavaScript. By inserting 'Unicode Byte-order-Mark (BOM)' \ncharacters into the HTML code (e. g. ''), these filters \nmight not recognize the tags anymore; however, Firefox would still \nexecute them since BOM markers are filtered out before processing the \npage. (MFSA 2006-42, CVE-2006-2783)\n\nPaul Nickerson noticed that the fix for CVE-2005-0752 (JavaScript \nprivilege escalation on the plugins page) was not sufficient to \nprevent all variants of exploitation. (MFSA 2006-36, CVE-2006-2784)\n\nPaul Nickerson demonstrated that if an attacker could convince a user \nto right-click on a broken image and choose \"View Image\" from the \ncontext menu then he could get JavaScript to run on a site of the \nattacker's choosing. This could be used to steal login cookies or \nother confidential information from the target site. (MFSA 2006-34, \nCVE-2006-2785)\n\nKazuho Oku discovered various ways to perform HTTP response smuggling \nwhen used with certain proxy servers. Due to different interpretation \nof nonstandard HTTP headers in Firefox and the proxy server, a \nmalicious web site can exploit this to send back two responses to one \nrequest. The second response could be used to steal login cookies or \nother sensitive data from another opened web site. (MFSA 2006-33, \nCVE-2006-2786)", "edition": 6, "modified": "2006-07-25T00:00:00", "published": "2006-07-25T00:00:00", "id": "USN-296-2", "href": "https://ubuntu.com/security/notices/USN-296-2", "title": "Firefox vulnerabilities", "type": "ubuntu", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-07-09T00:23:17", "bulletinFamily": "unix", "cvelist": ["CVE-2006-2780", "CVE-2006-2784", "CVE-2006-2776", "CVE-2006-2778", "CVE-2006-2779", "CVE-2006-2781", "CVE-2006-2786", "CVE-2006-2783", "CVE-2006-2787", "CVE-2006-2775"], "description": "USN-297-1 fixed several vulnerabilities in Thunderbird for the Ubuntu \n6.06 LTS release. This update provides the corresponding fixes for \nUbuntu 5.04 and Ubuntu 5.10.\n\nFor reference, these are the details of the original USN:\n\nJonas Sicking discovered that under some circumstances persisted XUL \nattributes are associated with the wrong URL. A malicious web site \ncould exploit this to execute arbitrary code with the privileges of \nthe user. (MFSA 2006-35, CVE-2006-2775)\n\nPaul Nickerson discovered that content-defined setters on an object \nprototype were getting called by privileged UI code. It was \ndemonstrated that this could be exploited to run arbitrary web \nscript with full user privileges (MFSA 2006-37, CVE-2006-2776).\n\nMikolaj Habryn discovered a buffer overflow in the crypto.signText() \nfunction. By sending an email with malicious JavaScript to an user, \nand that user enabled JavaScript in Thunderbird (which is not the \ndefault and not recommended), this could potentially be exploited to \nexecute arbitrary code with the user's privileges. (MFSA 2006-38, \nCVE-2006-2778)\n\nThe Mozilla developer team discovered several bugs that lead to \ncrashes with memory corruption. These might be exploitable by \nmalicious web sites to execute arbitrary code with the privileges of \nthe user. (MFSA 2006-32, CVE-2006-2779, CVE-2006-2780)\n\nMasatoshi Kimura discovered a memory corruption (double-free) when \nprocessing a large VCard with invalid base64 characters in it. By \nsending a maliciously crafted set of VCards to a user, this could \npotentially be exploited to execute arbitrary code with the user's \nprivileges. (MFSA 2006-40, CVE-2006-2781)\n\nMasatoshi Kimura found a way to bypass web input sanitizers which \nfilter out JavaScript. By inserting 'Unicode Byte-order-Mark (BOM)' \ncharacters into the HTML code (e. g. ''), these filters \nmight not recognize the tags anymore; however, Thunderbird would \nstill execute them since BOM markers are filtered out before \nprocessing a mail containing JavaScript. (MFSA 2006-42, \nCVE-2006-2783)\n\nKazuho Oku discovered various ways to perform HTTP response \nsmuggling when used with certain proxy servers. Due to different \ninterpretation of nonstandard HTTP headers in Thunderbird and the \nproxy server, a malicious HTML email can exploit this to send back \ntwo responses to one request. The second response could be used to \nsteal login cookies or other sensitive data from another opened web \nsite. (MFSA 2006-33, CVE-2006-2786)\n\nIt was discovered that JavaScript run via EvalInSandbox() can escape \nthe sandbox. Malicious scripts received in emails containing \nJavaScript could use these privileges to execute arbitrary code with \nthe user's privileges. (MFSA 2006-31, CVE-2006-2787)", "edition": 6, "modified": "2006-07-26T00:00:00", "published": "2006-07-26T00:00:00", "id": "USN-297-3", "href": "https://ubuntu.com/security/notices/USN-297-3", "title": "Thunderbird vulnerabilities", "type": "ubuntu", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-07-09T00:25:39", "bulletinFamily": "unix", "cvelist": ["CVE-2006-2780", "CVE-2006-2784", "CVE-2006-2785", "CVE-2006-2776", "CVE-2006-2778", "CVE-2006-2779", "CVE-2006-2781", "CVE-2005-0752", "CVE-2006-2786", "CVE-2006-1729", "CVE-2006-2783", "CVE-2006-2787", "CVE-2006-2777", "CVE-2006-2775", "CVE-2006-2782"], "description": "Jonas Sicking discovered that under some circumstances persisted XUL \nattributes are associated with the wrong URL. A malicious web site \ncould exploit this to execute arbitrary code with the privileges of \nthe user. (MFSA 2006-35, CVE-2006-2775)\n\nPaul Nickerson discovered that content-defined setters on an object \nprototype were getting called by privileged UI code. It was \ndemonstrated that this could be exploited to run arbitrary web script \nwith full user privileges (MFSA 2006-37, CVE-2006-2776). A similar \nattack was discovered by moz_bug_r_a4 that leveraged SelectionObject \nnotifications that were called in privileged context. (MFSA 2006-43, \nCVE-2006-2777)\n\nMikolaj Habryn discovered a buffer overflow in the crypto.signText() \nfunction. By tricking a user to visit a site with an SSL certificate \nwith specially crafted optional Certificate Authority name \narguments, this could potentially be exploited to execute arbitrary \ncode with the user's privileges. (MFSA 2006-38, CVE-2006-2778)\n\nThe Mozilla developer team discovered several bugs that lead to \ncrashes with memory corruption. These might be exploitable by \nmalicious web sites to execute arbitrary code with the privileges of \nthe user. (MFSA 2006-32, CVE-2006-2779, CVE-2006-2780)\n\nMasatoshi Kimura discovered a memory corruption (double-free) when \nprocessing a large VCard with invalid base64 characters in it. By \nsending a maliciously crafted set of VCards to a user, this could \npotentially be exploited to execute arbitrary code with the user's \nprivileges. (MFSA 2006-40, CVE-2006-2781)\n\nChuck McAuley reported that the fix for CVE-2006-1729 (file stealing \nby changing input type) was not sufficient to prevent all variants of \nexploitation. (MFSA 2006-41, CVE-2006-2782)\n\nMasatoshi Kimura found a way to bypass web input sanitizers which \nfilter out JavaScript. By inserting 'Unicode Byte-order-Mark (BOM)' \ncharacters into the HTML code (e. g. ''), these filters \nmight not recognize the tags anymore; however, Mozilla would still \nexecute them since BOM markers are filtered out before processing the \npage. (MFSA 2006-42, CVE-2006-2783)\n\nPaul Nickerson noticed that the fix for CVE-2005-0752 (JavaScript \nprivilege escalation on the plugins page) was not sufficient to \nprevent all variants of exploitation. (MFSA 2006-36, CVE-2006-2784)\n\nPaul Nickerson demonstrated that if an attacker could convince a user \nto right-click on a broken image and choose \"View Image\" from the \ncontext menu then he could get JavaScript to run on a site of the \nattacker's choosing. This could be used to steal login cookies or \nother confidential information from the target site. (MFSA 2006-34, \nCVE-2006-2785)\n\nKazuho Oku discovered various ways to perform HTTP response smuggling \nwhen used with certain proxy servers. Due to different interpretation \nof nonstandard HTTP headers in Mozilla and the proxy server, a \nmalicious web site can exploit this to send back two responses to one \nrequest. The second response could be used to steal login cookies or \nother sensitive data from another opened web site. (MFSA 2006-33, \nCVE-2006-2786)", "edition": 6, "modified": "2006-07-26T00:00:00", "published": "2006-07-26T00:00:00", "id": "USN-323-1", "href": "https://ubuntu.com/security/notices/USN-323-1", "title": "mozilla vulnerabilities", "type": "ubuntu", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-07-09T00:31:08", "bulletinFamily": "unix", "cvelist": ["CVE-2006-2780", "CVE-2006-2776", "CVE-2006-2778", "CVE-2006-2779", "CVE-2006-2781", "CVE-2006-2786", "CVE-2006-2783", "CVE-2006-2787", "CVE-2006-2775"], "description": "Jonas Sicking discovered that under some circumstances persisted XUL \nattributes are associated with the wrong URL. A malicious web site \ncould exploit this to execute arbitrary code with the privileges of \nthe user. (MFSA 2006-35, CVE-2006-2775)\n\nPaul Nickerson discovered that content-defined setters on an object \nprototype were getting called by privileged UI code. It was \ndemonstrated that this could be exploited to run arbitrary web script \nwith full user privileges (MFSA 2006-37, CVE-2006-2776).\n\nMikolaj Habryn discovered a buffer overflow in the crypto.signText() \nfunction. By sending an email with malicious JavaScript to an user, \nand that user enabled JavaScript in Thunderbird (which is not the \ndefault and not recommended), this could potentially be exploited to \nexecute arbitrary code with the user's privileges. (MFSA 2006-38, \nCVE-2006-2778)\n\nThe Mozilla developer team discovered several bugs that lead to \ncrashes with memory corruption. These might be exploitable by \nmalicious web sites to execute arbitrary code with the privileges of \nthe user. (MFSA 2006-32, CVE-2006-2779, CVE-2006-2780)\n\nMasatoshi Kimura discovered a memory corruption (double-free) when \nprocessing a large VCard with invalid base64 characters in it. By \nsending a maliciously crafted set of VCards to a user, this could \npotentially be exploited to execute arbitrary code with the user's \nprivileges. (MFSA 2006-40, CVE-2006-2781)\n\nMasatoshi Kimura found a way to bypass web input sanitizers which \nfilter out JavaScript. By inserting 'Unicode Byte-order-Mark (BOM)' \ncharacters into the HTML code (e. g. ''), these filters \nmight not recognize the tags anymore; however, Thunderbird would still \nexecute them since BOM markers are filtered out before processing a \nmail containing JavaScript. (MFSA 2006-42, CVE-2006-2783)\n\nKazuho Oku discovered various ways to perform HTTP response smuggling \nwhen used with certain proxy servers. Due to different interpretation \nof nonstandard HTTP headers in Thunderbird and the proxy server, a \nmalicious HTML email can exploit this to send back two responses to one \nrequest. The second response could be used to steal login cookies or \nother sensitive data from another opened web site. (MFSA 2006-33, \nCVE-2006-2786)\n\nIt was discovered that JavaScript run via EvalInSandbox() can escape \nthe sandbox. Malicious scripts received in emails containing \nJavaScript could use these privileges to execute arbitrary code with \nthe user's privileges. (MFSA 2006-31, CVE-2006-2787)\n\nThe \"enigmail\" plugin has been updated to work with the new \nThunderbird version.", "edition": 6, "modified": "2006-06-14T00:00:00", "published": "2006-06-14T00:00:00", "id": "USN-297-1", "href": "https://ubuntu.com/security/notices/USN-297-1", "title": "Thunderbird vulnerabilities", "type": "ubuntu", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "gentoo": [{"lastseen": "2016-09-06T19:46:49", "bulletinFamily": "unix", "cvelist": ["CVE-2006-3806", "CVE-2006-3809", "CVE-2006-3803", "CVE-2006-3807", "CVE-2006-3811", "CVE-2006-3677", "CVE-2006-3810", "CVE-2006-3801", "CVE-2006-3812", "CVE-2006-3113", "CVE-2006-3805", "CVE-2006-3808", "CVE-2006-3802"], "edition": 1, "description": "### Background\n\nMozilla Firefox is a redesign of the Mozilla Navigator component. The goal is to produce a cross-platform stand-alone browser application. \n\n### Description\n\nThe following vulnerabilities have been reported: \n\n * Benjamin Smedberg discovered that chrome URL's could be made to reference remote files.\n * Developers in the Mozilla community looked for and fixed several crash bugs to improve the stability of Mozilla clients.\n * \"shutdown\" reports that cross-site scripting (XSS) attacks could be performed using the construct XPCNativeWrapper(window).Function(...), which created a function that appeared to belong to the window in question even after it had been navigated to the target site.\n * \"shutdown\" reports that scripts granting the UniversalBrowserRead privilege can leverage that into the equivalent of the far more powerful UniversalXPConnect since they are allowed to \"read\" into a privileged context.\n * \"moz_bug_r_a4\" reports that A malicious Proxy AutoConfig (PAC) server could serve a PAC script that can execute code with elevated privileges by setting the required FindProxyForURL function to the eval method on a privileged object that leaked into the PAC sandbox.\n * \"moz_bug_r_a4\" discovered that Named JavaScript functions have a parent object created using the standard Object() constructor (ECMA-specified behavior) and that this constructor can be redefined by script (also ECMA-specified behavior).\n * Igor Bukanov and shutdown found additional places where an untimely garbage collection could delete a temporary object that was in active use.\n * Georgi Guninski found potential integer overflow issues with long strings in the toSource() methods of the Object, Array and String objects as well as string function arguments.\n * H. D. Moore reported a testcase that was able to trigger a race condition where JavaScript garbage collection deleted a temporary variable still being used in the creation of a new Function object.\n * A malicious page can hijack native DOM methods on a document object in another domain, which will run the attacker's script when called by the victim page.\n * Secunia Research has discovered a vulnerability which is caused due to an memory corruption error within the handling of simultaneously happening XPCOM events. This leads to use of a deleted timer object.\n * An anonymous researcher for TippingPoint and the Zero Day Initiative showed that when used in a web page Java would reference properties of the window.navigator object as it started up.\n * Thilo Girmann discovered that in certain circumstances a JavaScript reference to a frame or window was not properly cleared when the referenced content went away.\n\n### Impact\n\nA user can be enticed to open specially crafted URLs, visit webpages containing malicious JavaScript or execute a specially crafted script. These events could lead to the execution of arbitrary code, or the installation of malware on the user's computer. \n\n### Workaround\n\nThere is no known workaround at this time. \n\n### Resolution\n\nAll Mozilla Firefox users should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=www-client/mozilla-firefox-1.5.0.5\"\n\nUsers of the binary package should upgrade as well: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=www-client/mozilla-firefox-bin-1.5.0.5\"", "modified": "2006-08-03T00:00:00", "published": "2006-08-03T00:00:00", "id": "GLSA-200608-03", "href": "https://security.gentoo.org/glsa/200608-03", "type": "gentoo", "title": "Mozilla Firefox: Multiple vulnerabilities", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2016-09-06T19:46:17", "bulletinFamily": "unix", "cvelist": ["CVE-2006-3806", "CVE-2006-3809", "CVE-2006-3803", "CVE-2006-3807", "CVE-2006-3811", "CVE-2006-3677", "CVE-2006-3804", "CVE-2006-3810", "CVE-2006-3801", "CVE-2006-3812", "CVE-2006-3113", "CVE-2006-3805", "CVE-2006-3808", "CVE-2006-3802"], "description": "### Background\n\nThe Mozilla SeaMonkey project is a community effort to deliver production-quality releases of code derived from the application formerly known as \"Mozilla Application Suite\". \n\n### Description\n\nThe following vulnerabilities have been reported: \n\n * Benjamin Smedberg discovered that chrome URL's could be made to reference remote files.\n * Developers in the Mozilla community looked for and fixed several crash bugs to improve the stability of Mozilla clients, which could lead to the execution of arbitrary code by a remote attacker.\n * \"shutdown\" reports that cross-site scripting (XSS) attacks could be performed using the construct XPCNativeWrapper(window).Function(...), which created a function that appeared to belong to the window in question even after it had been navigated to the target site.\n * \"shutdown\" reports that scripts granting the UniversalBrowserRead privilege can leverage that into the equivalent of the far more powerful UniversalXPConnect since they are allowed to \"read\" into a privileged context.\n * \"moz_bug_r_a4\" reports that A malicious Proxy AutoConfig (PAC) server could serve a PAC script that can execute code with elevated privileges by setting the required FindProxyForURL function to the eval method on a privileged object that leaked into the PAC sandbox.\n * \"moz_bug_r_a4\" discovered that Named JavaScript functions have a parent object created using the standard Object() constructor (ECMA-specified behavior) and that this constructor can be redefined by script (also ECMA-specified behavior).\n * Igor Bukanov and shutdown found additional places where an untimely garbage collection could delete a temporary object that was in active use.\n * Georgi Guninski found potential integer overflow issues with long strings in the toSource() methods of the Object, Array and String objects as well as string function arguments.\n * H. D. Moore reported a testcase that was able to trigger a race condition where JavaScript garbage collection deleted a temporary variable still being used in the creation of a new Function object.\n * A malicious page can hijack native DOM methods on a document object in another domain, which will run the attacker's script when called by the victim page.\n * Secunia Research has discovered a vulnerability which is caused due to an memory corruption error within the handling of simultaneously happening XPCOM events. This leads to use of a deleted timer object.\n * An anonymous researcher for TippingPoint and the Zero Day Initiative showed that when used in a web page Java would reference properties of the window.navigator object as it started up.\n * Thilo Girmann discovered that in certain circumstances a JavaScript reference to a frame or window was not properly cleared when the referenced content went away.\n\n### Impact\n\nA user can be enticed to open specially crafted URLs, visit webpages containing malicious JavaScript or execute a specially crafted script. These events could lead to the execution of arbitrary code, or the installation of malware on the user's computer. \n\n### Workaround\n\nThere is no known workaround at this time. \n\n### Resolution\n\nAll Thunderbird users should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=www-client/seamonkey-1.0.3\"", "edition": 1, "modified": "2006-08-03T00:00:00", "published": "2006-08-03T00:00:00", "id": "GLSA-200608-02", "href": "https://security.gentoo.org/glsa/200608-02", "type": "gentoo", "title": "Mozilla SeaMonkey: Multiple vulnerabilities", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2016-09-06T19:46:28", "bulletinFamily": "unix", "cvelist": ["CVE-2006-3806", "CVE-2006-3809", "CVE-2006-3803", "CVE-2006-3807", "CVE-2006-3811", "CVE-2006-3804", "CVE-2006-3810", "CVE-2006-3812", "CVE-2006-3113", "CVE-2006-3805", "CVE-2006-3802"], "edition": 1, "description": "### Background\n\nThe Mozilla Thunderbird mail client is a redesign of the Mozilla Mail component. The goal is to produce a cross-platform stand-alone mail application using XUL (XML User Interface Language). \n\n### Description\n\nThe following vulnerabilities have been reported: \n\n * Benjamin Smedberg discovered that chrome URLss could be made to reference remote files.\n * Developers in the Mozilla community looked for and fixed several crash bugs to improve the stability of Mozilla clients.\n * \"shutdown\" reports that cross-site scripting (XSS) attacks could be performed using the construct XPCNativeWrapper(window).Function(...), which created a function that appeared to belong to the window in question even after it had been navigated to the target site.\n * \"shutdown\" reports that scripts granting the UniversalBrowserRead privilege can leverage that into the equivalent of the far more powerful UniversalXPConnect since they are allowed to \"read\" into a privileged context.\n * \"moz_bug_r_a4\" discovered that Named JavaScript functions have a parent object created using the standard Object() constructor (ECMA-specified behavior) and that this constructor can be redefined by script (also ECMA-specified behavior).\n * Igor Bukanov and shutdown found additional places where an untimely garbage collection could delete a temporary object that was in active use.\n * Georgi Guninski found potential integer overflow issues with long strings in the toSource() methods of the Object, Array and String objects as well as string function arguments.\n * H. D. Moore reported a testcase that was able to trigger a race condition where JavaScript garbage collection deleted a temporary variable still being used in the creation of a new Function object.\n * A malicious page can hijack native DOM methods on a document object in another domain, which will run the attacker's script when called by the victim page.\n * Secunia Research has discovered a vulnerability which is caused due to an memory corruption error within the handling of simultaneously happening XPCOM events. This leads to use of a deleted timer object.\n\n### Impact\n\nA user can be enticed to open specially crafted URLs, visit webpages containing malicious JavaScript or execute a specially crafted script. These events could lead to the execution of arbitrary code, or the installation of malware on the user's computer. \n\n### Workaround\n\nThere is no known workaround at this time. \n\n### Resolution\n\nAll Mozilla Thunderbird users should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=mail-client/mozilla-thunderbird-1.5.0.5\"\n\nAll Mozilla Thunderbird binary users should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=mail-client/mozilla-thunderbird-bin-1.5.0.5\"", "modified": "2006-08-03T00:00:00", "published": "2006-08-03T00:00:00", "id": "GLSA-200608-04", "href": "https://security.gentoo.org/glsa/200608-04", "type": "gentoo", "title": "Mozilla Thunderbird: Multiple vulnerabilities", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2016-09-06T19:46:51", "bulletinFamily": "unix", "cvelist": ["CVE-2006-2780", "CVE-2006-2784", "CVE-2006-2785", "CVE-2006-2776", "CVE-2006-2778", "CVE-2006-2779", "CVE-2006-2786", "CVE-2006-2783", "CVE-2006-2787", "CVE-2006-2777", "CVE-2006-2775", "CVE-2006-2782"], "description": "### Background\n\nMozilla Firefox is the next-generation web browser from the Mozilla project. \n\n### Description\n\nA number of vulnerabilities were found and fixed in Mozilla Firefox. For details please consult the references below. \n\n### Impact\n\nBy enticing the user to visit a malicious website, a remote attacker can inject arbitrary HTML and JavaScript Code into the user's browser, execute JavaScript code with elevated privileges and possibly execute arbitrary code with the permissions of the user running the application. \n\n### Workaround\n\nThere is no known workaround at this time. \n\n### Resolution\n\nAll Mozilla Firefox users should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=www-client/mozilla-firefox-1.5.0.4\"\n\nAll Mozilla Firefox binary users should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=www-client/mozilla-firefox-bin-1.5.0.4\"\n\nNote: There is no stable fixed version for the Alpha architecture yet. Users of Mozilla Firefox on Alpha should consider unmerging it until such a version is available.", "edition": 1, "modified": "2006-06-11T00:00:00", "published": "2006-06-11T00:00:00", "id": "GLSA-200606-12", "href": "https://security.gentoo.org/glsa/200606-12", "type": "gentoo", "title": "Mozilla Firefox: Multiple vulnerabilities", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2016-09-06T19:46:49", "bulletinFamily": "unix", "cvelist": ["CVE-2006-2780", "CVE-2006-2776", "CVE-2006-2778", "CVE-2006-2779", "CVE-2006-2781", "CVE-2006-2786", "CVE-2006-2783", "CVE-2006-2787", "CVE-2006-2775"], "edition": 1, "description": "### Background\n\nMozilla Thunderbird is the next-generation mail client from the Mozilla project. \n\n### Description\n\nSeveral vulnerabilities were found and fixed in Mozilla Thunderbird. For details, please consult the references below. \n\n### Impact\n\nA remote attacker could craft malicious emails that would leverage these issues to inject and execute arbitrary script code with elevated privileges, spoof content, and possibly execute arbitrary code with the rights of the user running the application. \n\n### Workaround\n\nThere are no known workarounds for all the issues at this time. \n\n### Resolution\n\nAll Mozilla Thunderbird users should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=mail-client/mozilla-thunderbird-1.5.0.4\"\n\nAll Mozilla Thunderbird binary users should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=mail-client/mozilla-thunderbird-bin-1.5.0.4\"\n\nNote: There is no stable fixed version for the Alpha architecture yet. Users of Mozilla Thunderbird on Alpha should consider unmerging it until such a version is available.", "modified": "2006-06-19T00:00:00", "published": "2006-06-19T00:00:00", "id": "GLSA-200606-21", "href": "https://security.gentoo.org/glsa/200606-21", "type": "gentoo", "title": "Mozilla Thunderbird: Multiple vulnerabilities", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "openvas": [{"lastseen": "2017-07-24T12:50:08", "bulletinFamily": "scanner", "cvelist": ["CVE-2006-3806", "CVE-2006-3809", "CVE-2006-3803", "CVE-2006-3807", "CVE-2006-3811", "CVE-2006-3677", "CVE-2006-3810", "CVE-2006-3801", "CVE-2006-3812", "CVE-2006-3113", "CVE-2006-3805", "CVE-2006-3808", "CVE-2006-3802"], "description": "The remote host is missing updates announced in\nadvisory GLSA 200608-03.", "modified": "2017-07-07T00:00:00", "published": "2008-09-24T00:00:00", "id": "OPENVAS:57853", "href": "http://plugins.openvas.org/nasl.php?oid=57853", "type": "openvas", "title": "Gentoo Security Advisory GLSA 200608-03 (Firefox)", "sourceData": "# OpenVAS Vulnerability Test\n# $\n# Description: Auto generated from Gentoo's XML based advisory\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The Mozilla Foundation has reported numerous security vulnerabilities\nrelated to Mozilla Firefox.\";\ntag_solution = \"All Mozilla Firefox users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose\n'>=www-client/mozilla-firefox-1.5.0.5'\n\nUsers of the binary package should upgrade as well:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose\n'>=www-client/mozilla-firefox-bin-1.5.0.5'\n\nhttp://www.securityspace.com/smysecure/catid.html?in=GLSA%20200608-03\nhttp://bugs.gentoo.org/show_bug.cgi?id=141842\";\ntag_summary = \"The remote host is missing updates announced in\nadvisory GLSA 200608-03.\";\n\n \n\nif(description)\n{\n script_id(57853);\n script_version(\"$Revision: 6596 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 11:21:37 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)\");\n script_cve_id(\"CVE-2006-3113\", \"CVE-2006-3677\", \"CVE-2006-3801\", \"CVE-2006-3802\", \"CVE-2006-3803\", \"CVE-2006-3805\", \"CVE-2006-3806\", \"CVE-2006-3807\", \"CVE-2006-3808\", \"CVE-2006-3809\", \"CVE-2006-3810\", \"CVE-2006-3811\", \"CVE-2006-3812\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_name(\"Gentoo Security Advisory GLSA 200608-03 (Firefox)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Gentoo Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/gentoo\", \"ssh/login/pkg\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-gentoo.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = ispkgvuln(pkg:\"www-client/mozilla-firefox\", unaffected: make_list(\"ge 1.5.0.5\"), vulnerable: make_list(\"lt 1.5.0.5\"))) != NULL) {\n report += res;\n}\nif ((res = ispkgvuln(pkg:\"www-client/mozilla-firefox-bin\", unaffected: make_list(\"ge 1.5.0.5\"), vulnerable: make_list(\"lt 1.5.0.5\"))) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-07-24T12:50:25", "bulletinFamily": "scanner", "cvelist": ["CVE-2006-3806", "CVE-2006-3809", "CVE-2006-3803", "CVE-2006-3807", "CVE-2006-3811", "CVE-2006-3677", "CVE-2006-3804", "CVE-2006-3810", "CVE-2006-3801", "CVE-2006-3812", "CVE-2006-3113", "CVE-2006-3805", "CVE-2006-3808", "CVE-2006-3802"], "description": "The remote host is missing updates announced in\nadvisory GLSA 200608-02.", "modified": "2017-07-07T00:00:00", "published": "2008-09-24T00:00:00", "id": "OPENVAS:57852", "href": "http://plugins.openvas.org/nasl.php?oid=57852", "type": "openvas", "title": "Gentoo Security Advisory GLSA 200608-02 (SeaMonkey)", "sourceData": "# OpenVAS Vulnerability Test\n# $\n# Description: Auto generated from Gentoo's XML based advisory\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The Mozilla Foundation has reported numerous security vulnerabilities\nrelated to Mozilla SeaMonkey.\";\ntag_solution = \"All Thunderbird users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=www-client/seamonkey-1.0.3'\n\nhttp://www.securityspace.com/smysecure/catid.html?in=GLSA%20200608-02\nhttp://bugs.gentoo.org/show_bug.cgi?id=141842\";\ntag_summary = \"The remote host is missing updates announced in\nadvisory GLSA 200608-02.\";\n\n \n\nif(description)\n{\n script_id(57852);\n script_version(\"$Revision: 6596 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 11:21:37 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)\");\n script_cve_id(\"CVE-2006-3113\", \"CVE-2006-3677\", \"CVE-2006-3801\", \"CVE-2006-3802\", \"CVE-2006-3803\", \"CVE-2006-3804\", \"CVE-2006-3805\", \"CVE-2006-3806\", \"CVE-2006-3807\", \"CVE-2006-3808\", \"CVE-2006-3809\", \"CVE-2006-3810\", \"CVE-2006-3811\", \"CVE-2006-3812\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_name(\"Gentoo Security Advisory GLSA 200608-02 (SeaMonkey)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Gentoo Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/gentoo\", \"ssh/login/pkg\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-gentoo.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = ispkgvuln(pkg:\"www-client/seamonkey\", unaffected: make_list(\"ge 1.0.3\"), vulnerable: make_list(\"lt 1.0.3\"))) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-07-02T21:10:11", "bulletinFamily": "scanner", "cvelist": ["CVE-2006-3806", "CVE-2006-3809", "CVE-2006-3803", "CVE-2006-3807", "CVE-2006-3811", "CVE-2006-3677", "CVE-2006-3804", "CVE-2006-3810", "CVE-2006-3801", "CVE-2006-3812", "CVE-2006-3113", "CVE-2006-3805", "CVE-2006-3808", "CVE-2006-3802"], "description": "The remote host is missing an update to the system\nas announced in the referenced advisory.", "modified": "2016-09-19T00:00:00", "published": "2008-09-04T00:00:00", "id": "OPENVAS:57146", "href": "http://plugins.openvas.org/nasl.php?oid=57146", "type": "openvas", "title": "FreeBSD Ports: firefox", "sourceData": "#\n#VID e2a92664-1d60-11db-88cf-000c6ec775d9\n# OpenVAS Vulnerability Test\n# $\n# Description: Auto generated from vuxml or freebsd advisories\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The following packages are affected:\n firefox\n linux-firefox\n linux-firefox-devel\n seamonkey\n linux-seamonkey\n thunderbird\n linux-thunderbird\n mozilla-thunderbird\n mozilla\n linux-mozilla\n linux-mozilla-devel\";\ntag_solution = \"Update your system with the appropriate patches or\nsoftware upgrades.\n\nhttp://www.mozilla.org/projects/security/known-vulnerabilities.html#seamonkey1.0.3\nhttp://www.mozilla.org/security/announce/2006/mfsa2006-44.html\nhttp://www.mozilla.org/security/announce/2006/mfsa2006-45.html\nhttp://www.mozilla.org/security/announce/2006/mfsa2006-46.html\nhttp://www.mozilla.org/security/announce/2006/mfsa2006-47.html\nhttp://www.mozilla.org/security/announce/2006/mfsa2006-48.html\nhttp://www.mozilla.org/security/announce/2006/mfsa2006-49.html\nhttp://www.mozilla.org/security/announce/2006/mfsa2006-50.html\nhttp://www.mozilla.org/security/announce/2006/mfsa2006-51.html\nhttp://www.mozilla.org/security/announce/2006/mfsa2006-52.html\nhttp://www.mozilla.org/security/announce/2006/mfsa2006-53.html\nhttp://www.mozilla.org/security/announce/2006/mfsa2006-54.html\nhttp://www.mozilla.org/security/announce/2006/mfsa2006-55.html\nhttp://www.mozilla.org/security/announce/2006/mfsa2006-56.html\nhttp://www.vuxml.org/freebsd/e2a92664-1d60-11db-88cf-000c6ec775d9.html\";\ntag_summary = \"The remote host is missing an update to the system\nas announced in the referenced advisory.\";\n\n\nif(description)\n{\n script_id(57146);\n script_version(\"$Revision: 4112 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2016-09-19 15:17:59 +0200 (Mon, 19 Sep 2016) $\");\n script_tag(name:\"creation_date\", value:\"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)\");\n script_cve_id(\"CVE-2006-3113\", \"CVE-2006-3677\", \"CVE-2006-3801\", \"CVE-2006-3802\", \"CVE-2006-3803\", \"CVE-2006-3804\", \"CVE-2006-3805\", \"CVE-2006-3806\", \"CVE-2006-3807\", \"CVE-2006-3808\", \"CVE-2006-3809\", \"CVE-2006-3810\", \"CVE-2006-3811\", \"CVE-2006-3812\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_name(\"FreeBSD Ports: firefox\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2006 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"FreeBSD Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/freebsdrel\", \"login/SSH/success\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-bsd.inc\");\n\ntxt = \"\";\nvuln = 0;\nbver = portver(pkg:\"firefox\");\nif(!isnull(bver) && revcomp(a:bver, b:\"1.5.0.5,1\")<0) {\n txt += 'Package firefox version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\nif(!isnull(bver) && revcomp(a:bver, b:\"2.*,1\")>0) {\n txt += 'Package firefox version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\nbver = portver(pkg:\"linux-firefox\");\nif(!isnull(bver) && revcomp(a:bver, b:\"1.5.0.5\")<0) {\n txt += 'Package linux-firefox version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\nbver = portver(pkg:\"linux-firefox-devel\");\nif(!isnull(bver) && revcomp(a:bver, b:\"3.0.a2006.07.26\")<0) {\n txt += 'Package linux-firefox-devel version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\nbver = portver(pkg:\"seamonkey\");\nif(!isnull(bver) && revcomp(a:bver, b:\"1.0.3\")<0) {\n txt += 'Package seamonkey version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\nbver = portver(pkg:\"linux-seamonkey\");\nif(!isnull(bver) && revcomp(a:bver, b:\"1.0.3\")<0) {\n txt += 'Package linux-seamonkey version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\nbver = portver(pkg:\"thunderbird\");\nif(!isnull(bver) && revcomp(a:bver, b:\"1.5.0.5\")<0) {\n txt += 'Package thunderbird version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\nbver = portver(pkg:\"linux-thunderbird\");\nif(!isnull(bver) && revcomp(a:bver, b:\"1.5.0.5\")<0) {\n txt += 'Package linux-thunderbird version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\nbver = portver(pkg:\"mozilla-thunderbird\");\nif(!isnull(bver) && revcomp(a:bver, b:\"1.5.0.5\")<0) {\n txt += 'Package mozilla-thunderbird version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\nbver = portver(pkg:\"mozilla\");\nif(!isnull(bver) && revcomp(a:bver, b:\"0\")>0) {\n txt += 'Package mozilla version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\nbver = portver(pkg:\"linux-mozilla\");\nif(!isnull(bver) && revcomp(a:bver, b:\"0\")>0) {\n txt += 'Package linux-mozilla version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\nbver = portver(pkg:\"linux-mozilla-devel\");\nif(!isnull(bver) && revcomp(a:bver, b:\"0\")>0) {\n txt += 'Package linux-mozilla-devel version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\n\nif(vuln) {\n security_message(data:string(txt));\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-07-24T12:50:15", "bulletinFamily": "scanner", "cvelist": ["CVE-2006-3806", "CVE-2006-3809", "CVE-2006-3803", "CVE-2006-3807", "CVE-2006-3811", "CVE-2006-3804", "CVE-2006-3810", "CVE-2006-3812", "CVE-2006-3113", "CVE-2006-3805", "CVE-2006-3802"], "description": "The remote host is missing updates announced in\nadvisory GLSA 200608-04.", "modified": "2017-07-07T00:00:00", "published": "2008-09-24T00:00:00", "id": "OPENVAS:57854", "href": "http://plugins.openvas.org/nasl.php?oid=57854", "type": "openvas", "title": "Gentoo Security Advisory GLSA 200608-04 (Thunderbird)", "sourceData": "# OpenVAS Vulnerability Test\n# $\n# Description: Auto generated from Gentoo's XML based advisory\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The Mozilla Foundation has reported numerous security vulnerabilities\nrelated to Mozilla Thunderbird.\";\ntag_solution = \"All Mozilla Thunderbird users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose\n'>=mail-client/mozilla-thunderbird-1.5.0.5'\n\nAll Mozilla Thunderbird binary users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose\n'>=mail-client/mozilla-thunderbird-bin-1.5.0.5'\n\nhttp://www.securityspace.com/smysecure/catid.html?in=GLSA%20200608-04\nhttp://bugs.gentoo.org/show_bug.cgi?id=141842\";\ntag_summary = \"The remote host is missing updates announced in\nadvisory GLSA 200608-04.\";\n\n \n\nif(description)\n{\n script_id(57854);\n script_version(\"$Revision: 6596 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 11:21:37 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)\");\n script_cve_id(\"CVE-2006-3113\", \"CVE-2006-3802\", \"CVE-2006-3803\", \"CVE-2006-3804\", \"CVE-2006-3805\", \"CVE-2006-3806\", \"CVE-2006-3807\", \"CVE-2006-3809\", \"CVE-2006-3810\", \"CVE-2006-3811\", \"CVE-2006-3812\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_name(\"Gentoo Security Advisory GLSA 200608-04 (Thunderbird)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Gentoo Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/gentoo\", \"ssh/login/pkg\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-gentoo.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = ispkgvuln(pkg:\"mail-client/mozilla-thunderbird\", unaffected: make_list(\"ge 1.5.0.5\"), vulnerable: make_list(\"lt 1.5.0.5\"))) != NULL) {\n report += res;\n}\nif ((res = ispkgvuln(pkg:\"mail-client/mozilla-thunderbird-bin\", unaffected: make_list(\"ge 1.5.0.5\"), vulnerable: make_list(\"lt 1.5.0.5\"))) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-07-24T12:50:25", "bulletinFamily": "scanner", "cvelist": ["CVE-2006-3806", "CVE-2006-3809", "CVE-2006-3807", "CVE-2006-3810", "CVE-2006-2779", "CVE-2006-3805", "CVE-2006-3808"], "description": "The remote host is missing an update to mozilla-thunderbird\nannounced via advisory DSA 1159-1.\n\nSeveral security related problems have been discovered in Mozilla and\nderived products such as Mozilla Thunderbird. The Common\nVulnerabilities and Exposures project identifies the following\nvulnerabilities:\n\nCVE-2006-2779\n\nMozilla team members discovered several crashes during testing of\nthe browser engine showing evidence of memory corruption which may\nalso lead to the execution of arbitrary code. The last bit of\nthis problem will be corrected with the next update. You can\nprevent any trouble by disabling Javascript. [MFSA-2006-32]\n\nCVE-2006-3805\n\nThe Javascript engine might allow remote attackers to execute\narbitrary code. [MFSA-2006-50]\n\nCVE-2006-3806\n\nMultiple integer overflows in the Javascript engine might allow\nremote attackers to execute arbitrary code. [MFSA-2006-50]\n\nCVE-2006-3807\n\nSpecially crafted Javascript allows remote attackers to execute\narbitrary code. [MFSA-2006-51]\n\nCVE-2006-3808\n\nRemote AutoConfig (PAC) servers could execute code with elevated\nprivileges via a specially crafted PAC script. [MFSA-2006-52]\n\nCVE-2006-3809\n\nScripts with the UniversalBrowserRead privilege could gain\nUniversalXPConnect privileges and possibly execute code or obtain\nsensitive data. [MFSA-2006-53]\n\nCVE-2006-3810\n\nA cross-site scripting vulnerability allows remote attackers to\ninject arbitrary web script or HTML. [MFSA-2006-54]", "modified": "2017-07-07T00:00:00", "published": "2008-01-17T00:00:00", "id": "OPENVAS:57302", "href": "http://plugins.openvas.org/nasl.php?oid=57302", "type": "openvas", "title": "Debian Security Advisory DSA 1159-1 (mozilla-thunderbird)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_1159_1.nasl 6616 2017-07-07 12:10:49Z cfischer $\n# Description: Auto-generated from advisory DSA 1159-1\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largerly excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_solution = \"For the stable distribution (sarge) these problems have been fixed in\nversion 1.0.2-2.sarge1.0.8b.1.\n\nFor the unstable distribution (sid) these problems have been fixed in\nversion 1.5.0.5-1.\n\nWe recommend that you upgrade your mozilla-thunderbird package.\n\n https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201159-1\";\ntag_summary = \"The remote host is missing an update to mozilla-thunderbird\nannounced via advisory DSA 1159-1.\n\nSeveral security related problems have been discovered in Mozilla and\nderived products such as Mozilla Thunderbird. The Common\nVulnerabilities and Exposures project identifies the following\nvulnerabilities:\n\nCVE-2006-2779\n\nMozilla team members discovered several crashes during testing of\nthe browser engine showing evidence of memory corruption which may\nalso lead to the execution of arbitrary code. The last bit of\nthis problem will be corrected with the next update. You can\nprevent any trouble by disabling Javascript. [MFSA-2006-32]\n\nCVE-2006-3805\n\nThe Javascript engine might allow remote attackers to execute\narbitrary code. [MFSA-2006-50]\n\nCVE-2006-3806\n\nMultiple integer overflows in the Javascript engine might allow\nremote attackers to execute arbitrary code. [MFSA-2006-50]\n\nCVE-2006-3807\n\nSpecially crafted Javascript allows remote attackers to execute\narbitrary code. [MFSA-2006-51]\n\nCVE-2006-3808\n\nRemote AutoConfig (PAC) servers could execute code with elevated\nprivileges via a specially crafted PAC script. [MFSA-2006-52]\n\nCVE-2006-3809\n\nScripts with the UniversalBrowserRead privilege could gain\nUniversalXPConnect privileges and possibly execute code or obtain\nsensitive data. [MFSA-2006-53]\n\nCVE-2006-3810\n\nA cross-site scripting vulnerability allows remote attackers to\ninject arbitrary web script or HTML. [MFSA-2006-54]\";\n\n\nif(description)\n{\n script_id(57302);\n script_version(\"$Revision: 6616 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 14:10:49 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2008-01-17 23:13:11 +0100 (Thu, 17 Jan 2008)\");\n script_cve_id(\"CVE-2006-2779\", \"CVE-2006-3805\", \"CVE-2006-3806\", \"CVE-2006-3807\", \"CVE-2006-3808\", \"CVE-2006-3809\", \"CVE-2006-3810\");\n script_bugtraq_id(18228,19181);\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_name(\"Debian Security Advisory DSA 1159-1 (mozilla-thunderbird)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2006 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"mozilla-thunderbird\", ver:\"1.0.2-2.sarge1.0.8b.1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"mozilla-thunderbird-dev\", ver:\"1.0.2-2.sarge1.0.8b.1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"mozilla-thunderbird-inspector\", ver:\"1.0.2-2.sarge1.0.8b.1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"mozilla-thunderbird-offline\", ver:\"1.0.2-2.sarge1.0.8b.1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"mozilla-thunderbird-typeaheadfind\", ver:\"1.0.2-2.sarge1.0.8b.1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-24T12:49:48", "bulletinFamily": "scanner", "cvelist": ["CVE-2006-3806", "CVE-2006-3809", "CVE-2006-3807", "CVE-2006-3810", "CVE-2006-2779", "CVE-2006-3805", "CVE-2006-3808"], "description": "The remote host is missing an update to mozilla-thunderbird\nannounced via advisory DSA 1159-2.\n\nThe latest security updates of Mozilla Thunderbird introduced a\nregression that led to a disfunctional attachment panel which warrants\na correction to fix this issue. For reference please find below the\noriginal advisory text:\n\nSeveral security related problems have been discovered in Mozilla and\nderived products such as Mozilla Thunderbird. The Common\nVulnerabilities and Exposures project identifies the following\nvulnerabilities:\n\nCVE-2006-2779\n\nMozilla team members discovered several crashes during testing of\nthe browser engine showing evidence of memory corruption which may\nalso lead to the execution of arbitrary code. The last bit of\nthis problem will be corrected with the next update. You can\nprevent any trouble by disabling Javascript. [MFSA-2006-32]\n\nCVE-2006-3805\n\nThe Javascript engine might allow remote attackers to execute\narbitrary code. [MFSA-2006-50]\n\nCVE-2006-3806\n\nMultiple integer overflows in the Javascript engine might allow\nremote attackers to execute arbitrary code. [MFSA-2006-50]\n\nCVE-2006-3807\n\nSpecially crafted Javascript allows remote attackers to execute\narbitrary code. [MFSA-2006-51]\n\nCVE-2006-3808\n\nRemote AutoConfig (PAC) servers could execute code with elevated\nprivileges via a specially crafted PAC script. [MFSA-2006-52]\n\nCVE-2006-3809\n\nScripts with the UniversalBrowserRead privilege could gain\nUniversalXPConnect privileges and possibly execute code or obtain\nsensitive data. [MFSA-2006-53]\n\nCVE-2006-3810\n\nA cross-site scripting vulnerability allows remote attackers to\ninject arbitrary web script or HTML. [MFSA-2006-54]", "modified": "2017-07-07T00:00:00", "published": "2008-01-17T00:00:00", "id": "OPENVAS:57358", "href": "http://plugins.openvas.org/nasl.php?oid=57358", "type": "openvas", "title": "Debian Security Advisory DSA 1159-2 (mozilla-thunderbird)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_1159_2.nasl 6616 2017-07-07 12:10:49Z cfischer $\n# Description: Auto-generated from advisory DSA 1159-2\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largerly excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_solution = \"For the stable distribution (sarge) these problems have been fixed in\nversion 1.0.2-2.sarge1.0.8b.2.\n\nFor the unstable distribution (sid) these problems have been fixed in\nversion 1.5.0.5-1.\n\nWe recommend that you upgrade your mozilla-thunderbird package.\n\n https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201159-2\";\ntag_summary = \"The remote host is missing an update to mozilla-thunderbird\nannounced via advisory DSA 1159-2.\n\nThe latest security updates of Mozilla Thunderbird introduced a\nregression that led to a disfunctional attachment panel which warrants\na correction to fix this issue. For reference please find below the\noriginal advisory text:\n\nSeveral security related problems have been discovered in Mozilla and\nderived products such as Mozilla Thunderbird. The Common\nVulnerabilities and Exposures project identifies the following\nvulnerabilities:\n\nCVE-2006-2779\n\nMozilla team members discovered several crashes during testing of\nthe browser engine showing evidence of memory corruption which may\nalso lead to the execution of arbitrary code. The last bit of\nthis problem will be corrected with the next update. You can\nprevent any trouble by disabling Javascript. [MFSA-2006-32]\n\nCVE-2006-3805\n\nThe Javascript engine might allow remote attackers to execute\narbitrary code. [MFSA-2006-50]\n\nCVE-2006-3806\n\nMultiple integer overflows in the Javascript engine might allow\nremote attackers to execute arbitrary code. [MFSA-2006-50]\n\nCVE-2006-3807\n\nSpecially crafted Javascript allows remote attackers to execute\narbitrary code. [MFSA-2006-51]\n\nCVE-2006-3808\n\nRemote AutoConfig (PAC) servers could execute code with elevated\nprivileges via a specially crafted PAC script. [MFSA-2006-52]\n\nCVE-2006-3809\n\nScripts with the UniversalBrowserRead privilege could gain\nUniversalXPConnect privileges and possibly execute code or obtain\nsensitive data. [MFSA-2006-53]\n\nCVE-2006-3810\n\nA cross-site scripting vulnerability allows remote attackers to\ninject arbitrary web script or HTML. [MFSA-2006-54]\";\n\n\nif(description)\n{\n script_id(57358);\n script_version(\"$Revision: 6616 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 14:10:49 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2008-01-17 23:13:11 +0100 (Thu, 17 Jan 2008)\");\n script_cve_id(\"CVE-2006-2779\", \"CVE-2006-3805\", \"CVE-2006-3806\", \"CVE-2006-3807\", \"CVE-2006-3808\", \"CVE-2006-3809\", \"CVE-2006-3810\");\n script_bugtraq_id(18228,19181);\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_name(\"Debian Security Advisory DSA 1159-2 (mozilla-thunderbird)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2006 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"mozilla-thunderbird\", ver:\"1.0.2-2.sarge1.0.8b.2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"mozilla-thunderbird-dev\", ver:\"1.0.2-2.sarge1.0.8b.2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"mozilla-thunderbird-inspector\", ver:\"1.0.2-2.sarge1.0.8b.2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"mozilla-thunderbird-offline\", ver:\"1.0.2-2.sarge1.0.8b.2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"mozilla-thunderbird-typeaheadfind\", ver:\"1.0.2-2.sarge1.0.8b.2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-24T12:50:16", "bulletinFamily": "scanner", "cvelist": ["CVE-2006-3806", "CVE-2006-3809", "CVE-2006-3807", "CVE-2006-3810", "CVE-2006-2779", "CVE-2006-3805", "CVE-2006-3808"], "description": "The remote host is missing an update to mozilla\nannounced via advisory DSA 1160-2.\n\nThe latest security updates of Mozilla introduced a regression that\nled to a disfunctional attachment panel which warrants a correction to\nfix this issue. For reference please find below the original advisory\ntext:\n\nSeveral security related problems have been discovered in Mozilla and\nderived products. The Common Vulnerabilities and Exposures project\nidentifies the following vulnerabilities:\n\nCVE-2006-2779\n\nMozilla team members discovered several crashes during testing of\nthe browser engine showing evidence of memory corruption which may\nalso lead to the execution of arbitrary code. The last bit of\nthis problem will be corrected with the next update. You can\nprevent any trouble by disabling Javascript. [MFSA-2006-32]\n\nCVE-2006-3805\n\nThe Javascript engine might allow remote attackers to execute\narbitrary code. [MFSA-2006-50]\n\nCVE-2006-3806\n\nMultiple integer overflows in the Javascript engine might allow\nremote attackers to execute arbitrary code. [MFSA-2006-50]\n\nCVE-2006-3807\n\nSpecially crafted Javascript allows remote attackers to execute\narbitrary code. [MFSA-2006-51]\n\nCVE-2006-3808\n\nRemote AutoConfig (PAC) servers could execute code with elevated\nprivileges via a specially crafted PAC script. [MFSA-2006-52]\n\nCVE-2006-3809\n\nScripts with the UniversalBrowserRead privilege could gain\nUniversalXPConnect privileges and possibly execute code or obtain\nsensitive data. [MFSA-2006-53]\n\nCVE-2006-3810\n\nA cross-site scripting vulnerability allows remote attackers to\ninject arbitrary web script or HTML. [MFSA-2006-54]", "modified": "2017-07-07T00:00:00", "published": "2008-01-17T00:00:00", "id": "OPENVAS:57380", "href": "http://plugins.openvas.org/nasl.php?oid=57380", "type": "openvas", "title": "Debian Security Advisory DSA 1160-2 (mozilla)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_1160_2.nasl 6616 2017-07-07 12:10:49Z cfischer $\n# Description: Auto-generated from advisory DSA 1160-2\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largerly excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_solution = \"For the stable distribution (sarge) these problems have been fixed in\nversion 1.7.8-1sarge7.2.2.\n\nFor the unstable distribution (sid) these problems won't be fixed\nsince its end of lifetime has been reached and the package will soon\nbe removed.\n\nWe recommend that you upgrade your mozilla package.\n\n https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201160-2\";\ntag_summary = \"The remote host is missing an update to mozilla\nannounced via advisory DSA 1160-2.\n\nThe latest security updates of Mozilla introduced a regression that\nled to a disfunctional attachment panel which warrants a correction to\nfix this issue. For reference please find below the original advisory\ntext:\n\nSeveral security related problems have been discovered in Mozilla and\nderived products. The Common Vulnerabilities and Exposures project\nidentifies the following vulnerabilities:\n\nCVE-2006-2779\n\nMozilla team members discovered several crashes during testing of\nthe browser engine showing evidence of memory corruption which may\nalso lead to the execution of arbitrary code. The last bit of\nthis problem will be corrected with the next update. You can\nprevent any trouble by disabling Javascript. [MFSA-2006-32]\n\nCVE-2006-3805\n\nThe Javascript engine might allow remote attackers to execute\narbitrary code. [MFSA-2006-50]\n\nCVE-2006-3806\n\nMultiple integer overflows in the Javascript engine might allow\nremote attackers to execute arbitrary code. [MFSA-2006-50]\n\nCVE-2006-3807\n\nSpecially crafted Javascript allows remote attackers to execute\narbitrary code. [MFSA-2006-51]\n\nCVE-2006-3808\n\nRemote AutoConfig (PAC) servers could execute code with elevated\nprivileges via a specially crafted PAC script. [MFSA-2006-52]\n\nCVE-2006-3809\n\nScripts with the UniversalBrowserRead privilege could gain\nUniversalXPConnect privileges and possibly execute code or obtain\nsensitive data. [MFSA-2006-53]\n\nCVE-2006-3810\n\nA cross-site scripting vulnerability allows remote attackers to\ninject arbitrary web script or HTML. [MFSA-2006-54]\";\n\n\nif(description)\n{\n script_id(57380);\n script_version(\"$Revision: 6616 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 14:10:49 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2008-01-17 23:13:11 +0100 (Thu, 17 Jan 2008)\");\n script_cve_id(\"CVE-2006-2779\", \"CVE-2006-3805\", \"CVE-2006-3806\", \"CVE-2006-3807\", \"CVE-2006-3808\", \"CVE-2006-3809\", \"CVE-2006-3810\");\n script_bugtraq_id(18228,19181);\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_name(\"Debian Security Advisory DSA 1160-2 (mozilla)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2006 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"libnspr-dev\", ver:\"1.7.8-1sarge7.2.2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libnspr4\", ver:\"1.7.8-1sarge7.2.2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libnss-dev\", ver:\"1.7.8-1sarge7.2.2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libnss3\", ver:\"1.7.8-1sarge7.2.2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"mozilla\", ver:\"1.7.8-1sarge7.2.2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"mozilla-browser\", ver:\"1.7.8-1sarge7.2.2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"mozilla-calendar\", ver:\"1.7.8-1sarge7.2.2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"mozilla-chatzilla\", ver:\"1.7.8-1sarge7.2.2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"mozilla-dev\", ver:\"1.7.8-1sarge7.2.2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"mozilla-dom-inspector\", ver:\"1.7.8-1sarge7.2.2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"mozilla-js-debugger\", ver:\"1.7.8-1sarge7.2.2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"mozilla-mailnews\", ver:\"1.7.8-1sarge7.2.2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"mozilla-psm\", ver:\"1.7.8-1sarge7.2.2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-24T12:49:47", "bulletinFamily": "scanner", "cvelist": ["CVE-2006-3806", "CVE-2006-3809", "CVE-2006-3807", "CVE-2006-3810", "CVE-2006-2779", "CVE-2006-3805", "CVE-2006-3808"], "description": "The remote host is missing an update to mozilla\nannounced via advisory DSA 1160-1.\n\nSeveral security related problems have been discovered in Mozilla and\nderived products. The Common Vulnerabilities and Exposures project\nidentifies the following vulnerabilities:\n\nCVE-2006-2779\n\nMozilla team members discovered several crashes during testing of\nthe browser engine showing evidence of memory corruption which may\nalso lead to the execution of arbitrary code. The last bit of\nthis problem will be corrected with the next update. You can\nprevent any trouble by disabling Javascript. [MFSA-2006-32]\n\nCVE-2006-3805\n\nThe Javascript engine might allow remote attackers to execute\narbitrary code. [MFSA-2006-50]\n\nCVE-2006-3806\n\nMultiple integer overflows in the Javascript engine might allow\nremote attackers to execute arbitrary code. [MFSA-2006-50]\n\nCVE-2006-3807\n\nSpecially crafted Javascript allows remote attackers to execute\narbitrary code. [MFSA-2006-51]\n\nCVE-2006-3808\n\nRemote AutoConfig (PAC) servers could execute code with elevated\nprivileges via a specially crafted PAC script. [MFSA-2006-52]\n\nCVE-2006-3809\n\nScripts with the UniversalBrowserRead privilege could gain\nUniversalXPConnect privileges and possibly execute code or obtain\nsensitive data. [MFSA-2006-53]\n\nCVE-2006-3810\n\nA cross-site scripting vulnerability allows remote attackers to\ninject arbitrary web script or HTML. [MFSA-2006-54]", "modified": "2017-07-07T00:00:00", "published": "2008-01-17T00:00:00", "id": "OPENVAS:57328", "href": "http://plugins.openvas.org/nasl.php?oid=57328", "type": "openvas", "title": "Debian Security Advisory DSA 1160-1 (mozilla)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_1160_1.nasl 6616 2017-07-07 12:10:49Z cfischer $\n# Description: Auto-generated from advisory DSA 1160-1\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largerly excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_solution = \"For the stable distribution (sarge) these problems have been fixed in\nversion 1.7.8-1sarge7.2.1.\n\nFor the unstable distribution (sid) these problems won't be fixed\nsince its end of lifetime has been reached and the package will soon\nbe removed.\n\nWe recommend that you upgrade your mozilla package.\n\n https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201160-1\";\ntag_summary = \"The remote host is missing an update to mozilla\nannounced via advisory DSA 1160-1.\n\nSeveral security related problems have been discovered in Mozilla and\nderived products. The Common Vulnerabilities and Exposures project\nidentifies the following vulnerabilities:\n\nCVE-2006-2779\n\nMozilla team members discovered several crashes during testing of\nthe browser engine showing evidence of memory corruption which may\nalso lead to the execution of arbitrary code. The last bit of\nthis problem will be corrected with the next update. You can\nprevent any trouble by disabling Javascript. [MFSA-2006-32]\n\nCVE-2006-3805\n\nThe Javascript engine might allow remote attackers to execute\narbitrary code. [MFSA-2006-50]\n\nCVE-2006-3806\n\nMultiple integer overflows in the Javascript engine might allow\nremote attackers to execute arbitrary code. [MFSA-2006-50]\n\nCVE-2006-3807\n\nSpecially crafted Javascript allows remote attackers to execute\narbitrary code. [MFSA-2006-51]\n\nCVE-2006-3808\n\nRemote AutoConfig (PAC) servers could execute code with elevated\nprivileges via a specially crafted PAC script. [MFSA-2006-52]\n\nCVE-2006-3809\n\nScripts with the UniversalBrowserRead privilege could gain\nUniversalXPConnect privileges and possibly execute code or obtain\nsensitive data. [MFSA-2006-53]\n\nCVE-2006-3810\n\nA cross-site scripting vulnerability allows remote attackers to\ninject arbitrary web script or HTML. [MFSA-2006-54]\";\n\n\nif(description)\n{\n script_id(57328);\n script_version(\"$Revision: 6616 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 14:10:49 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2008-01-17 23:13:11 +0100 (Thu, 17 Jan 2008)\");\n script_cve_id(\"CVE-2006-2779\", \"CVE-2006-3805\", \"CVE-2006-3806\", \"CVE-2006-3807\", \"CVE-2006-3808\", \"CVE-2006-3809\", \"CVE-2006-3810\");\n script_bugtraq_id(18228,19181);\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_name(\"Debian Security Advisory DSA 1160-1 (mozilla)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2006 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"libnspr-dev\", ver:\"1.7.8-1sarge7.2.1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libnspr4\", ver:\"1.7.8-1sarge7.2.1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libnss-dev\", ver:\"1.7.8-1sarge7.2.1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libnss3\", ver:\"1.7.8-1sarge7.2.1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"mozilla\", ver:\"1.7.8-1sarge7.2.1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"mozilla-browser\", ver:\"1.7.8-1sarge7.2.1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"mozilla-calendar\", ver:\"1.7.8-1sarge7.2.1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"mozilla-chatzilla\", ver:\"1.7.8-1sarge7.2.1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"mozilla-dev\", ver:\"1.7.8-1sarge7.2.1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"mozilla-dom-inspector\", ver:\"1.7.8-1sarge7.2.1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"mozilla-js-debugger\", ver:\"1.7.8-1sarge7.2.1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"mozilla-mailnews\", ver:\"1.7.8-1sarge7.2.1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"mozilla-psm\", ver:\"1.7.8-1sarge7.2.1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-24T12:50:10", "bulletinFamily": "scanner", "cvelist": ["CVE-2006-3806", "CVE-2006-3809", "CVE-2006-3807", "CVE-2006-3811", "CVE-2006-3805", "CVE-2006-3808"], "description": "The remote host is missing an update to mozilla-firefox\nannounced via advisory DSA 1161-1.\n\nSeveral security related problems have been discovered in Mozilla and\nderived products like Mozilla Firefox. The Common Vulnerabilities and\nExposures project identifies the following vulnerabilities:\n\nCVE-2006-3805\n\nThe Javascript engine might allow remote attackers to execute\narbitrary code. [MFSA-2006-50]\n\nCVE-2006-3806\n\nMultiple integer overflows in the Javascript engine might allow\nremote attackers to execute arbitrary code. [MFSA-2006-50]\n\nCVE-2006-3807\n\nSpecially crafted Javascript allows remote attackers to execute\narbitrary code. [MFSA-2006-51]\n\nCVE-2006-3808\n\nRemote AutoConfig (PAC) servers could execute code with elevated\nprivileges via a specially crafted PAC script. [MFSA-2006-52]\n\nCVE-2006-3809\n\nScripts with the UniversalBrowserRead privilege could gain\nUniversalXPConnect privileges and possibly execute code or obtain\nsensitive data. [MFSA-2006-53]\n\nCVE-2006-3811\n\nMultiple vulnerabilities allow remote attackers to cause a denial\nof service (crash) and possibly execute arbitrary code.\n[MFSA-2006-55]", "modified": "2017-07-07T00:00:00", "published": "2008-01-17T00:00:00", "id": "OPENVAS:57329", "href": "http://plugins.openvas.org/nasl.php?oid=57329", "type": "openvas", "title": "Debian Security Advisory DSA 1161-1 (mozilla-firefox)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_1161_1.nasl 6616 2017-07-07 12:10:49Z cfischer $\n# Description: Auto-generated from advisory DSA 1161-1\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largerly excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_solution = \"For the stable distribution (sarge) these problems have been fixed in\nversion 1.0.4-2sarge10.\n\nFor the unstable distribution (sid) these problems have been fixed in\nversion 1.5.dfsg+1.5.0.5-1.\n\nWe recommend that you upgrade your mozilla-firefox package.\n\n https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201161-1\";\ntag_summary = \"The remote host is missing an update to mozilla-firefox\nannounced via advisory DSA 1161-1.\n\nSeveral security related problems have been discovered in Mozilla and\nderived products like Mozilla Firefox. The Common Vulnerabilities and\nExposures project identifies the following vulnerabilities:\n\nCVE-2006-3805\n\nThe Javascript engine might allow remote attackers to execute\narbitrary code. [MFSA-2006-50]\n\nCVE-2006-3806\n\nMultiple integer overflows in the Javascript engine might allow\nremote attackers to execute arbitrary code. [MFSA-2006-50]\n\nCVE-2006-3807\n\nSpecially crafted Javascript allows remote attackers to execute\narbitrary code. [MFSA-2006-51]\n\nCVE-2006-3808\n\nRemote AutoConfig (PAC) servers could execute code with elevated\nprivileges via a specially crafted PAC script. [MFSA-2006-52]\n\nCVE-2006-3809\n\nScripts with the UniversalBrowserRead privilege could gain\nUniversalXPConnect privileges and possibly execute code or obtain\nsensitive data. [MFSA-2006-53]\n\nCVE-2006-3811\n\nMultiple vulnerabilities allow remote attackers to cause a denial\nof service (crash) and possibly execute arbitrary code.\n[MFSA-2006-55]\";\n\n\nif(description)\n{\n script_id(57329);\n script_version(\"$Revision: 6616 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 14:10:49 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2008-01-17 23:13:11 +0100 (Thu, 17 Jan 2008)\");\n script_cve_id(\"CVE-2006-3805\", \"CVE-2006-3806\", \"CVE-2006-3807\", \"CVE-2006-3808\", \"CVE-2006-3809\", \"CVE-2006-3811\");\n script_bugtraq_id(19181);\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_name(\"Debian Security Advisory DSA 1161-1 (mozilla-firefox)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2006 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"mozilla-firefox\", ver:\"1.0.4-2sarge10\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"mozilla-firefox-dom-inspector\", ver:\"1.0.4-2sarge10\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"mozilla-firefox-gnome-support\", ver:\"1.0.4-2sarge10\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-07-24T12:49:50", "bulletinFamily": "scanner", "cvelist": ["CVE-2006-3806", "CVE-2006-3809", "CVE-2006-3807", "CVE-2006-3811", "CVE-2006-3805", "CVE-2006-3808"], "description": "The remote host is missing an update to mozilla-firefox\nannounced via advisory DSA 1161-2.\n\nThe latest security updates of Mozilla Firefox introduced a regression\nthat led to a disfunctional attachment panel which warrants a\ncorrection to fix this issue. For reference please find below the\noriginal advisory text:\n\nSeveral security related problems have been discovered in Mozilla and\nderived products like Mozilla Firefox. The Common Vulnerabilities and\nExposures project identifies the following vulnerabilities:\n\nCVE-2006-3805\n\nThe Javascript engine might allow remote attackers to execute\narbitrary code. [MFSA-2006-50]\n\nCVE-2006-3806\n\nMultiple integer overflows in the Javascript engine might allow\nremote attackers to execute arbitrary code. [MFSA-2006-50]\n\nCVE-2006-3807\n\nSpecially crafted Javascript allows remote attackers to execute\narbitrary code. [MFSA-2006-51]\n\nCVE-2006-3808\n\nRemote AutoConfig (PAC) servers could execute code with elevated\nprivileges via a specially crafted PAC script. [MFSA-2006-52]\n\nCVE-2006-3809\n\nScripts with the UniversalBrowserRead privilege could gain\nUniversalXPConnect privileges and possibly execute code or obtain\nsensitive data. [MFSA-2006-53]\n\nCVE-2006-3811\n\nMultiple vulnerabilities allow remote attackers to cause a denial\nof service (crash) and possibly execute arbitrary code.\n[MFSA-2006-55]", "modified": "2017-07-07T00:00:00", "published": "2008-01-17T00:00:00", "id": "OPENVAS:57378", "href": "http://plugins.openvas.org/nasl.php?oid=57378", "type": "openvas", "title": "Debian Security Advisory DSA 1161-2 (mozilla-firefox)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_1161_2.nasl 6616 2017-07-07 12:10:49Z cfischer $\n# Description: Auto-generated from advisory DSA 1161-2\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largerly excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_solution = \"For the stable distribution (sarge) these problems have been fixed in\nversion 1.0.4-2sarge11.\n\nFor the unstable distribution (sid) these problems have been fixed in\nversion 1.5.dfsg+1.5.0.5-1.\n\nWe recommend that you upgrade your mozilla-firefox package.\n\n https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201161-2\";\ntag_summary = \"The remote host is missing an update to mozilla-firefox\nannounced via advisory DSA 1161-2.\n\nThe latest security updates of Mozilla Firefox introduced a regression\nthat led to a disfunctional attachment panel which warrants a\ncorrection to fix this issue. For reference please find below the\noriginal advisory text:\n\nSeveral security related problems have been discovered in Mozilla and\nderived products like Mozilla Firefox. The Common Vulnerabilities and\nExposures project identifies the following vulnerabilities:\n\nCVE-2006-3805\n\nThe Javascript engine might allow remote attackers to execute\narbitrary code. [MFSA-2006-50]\n\nCVE-2006-3806\n\nMultiple integer overflows in the Javascript engine might allow\nremote attackers to execute arbitrary code. [MFSA-2006-50]\n\nCVE-2006-3807\n\nSpecially crafted Javascript allows remote attackers to execute\narbitrary code. [MFSA-2006-51]\n\nCVE-2006-3808\n\nRemote AutoConfig (PAC) servers could execute code with elevated\nprivileges via a specially crafted PAC script. [MFSA-2006-52]\n\nCVE-2006-3809\n\nScripts with the UniversalBrowserRead privilege could gain\nUniversalXPConnect privileges and possibly execute code or obtain\nsensitive data. [MFSA-2006-53]\n\nCVE-2006-3811\n\nMultiple vulnerabilities allow remote attackers to cause a denial\nof service (crash) and possibly execute arbitrary code.\n[MFSA-2006-55]\";\n\n\nif(description)\n{\n script_id(57378);\n script_version(\"$Revision: 6616 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 14:10:49 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2008-01-17 23:13:11 +0100 (Thu, 17 Jan 2008)\");\n script_cve_id(\"CVE-2006-3805\", \"CVE-2006-3806\", \"CVE-2006-3807\", \"CVE-2006-3808\", \"CVE-2006-3809\", \"CVE-2006-3811\");\n script_bugtraq_id(19181);\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_name(\"Debian Security Advisory DSA 1161-2 (mozilla-firefox)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2006 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"mozilla-firefox\", ver:\"1.0.4-2sarge11\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"mozilla-firefox-dom-inspector\", ver:\"1.0.4-2sarge11\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"mozilla-firefox-gnome-support\", ver:\"1.0.4-2sarge11\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "suse": [{"lastseen": "2016-09-04T11:41:24", "bulletinFamily": "unix", "cvelist": ["CVE-2006-3806", "CVE-2006-3809", "CVE-2006-3803", "CVE-2006-3807", "CVE-2006-3811", "CVE-2006-3677", "CVE-2006-3804", "CVE-2006-3810", "CVE-2006-3801", "CVE-2006-3812", "CVE-2006-3113", "CVE-2006-3805", "CVE-2006-3808", "CVE-2006-3802"], "description": "To fix various security problems we released update packages that bring Mozilla Firefox to version 1.5.0.6, MozillaThunderdbird to version 1.5.0.5 and the Seamonkey Suite to version 1.0.3.\n#### Solution\nThere is no known workaround, please install the update packages. If you are using the old Mozilla Suite browser we recommend no longer using it, but switching to Mozilla Firefox, konqueror or Opera.", "edition": 1, "modified": "2006-08-16T15:11:18", "published": "2006-08-16T15:11:18", "id": "SUSE-SA:2006:048", "href": "http://lists.opensuse.org/opensuse-security-announce/2006-08/msg00014.html", "title": "remote code execution in MozillaFirefox,MozillaThunderbird,Seamonkey", "type": "suse", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2016-09-04T11:26:30", "bulletinFamily": "unix", "cvelist": ["CVE-2006-1942", "CVE-2006-2780", "CVE-2006-2784", "CVE-2006-2785", "CVE-2006-2776", "CVE-2006-2778", "CVE-2006-2779", "CVE-2006-2781", "CVE-2006-2786", "CVE-2006-1729", "CVE-2006-2783", "CVE-2006-2787", "CVE-2006-2777", "CVE-2006-2775", "CVE-2006-2782"], "description": "This update fixes several security problems in the Mozilla Firefox 1.5 browser, Thunderbird 1.5 mail reader and Seamonkey Suite.\n#### Solution\nThere is no known workaround, please install the update packages.", "edition": 1, "modified": "2006-06-23T08:11:46", "published": "2006-06-23T08:11:46", "id": "SUSE-SA:2006:035", "href": "http://lists.opensuse.org/opensuse-security-announce/2006-06/msg00022.html", "type": "suse", "title": "remote code execution in MozillaFirefox,MozillaThunderbird,Seamonkey", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "freebsd": [{"lastseen": "2019-05-29T18:34:43", "bulletinFamily": "unix", "cvelist": ["CVE-2006-3806", "CVE-2006-3809", "CVE-2006-3803", "CVE-2006-3807", "CVE-2006-3811", "CVE-2006-3677", "CVE-2006-3804", "CVE-2006-3810", "CVE-2006-3801", "CVE-2006-3812", "CVE-2006-3113", "CVE-2006-3805", "CVE-2006-3808", "CVE-2006-3802"], "description": "\nA Mozilla Foundation Security Advisory reports of multiple\n\t issues. Several of which can be used to run arbitrary code\n\t with the privilege of the user running the program.\n\n\nMFSA 2006-56 chrome: scheme loading remote content\nMFSA 2006-55 Crashes with evidence of memory corruption\n\t (rv:1.8.0.5)\nMFSA 2006-54 XSS with\n\t XPCNativeWrapper(window).Function(...)\nMFSA 2006-53 UniversalBrowserRead privilege escalation\nMFSA 2006-52 PAC privilege escalation using\n\t Function.prototype.call\nMFSA 2006-51 Privilege escalation using named-functions\n\t and redefined \"new Object()\"\nMFSA 2006-50 JavaScript engine vulnerabilities\nMFSA 2006-49 Heap buffer overwrite on malformed VCard\nMFSA 2006-48 JavaScript new Function race condition\nMFSA 2006-47 Native DOM methods can be hijacked across\n\t domains\nMFSA 2006-46 Memory corruption with simultaneous events\nMFSA 2006-45 Javascript navigator Object Vulnerability\nMFSA 2006-44 Code execution through deleted frame\n\t reference\n\n\n", "edition": 4, "modified": "2006-11-02T00:00:00", "published": "2006-07-25T00:00:00", "id": "E2A92664-1D60-11DB-88CF-000C6EC775D9", "href": "https://vuxml.freebsd.org/freebsd/e2a92664-1d60-11db-88cf-000c6ec775d9.html", "title": "mozilla -- multiple vulnerabilities", "type": "freebsd", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "debian": [{"lastseen": "2020-11-11T13:27:30", "bulletinFamily": "unix", "cvelist": ["CVE-2006-3806", "CVE-2006-3809", "CVE-2006-3807", "CVE-2006-3810", "CVE-2006-2779", "CVE-2006-3805", "CVE-2006-3808"], "description": "- --------------------------------------------------------------------------\nDebian Security Advisory DSA 1159-1 security@debian.org\nhttp://www.debian.org/security/ Martin Schulze\nAugust 28th, 2006 http://www.debian.org/security/faq\n- --------------------------------------------------------------------------\n\nPackage : mozilla-thunderbird\nVulnerability : several\nProblem type : remote\nDebian-specific: no\nCVE IDs : CVE-2006-2779 CVE-2006-3805 CVE-2006-3806 CVE-2006-3807\n CVE-2006-3808 CVE-2006-3809 CVE-2006-3810\nCERT advisories: VU#466673 VU#655892 VU#687396 VU#876420 VU#911004\nBugTraq IDs : 18228 19181\n\nSeveral security related problems have been discovered in Mozilla and\nderived products such as Mozilla Thunderbird. The Common\nVulnerabilities and Exposures project identifies the following\nvulnerabilities:\n\nCVE-2006-2779\n\n Mozilla team members discovered several crashes during testing of\n the browser engine showing evidence of memory corruption which may\n also lead to the execution of arbitrary code. The last bit of\n this problem will be corrected with the next update. You can\n prevent any trouble by disabling Javascript. [MFSA-2006-32]\n\nCVE-2006-3805\n\n The Javascript engine might allow remote attackers to execute\n arbitrary code. [MFSA-2006-50]\n\nCVE-2006-3806\n\n Multiple integer overflows in the Javascript engine might allow\n remote attackers to execute arbitrary code. [MFSA-2006-50]\n\nCVE-2006-3807\n\n Specially crafted Javascript allows remote attackers to execute\n arbitrary code. [MFSA-2006-51]\n\nCVE-2006-3808\n\n Remote AutoConfig (PAC) servers could execute code with elevated\n privileges via a specially crafted PAC script. [MFSA-2006-52]\n\nCVE-2006-3809\n\n Scripts with the UniversalBrowserRead privilege could gain\n UniversalXPConnect privileges and possibly execute code or obtain\n sensitive data. [MFSA-2006-53]\n\nCVE-2006-3810\n\n A cross-site scripting vulnerability allows remote attackers to\n inject arbitrary web script or HTML. [MFSA-2006-54]\n\nFor the stable distribution (sarge) these problems have been fixed in\nversion 1.0.2-2.sarge1.0.8b.1.\n\nFor the unstable distribution (sid) these problems have been fixed in\nversion 1.5.0.5-1.\n\nWe recommend that you upgrade your mozilla-thunderbird package.\n\n\nUpgrade Instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file.\n\nIf you are using the apt-get package manager, use the line for\nsources.list as given at the end of this advisory:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration.\n\n\nDebian GNU/Linux 3.1 alias sarge\n- --------------------------------\n\n Source archives:\n\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8b.1.dsc\n Size/MD5 checksum: 1003 04d64af96e791f70b148b47369e78fa8\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8b.1.diff.gz\n Size/MD5 checksum: 485519 ee4edfac117a53c5af08ed97fe85fe55\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2.orig.tar.gz\n Size/MD5 checksum: 33288906 806175393a226670aa66060452d31df4\n\n Alpha architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8b.1_alpha.deb\n Size/MD5 checksum: 12848642 4c5bcb9649ff7eec7d4ad6409fccfbce\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8b.1_alpha.deb\n Size/MD5 checksum: 3279330 5de619881da404d6846a64e1ab100198\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8b.1_alpha.deb\n Size/MD5 checksum: 151606 aca457a945d7a89cc5ad25952db6d32b\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8b.1_alpha.deb\n Size/MD5 checksum: 33038 f219f0a68ebce04be1a448d582330e36\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8b.1_alpha.deb\n Size/MD5 checksum: 88998 349021463f3a1fca2c269044cf3e66ca\n\n AMD64 architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8b.1_amd64.deb\n Size/MD5 checksum: 12255144 bacce34b5bc0e00ae8dfdcb6db7effee\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8b.1_amd64.deb\n Size/MD5 checksum: 3280524 68041a19610600cd691914971d72e915\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8b.1_amd64.deb\n Size/MD5 checksum: 150580 d4cd554373b8cf9695e11b172ccd018c\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8b.1_amd64.deb\n Size/MD5 checksum: 33032 5c7cc39d0f91f8cbd7dfbcd62f5233ea\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8b.1_amd64.deb\n Size/MD5 checksum: 88794 ef6eb382de91c862944b1486e5c343a7\n\n ARM architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8b.1_arm.deb\n Size/MD5 checksum: 10342700 42ebac688dbc2943768353f381c48af5\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8b.1_arm.deb\n Size/MD5 checksum: 3271408 8d1d920dbc27c50d3cef51653ae67571\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8b.1_arm.deb\n Size/MD5 checksum: 142784 14df28e047604532f99d28d57fd66555\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8b.1_arm.deb\n Size/MD5 checksum: 33052 441a28a0673a0b4a341ea3d2685ef7a7\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8b.1_arm.deb\n Size/MD5 checksum: 80852 608e1e053e2bfd73099f6e853cdc3b11\n\n Intel IA-32 architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8b.1_i386.deb\n Size/MD5 checksum: 11563882 b41abc362fc0ed424a3a4cd6c4fa8ca6\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8b.1_i386.deb\n Size/MD5 checksum: 3507108 6c5268e655733613500ee2173f1012ec\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8b.1_i386.deb\n Size/MD5 checksum: 146250 ba9d20e519d188c237b4b7cef17d3bbe\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8b.1_i386.deb\n Size/MD5 checksum: 33052 ef87f87b1ec09d8b1e66591e69895233\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8b.1_i386.deb\n Size/MD5 checksum: 87606 925e4a236ba4230a8e32216a064c3f06\n\n Intel IA-64 architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8b.1_ia64.deb\n Size/MD5 checksum: 14624106 a3b234485952ea02ccfdd68133a2cf35\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8b.1_ia64.deb\n Size/MD5 checksum: 3291038 a15a8ff3fbc471ed4969bb86e67c3c4c\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8b.1_ia64.deb\n Size/MD5 checksum: 154934 96ab243eb1e9340a6c04743d761febe8\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8b.1_ia64.deb\n Size/MD5 checksum: 33034 ef4ff45411db444879bd8171814989e0\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8b.1_ia64.deb\n Size/MD5 checksum: 106730 975838d769c3c4e9821ee2f2db1f180a\n\n HP Precision architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8b.1_hppa.deb\n Size/MD5 checksum: 13565080 e4e770db9c3257e4082f6ba9a4b17942\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8b.1_hppa.deb\n Size/MD5 checksum: 3284790 cd7b3d8fa65712084108545b06bf5cf8\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8b.1_hppa.deb\n Size/MD5 checksum: 152812 a850d4bbfc5412356adb8999e4afd3a2\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8b.1_hppa.deb\n Size/MD5 checksum: 33046 4b2d523df0b35eaf49c2ee670040a746\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8b.1_hppa.deb\n Size/MD5 checksum: 96926 49c2664125f88dcbcf8fc370490f1783\n\n Motorola 680x0 architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8b.1_m68k.deb\n Size/MD5 checksum: 10791242 efe7adeef2105ee962f60eb09d32be04\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8b.1_m68k.deb\n Size/MD5 checksum: 3270798 a64399e4e34ec761ddb064e650432d47\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8b.1_m68k.deb\n Size/MD5 checksum: 144566 c368a1f6bda4a639c799903d3bed7c86\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8b.1_m68k.deb\n Size/MD5 checksum: 33066 3992b0cab96e959ecea687899f8ef05f\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8b.1_m68k.deb\n Size/MD5 checksum: 82094 b13852c78fa4f46ff993f3c1e98680dc\n\n Big endian MIPS architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8b.1_mips.deb\n Size/MD5 checksum: 11943796 cb93a2f2fc4dd706defeaea3c18a6b6f\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8b.1_mips.deb\n Size/MD5 checksum: 3278794 9acf4f9583972ed1fe2d453e8330233b\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8b.1_mips.deb\n Size/MD5 checksum: 147496 07472047d17dabe204412c357bb21169\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8b.1_mips.deb\n Size/MD5 checksum: 33042 b7f0219fc847c1a52b3336aea10b1523\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8b.1_mips.deb\n Size/MD5 checksum: 84296 de6058169bdcaac13f4e44e50d86fcfa\n\n Little endian MIPS architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8b.1_mipsel.deb\n Size/MD5 checksum: 11811180 7a90700b755f8a9628743c00c5658e01\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8b.1_mipsel.deb\n Size/MD5 checksum: 3279738 b7599c5e7cb743cfe02f60402beeef4c\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8b.1_mipsel.deb\n Size/MD5 checksum: 147050 e648ba4dcabf8cd85415d259d19f9dc5\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8b.1_mipsel.deb\n Size/MD5 checksum: 33034 9892f5d7755b7b013b825acf7d239b9a\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8b.1_mipsel.deb\n Size/MD5 checksum: 84184 08802c45278f5d135118b15c261d60ff\n\n PowerPC architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8b.1_powerpc.deb\n Size/MD5 checksum: 10908332 b4899f52b0b1555eef1a52e29f7ccff0\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8b.1_powerpc.deb\n Size/MD5 checksum: 3269376 138a349de0a5a33317fb12e38fa7048d\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8b.1_powerpc.deb\n Size/MD5 checksum: 144570 8a5fbabc69454577f95fca69d6922183\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8b.1_powerpc.deb\n Size/MD5 checksum: 33046 eab66e527293d35eeec5a2aa21e34988\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8b.1_powerpc.deb\n Size/MD5 checksum: 80956 110bbacc7e5b85d32966e8b095d18e49\n\n IBM S/390 architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8b.1_s390.deb\n Size/MD5 checksum: 12701528 e77cc46c7784b4678e00158c4067fb13\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8b.1_s390.deb\n Size/MD5 checksum: 3279814 9f614f520b7d24b584b4dfdde4d6856c\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8b.1_s390.deb\n Size/MD5 checksum: 150872 8ec4f9059a17b2e75afd8cb472dfd7d4\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8b.1_s390.deb\n Size/MD5 checksum: 33030 1a9dd5360add1b5c7d3940e44efc72f4\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8b.1_s390.deb\n Size/MD5 checksum: 88798 c1fc3eda5995f50df821da0913447ffa\n\n Sun Sparc architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8b.1_sparc.deb\n Size/MD5 checksum: 11176418 d9291799bae4c157fe7f0a9dd86ebcf4\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8b.1_sparc.deb\n Size/MD5 checksum: 3275086 2a78bb9f76059b034dd1232cdd82dee6\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8b.1_sparc.deb\n Size/MD5 checksum: 144214 0f03b8b13d7cb6ae6c0eebbec1da6d2b\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8b.1_sparc.deb\n Size/MD5 checksum: 33056 4b9864766f12b2328b9e6fdfd98a4d0e\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8b.1_sparc.deb\n Size/MD5 checksum: 82648 c02d426a3ab8f7e704f946d0b0fee7c8\n\n\n These files will probably be moved into the stable distribution on\n its next update.\n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>\n\n", "edition": 3, "modified": "2006-08-28T00:00:00", "published": "2006-08-28T00:00:00", "id": "DEBIAN:DSA-1159-1:138F3", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2006/msg00249.html", "title": "[SECURITY] [DSA 1159-1] New Mozilla Thunderbird packages fix several problems", "type": "debian", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-11-11T13:25:48", "bulletinFamily": "unix", "cvelist": ["CVE-2006-3806", "CVE-2006-3809", "CVE-2006-3807", "CVE-2006-3810", "CVE-2006-2779", "CVE-2006-3805", "CVE-2006-3808"], "description": "- --------------------------------------------------------------------------\nDebian Security Advisory DSA 1160-2 security@debian.org\nhttp://www.debian.org/security/ Martin Schulze\nSeptember 15th, 2006 http://www.debian.org/security/faq\n- --------------------------------------------------------------------------\n\nPackage : mozilla\nVulnerability : several\nProblem type : remote\nDebian-specific: no\nCVE IDs : CVE-2006-2779 CVE-2006-3805 CVE-2006-3806 CVE-2006-3807\n CVE-2006-3808 CVE-2006-3809 CVE-2006-3810\nCERT advisories: VU#466673 VU#655892 VU#687396 VU#876420 VU#911004\nBugTraq IDs : 18228 19181\n\nThe latest security updates of Mozilla introduced a regression that\nled to a disfunctional attachment panel which warrants a correction to\nfix this issue. For reference please find below the original advisory\ntext:\n\n Several security related problems have been discovered in Mozilla and\n derived products. The Common Vulnerabilities and Exposures project\n identifies the following vulnerabilities:\n\n CVE-2006-2779\n\n Mozilla team members discovered several crashes during testing of\n the browser engine showing evidence of memory corruption which may\n also lead to the execution of arbitrary code. The last bit of\n this problem will be corrected with the next update. You can\n prevent any trouble by disabling Javascript. [MFSA-2006-32]\n\n CVE-2006-3805\n\n The Javascript engine might allow remote attackers to execute\n arbitrary code. [MFSA-2006-50]\n\n CVE-2006-3806\n\n Multiple integer overflows in the Javascript engine might allow\n remote attackers to execute arbitrary code. [MFSA-2006-50]\n\n CVE-2006-3807\n\n Specially crafted Javascript allows remote attackers to execute\n arbitrary code. [MFSA-2006-51]\n\n CVE-2006-3808\n\n Remote AutoConfig (PAC) servers could execute code with elevated\n privileges via a specially crafted PAC script. [MFSA-2006-52]\n\n CVE-2006-3809\n\n Scripts with the UniversalBrowserRead privilege could gain\n UniversalXPConnect privileges and possibly execute code or obtain\n sensitive data. [MFSA-2006-53]\n\n CVE-2006-3810\n\n A cross-site scripting vulnerability allows remote attackers to\n inject arbitrary web script or HTML. [MFSA-2006-54]\n\nFor the stable distribution (sarge) these problems have been fixed in\nversion 1.7.8-1sarge7.2.2.\n\nFor the unstable distribution (sid) these problems won't be fixed\nsince its end of lifetime has been reached and the package will soon\nbe removed.\n\nWe recommend that you upgrade your mozilla package.\n\n\nUpgrade Instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file.\n\nIf you are using the apt-get package manager, use the line for\nsources.list as given at the end of this advisory:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration.\n\n\nDebian GNU/Linux 3.1 alias sarge\n- --------------------------------\n\n Source archives:\n\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.2.2.dsc\n Size/MD5 checksum: 1131 bb39933b4dcb63f6f986f0da3ab9461e\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.2.2.diff.gz\n Size/MD5 checksum: 532293 5a86930497b980b25e7f8e5cd6305ad0\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8.orig.tar.gz\n Size/MD5 checksum: 30589520 13c0f0331617748426679e8f2e9f537a\n\n Alpha architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.2.2_alpha.deb\n Size/MD5 checksum: 168074 553ba25202552c16c02cfdcf94bbc1c4\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.2.2_alpha.deb\n Size/MD5 checksum: 147582 e953bc1da64aaab9b50ef2bd357279b8\n http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.2.2_alpha.deb\n Size/MD5 checksum: 184944 18bfed4502c3e8a50cac55bd69cf6f20\n http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.2.2_alpha.deb\n Size/MD5 checksum: 857148 c9f560d4ad706a1e50dbd2db21978427\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.2.2_alpha.deb\n Size/MD5 checksum: 1042 9de55ee42dcc1c484a801623ac29c80d\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.2.2_alpha.deb\n Size/MD5 checksum: 11484766 4b31f8553a2ee93057858b35cdc522d9\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.2.2_alpha.deb\n Size/MD5 checksum: 403274 da75d1e0207b660ae42d7d1eb0b99617\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.2.2_alpha.deb\n Size/MD5 checksum: 158338 264975902923a3c4b04f3fb2758cf61e\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.2.2_alpha.deb\n Size/MD5 checksum: 3358874 5728dcb6abe8f43915d0b62cdae5fb78\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.2.2_alpha.deb\n Size/MD5 checksum: 122312 c96ac910fe008c2582d5b33a4abdfdb0\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.2.2_alpha.deb\n Size/MD5 checksum: 204152 e262ee393ee0114d19c646520b95a0e8\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.2.2_alpha.deb\n Size/MD5 checksum: 1937184 b87b131e3f4da4757b725ebb77a624aa\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.2.2_alpha.deb\n Size/MD5 checksum: 212582 e1bb8eb0ea7013d825f1c6368931b9d1\n\n AMD64 architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.2.2_amd64.deb\n Size/MD5 checksum: 168072 0d98ed91660e7fc8d1f4a31ead03b9bf\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.2.2_amd64.deb\n Size/MD5 checksum: 146678 7a8e7068a414213850e54253ebb0d977\n http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.2.2_amd64.deb\n Size/MD5 checksum: 184950 f428f4a3ef968df80df014a98d747ce5\n http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.2.2_amd64.deb\n Size/MD5 checksum: 715510 91bd0fcde1c53b6056ea33860c464d90\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.2.2_amd64.deb\n Size/MD5 checksum: 1042 47e650f92cdafea5dc08d93e37bc7d7e\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.2.2_amd64.deb\n Size/MD5 checksum: 10948878 e537efe2b7e984f51dc1e187d3f34ac7\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.2.2_amd64.deb\n Size/MD5 checksum: 403278 831026525cebf77e1195b9a571127911\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.2.2_amd64.deb\n Size/MD5 checksum: 158334 a1ff9fbaf23292c6d593fe5bed360ecb\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.2.2_amd64.deb\n Size/MD5 checksum: 3352852 d9704f4582d97890a546801df3716782\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.2.2_amd64.deb\n Size/MD5 checksum: 121206 e4687f0678206bc7546786c517771feb\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.2.2_amd64.deb\n Size/MD5 checksum: 204158 89914bc3978d7502003529976e381ba8\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.2.2_amd64.deb\n Size/MD5 checksum: 1936056 4bbeba555dbc0b68c8c2ccd45e42d948\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.2.2_amd64.deb\n Size/MD5 checksum: 204432 d9975a7eafd40678112faad81185018f\n\n ARM architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.2.2_arm.deb\n Size/MD5 checksum: 168068 fce9bf7f31bfdfbfe100965648b5fbe1\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.2.2_arm.deb\n Size/MD5 checksum: 125028 a4bbf5fcb376c008a20a113823b4f528\n http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.2.2_arm.deb\n Size/MD5 checksum: 184964 0d46a1f48a783fc781029e9d2b810c9c\n http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.2.2_arm.deb\n Size/MD5 checksum: 632708 0d9a60c457fcb65d0100f8e26b79d2ca\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.2.2_arm.deb\n Size/MD5 checksum: 1038 da7c79e8962cf7d1c834ebf429d380e8\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.2.2_arm.deb\n Size/MD5 checksum: 9219442 dd73deb6db71af0cdfdf86885d53465d\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.2.2_arm.deb\n Size/MD5 checksum: 403316 c39b47abf0d634e40e42fcbee2ffa1db\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.2.2_arm.deb\n Size/MD5 checksum: 158380 abe3b5a07b4ff166d7ef3f2c018d8fcf\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.2.2_arm.deb\n Size/MD5 checksum: 3342318 b60668be41da0a39844b18d02aa63741\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.2.2_arm.deb\n Size/MD5 checksum: 112658 231332c5934adafb236d8fde7be70cfb\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.2.2_arm.deb\n Size/MD5 checksum: 204176 d71b44edfe88785428619a51908b5d3b\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.2.2_arm.deb\n Size/MD5 checksum: 1604478 075ca3db4526f490a3b6a57d52ce4dc7\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.2.2_arm.deb\n Size/MD5 checksum: 169016 0a74bc4e92be3879da2da8d126868299\n\n HP Precision architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.2.2_hppa.deb\n Size/MD5 checksum: 168068 79ff86fa3907e2a53a5dadd5d315b56a\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.2.2_hppa.deb\n Size/MD5 checksum: 157604 12b6abdb4a0d7706c67e6418b4e73f9b\n http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.2.2_hppa.deb\n Size/MD5 checksum: 184962 9364b64efcd74f2a34dabc783c0ce986\n http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.2.2_hppa.deb\n Size/MD5 checksum: 755438 de9b01a201480a90831d1fbc1fac5c6c\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.2.2_hppa.deb\n Size/MD5 checksum: 1042 2d88d33a47e5a9372d503705b3ace0c9\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.2.2_hppa.deb\n Size/MD5 checksum: 12167958 1195ed2e4e13a95a04283d04267a48ce\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.2.2_hppa.deb\n Size/MD5 checksum: 403276 53a622d0957c63ef52029b7ea514c4d8\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.2.2_hppa.deb\n Size/MD5 checksum: 158348 9dfaf9108f6b53ef2590ed9926922499\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.2.2_hppa.deb\n Size/MD5 checksum: 3359196 2d74deb88c6808c27b5f820ba723bb6b\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.2.2_hppa.deb\n Size/MD5 checksum: 123516 3e4d3c99cb18c8dc619784d9710cb2f6\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.2.2_hppa.deb\n Size/MD5 checksum: 204158 742a5f3e3607163909b019fc8199c5b3\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.2.2_hppa.deb\n Size/MD5 checksum: 2135242 ef8c1529ad34a6597fd7881ec97036f5\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.2.2_hppa.deb\n Size/MD5 checksum: 216392 b91e9dc35b71766e3c2d866f3597b170\n\n Intel IA-32 architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.2.2_i386.deb\n Size/MD5 checksum: 170352 40703cb53ee5b7294dc107887569c08b\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.2.2_i386.deb\n Size/MD5 checksum: 137502 f85890195ea91c20d4b8c4992133c9c5\n http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.2.2_i386.deb\n Size/MD5 checksum: 187146 35b47880629e7947d510ac659b1dd3d0\n http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.2.2_i386.deb\n Size/MD5 checksum: 662276 52c7a3db98c5a97f260bc32d275b2919\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.2.2_i386.deb\n Size/MD5 checksum: 1038 96c3fdcc00a3815780d1c852f97a3306\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.2.2_i386.deb\n Size/MD5 checksum: 10346404 0375cc857561973bce9465d44e5c5cd9\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.2.2_i386.deb\n Size/MD5 checksum: 403518 bd1d71b85dc5804a8aa10d2f7b72a932\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.2.2_i386.deb\n Size/MD5 checksum: 158372 7629bf899b61e3f6e0ce0443eb8afbdb\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.2.2_i386.deb\n Size/MD5 checksum: 3594582 4e1d44adf416fef07f8f8e3ac8251ea8\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.2.2_i386.deb\n Size/MD5 checksum: 116674 8dc261639f60ae8c63c9fc4dfc172888\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.2.2_i386.deb\n Size/MD5 checksum: 204172 23721786d112c62e2ab6d79cfe982cd6\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.2.2_i386.deb\n Size/MD5 checksum: 1816144 8b73736956fd00eab47d3da1b69d52dc\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.2.2_i386.deb\n Size/MD5 checksum: 192752 2750113b2c0b9a9a17294c82ccb1abb8\n\n Intel IA-64 architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.2.2_ia64.deb\n Size/MD5 checksum: 168068 8a8b01bc327c81ac9a35eec2606f0afc\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.2.2_ia64.deb\n Size/MD5 checksum: 175020 7f421d9a83a3645a3e6defcea674eee7\n http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.2.2_ia64.deb\n Size/MD5 checksum: 184960 9f48269063f614ad7f2452ea5d684582\n http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.2.2_ia64.deb\n Size/MD5 checksum: 967452 51e6465184e6368d9cd3a5d2dfbb328a\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.2.2_ia64.deb\n Size/MD5 checksum: 1034 c1407f176821f65d05121b9b9fa2be17\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.2.2_ia64.deb\n Size/MD5 checksum: 12961330 9afc30c671d79c2820b38d44550a9334\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.2.2_ia64.deb\n Size/MD5 checksum: 403274 97e3733b9ed636dde9f64607a8fd5b31\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.2.2_ia64.deb\n Size/MD5 checksum: 158334 18eb5b155cba3e74c07bd08d60e26b18\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.2.2_ia64.deb\n Size/MD5 checksum: 3378646 028b0d4dde4a766b856855e96432d0c1\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.2.2_ia64.deb\n Size/MD5 checksum: 125610 2b2b7e71175af23fdb4acb766ecb216d\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.2.2_ia64.deb\n Size/MD5 checksum: 204146 a85654f4a1e5d6445af59983689ac5b9\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.2.2_ia64.deb\n Size/MD5 checksum: 2302356 f68c5a97ca84e5a8789c7ea8616feda3\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.2.2_ia64.deb\n Size/MD5 checksum: 242824 57b969592c8d46f13e42fc45bd2b620f\n\n Motorola 680x0 architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.2.2_m68k.deb\n Size/MD5 checksum: 168084 ebaefee3ded203ba02eb42d440d01140\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.2.2_m68k.deb\n Size/MD5 checksum: 126708 639cc0b13f5a259ca255a214e7448cb6\n http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.2.2_m68k.deb\n Size/MD5 checksum: 184984 bda1a3fb6f94da0fa93caafd8726c4bb\n http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.2.2_m68k.deb\n Size/MD5 checksum: 600782 0da67847bd97a0deeca7221ed6daa762\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.2.2_m68k.deb\n Size/MD5 checksum: 1044 0e3b52647ec4d1cab0df8133c4183bb6\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.2.2_m68k.deb\n Size/MD5 checksum: 9712800 73f41e356d2d7d7e2b2131c33f3fb865\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.2.2_m68k.deb\n Size/MD5 checksum: 403356 5703ad69f20642dff0b73abaf3b291e9\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.2.2_m68k.deb\n Size/MD5 checksum: 158386 15f302f71c73e88c2bdf4599f1a990b7\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.2.2_m68k.deb\n Size/MD5 checksum: 3336818 b8570a6a33a5aaaf9165f9bd7870f3d2\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.2.2_m68k.deb\n Size/MD5 checksum: 114446 59dda0bbda07cff9e208e1fad40c5357\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.2.2_m68k.deb\n Size/MD5 checksum: 204192 e0bb7bac75c0e86b972efa750a1170cd\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.2.2_m68k.deb\n Size/MD5 checksum: 1683150 6595c133e2616136f47c44cf595cfcc3\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.2.2_m68k.deb\n Size/MD5 checksum: 174924 d1c35762abfe065b9d703960a21a9d99\n\n Big endian MIPS architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.2.2_mips.deb\n Size/MD5 checksum: 168076 5947b8928a7d52f2d40cc93a0efe95ed\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.2.2_mips.deb\n Size/MD5 checksum: 141558 dc10a1a91e526e92d22d4585594c0669\n http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.2.2_mips.deb\n Size/MD5 checksum: 184958 a7ff18cd5c7522cb46250f970b792541\n http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.2.2_mips.deb\n Size/MD5 checksum: 726538 e5cfada69c95b3ff6374c0dde7b755e8\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.2.2_mips.deb\n Size/MD5 checksum: 1044 6fe88cb467a02eb83f1b6cc56cb2ba63\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.2.2_mips.deb\n Size/MD5 checksum: 10735426 b229a0c89d52fed9a6ca47da0630f870\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.2.2_mips.deb\n Size/MD5 checksum: 403270 7dcffe7aa3853fe206eaf3209809ec59\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.2.2_mips.deb\n Size/MD5 checksum: 158344 04223592accfc2dfd5a32b00f303c8ac\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.2.2_mips.deb\n Size/MD5 checksum: 3358718 43bc8b35c0b1d67ea06ddd4649d36fbc\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.2.2_mips.deb\n Size/MD5 checksum: 117626 cd932bedb3c95f08d612eff4b9bec368\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.2.2_mips.deb\n Size/MD5 checksum: 204164 5689c8ae6a39dfc735af908e216f4505\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.2.2_mips.deb\n Size/MD5 checksum: 1795556 cfa51006dde9b3433f25048b0c562166\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.2.2_mips.deb\n Size/MD5 checksum: 189938 e7ca25e62753d01a29e668680110fd03\n\n Little endian MIPS architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.2.2_mipsel.deb\n Size/MD5 checksum: 168076 fa13db77745d2c3dc3e7a12fc19ad4cd\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.2.2_mipsel.deb\n Size/MD5 checksum: 141502 f6a859a3cd7a1f8e8d704a189a72ba8b\n http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.2.2_mipsel.deb\n Size/MD5 checksum: 184968 d90edf8a1c7642b76cfea3068efa55d3\n http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.2.2_mipsel.deb\n Size/MD5 checksum: 715976 7a9aea273c635f0ba708f15b887b16c5\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.2.2_mipsel.deb\n Size/MD5 checksum: 1042 4ead757bdb7893ddfb5eef4ca12464e1\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.2.2_mipsel.deb\n Size/MD5 checksum: 10610616 0c0aabe84441b9ef639159bc849121e8\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.2.2_mipsel.deb\n Size/MD5 checksum: 403286 6f4b7ee71b7f4927daa64166a5934a14\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.2.2_mipsel.deb\n Size/MD5 checksum: 158348 325353631a54b489d4cc0ed578459ba9\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.2.2_mipsel.deb\n Size/MD5 checksum: 3359394 f3b7354fe4e390c4ea740e364610d6fd\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.2.2_mipsel.deb\n Size/MD5 checksum: 117228 2cc3a94499f9504531c1dfbc42bb2987\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.2.2_mipsel.deb\n Size/MD5 checksum: 204160 35a12913bf54c279401c34bcaf02f837\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.2.2_mipsel.deb\n Size/MD5 checksum: 1777626 bc1de5ce86cb2947975e2d15368e6ad5\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.2.2_mipsel.deb\n Size/MD5 checksum: 187518 d2d60cc4b957fb143d89855d51b89b64\n\n PowerPC architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.2.2_powerpc.deb\n Size/MD5 checksum: 168068 fe49d18e432e28aa0aa4e06ee720bdb6\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.2.2_powerpc.deb\n Size/MD5 checksum: 132040 088cf084ba4f12278a498570de88bda2\n http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.2.2_powerpc.deb\n Size/MD5 checksum: 184950 971800ffb5d07ca71b8a665cb4cdd3c1\n http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.2.2_powerpc.deb\n Size/MD5 checksum: 719746 079df4da7ec5cc46052378464f68bb73\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.2.2_powerpc.deb\n Size/MD5 checksum: 1040 dbe93abdb48856ee45c5c1f31dc74d83\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.2.2_powerpc.deb\n Size/MD5 checksum: 9708238 60c1f1d72c777602d3663bd9f6d66d8c\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.2.2_powerpc.deb\n Size/MD5 checksum: 403288 3d67e5bbca986f3d493f092de173b986\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.2.2_powerpc.deb\n Size/MD5 checksum: 158338 210cb429751cc16741a99a5a501252bd\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.2.2_powerpc.deb\n Size/MD5 checksum: 3341180 f0fbd1b7ae8e83a6212f10e210a7afbc\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.2.2_powerpc.deb\n Size/MD5 checksum: 114582 23b3b328c10d7472f37062d1fb89835a\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.2.2_powerpc.deb\n Size/MD5 checksum: 204146 8906e4e5938b651da42ecaadf5ede88a\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.2.2_powerpc.deb\n Size/MD5 checksum: 1643152 f997b2218228de4a821e1a76ac307a8e\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.2.2_powerpc.deb\n Size/MD5 checksum: 175706 df8d203557f6c0da764ab163dfd35ba0\n\n IBM S/390 architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.2.2_s390.deb\n Size/MD5 checksum: 168070 dbbc50f83250fa4e96ce5fa5aa1f1239\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.2.2_s390.deb\n Size/MD5 checksum: 157342 9ca3b2ba1392a8e0b9ae312770fa422f\n http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.2.2_s390.deb\n Size/MD5 checksum: 184942 64f9ec8255365634cf3e985d78b0a918\n http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.2.2_s390.deb\n Size/MD5 checksum: 799736 3a649e5c93b057fb5c49e9614b9c4d48\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.2.2_s390.deb\n Size/MD5 checksum: 1034 312e876dd1ada606d872ecc3f5dd1c87\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.2.2_s390.deb\n Size/MD5 checksum: 11332196 ba8e90e85c7e47b1f7d2a0e558572bd0\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.2.2_s390.deb\n Size/MD5 checksum: 403286 84d8aa100b642ddf3e11d25d7cf2e3f4\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.2.2_s390.deb\n Size/MD5 checksum: 158334 eee9734fc27ed2120b19b68f64ed9a47\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.2.2_s390.deb\n Size/MD5 checksum: 3353460 94a5f4aeb8e6caf52298ab42ce51925b\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.2.2_s390.deb\n Size/MD5 checksum: 121356 039e4621cc5f1f396f04cce7d936ae20\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.2.2_s390.deb\n Size/MD5 checksum: 204162 76138f26bcc903413304ecdea530b582\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.2.2_s390.deb\n Size/MD5 checksum: 1944774 2a1fc7f1bda7ecb455993706030f3886\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.2.2_s390.deb\n Size/MD5 checksum: 213602 4b929622e24e962f12715d98ec5184e7\n\n Sun Sparc architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.2.2_sparc.deb\n Size/MD5 checksum: 168072 41eac7654297e41bb8ea1bcdeb41855e\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.2.2_sparc.deb\n Size/MD5 checksum: 129260 08ca2de15725be7d32b3b2324715a058\n http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.2.2_sparc.deb\n Size/MD5 checksum: 184956 d4a41f56e9b37ffb60a2c66b30c5471f\n http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.2.2_sparc.deb\n Size/MD5 checksum: 673524 84378a8cf1d88b597fb6a4cbb815adcc\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.2.2_sparc.deb\n Size/MD5 checksum: 1042 88279f4538a6e215092f5b9bc9e16e68\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.2.2_sparc.deb\n Size/MD5 checksum: 9381720 4912beeb2cb4a02cc4abf6d5c730180a\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.2.2_sparc.deb\n Size/MD5 checksum: 403296 c6346a95715ba44112e46cf80959c503\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.2.2_sparc.deb\n Size/MD5 checksum: 158350 b12497e5a02785d466d1975ea22d4040\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.2.2_sparc.deb\n Size/MD5 checksum: 3342192 ef8bfe776ee10bbbd7cb2a7fa3754aa6\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.2.2_sparc.deb\n Size/MD5 checksum: 112532 b3e1ff572f35ca8a5fa368cf815cb32f\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.2.2_sparc.deb\n Size/MD5 checksum: 204164 f376fe7d73e318e1c87e66bd527ef147\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.2.2_sparc.deb\n Size/MD5 checksum: 1583792 7a9053fa95df17218f140360f69fe05a\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.2.2_sparc.deb\n Size/MD5 checksum: 168116 65ecc744a989197668923747d5dfcdde\n\n\n\n These files will probably be moved into the stable distribution on\n its next update.\n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>\n\n", "edition": 3, "modified": "2006-09-14T00:00:00", "published": "2006-09-14T00:00:00", "id": "DEBIAN:DSA-1160-2:83BE0", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2006/msg00269.html", "title": "[SECURITY] [DSA 1160-2] New Mozilla packages fix several vulnerabilities", "type": "debian", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-11-11T13:30:37", "bulletinFamily": "unix", "cvelist": ["CVE-2006-3806", "CVE-2006-3809", "CVE-2006-3807", "CVE-2006-3810", "CVE-2006-2779", "CVE-2006-3805", "CVE-2006-3808"], "description": "- --------------------------------------------------------------------------\nDebian Security Advisory DSA 1160-1 security@debian.org\nhttp://www.debian.org/security/ Martin Schulze\nAugust 29th, 2006 http://www.debian.org/security/faq\n- --------------------------------------------------------------------------\n\nPackage : mozilla\nVulnerability : several\nProblem type : remote\nDebian-specific: no\nCVE IDs : CVE-2006-2779 CVE-2006-3805 CVE-2006-3806 CVE-2006-3807\n CVE-2006-3808 CVE-2006-3809 CVE-2006-3810\nCERT advisories: VU#466673 VU#655892 VU#687396 VU#876420 VU#911004\nBugTraq IDs : 18228 19181\n\nSeveral security related problems have been discovered in Mozilla and\nderived products. The Common Vulnerabilities and Exposures project\nidentifies the following vulnerabilities:\n\nCVE-2006-2779\n\n Mozilla team members discovered several crashes during testing of\n the browser engine showing evidence of memory corruption which may\n also lead to the execution of arbitrary code. The last bit of\n this problem will be corrected with the next update. You can\n prevent any trouble by disabling Javascript. [MFSA-2006-32]\n\nCVE-2006-3805\n\n The Javascript engine might allow remote attackers to execute\n arbitrary code. [MFSA-2006-50]\n\nCVE-2006-3806\n\n Multiple integer overflows in the Javascript engine might allow\n remote attackers to execute arbitrary code. [MFSA-2006-50]\n\nCVE-2006-3807\n\n Specially crafted Javascript allows remote attackers to execute\n arbitrary code. [MFSA-2006-51]\n\nCVE-2006-3808\n\n Remote AutoConfig (PAC) servers could execute code with elevated\n privileges via a specially crafted PAC script. [MFSA-2006-52]\n\nCVE-2006-3809\n\n Scripts with the UniversalBrowserRead privilege could gain\n UniversalXPConnect privileges and possibly execute code or obtain\n sensitive data. [MFSA-2006-53]\n\nCVE-2006-3810\n\n A cross-site scripting vulnerability allows remote attackers to\n inject arbitrary web script or HTML. [MFSA-2006-54]\n\nFor the stable distribution (sarge) these problems have been fixed in\nversion 1.7.8-1sarge7.2.1.\n\nFor the unstable distribution (sid) these problems won't be fixed\nsince its end of lifetime has been reached and the package will soon\nbe removed.\n\nWe recommend that you upgrade your mozilla package.\n\n\nUpgrade Instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file.\n\nIf you are using the apt-get package manager, use the line for\nsources.list as given at the end of this advisory:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration.\n\n\nDebian GNU/Linux 3.1 alias sarge\n- --------------------------------\n\n Source archives:\n\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.2.1.dsc\n Size/MD5 checksum: 1131 2bd30d0e1391b9705d1c8bcdcb9aa3e8\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.2.1.diff.gz\n Size/MD5 checksum: 531386 81427d72e82e1117623773ef1d9e0d92\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8.orig.tar.gz\n Size/MD5 checksum: 30589520 13c0f0331617748426679e8f2e9f537a\n\n Alpha architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.2.1_alpha.deb\n Size/MD5 checksum: 168074 eac003641c1939a8b4bef7497c374ba6\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.2.1_alpha.deb\n Size/MD5 checksum: 147532 e0a6fb3ce5c6de10c698cff9b80cc117\n http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.2.1_alpha.deb\n Size/MD5 checksum: 184942 223249982ca92e440245a6bb9d75d533\n http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.2.1_alpha.deb\n Size/MD5 checksum: 857098 8b0e75af2905326a5d9e67be91c9aac8\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.2.1_alpha.deb\n Size/MD5 checksum: 1040 66b38827a857248465f223152b80f204\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.2.1_alpha.deb\n Size/MD5 checksum: 11484928 d27d68018193d11fe6781e41feb81678\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.2.1_alpha.deb\n Size/MD5 checksum: 403300 153ac5f793787cefc5ae5678ef844e4b\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.2.1_alpha.deb\n Size/MD5 checksum: 158344 245e5dd64c3c328b5c02408e244db629\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.2.1_alpha.deb\n Size/MD5 checksum: 3358858 aa3043c1f46a6c5bfdc67efb433c7572\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.2.1_alpha.deb\n Size/MD5 checksum: 122304 54105650c2458ff3c29825cbc6295144\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.2.1_alpha.deb\n Size/MD5 checksum: 204164 05fb25c76ab388ffc0cd1930ed7fa780\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.2.1_alpha.deb\n Size/MD5 checksum: 1937180 0b49f5a4694fa5dccb024ae2d9399077\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.2.1_alpha.deb\n Size/MD5 checksum: 212580 db8f16769dd27e8241dd073225433b74\n\n AMD64 architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.2.1_amd64.deb\n Size/MD5 checksum: 168070 b42a4f421d392323c5ccf78f59a446f9\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.2.1_amd64.deb\n Size/MD5 checksum: 146634 108d35f0e9303db9b5c2d803f33d29fb\n http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.2.1_amd64.deb\n Size/MD5 checksum: 184962 dae604dee94ff87f0883c8bcbaed87de\n http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.2.1_amd64.deb\n Size/MD5 checksum: 715462 b8a19b3a0729575842ffc45f6cc525ce\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.2.1_amd64.deb\n Size/MD5 checksum: 1034 2eb59559388c253878b92b4b566d32f5\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.2.1_amd64.deb\n Size/MD5 checksum: 10948874 79783e1204731d378de0de64e2e060ff\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.2.1_amd64.deb\n Size/MD5 checksum: 403290 9060ed97202c1419e75511e1117a2e69\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.2.1_amd64.deb\n Size/MD5 checksum: 158342 15fd68de4bd67ece8b11477f4bc813c8\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.2.1_amd64.deb\n Size/MD5 checksum: 3352804 9cd9ee777bca717e736d3eecb4813adf\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.2.1_amd64.deb\n Size/MD5 checksum: 121184 e383a9b3187337765fd635eb75333469\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.2.1_amd64.deb\n Size/MD5 checksum: 204172 3a9ee9ae111fb1f6c8b09860869aedbe\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.2.1_amd64.deb\n Size/MD5 checksum: 1936078 b973fcfa00570b490e3d4884d9c6e825\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.2.1_amd64.deb\n Size/MD5 checksum: 204426 999ddfb35f3a0b8a974aeae56c22dc65\n\n ARM architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.2.1_arm.deb\n Size/MD5 checksum: 168074 a836b7a5b37b78aaebcb61ff654e3cf2\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.2.1_arm.deb\n Size/MD5 checksum: 124986 2e2ca9f9bd5665ac32c42952a452796b\n http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.2.1_arm.deb\n Size/MD5 checksum: 184962 8fb34805a06ab453ba89d0c23e4f9e5b\n http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.2.1_arm.deb\n Size/MD5 checksum: 632686 6c8279f37ffc94cfd53ed83a5c180a8b\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.2.1_arm.deb\n Size/MD5 checksum: 1038 7d522787331c0e28b5f7c6c1af24cce9\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.2.1_arm.deb\n Size/MD5 checksum: 9219618 782774e232a36315020a29df714397a0\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.2.1_arm.deb\n Size/MD5 checksum: 403348 f925ff6457b707657779b5b4fe421cd0\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.2.1_arm.deb\n Size/MD5 checksum: 158366 ac6ba8d892c154c57d71cfe0a208da1a\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.2.1_arm.deb\n Size/MD5 checksum: 3342412 c4740ddaba9219a6c94ad1d3d2907cbd\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.2.1_arm.deb\n Size/MD5 checksum: 112662 9865794389927f4b199020c5ef66cafe\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.2.1_arm.deb\n Size/MD5 checksum: 204186 0e66cf4d32d251121edad264c6ed61ae\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.2.1_arm.deb\n Size/MD5 checksum: 1604474 c68c19164028881a7e9d190a5a8c73f2\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.2.1_arm.deb\n Size/MD5 checksum: 169044 99d262cc2a412f938fd62dd5cb80d4aa\n\n Intel IA-32 architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.2.1_i386.deb\n Size/MD5 checksum: 170346 c96f11b70b94d0f7a5dd198ae0270316\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.2.1_i386.deb\n Size/MD5 checksum: 137444 d5505057ab521c13c9b9df8faf1898ad\n http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.2.1_i386.deb\n Size/MD5 checksum: 187130 fbb5013961c323e1a6eac06a972399fb\n http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.2.1_i386.deb\n Size/MD5 checksum: 662236 11505452778ab2a6f62b8b12690e327a\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.2.1_i386.deb\n Size/MD5 checksum: 1036 c90cf11f05a6db492676075f10455caa\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.2.1_i386.deb\n Size/MD5 checksum: 10346294 690c7568c81116dc99575e67c02c26c7\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.2.1_i386.deb\n Size/MD5 checksum: 403522 31bf91f8cc9a86f67cce7b1bbbd6bc7b\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.2.1_i386.deb\n Size/MD5 checksum: 158376 ee2658cae1ba55a281b06ebde593659a\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.2.1_i386.deb\n Size/MD5 checksum: 3594716 f8c1546c3530793960246557fbcf382c\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.2.1_i386.deb\n Size/MD5 checksum: 116690 21d708a27dd00ef6f7143e9f9a6cdf73\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.2.1_i386.deb\n Size/MD5 checksum: 204178 b6a41c12e4c7008177f8746fab92901a\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.2.1_i386.deb\n Size/MD5 checksum: 1816154 77f5e242fdc4adb1924be7f975a2405c\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.2.1_i386.deb\n Size/MD5 checksum: 192744 eb2e3a4bc87212eca06c12f1e7d46521\n\n Intel IA-64 architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.2.1_ia64.deb\n Size/MD5 checksum: 168072 7209fb036521f59fd735e703ec79400e\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.2.1_ia64.deb\n Size/MD5 checksum: 174978 10ba506a46b231aeee34dd51510ffee8\n http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.2.1_ia64.deb\n Size/MD5 checksum: 184954 d3cba059a9c48a693418fd96e791f57e\n http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.2.1_ia64.deb\n Size/MD5 checksum: 967402 052903f29e606cad5e4182773a42d416\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.2.1_ia64.deb\n Size/MD5 checksum: 1034 152faf535691f3f8ebe217cc0d37422c\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.2.1_ia64.deb\n Size/MD5 checksum: 12961084 020b12eb88202d7d3ae166ecfa828878\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.2.1_ia64.deb\n Size/MD5 checksum: 403296 bb77bbcaad98b8a86369c72ccc026011\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.2.1_ia64.deb\n Size/MD5 checksum: 158342 f1f091c558fd2d6075373b9472190cf1\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.2.1_ia64.deb\n Size/MD5 checksum: 3378634 2f3091a1d77aee6324eb818ade2c817d\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.2.1_ia64.deb\n Size/MD5 checksum: 125590 53ca1454eebe786c7ff1c3f68940d434\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.2.1_ia64.deb\n Size/MD5 checksum: 204164 68889825552d42960a9c047f5db4ead5\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.2.1_ia64.deb\n Size/MD5 checksum: 2302378 c66ad68e4c2ee6d463dcaa1f7e795463\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.2.1_ia64.deb\n Size/MD5 checksum: 242830 1fa9d4351819c18bc4b773c682ad74de\n\n HP Precision architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.2.1_hppa.deb\n Size/MD5 checksum: 168076 66d61d5be7abd2e8b74a6c96198e9552\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.2.1_hppa.deb\n Size/MD5 checksum: 157562 0104f3dfd071237a5cfa40c5ee433575\n http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.2.1_hppa.deb\n Size/MD5 checksum: 184960 999ee07a9b0c90f504d00ca54c139198\n http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.2.1_hppa.deb\n Size/MD5 checksum: 755388 764a9d45fbf49b17d9d5aadb89d85829\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.2.1_hppa.deb\n Size/MD5 checksum: 1040 c5b34199e97ffc378d3fd2d9dcf72bea\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.2.1_hppa.deb\n Size/MD5 checksum: 12168102 6dec58cb9458522eae398920e9aed844\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.2.1_hppa.deb\n Size/MD5 checksum: 403306 6188aa3503a805bd203c62610c4e3ced\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.2.1_hppa.deb\n Size/MD5 checksum: 158346 44964603e4dbed4635cfb16095665ef7\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.2.1_hppa.deb\n Size/MD5 checksum: 3359148 eb36fb8717e781f36760147898718d94\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.2.1_hppa.deb\n Size/MD5 checksum: 123522 65537d7af21935b0b92749ca351e17be\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.2.1_hppa.deb\n Size/MD5 checksum: 204174 f945cf55aabf0ab174f04e88b4180620\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.2.1_hppa.deb\n Size/MD5 checksum: 2135256 640e1fbc9bc8a2d5f84ffbbcaee57567\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.2.1_hppa.deb\n Size/MD5 checksum: 216396 1fcca2871418d7411b2c247b31a656f7\n\n Motorola 680x0 architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.2.1_m68k.deb\n Size/MD5 checksum: 168092 fe86bb2ca8abc891c409057990732610\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.2.1_m68k.deb\n Size/MD5 checksum: 126642 07e87b835240123e3a0b823a34aabe95\n http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.2.1_m68k.deb\n Size/MD5 checksum: 184984 6cf1417d36748d1a9b9547174b74d177\n http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.2.1_m68k.deb\n Size/MD5 checksum: 600730 576d83b5963a8ffc881daed75e6c6f6f\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.2.1_m68k.deb\n Size/MD5 checksum: 1044 e28e82a08d4b72b4eecb426a2c19e4e0\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.2.1_m68k.deb\n Size/MD5 checksum: 9712802 98a468557f08faefcfb386e1b03ce53b\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.2.1_m68k.deb\n Size/MD5 checksum: 403368 ab30bf829c00290b4cbc3b63786029c2\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.2.1_m68k.deb\n Size/MD5 checksum: 158406 77bc46299d455fe392bd60a3037e205f\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.2.1_m68k.deb\n Size/MD5 checksum: 3337004 297f3a2e48d9375a32e90b93a8763871\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.2.1_m68k.deb\n Size/MD5 checksum: 114468 21fe6664bf23421fcba559396134fcf0\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.2.1_m68k.deb\n Size/MD5 checksum: 204184 058b99007e3e3fac132353330c464dea\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.2.1_m68k.deb\n Size/MD5 checksum: 1683152 8948cd6b6c7e1c0da51264f1d7ffb6a0\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.2.1_m68k.deb\n Size/MD5 checksum: 174924 b2da7692c92862df050caeb6060246f1\n\n Big endian MIPS architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.2.1_mips.deb\n Size/MD5 checksum: 168072 ef741effd5c0d92bfd1006a067fd420f\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.2.1_mips.deb\n Size/MD5 checksum: 141500 23dcf154e495b937c76b0d08c8ba3af1\n http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.2.1_mips.deb\n Size/MD5 checksum: 184950 573206997817d3b0c52f3f74f0f0935e\n http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.2.1_mips.deb\n Size/MD5 checksum: 726474 b411fb639491df2df5258b3b23cf115f\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.2.1_mips.deb\n Size/MD5 checksum: 1040 2053ec9d35e7de4ddccbc4bd9e068dd3\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.2.1_mips.deb\n Size/MD5 checksum: 10735382 04afb86059c770780b2c5ed9574b252a\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.2.1_mips.deb\n Size/MD5 checksum: 403278 b33128eba36459050025687c1b97251d\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.2.1_mips.deb\n Size/MD5 checksum: 158356 2eaa19cd569a150fb0888a905dbfdfa6\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.2.1_mips.deb\n Size/MD5 checksum: 3358818 d1de9be804d868b1cb6b01ff14818bb5\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.2.1_mips.deb\n Size/MD5 checksum: 117622 b9cbc88e07c6ba01713f573099dcac35\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.2.1_mips.deb\n Size/MD5 checksum: 204164 c24dc616bc0019537a371281b6c5ce21\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.2.1_mips.deb\n Size/MD5 checksum: 1795562 294cae49d1f538a2326de93caf90ef2a\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.2.1_mips.deb\n Size/MD5 checksum: 189932 5fc63acfb905a864466afc317ad62764\n\n Little endian MIPS architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.2.1_mipsel.deb\n Size/MD5 checksum: 168076 52d5bb8de3bcac5af1b9c7161253fc6e\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.2.1_mipsel.deb\n Size/MD5 checksum: 141448 759d76f0c1f1a3141aa7e5b6fa738cd2\n http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.2.1_mipsel.deb\n Size/MD5 checksum: 184952 1613e4a0ebb0b01215c3f50622906953\n http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.2.1_mipsel.deb\n Size/MD5 checksum: 715936 dea4e33f2242680a9f6992a7ebe69f69\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.2.1_mipsel.deb\n Size/MD5 checksum: 1042 a1c3ebbbd7ec67a49483b5ac811ef24d\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.2.1_mipsel.deb\n Size/MD5 checksum: 10610812 3c6e191ecd90394cc89d5917f88b3811\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.2.1_mipsel.deb\n Size/MD5 checksum: 403296 f0fc353a203378cd9051ffca1c333ee7\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.2.1_mipsel.deb\n Size/MD5 checksum: 158352 98411cf47fe0952686e12f4be46e7d94\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.2.1_mipsel.deb\n Size/MD5 checksum: 3359336 f7afcef1f79da6078e6430af714f952b\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.2.1_mipsel.deb\n Size/MD5 checksum: 117208 8fcd67e70a26166aec44114139c4d0e0\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.2.1_mipsel.deb\n Size/MD5 checksum: 204170 a706dca773dd6c03e7d700939fc1e96e\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.2.1_mipsel.deb\n Size/MD5 checksum: 1777624 f9ec1c606051df270a0f2335857177ad\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.2.1_mipsel.deb\n Size/MD5 checksum: 187520 3c28b28ebc6baff0c9bb847a21372e7e\n\n PowerPC architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.2.1_powerpc.deb\n Size/MD5 checksum: 168082 13e1e7545eed58e1270a0ab2c2d433ca\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.2.1_powerpc.deb\n Size/MD5 checksum: 131994 24dde066f00f91ed7c303768bf5219fe\n http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.2.1_powerpc.deb\n Size/MD5 checksum: 184964 21eff711bbb483906b64e5e168095ed9\n http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.2.1_powerpc.deb\n Size/MD5 checksum: 719692 68fd6243189e634a4b0139384efca743\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.2.1_powerpc.deb\n Size/MD5 checksum: 1046 85e2ca21bc46e736215b4419deaaaeb8\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.2.1_powerpc.deb\n Size/MD5 checksum: 9708312 ae32ace9e83f069280dd57e345e9c951\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.2.1_powerpc.deb\n Size/MD5 checksum: 403294 713943ac3d06f4b151389688b9344f26\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.2.1_powerpc.deb\n Size/MD5 checksum: 158358 e298f882d70323a87942d2a110105336\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.2.1_powerpc.deb\n Size/MD5 checksum: 3341090 64ea6ce84a115bdc20bfa3dcd5b61bfd\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.2.1_powerpc.deb\n Size/MD5 checksum: 114598 912e6c2dddf4835bcd5458d8142b012b\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.2.1_powerpc.deb\n Size/MD5 checksum: 204174 5961f2538d92304d808bdeb36ebfd43b\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.2.1_powerpc.deb\n Size/MD5 checksum: 1643146 cffb2e9d9a2dfeccd12e469525e73e21\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.2.1_powerpc.deb\n Size/MD5 checksum: 175724 2a597fcb96bd9e8b119f96fc813615e7\n\n IBM S/390 architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.2.1_s390.deb\n Size/MD5 checksum: 168068 192a90d8302aba56c5188562e43c11c1\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.2.1_s390.deb\n Size/MD5 checksum: 157298 12d3bf42c74ef7a00c9d33fa92393e2f\n http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.2.1_s390.deb\n Size/MD5 checksum: 184942 849cdda4f8860506bb79f316b89ea365\n http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.2.1_s390.deb\n Size/MD5 checksum: 799696 713c51045254abf3d96d55884ee51a6c\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.2.1_s390.deb\n Size/MD5 checksum: 1034 bcafed934a00cdec70c2f62e083e2bf3\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.2.1_s390.deb\n Size/MD5 checksum: 11332328 b869c3b55f45383a4f050d6190c5d979\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.2.1_s390.deb\n Size/MD5 checksum: 403292 ef466f1e923cc970a1f6edc5695efe49\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.2.1_s390.deb\n Size/MD5 checksum: 158348 ffbc21fcb1ee262942f775d04b318d93\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.2.1_s390.deb\n Size/MD5 checksum: 3353464 705a66aa8deafe87aaa9d2509358002d\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.2.1_s390.deb\n Size/MD5 checksum: 121344 6b04648d824b662bca6841bd305b50d5\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.2.1_s390.deb\n Size/MD5 checksum: 204164 b56489b01c9992f25ad694d85e7cc4cc\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.2.1_s390.deb\n Size/MD5 checksum: 1944778 cc4551e2cb4e07c26843245de31ed270\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.2.1_s390.deb\n Size/MD5 checksum: 213600 be9c36068e6449c0e30a233887ea1d07\n\n Sun Sparc architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.2.1_sparc.deb\n Size/MD5 checksum: 168076 08f44358b647bf2c2ea7f0da859e8ac9\n http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.2.1_sparc.deb\n Size/MD5 checksum: 129208 18b77b286bfba205e942a72eb2baffab\n http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.2.1_sparc.deb\n Size/MD5 checksum: 184942 864ce609343d141ade3c922d138f6f78\n http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.2.1_sparc.deb\n Size/MD5 checksum: 673486 e87272fe32ca15edc9ea340737aa3e0e\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.2.1_sparc.deb\n Size/MD5 checksum: 1042 7ec6b04120c98b7ab47143fe1141d8d7\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.2.1_sparc.deb\n Size/MD5 checksum: 9381788 34105262fdd068aafce32b54d5f45236\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.2.1_sparc.deb\n Size/MD5 checksum: 403296 ec09417da44a128602cb441462b28816\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.2.1_sparc.deb\n Size/MD5 checksum: 158350 bbda61175cf8fc0e9cb5ae24da55b9a4\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.2.1_sparc.deb\n Size/MD5 checksum: 3342214 e160009ac134ebd9ff0209176a320429\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.2.1_sparc.deb\n Size/MD5 checksum: 112516 20e88571138978994c7c05528610a790\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.2.1_sparc.deb\n Size/MD5 checksum: 204168 b7b3949f1d80b750efa8f8c2f40c2c6d\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.2.1_sparc.deb\n Size/MD5 checksum: 1583812 48afe1f55a7d4fd35eb4a42619941979\n http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.2.1_sparc.deb\n Size/MD5 checksum: 168118 35333e0fd86439304bc49d1eded1c4ae\n\n\n These files will probably be moved into the stable distribution on\n its next update.\n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>\n\n", "edition": 3, "modified": "2006-08-29T00:00:00", "published": "2006-08-29T00:00:00", "id": "DEBIAN:DSA-1160-1:44864", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2006/msg00250.html", "title": "[SECURITY] [DSA 1160-1] New Mozilla packages fix several vulnerabilities", "type": "debian", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-11-11T13:23:53", "bulletinFamily": "unix", "cvelist": ["CVE-2006-3806", "CVE-2006-3809", "CVE-2006-3807", "CVE-2006-3810", "CVE-2006-2779", "CVE-2006-3805", "CVE-2006-3808"], "description": "- --------------------------------------------------------------------------\nDebian Security Advisory DSA 1159-2 security@debian.org\nhttp://www.debian.org/security/ Martin Schulze\nSeptember 8th, 2006 http://www.debian.org/security/faq\n- --------------------------------------------------------------------------\n\nPackage : mozilla-thunderbird\nVulnerability : several\nProblem type : remote\nDebian-specific: no\nCVE IDs : CVE-2006-2779 CVE-2006-3805 CVE-2006-3806 CVE-2006-3807\n CVE-2006-3808 CVE-2006-3809 CVE-2006-3810\nCERT advisories: VU#466673 VU#655892 VU#687396 VU#876420 VU#911004\nBugTraq IDs : 18228 19181\n\nThe latest security updates of Mozilla Thunderbird introduced a\nregression that led to a disfunctional attachment panel which warrants\na correction to fix this issue. For reference please find below the\noriginal advisory text:\n\n Several security related problems have been discovered in Mozilla and\n derived products such as Mozilla Thunderbird. The Common\n Vulnerabilities and Exposures project identifies the following\n vulnerabilities:\n\n CVE-2006-2779\n\n Mozilla team members discovered several crashes during testing of\n the browser engine showing evidence of memory corruption which may\n also lead to the execution of arbitrary code. The last bit of\n this problem will be corrected with the next update. You can\n prevent any trouble by disabling Javascript. [MFSA-2006-32]\n\n CVE-2006-3805\n\n The Javascript engine might allow remote attackers to execute\n arbitrary code. [MFSA-2006-50]\n\n CVE-2006-3806\n\n Multiple integer overflows in the Javascript engine might allow\n remote attackers to execute arbitrary code. [MFSA-2006-50]\n\n CVE-2006-3807\n\n Specially crafted Javascript allows remote attackers to execute\n arbitrary code. [MFSA-2006-51]\n\n CVE-2006-3808\n\n Remote AutoConfig (PAC) servers could execute code with elevated\n privileges via a specially crafted PAC script. [MFSA-2006-52]\n\n CVE-2006-3809\n\n Scripts with the UniversalBrowserRead privilege could gain\n UniversalXPConnect privileges and possibly execute code or obtain\n sensitive data. [MFSA-2006-53]\n\n CVE-2006-3810\n\n A cross-site scripting vulnerability allows remote attackers to\n inject arbitrary web script or HTML. [MFSA-2006-54]\n\nFor the stable distribution (sarge) these problems have been fixed in\nversion 1.0.2-2.sarge1.0.8b.2.\n\nFor the unstable distribution (sid) these problems have been fixed in\nversion 1.5.0.5-1.\n\nWe recommend that you upgrade your mozilla-thunderbird package.\n\n\nUpgrade Instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file.\n\nIf you are using the apt-get package manager, use the line for\nsources.list as given at the end of this advisory:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration.\n\n\nDebian GNU/Linux 3.1 alias sarge\n- --------------------------------\n\n Source archives:\n\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8b.2.dsc\n Size/MD5 checksum: 1003 359853df29b29253164e9aef34d18066\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8b.2.diff.gz\n Size/MD5 checksum: 486593 3759fe23473ecb6cee532cb47cdd4e63\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2.orig.tar.gz\n Size/MD5 checksum: 33288906 806175393a226670aa66060452d31df4\n\n Alpha architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8b.2_alpha.deb\n Size/MD5 checksum: 12849016 fdf32dcb741195378d9079231aba21cd\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8b.2_alpha.deb\n Size/MD5 checksum: 3279426 879ae924d100517f98ee7f39a84e1bb2\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8b.2_alpha.deb\n Size/MD5 checksum: 151696 dd6911608eb54bebc7fbcdb58e5d63bb\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8b.2_alpha.deb\n Size/MD5 checksum: 33138 9581f8f0be21162692672e55d5f00640\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8b.2_alpha.deb\n Size/MD5 checksum: 89106 06a2f4752c619fb6a80d15d8fd1741de\n\n AMD64 architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8b.2_amd64.deb\n Size/MD5 checksum: 12255346 0ef80084b8dc8f3aeab523b3ce03009e\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8b.2_amd64.deb\n Size/MD5 checksum: 3280646 de3c980f39e86509f62348d39ffb65f5\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8b.2_amd64.deb\n Size/MD5 checksum: 150662 369341b36fb2a2bcf3178c5bf788c72c\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8b.2_amd64.deb\n Size/MD5 checksum: 33132 42ef7496ee17221749feff905c1eb3ce\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8b.2_amd64.deb\n Size/MD5 checksum: 88892 15554699cf57f756e7e615910c36e705\n\n ARM architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8b.2_arm.deb\n Size/MD5 checksum: 10343074 0716c5639dc5b76dfee6f2aac33378f1\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8b.2_arm.deb\n Size/MD5 checksum: 3271558 0df9cfaf413911576ab6cbda7a366dc5\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8b.2_arm.deb\n Size/MD5 checksum: 142846 59248b09ddba4eea5c15f3a8e441c8b8\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8b.2_arm.deb\n Size/MD5 checksum: 33160 e0292cee475239b5660a1db8a60e9599\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8b.2_arm.deb\n Size/MD5 checksum: 80938 12eae1b21352bdbe21499d74f2ee3bc7\n\n HP Precision architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8b.2_hppa.deb\n Size/MD5 checksum: 13564760 ac59239f3cd97d1ae63616335e86b755\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8b.2_hppa.deb\n Size/MD5 checksum: 3284788 9c9ed05edb7b5d15c444347f27d997b6\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8b.2_hppa.deb\n Size/MD5 checksum: 152898 39997b48bfa96256946015464c4cabb9\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8b.2_hppa.deb\n Size/MD5 checksum: 33144 9f7a34db227b65158d2907e7030c0a35\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8b.2_hppa.deb\n Size/MD5 checksum: 97012 3b4cf017d74aa8a47d723b4c2f196735\n\n Intel IA-32 architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8b.2_i386.deb\n Size/MD5 checksum: 11564254 30581baff08ebcf78cb7a805078238c3\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8b.2_i386.deb\n Size/MD5 checksum: 3507668 46a7e9a8d982b9df0a3ac2c0d0f2f9e6\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8b.2_i386.deb\n Size/MD5 checksum: 146348 b8c2a88b083683e63ee7e83846aff346\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8b.2_i386.deb\n Size/MD5 checksum: 33150 5f56019ede768d9132def0798ea1c1fb\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8b.2_i386.deb\n Size/MD5 checksum: 87708 c51a3dc04f9bcba7fdfd486474d63966\n\n Intel IA-64 architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8b.2_ia64.deb\n Size/MD5 checksum: 14624280 55e21c6d9b9590b7b02646071e3d4881\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8b.2_ia64.deb\n Size/MD5 checksum: 3291092 d6cfb0e457c509cfd558b41d6db45e61\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8b.2_ia64.deb\n Size/MD5 checksum: 155048 12b7efd38b79c5e152757c1ae2861344\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8b.2_ia64.deb\n Size/MD5 checksum: 33144 b941a4303b34f97550744026b347e711\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8b.2_ia64.deb\n Size/MD5 checksum: 106840 e5e09e738134c8a7494a2b15e95c40df\n\n Motorola 680x0 architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8b.2_m68k.deb\n Size/MD5 checksum: 10791360 246f9f51609b2848c2d54f3183e07d5d\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8b.2_m68k.deb\n Size/MD5 checksum: 3271086 ad5796c388daa8f0965fdb8a353ba90d\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8b.2_m68k.deb\n Size/MD5 checksum: 144660 486d2b72286e105a670c40c4982857fd\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8b.2_m68k.deb\n Size/MD5 checksum: 33174 feca51e39ec459f867e412e788308687\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8b.2_m68k.deb\n Size/MD5 checksum: 82198 a2252137e94259eb8e699bf4d7a84ab7\n\n Big endian MIPS architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8b.2_mips.deb\n Size/MD5 checksum: 11943666 7d1fc9df6d4bb496bbed6b5f10353db3\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8b.2_mips.deb\n Size/MD5 checksum: 3278862 02a47eea657b6d287a860f98bb54c11e\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8b.2_mips.deb\n Size/MD5 checksum: 147602 07157e5a5dd3af8d299f7b4e060b357e\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8b.2_mips.deb\n Size/MD5 checksum: 33146 1d945a5ae87a049a5d12f604f5ecf83f\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8b.2_mips.deb\n Size/MD5 checksum: 84410 53d48b348d8d62b2aa2a2f03cf92e84d\n\n Little endian MIPS architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8b.2_mipsel.deb\n Size/MD5 checksum: 11811276 e8b1890107fb3c3e9410d396dd6fee51\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8b.2_mipsel.deb\n Size/MD5 checksum: 3279782 c0daeff4c21f2bc5a47731cb06ae51aa\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8b.2_mipsel.deb\n Size/MD5 checksum: 147156 f240918563f055e8da73d60aff27b63f\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8b.2_mipsel.deb\n Size/MD5 checksum: 33132 7d1aa8886a3d0b7857298944b03a55ba\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8b.2_mipsel.deb\n Size/MD5 checksum: 84270 74cbaa157220d3012e421f9427041216\n\n PowerPC architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8b.2_powerpc.deb\n Size/MD5 checksum: 10908472 a7120c11e497b2e280562b3611e0ba55\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8b.2_powerpc.deb\n Size/MD5 checksum: 3269516 58f62e16cbcc5988ef169c44b746e51a\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8b.2_powerpc.deb\n Size/MD5 checksum: 144672 a62727479a514dbde5394e455a9bf055\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8b.2_powerpc.deb\n Size/MD5 checksum: 33136 b839ba3f926ac102c3c322e4e140e40f\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8b.2_powerpc.deb\n Size/MD5 checksum: 81046 9251eb44207d2610bef616e409951937\n\n IBM S/390 architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8b.2_s390.deb\n Size/MD5 checksum: 12702008 ce1773912bae44fdb1473a86b31ffddf\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8b.2_s390.deb\n Size/MD5 checksum: 3280008 d20c17b61ae08aacb9bcf2578ffd2d03\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8b.2_s390.deb\n Size/MD5 checksum: 150980 a7936545066775c99d0cec4cff187ba2\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8b.2_s390.deb\n Size/MD5 checksum: 33140 8389760a91f3444c6170d5ed32867bd1\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8b.2_s390.deb\n Size/MD5 checksum: 88926 d237c5c35347449b6695f352f25b112a\n\n Sun Sparc architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8b.2_sparc.deb\n Size/MD5 checksum: 11176470 9d792595c891df352238de0e1b4f7639\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8b.2_sparc.deb\n Size/MD5 checksum: 3275230 164f9abf5ca1a11a2ca5d0a69cc4a93f\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8b.2_sparc.deb\n Size/MD5 checksum: 144318 e79b826ed1d778023f567fee90730446\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8b.2_sparc.deb\n Size/MD5 checksum: 33148 7d029003df1ee859d52ceacd8ba1142f\n http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8b.2_sparc.deb\n Size/MD5 checksum: 82746 b308910b4e9c4025b0488d44424b85f3\n\n\n These files will probably be moved into the stable distribution on\n its next update.\n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>\n\n", "edition": 3, "modified": "2006-09-08T00:00:00", "published": "2006-09-08T00:00:00", "id": "DEBIAN:DSA-1159-2:06228", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2006/msg00262.html", "title": "[SECURITY] [DSA 1159-2] New Mozilla Thunderbird packages fix several problems", "type": "debian", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-11-11T13:20:26", "bulletinFamily": "unix", "cvelist": ["CVE-2006-3806", "CVE-2006-3809", "CVE-2006-3807", "CVE-2006-3811", "CVE-2006-3805", "CVE-2006-3808"], "description": "- --------------------------------------------------------------------------\nDebian Security Advisory DSA 1161-2 security@debian.org\nhttp://www.debian.org/security/ Martin Schulze\nSeptember 13th, 2006 http://www.debian.org/security/faq\n- --------------------------------------------------------------------------\n\nPackage : mozilla-firefox\nVulnerability : several\nProblem type : remote\nDebian-specific: no\nCVE IDs : CVE-2006-3805 CVE-2006-3806 CVE-2006-3807 CVE-2006-3808\n CVE-2006-3809 CVE-2006-3811\nCERT advisories: VU#655892 VU#687396 VU#876420\nBugTraq ID : 19181\n\nThe latest security updates of Mozilla Firefox introduced a regression\nthat led to a disfunctional attachment panel which warrants a\ncorrection to fix this issue. For reference please find below the\noriginal advisory text:\n\n Several security related problems have been discovered in Mozilla and\n derived products like Mozilla Firefox. The Common Vulnerabilities and\n Exposures project identifies the following vulnerabilities:\n\n CVE-2006-3805\n\n The Javascript engine might allow remote attackers to execute\n arbitrary code. [MFSA-2006-50]\n\n CVE-2006-3806\n\n Multiple integer overflows in the Javascript engine might allow\n remote attackers to execute arbitrary code. [MFSA-2006-50]\n\n CVE-2006-3807\n\n Specially crafted Javascript allows remote attackers to execute\n arbitrary code. [MFSA-2006-51]\n\n CVE-2006-3808\n\n Remote AutoConfig (PAC) servers could execute code with elevated\n privileges via a specially crafted PAC script. [MFSA-2006-52]\n\n CVE-2006-3809\n\n Scripts with the UniversalBrowserRead privilege could gain\n UniversalXPConnect privileges and possibly execute code or obtain\n sensitive data. [MFSA-2006-53]\n\n CVE-2006-3811\n\n Multiple vulnerabilities allow remote attackers to cause a denial\n of service (crash) and possibly execute arbitrary code.\n [MFSA-2006-55]\n\nFor the stable distribution (sarge) these problems have been fixed in\nversion 1.0.4-2sarge11.\n\nFor the unstable distribution (sid) these problems have been fixed in\nversion 1.5.dfsg+1.5.0.5-1.\n\nWe recommend that you upgrade your mozilla-firefox package.\n\n\nUpgrade Instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file.\n\nIf you are using the apt-get package manager, use the line for\nsources.list as given at the end of this advisory:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration.\n\n\nDebian GNU/Linux 3.1 alias sarge\n- --------------------------------\n\n Source archives:\n\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge11.dsc\n Size/MD5 checksum: 1003 fcb7947248bc53a236134e59a7e9673a\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge11.diff.gz\n Size/MD5 checksum: 419204 417893bc76c1a0f772e6c6eff7571c98\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4.orig.tar.gz\n Size/MD5 checksum: 40212297 8e4ba81ad02c7986446d4e54e978409d\n\n Alpha architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge11_alpha.deb\n Size/MD5 checksum: 11176846 0f8f7a2dfe4758092806312b92c0fa16\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge11_alpha.deb\n Size/MD5 checksum: 169842 7bc6af501357d15416aa39a731ad84a7\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge11_alpha.deb\n Size/MD5 checksum: 61674 6746719356df15955ad4cadfee8a44ae\n\n AMD64 architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge11_amd64.deb\n Size/MD5 checksum: 9405320 6cb1704571922ccc445aa3b54cfee6b1\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge11_amd64.deb\n Size/MD5 checksum: 164636 81725e9973607ef36dd732a2e7ef40a1\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge11_amd64.deb\n Size/MD5 checksum: 60204 2eb1e134427f4f4dc94233c42aadc295\n\n ARM architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge11_arm.deb\n Size/MD5 checksum: 8228072 fd099e40cc4ab7475f9b9ee5edbaf224\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge11_arm.deb\n Size/MD5 checksum: 156064 10ce619e39bc6b2731114786e1cb9c93\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge11_arm.deb\n Size/MD5 checksum: 55518 da686a241720a55b9f444c2d00da3fb8\n\n HP Precision architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge11_hppa.deb\n Size/MD5 checksum: 10281878 47dd66ed0e3f65b784257a3a7124b669\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge11_hppa.deb\n Size/MD5 checksum: 167584 b795910270c5244dce878ede41b1bf4e\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge11_hppa.deb\n Size/MD5 checksum: 60656 e2735db17f1c50937886821f5c682325\n\n Intel IA-32 architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge11_i386.deb\n Size/MD5 checksum: 8905260 78f91ed5ea64d8401f81c881bf197318\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge11_i386.deb\n Size/MD5 checksum: 159842 39c39cc385ece1da80d7129ad5d91073\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge11_i386.deb\n Size/MD5 checksum: 57062 54ca183ad099a3d172a03433fb9bae77\n\n Intel IA-64 architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge11_ia64.deb\n Size/MD5 checksum: 11638550 b7c8dca5be087b63b0c9cb99a5406ee6\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge11_ia64.deb\n Size/MD5 checksum: 170184 ebba92837650a1af655a24b3196510cd\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge11_ia64.deb\n Size/MD5 checksum: 64872 0da252d7693a0c55a7f1e9e92e8bfd93\n\n Motorola 680x0 architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge11_m68k.deb\n Size/MD5 checksum: 8180246 a55c8120cfc2da1df53dc65ecd6fce91\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge11_m68k.deb\n Size/MD5 checksum: 158684 746c12952165ac9375d63b5ae8ba34f1\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge11_m68k.deb\n Size/MD5 checksum: 56318 e1b1e85cf556c71d425403b0177aa871\n\n Big endian MIPS architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge11_mips.deb\n Size/MD5 checksum: 9939250 9e86d61f30f4057e59dc7f310cbb5cf5\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge11_mips.deb\n Size/MD5 checksum: 157634 e5f8214f60849ae5ac4be6967719d2cd\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge11_mips.deb\n Size/MD5 checksum: 57332 aec13be187d73ef17e173594f6476b5a\n\n Little endian MIPS architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge11_mipsel.deb\n Size/MD5 checksum: 9814448 412c4ae8bf5c53d0d6eb151a13f5be65\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge11_mipsel.deb\n Size/MD5 checksum: 157198 a7ef40abac781f64a43fb6bfd5013785\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge11_mipsel.deb\n Size/MD5 checksum: 57148 50378fe99784dd4e0612f2339843345a\n\n PowerPC architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge11_powerpc.deb\n Size/MD5 checksum: 8576000 845d7e9726dfe677b3e7e788b3c4daa7\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge11_powerpc.deb\n Size/MD5 checksum: 158278 cee79f6031004b1d26287c1766acc8c0\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge11_powerpc.deb\n Size/MD5 checksum: 59444 3cede4cc2ffbb21a460a87ae6da4c443\n\n IBM S/390 architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge11_s390.deb\n Size/MD5 checksum: 9644388 4cdc4fba0ff2f749509e0162eac50ab1\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge11_s390.deb\n Size/MD5 checksum: 165190 285d75aa1d10c558cf56de3917777ab4\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge11_s390.deb\n Size/MD5 checksum: 59630 686ad114f29bce70ebeef7744ac140a9\n\n Sun Sparc architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge11_sparc.deb\n Size/MD5 checksum: 8667892 cac220d156fdb0d0a307ccbec6e648af\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge11_sparc.deb\n Size/MD5 checksum: 158460 fa572a3d6e045fd7faca38d96ad0d529\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge11_sparc.deb\n Size/MD5 checksum: 55882 e70bf88e151ba6e56a9bc4239bc519c8\n\n\n These files will probably be moved into the stable distribution on\n its next update.\n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>\n\n", "edition": 3, "modified": "2006-09-13T00:00:00", "published": "2006-09-13T00:00:00", "id": "DEBIAN:DSA-1161-2:1671F", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2006/msg00266.html", "title": "[SECURITY] [DSA 1161-2] New Mozilla Firefox packages fix several vulnerabilities", "type": "debian", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-11-11T13:11:49", "bulletinFamily": "unix", "cvelist": ["CVE-2006-3806", "CVE-2006-3809", "CVE-2006-3807", "CVE-2006-3811", "CVE-2006-3805", "CVE-2006-3808"], "description": "- --------------------------------------------------------------------------\nDebian Security Advisory DSA 1161-1 security@debian.org\nhttp://www.debian.org/security/ Martin Schulze\nAugust 29th, 2006 http://www.debian.org/security/faq\n- --------------------------------------------------------------------------\n\nPackage : mozilla-firefox\nVulnerability : several\nProblem type : remote\nDebian-specific: no\nCVE IDs : CVE-2006-3805 CVE-2006-3806 CVE-2006-3807 CVE-2006-3808\n CVE-2006-3809 CVE-2006-3811\nCERT advisories: VU#655892 VU#687396 VU#876420\nBugTraq ID : 19181\n\nSeveral security related problems have been discovered in Mozilla and\nderived products like Mozilla Firefox. The Common Vulnerabilities and\nExposures project identifies the following vulnerabilities:\n\nCVE-2006-3805\n\n The Javascript engine might allow remote attackers to execute\n arbitrary code. [MFSA-2006-50]\n\nCVE-2006-3806\n\n Multiple integer overflows in the Javascript engine might allow\n remote attackers to execute arbitrary code. [MFSA-2006-50]\n\nCVE-2006-3807\n\n Specially crafted Javascript allows remote attackers to execute\n arbitrary code. [MFSA-2006-51]\n\nCVE-2006-3808\n\n Remote AutoConfig (PAC) servers could execute code with elevated\n privileges via a specially crafted PAC script. [MFSA-2006-52]\n\nCVE-2006-3809\n\n Scripts with the UniversalBrowserRead privilege could gain\n UniversalXPConnect privileges and possibly execute code or obtain\n sensitive data. [MFSA-2006-53]\n\nCVE-2006-3811\n\n Multiple vulnerabilities allow remote attackers to cause a denial\n of service (crash) and possibly execute arbitrary code.\n [MFSA-2006-55]\n\nFor the stable distribution (sarge) these problems have been fixed in\nversion 1.0.4-2sarge10.\n\nFor the unstable distribution (sid) these problems have been fixed in\nversion 1.5.dfsg+1.5.0.5-1.\n\nWe recommend that you upgrade your mozilla-firefox package.\n\n\nUpgrade Instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file.\n\nIf you are using the apt-get package manager, use the line for\nsources.list as given at the end of this advisory:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration.\n\n\nDebian GNU/Linux 3.1 alias sarge\n- --------------------------------\n\n Source archives:\n\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge10.dsc\n Size/MD5 checksum: 1003 09583ca7a6bd470e092c5226528ae80c\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge10.diff.gz\n Size/MD5 checksum: 419119 3618884176a92d3ac97022e074188e77\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4.orig.tar.gz\n Size/MD5 checksum: 40212297 8e4ba81ad02c7986446d4e54e978409d\n\n Alpha architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge10_alpha.deb\n Size/MD5 checksum: 11176644 0b0ab73f6c4deebad034c9c5f604d3a0\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge10_alpha.deb\n Size/MD5 checksum: 169796 fbfddc6581dd0c7389a6445ecb0ec3f9\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge10_alpha.deb\n Size/MD5 checksum: 61598 b07ab088199007de44282145a7721fc3\n\n AMD64 architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge10_amd64.deb\n Size/MD5 checksum: 9405310 33590c4e5998a0b7fa9a26b281e7da3c\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge10_amd64.deb\n Size/MD5 checksum: 164566 aceef401edf65c2633f27aad978396dc\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge10_amd64.deb\n Size/MD5 checksum: 60122 d5250c9fb83f1b7c67123a1bf2191840\n\n ARM architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge10_arm.deb\n Size/MD5 checksum: 8228178 aed4e4dbbeefc391454e3f7aebc63a15\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge10_arm.deb\n Size/MD5 checksum: 156018 440374f401628e71f4f01057e0418c2c\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge10_arm.deb\n Size/MD5 checksum: 55444 02d92e0752b89ff7b049252b6c327300\n\n Intel IA-32 architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge10_i386.deb\n Size/MD5 checksum: 8904976 b2441882b3107c287ce1cf4414b7440f\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge10_i386.deb\n Size/MD5 checksum: 159774 18cb2b3db08016bc6c4526574f3b72de\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge10_i386.deb\n Size/MD5 checksum: 56992 00e9d8fc0cf7b22666627876851a365b\n\n Intel IA-64 architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge10_ia64.deb\n Size/MD5 checksum: 11638750 9e7e3b0aee30e3a80a0eec0515d81258\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge10_ia64.deb\n Size/MD5 checksum: 170104 d6dc6f919293d517ef990cb46060d115\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge10_ia64.deb\n Size/MD5 checksum: 64798 9532185c638659206c6627f5857698ff\n\n HP Precision architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge10_hppa.deb\n Size/MD5 checksum: 10281754 c5ec2b8d56096c9efb0efab75dcc9171\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge10_hppa.deb\n Size/MD5 checksum: 167484 9e8718e775368564fc6f691e214f651c\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge10_hppa.deb\n Size/MD5 checksum: 60578 65426b32ec4d7f2f7fb397aadae7b173\n\n Motorola 680x0 architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge10_m68k.deb\n Size/MD5 checksum: 8180240 2786b8b54f2748023752d1aec5899fe2\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge10_m68k.deb\n Size/MD5 checksum: 158648 869e3cacfa86e6cc68fcb9d98f081607\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge10_m68k.deb\n Size/MD5 checksum: 56246 2f14d625a593d86ef0c13c8b7f1391e5\n\n Big endian MIPS architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge10_mips.deb\n Size/MD5 checksum: 9939504 c18bb8875373e0e1dd707ad9a6778d87\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge10_mips.deb\n Size/MD5 checksum: 157580 8ebfe5494e67be102f9ef48f9af06d82\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge10_mips.deb\n Size/MD5 checksum: 57268 a4bd50f5614dace6e1d524372b4d3435\n\n Little endian MIPS architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge10_mipsel.deb\n Size/MD5 checksum: 9814412 363c45d54885eee9c6f4c6e0116a68ed\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge10_mipsel.deb\n Size/MD5 checksum: 157128 cb46a82ef943f94f10c0224efdb2a336\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge10_mipsel.deb\n Size/MD5 checksum: 57090 6971eb188d7dbdf22b032c91ae145111\n\n PowerPC architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge10_powerpc.deb\n Size/MD5 checksum: 8576282 1c61ed7a704bed95e6186e5fc1ffb25a\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge10_powerpc.deb\n Size/MD5 checksum: 158190 3ab95e22b86f243140f22687feed25af\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge10_powerpc.deb\n Size/MD5 checksum: 59370 5cc17f0992b7425b0f8c55422683f453\n\n IBM S/390 architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge10_s390.deb\n Size/MD5 checksum: 9643386 9d62f4ad6fb018b9f6dc3b1e48e11aba\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge10_s390.deb\n Size/MD5 checksum: 165116 ab405fffa91e4ac0ab18891dfb763d28\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge10_s390.deb\n Size/MD5 checksum: 59560 c7d8aec75403e3fde0e812bac573383a\n\n Sun Sparc architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge10_sparc.deb\n Size/MD5 checksum: 8667678 c65257545e9562877989ca3275df27c0\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge10_sparc.deb\n Size/MD5 checksum: 158394 94580d49c505b103d2b60b69022af5ab\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge10_sparc.deb\n Size/MD5 checksum: 55812 c0f3f408ea170b5c3b2f6e4542c52b5c\n\n\n These files will probably be moved into the stable distribution on\n its next update.\n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>\n\n", "edition": 3, "modified": "2006-08-29T00:00:00", "published": "2006-08-29T00:00:00", "id": "DEBIAN:DSA-1161-1:80103", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2006/msg00251.html", "title": "[SECURITY] [DSA 1161-1] New Mozilla Firefox packages fix several vulnerabilities", "type": "debian", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-11-11T13:23:47", "bulletinFamily": "unix", "cvelist": ["CVE-2006-1942", "CVE-2006-2780", "CVE-2006-2784", "CVE-2006-2785", "CVE-2006-2776", "CVE-2006-2778", "CVE-2006-2779", "CVE-2005-0752", "CVE-2006-2786", "CVE-2006-1729", "CVE-2006-2783", "CVE-2006-2787", "CVE-2006-2777", "CVE-2006-2775", "CVE-2006-2782"], "description": "- --------------------------------------------------------------------------\nDebian Security Advisory DSA 1120-1 security@debian.org\nhttp://www.debian.org/security/ Martin Schulze\nJuly 23rd, 2006 http://www.debian.org/security/faq\n- --------------------------------------------------------------------------\n\nPackage : mozilla-firefox\nVulnerability : several\nProblem type : remote\nDebian-specific: no\nCVE IDs : CVE-2006-1942 CVE-2006-2775 CVE-2006-2776 CVE-2006-2777\n CVE-2006-2778 CVE-2006-2779 CVE-2006-2780 CVE-2006-2782\n CVE-2006-2783 CVE-2006-2784 CVE-2006-2785 CVE-2006-2786\n CVE-2006-2787\nCERT advisories: VU#237257 VU#243153 VU#421529 VU#466673 VU#575969\nBugTraq ID : 18228\n\nSeveral security related problems have been discovered in Mozilla.\nThe Common Vulnerabilities and Exposures project identifies the\nfollowing vulnerabilities:\n\nCVE-2006-1942\n\n Eric Foley discovered that a user can be tricked to expose a local\n file to a remote attacker by displaying a local file as image in\n connection with other vulnerabilities. [MFSA-2006-39]\n\nCVE-2006-2775\n\n XUL attributes are associated with the wrong URL under certain\n circumstances, which might allow remote attackers to bypass\n restrictions. [MFSA-2006-35]\n\nCVE-2006-2776\n\n Paul Nickerson discovered that content-defined setters on an\n object prototype were getting called by privileged user interface\n code, and "moz_bug_r_a4" demonstrated that the higher privilege\n level could be passed along to the content-defined attack code.\n [MFSA-2006-37]\n\nCVE-2006-2777\n\n A vulnerability allows remote attackers to execute arbitrary code\n and create notifications that are executed in a privileged\n context. [MFSA-2006-43]\n\nCVE-2006-2778\n\n Mikolaj Habryn a buffer overflow in the crypto.signText function\n that allows remote attackers to execute arbitrary code via certain\n optional Certificate Authority name arguments. [MFSA-2006-38]\n\nCVE-2006-2779\n\n Mozilla team members discovered several crashes during testing of\n the browser engine showing evidence of memory corruption which may\n also lead to the execution of arbitrary code. This problem has\n only partially been corrected. [MFSA-2006-32]\n\nCVE-2006-2780\n\n An integer overflow allows remote attackers to cause a denial of\n service and may permit the execution of arbitrary code.\n [MFSA-2006-32]\n\nCVE-2006-2782\n\n Chuck McAuley discovered that a text input box can be pre-filled\n with a filename and then turned into a file-upload control,\n allowing a malicious website to steal any local file whose name\n they can guess. [MFSA-2006-41, MFSA-2006-23, CVE-2006-1729]\n\nCVE-2006-2783\n\n Masatoshi Kimura discovered that the Unicode Byte-order-Mark (BOM)\n is stripped from UTF-8 pages during the conversion to Unicode\n before the parser sees the web page, which allows remote attackers\n to conduct cross-site scripting (XSS) attacks. [MFSA-2006-42]\n\nCVE-2006-2784\n\n Paul Nickerson discovered that the fix for CAN-2005-0752 can be\n bypassed using nested javascript: URLs, allowing the attacker to\n execute privileged code. [MFSA-2005-34, MFSA-2006-36]\n\nCVE-2006-2785\n\n Paul Nickerson demonstrated that if an attacker could convince a\n user to right-click on a broken image and choose "View Image" from\n the context menu then he could get JavaScript to\n run. [MFSA-2006-34]\n\nCVE-2006-2786\n\n Kazuho Oku discovered that Mozilla's lenient handling of HTTP\n header syntax may allow remote attackers to trick the browser to\n interpret certain responses as if they were responses from two\n different sites. [MFSA-2006-33]\n\nCVE-2006-2787\n\n The Mozilla researcher "moz_bug_r_a4" discovered that JavaScript\n run via EvalInSandbox can escape the sandbox and gain elevated\n privilege. [MFSA-2006-31]\n\nFor the stable distribution (sarge) these problems have been fixed in\nversion 1.0.4-2sarge9.\n\nFor the unstable distribution (sid) these problems have been fixed in\nversion 1.5.dfsg+1.5.0.4-1.\n\nWe recommend that you upgrade your Mozilla Firefox packages.\n\n\nUpgrade Instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file.\n\nIf you are using the apt-get package manager, use the line for\nsources.list as given at the end of this advisory:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration.\n\n\nDebian GNU/Linux 3.1 alias sarge\n- --------------------------------\n\n Source archives:\n\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge9.dsc\n Size/MD5 checksum: 1001 21424c5ba440f16f6abea37711d66aa9\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge9.diff.gz\n Size/MD5 checksum: 398646 2eff76a21650ad05f52b5fdf73bd3f7e\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4.orig.tar.gz\n Size/MD5 checksum: 40212297 8e4ba81ad02c7986446d4e54e978409d\n\n Alpha architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge9_alpha.deb\n Size/MD5 checksum: 11173304 3a940907dc9761c8f509bb4c985db436\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge9_alpha.deb\n Size/MD5 checksum: 169032 05d7a00140abdf880b41c4fa28114068\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge9_alpha.deb\n Size/MD5 checksum: 60866 de85fa33566f2fbfcc86501ee62b2a1b\n\n AMD64 architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge9_amd64.deb\n Size/MD5 checksum: 9401816 963bc07e9bad81b56674d2e87fcc2074\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge9_amd64.deb\n Size/MD5 checksum: 163774 782e55322d790e206be62b7c973cf4ee\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge9_amd64.deb\n Size/MD5 checksum: 59390 62063c4dc7dfb9dd977b2a019bd37946\n\n ARM architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge9_arm.deb\n Size/MD5 checksum: 8223298 0a3854d01bb66b8251a6fd0f6f6acf1d\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge9_arm.deb\n Size/MD5 checksum: 155248 04b4755e60835717a7b5ed0025f00f0c\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge9_arm.deb\n Size/MD5 checksum: 54702 93f66e628ad9327de4ed14acdfec4395\n\n Intel IA-32 architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge9_i386.deb\n Size/MD5 checksum: 8899786 395567e782da4a1d6e0ef10367ba57cc\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge9_i386.deb\n Size/MD5 checksum: 159032 5225bca73b84ed3e8a1c4e06bdd6cd69\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge9_i386.deb\n Size/MD5 checksum: 56250 f8baa460416bd34c28e347b371c2ac72\n\n Intel IA-64 architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge9_ia64.deb\n Size/MD5 checksum: 11632562 3fc46e9c4a4575594c610c7ff85146ce\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge9_ia64.deb\n Size/MD5 checksum: 169362 aad3f6f89760080eca86f9988c690532\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge9_ia64.deb\n Size/MD5 checksum: 64062 0973673b6e56cc6d26db14a0170c4a1a\n\n HP Precision architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge9_hppa.deb\n Size/MD5 checksum: 10275134 dbdcf7d07ead3c046ec5a604922bd853\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge9_hppa.deb\n Size/MD5 checksum: 166732 ff51c0f78f3bb6ee011c85e850e67230\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge9_hppa.deb\n Size/MD5 checksum: 59840 856193bc316aecbcce4f88aae4404240\n\n Motorola 680x0 architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge9_m68k.deb\n Size/MD5 checksum: 8175302 d60841a0292077f4635ca9b68c45cd8a\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge9_m68k.deb\n Size/MD5 checksum: 157932 5559512572a0493c336f46e67dc6163d\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge9_m68k.deb\n Size/MD5 checksum: 55524 f04387c9e24e76965342227983327a03\n\n Big endian MIPS architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge9_mips.deb\n Size/MD5 checksum: 9932150 56eefc3ec8a8832645ec1316929f4411\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge9_mips.deb\n Size/MD5 checksum: 156774 696dca1ed57d6c13fd80bcd6fc4364cd\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge9_mips.deb\n Size/MD5 checksum: 56506 af7303ff23599cf25224df22f5b92e05\n\n Little endian MIPS architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge9_mipsel.deb\n Size/MD5 checksum: 9810314 3673c61e049c42c7ea21ed58e06b2acc\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge9_mipsel.deb\n Size/MD5 checksum: 156350 9d3f411c8372b54775ab5ba90c10d0da\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge9_mipsel.deb\n Size/MD5 checksum: 56336 ccc11bdf50a4b0809fe7ed2dbdf44006\n\n PowerPC architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge9_powerpc.deb\n Size/MD5 checksum: 8571660 cf198d98db5695e5c423c567ebfdba38\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge9_powerpc.deb\n Size/MD5 checksum: 157448 d96866bfc3e74f73d6cf4a3f71aa50cb\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge9_powerpc.deb\n Size/MD5 checksum: 58628 e3a6722463006bb379c9548318784af8\n\n IBM S/390 architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge9_s390.deb\n Size/MD5 checksum: 9641400 c935ca331cf22eab9f311fc65c69e227\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge9_s390.deb\n Size/MD5 checksum: 164392 342aeb1f6362565bac9cd8f9a34e6711\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge9_s390.deb\n Size/MD5 checksum: 58816 3199d08b5c64c05d4c9f3600fd1a9927\n\n Sun Sparc architecture:\n\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge9_sparc.deb\n Size/MD5 checksum: 8662210 a25db0f4ce57b47898d633b2512cd0b4\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge9_sparc.deb\n Size/MD5 checksum: 157632 5d0f66746bcbb48269e1e4e0efa71067\n http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge9_sparc.deb\n Size/MD5 checksum: 55062 99d09b78f6efa23c02d1e9076185f105\n\n\n These files will probably be moved into the stable distribution on\n its next update.\n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>\n\n", "edition": 3, "modified": "2006-07-23T00:00:00", "published": "2006-07-23T00:00:00", "id": "DEBIAN:DSA-1120-1:5AE40", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2006/msg00207.html", "title": "[SECURITY] [DSA 1120-1] New Mozilla Firefox packages fix several vulnerabilities", "type": "debian", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "securityvulns": [{"lastseen": "2018-08-31T11:10:18", "bulletinFamily": "software", "cvelist": ["CVE-2006-3806", "CVE-2006-3081", "CVE-2006-3803", "CVE-2006-3807", "CVE-2006-3811", "CVE-2006-3677", "CVE-2006-3804", "CVE-2006-3801", "CVE-2006-3113", "CVE-2006-3805"], "description": "\r\n\r\n-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\n National Cyber Alert System\r\n\r\n Technical Cyber Security Alert TA06-208A\r\n\r\n\r\nMozilla Products Contain Multiple Vulnerabilities\r\n\r\n Original release date: July 27, 2006\r\n Last revised: --\r\n Source: US-CERT\r\n\r\n\r\nSystems Affected\r\n\r\n * Mozilla SeaMonkey\r\n * Mozilla Firefox\r\n * Mozilla Thunderbird\r\n\r\n Any products based on Mozilla components, specifically Gecko, may also\r\n be affected.\r\n\r\n\r\nOverview\r\n\r\n The Mozilla web browser and derived products contain several\r\n vulnerabilities, the most serious of which could allow a remote\r\n attacker to execute arbitrary code on an affected system.\r\n\r\n\r\nI. Description\r\n\r\n Several vulnerabilities have been reported in the Mozilla web browser\r\n and derived products. More detailed information is available in the\r\n individual vulnerability notes, including the following:\r\n\r\n\r\n VU#476724 - Mozilla products fail to properly handle frame references \r\n\r\n Mozilla products fail to properly handle frame or window references.\r\n This may allow a remote attacker to execute arbitrary code on a\r\n vulnerable system.\r\n (CVE-2006-3801)\r\n\r\n\r\n VU#670060 - Mozilla fails to properly release JavaScript references \r\n\r\n Mozilla products fail to properly release memory. This vulnerability\r\n may allow a remote attacker to execute code on a vulnerable system.\r\n (CVE-2006-3677)\r\n\r\n\r\n VU#239124 - Mozilla fails to properly handle simultaneous XPCOM events\r\n \r\n Mozilla products are vulnerable to memory corruption via simultaneous\r\n XPCOM events. This may allow a remote attacker to execute arbitrary\r\n code on a vulnerable system.\r\n (CVE-2006-3113)\r\n\r\n\r\n VU#265964 - Mozilla products contain a race condition \r\n\r\n Mozilla products contain a race condition. This vulnerability may\r\n allow a remote attacker to execute code on a vulnerable system.\r\n (CVE-2006-3803)\r\n\r\n\r\n VU#897540 - Mozilla products VCard attachment buffer overflow \r\n\r\n Mozilla products fail to properly handle malformed VCard attachments,\r\n allowing a buffer overflow to occur. This vulnerability may allow a\r\n remote attacker to execute arbitrary code on a vulnerable system.\r\n (CVE-2006-3804)\r\n\r\n\r\n VU#876420 - Mozilla fails to properly handle garbage collection \r\n\r\n The Mozilla JavaScript engine fails to properly perform garbage\r\n collection, which may allow a remote attacker to execute arbitrary\r\n code on a vulnerable system.\r\n (CVE-2006-3805)\r\n\r\n\r\n VU#655892 - Mozilla JavaScript engine contains multiple integer\r\n overflows \r\n\r\n The Mozilla JavaScript engine contains multiple integer overflows.\r\n This vulnerability may allow a remote attacker to execute arbitrary\r\n code on a vulnerable system.\r\n (CVE-2006-3806)\r\n\r\n\r\n VU#687396 - Mozilla products fail to properly validate JavaScript\r\n constructors \r\n\r\n Mozilla products fail to properly validate references returned by\r\n JavaScript constructors. This vulnerability may allow a remote\r\n attacker to execute arbitrary code on a vulnerable system.\r\n (CVE-2006-3807)\r\n\r\n\r\n VU#527676 - Mozilla contains multiple memory corruption\r\n vulnerabilities \r\n\r\n Mozilla products contain multiple vulnerabilities that can cause\r\n memory corruption. This may allow a remote attacker to execute\r\n arbitrary code on a vulnerable system.\r\n (CVE-2006-3811)\r\n\r\n\r\nII. Impact\r\n\r\n A remote, unauthenticated attacker could execute arbitrary code on a\r\n vulnerable system. An attacker may also be able to cause the\r\n vulnerable application to crash.\r\n\r\n\r\nIII. Solution\r\n\r\nUpgrade\r\n\r\n Upgrade to Mozilla Firefox 1.5.0.5, Mozilla Thunderbird 1.5.0.5, or\r\n SeaMonkey 1.0.3.\r\n\r\nDisable JavaScript and Java\r\n\r\n These vulnerabilities can be mitigated by disabling JavaScript and\r\n Java in all affected products. Instructions for disabling Java in\r\n Firefox can be found in the "Securing Your Web Browser" document.\r\n\r\n\r\nAppendix A. References\r\n\r\n * US-CERT Vulnerability Notes Related to July Mozilla Security\r\n Advisories -\r\n <http://www.kb.cert.org/vuls/byid?searchview&query=firefox_1505>\r\n\r\n * CVE-2006-3081 -\r\n <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3801>\r\n\r\n * CVE-2006-3677 -\r\n <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3677>\r\n\r\n * CVE-2006-3113 -\r\n <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3113>\r\n\r\n * CVE-2006-3803 -\r\n <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3803>\r\n\r\n * CVE-2006-3804 -\r\n <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3804>\r\n\r\n * CVE-2006-3805 -\r\n <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3805>\r\n\r\n * CVE-2006-3806 -\r\n <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3806>\r\n\r\n * CVE-2006-3807 -\r\n <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3807>\r\n\r\n * CVE-2006-3811 -\r\n <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3811>\r\n\r\n * Mozilla Foundation Security Advisories -\r\n <http://www.mozilla.org/security/announce/>\r\n\r\n * Known Vulnerabilities in Mozilla Products -\r\n <http://www.mozilla.org/projects/security/known-vulnerabilities.html>\r\n\r\n * Securing Your Web Browser -\r\n <http://www.us-cert.gov/reading_room/securing_browser/browser_security.html#Mozilla_Firefox>\r\n\r\n\r\n ____________________________________________________________________\r\n\r\n The most recent version of this document can be found at:\r\n\r\n <http://www.us-cert.gov/cas/techalerts/TA06-208A.html>\r\n ____________________________________________________________________\r\n\r\n Feedback can be directed to US-CERT Technical Staff. Please send\r\n email to <cert@cert.org> with "TA06-208A Feedback VU#239124" in the\r\n subject.\r\n ____________________________________________________________________\r\n\r\n For instructions on subscribing to or unsubscribing from this\r\n mailing list, visit <http://www.us-cert.gov/cas/signup.html>.\r\n ____________________________________________________________________\r\n\r\n Produced 2006 by US-CERT, a government organization.\r\n\r\n Terms of use:\r\n\r\n <http://www.us-cert.gov/legal.html>\r\n ____________________________________________________________________\r\n\r\n\r\nRevision History\r\n\r\n Jul 27, 2006: Initial release\r\n\r\n\r\n \r\n \r\n\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1.2.1 (GNU/Linux)\r\n\r\niQEVAwUBRMkgNexOF3G+ig+rAQIFsAgAoWoMkxxhkzb+xgLVCJF7h4k4EBCgJGWa\r\nBSOiFfL4Gs4vv4lNooDRCIOdxiBfXYL71XsIOT4aWry5852/6kyYnyAiXXYj1Uv0\r\nSbPY2sQSZ5EaG+G9i8HDIy3fpJN4XgH3ng1uzUnJihY19IfndbXicpZE+debIUri\r\nqt9NRD2f5FW5feKo1cBpYxtmxQAEePOa2dJHh7I7cnFGtG3MixHx4kVEyuYUutCX\r\n5tHDsfTIdySNkIdCQ4vhk846bErB/kaHiKMQDfMglllb3GOSc07OQ0CDo2eTPVsA\r\n9DtKkiDP1C4dh1mxco8CWlS6327+EB0KXGGoqDF2+j/rrpsW0oc8nA==\r\n=HwuK\r\n-----END PGP SIGNATURE-----", "edition": 1, "modified": "2006-07-28T00:00:00", "published": "2006-07-28T00:00:00", "id": "SECURITYVULNS:DOC:13656", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:13656", "title": "US-CERT Technical Cyber Security Alert TA06-208A -- Mozilla Products Contain Multiple Vulnerabilities", "type": "securityvulns", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-08-31T11:10:18", "bulletinFamily": "software", "cvelist": ["CVE-2006-2780", "CVE-2006-2784", "CVE-2006-2776", "CVE-2006-2778", "CVE-2006-2779", "CVE-2006-2781", "CVE-2006-2786", "CVE-2006-2783", "CVE-2006-2787", "CVE-2006-2775"], "description": "=========================================================== \r\nUbuntu Security Notice USN-297-3 July 26, 2006\r\nmozilla-thunderbird vulnerabilities\r\nCVE-2006-2775, CVE-2006-2776, CVE-2006-2778, CVE-2006-2779,\r\nCVE-2006-2780, CVE-2006-2781, CVE-2006-2783, CVE-2006-2784,\r\nCVE-2006-2787\r\n===========================================================\r\n\r\nA security issue affects the following Ubuntu releases:\r\n\r\nUbuntu 5.04\r\nUbuntu 5.10\r\n\r\nThis advisory also applies to the corresponding versions of\r\nKubuntu, Edubuntu, and Xubuntu.\r\n\r\nThe problem can be corrected by upgrading your system to the\r\nfollowing package versions:\r\n\r\nUbuntu 5.04:\r\n mozilla-thunderbird 1.0.8-0ubuntu05.04.1\r\n\r\nUbuntu 5.10:\r\n mozilla-thunderbird 1.0.8-0ubuntu05.10.2\r\n\r\nAfter a standard system upgrade you need to restart Thunderbird to\r\neffect the necessary changes.\r\n\r\nDetails follow:\r\n\r\nUSN-297-1 fixed several vulnerabilities in Thunderbird for the Ubuntu\r\n6.06 LTS release. This update provides the corresponding fixes for\r\nUbuntu 5.04 and Ubuntu 5.10.\r\n\r\nFor reference, these are the details of the original USN:\r\n\r\n Jonas Sicking discovered that under some circumstances persisted XUL\r\n attributes are associated with the wrong URL. A malicious web site\r\n could exploit this to execute arbitrary code with the privileges of\r\n the user. (MFSA 2006-35, CVE-2006-2775)\r\n\r\n Paul Nickerson discovered that content-defined setters on an object\r\n prototype were getting called by privileged UI code. It was\r\n demonstrated that this could be exploited to run arbitrary web\r\n script with full user privileges (MFSA 2006-37, CVE-2006-2776).\r\n\r\n Mikolaj Habryn discovered a buffer overflow in the crypto.signText()\r\n function. By sending an email with malicious JavaScript to an user,\r\n and that user enabled JavaScript in Thunderbird (which is not the\r\n default and not recommended), this could potentially be exploited to\r\n execute arbitrary code with the user's privileges. (MFSA 2006-38,\r\n CVE-2006-2778)\r\n\r\n The Mozilla developer team discovered several bugs that lead to\r\n crashes with memory corruption. These might be exploitable by\r\n malicious web sites to execute arbitrary code with the privileges of\r\n the user. (MFSA 2006-32, CVE-2006-2779, CVE-2006-2780)\r\n\r\n Masatoshi Kimura discovered a memory corruption (double-free) when\r\n processing a large VCard with invalid base64 characters in it. By\r\n sending a maliciously crafted set of VCards to a user, this could\r\n potentially be exploited to execute arbitrary code with the user's\r\n privileges. (MFSA 2006-40, CVE-2006-2781)\r\n\r\n Masatoshi Kimura found a way to bypass web input sanitizers which\r\n filter out JavaScript. By inserting 'Unicode Byte-order-Mark (BOM)'\r\n characters into the HTML code (e. g. '<scr[BOM]ipt>'), these filters\r\n might not recognize the tags anymore; however, Thunderbird would\r\n still execute them since BOM markers are filtered out before\r\n processing a mail containing JavaScript. (MFSA 2006-42,\r\n CVE-2006-2783)\r\n\r\n Kazuho Oku discovered various ways to perform HTTP response\r\n smuggling when used with certain proxy servers. Due to different\r\n interpretation of nonstandard HTTP headers in Thunderbird and the\r\n proxy server, a malicious HTML email can exploit this to send back\r\n two responses to one request. The second response could be used to\r\n steal login cookies or other sensitive data from another opened web\r\n site. (MFSA 2006-33, CVE-2006-2786)\r\n\r\n It was discovered that JavaScript run via EvalInSandbox() can escape\r\n the sandbox. Malicious scripts received in emails containing\r\n JavaScript could use these privileges to execute arbitrary code with\r\n the user's privileges. (MFSA 2006-31, CVE-2006-2787)\r\n\r\n\r\nUpdated packages for Ubuntu 5.04:\r\n\r\n Source archives:\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.8-0ubuntu05.04.1.diff.gz\r\n Size/MD5: 98300 a4dffa1705bd280224188e7bbc7781dd\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.8-0ubuntu05.04.1.dsc\r\n Size/MD5: 946 7eebd4d62af685dd0ce74d5ff741c92c\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.8.orig.tar.gz\r\n Size/MD5: 32849510 ae345f1b722d8f3a977af4fd358d27b0\r\n\r\n amd64 architecture (Athlon64, Opteron, EM64T Xeon)\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.8-0ubuntu05.04.1_amd64.deb\r\n Size/MD5: 3347854 519c296b742dc6e6d5c308b0b6c5a433\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.8-0ubuntu05.04.1_amd64.deb\r\n Size/MD5: 145244 9a8d5c4ade62afdb187022df1b188099\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.8-0ubuntu05.04.1_amd64.deb\r\n Size/MD5: 27718 aa28f71d2133d0810bbf166d86c68dc7\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.8-0ubuntu05.04.1_amd64.deb\r\n Size/MD5: 82728 55ede40f0e71d287cfabe73492b3a71a\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.8-0ubuntu05.04.1_amd64.deb\r\n Size/MD5: 11959242 c6acc1fa0785193f037fb35a14f7505e\r\n\r\n i386 architecture (x86 compatible Intel/AMD)\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.8-0ubuntu05.04.1_i386.deb\r\n Size/MD5: 3341642 18916c1156df514eb6b538ec63737a8d\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.8-0ubuntu05.04.1_i386.deb\r\n Size/MD5: 140326 b2f8c499a4b160e6131d2fb2278e54b5\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.8-0ubuntu05.04.1_i386.deb\r\n Size/MD5: 27724 6bab59d8db842eee01a411c256b64cd8\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.8-0ubuntu05.04.1_i386.deb\r\n Size/MD5: 80468 114885d918a10761414adafc506be2e5\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.8-0ubuntu05.04.1_i386.deb\r\n Size/MD5: 10911294 67ab1c44fe9a3d164e0c79755365e2bf\r\n\r\n powerpc architecture (Apple Macintosh G3/G4/G5)\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.8-0ubuntu05.04.1_powerpc.deb\r\n Size/MD5: 3337162 85e96f1fe254dc69170d3fc814110cd2\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.8-0ubuntu05.04.1_powerpc.deb\r\n Size/MD5: 139122 0ac4864a4c69045c43b37aad80f3336d\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.8-0ubuntu05.04.1_powerpc.deb\r\n Size/MD5: 27732 b4103fcdfef1107966f21b8a857dc01f\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.8-0ubuntu05.04.1_powerpc.deb\r\n Size/MD5: 74682 8f14928b2be37c12e205be1389749e0d\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.8-0ubuntu05.04.1_powerpc.deb\r\n Size/MD5: 10453746 f728c125a4ccf1d556ffd9cc39539055\r\n\r\nUpdated packages for Ubuntu 5.10:\r\n\r\n Source archives:\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.8-0ubuntu05.10.2.diff.gz\r\n Size/MD5: 100417 c3f0f93e338ff900b5ccec2515d0c43b\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.8-0ubuntu05.10.2.dsc\r\n Size/MD5: 919 5945fce5d3140112099d74b56537666b\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.8.orig.tar.gz\r\n Size/MD5: 32849510 ae345f1b722d8f3a977af4fd358d27b0\r\n\r\n amd64 architecture (Athlon64, Opteron, EM64T Xeon)\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.8-0ubuntu05.10.2_amd64.deb\r\n Size/MD5: 3294738 7340b5b39e4954d5c6284e04229e6632\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.8-0ubuntu05.10.2_amd64.deb\r\n Size/MD5: 146796 030b130217cd4b0cec9fd2e0c5239a0d\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.8-0ubuntu05.10.2_amd64.deb\r\n Size/MD5: 28266 11631a9ac55712b21a03470fe424e480\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.8-0ubuntu05.10.2_amd64.deb\r\n Size/MD5: 86278 4059ff0cb8da24cbd92d72accd3f2d67\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.8-0ubuntu05.10.2_amd64.deb\r\n Size/MD5: 11977184 6d77be91b8c0e9b06cf0cec0c8483998\r\n\r\n i386 architecture (x86 compatible Intel/AMD)\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.8-0ubuntu05.10.2_i386.deb\r\n Size/MD5: 3288954 2ced47739fac731f7347e497492df79e\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.8-0ubuntu05.10.2_i386.deb\r\n Size/MD5: 140348 f8b1ccb61ef81ba4b583f10369b82aee\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.8-0ubuntu05.10.2_i386.deb\r\n Size/MD5: 28262 ed05e4d9845d11e42062acd9d79e3a3b\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.8-0ubuntu05.10.2_i386.deb\r\n Size/MD5: 77656 586525c74b61275a49b3f91a549c31b4\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.8-0ubuntu05.10.2_i386.deb\r\n Size/MD5: 10380218 64dc49a7e9e75326164ca589aad327f1\r\n\r\n powerpc architecture (Apple Macintosh G3/G4/G5)\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.8-0ubuntu05.10.2_powerpc.deb\r\n Size/MD5: 3286824 49338b4f633089ec3119f8a341992751\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.8-0ubuntu05.10.2_powerpc.deb\r\n Size/MD5: 140438 401fc8d07b433ac4d71a9a37c9f086a7\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.8-0ubuntu05.10.2_powerpc.deb\r\n Size/MD5: 28272 900eb236bc7e85f4d99177f12d0084f4\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.8-0ubuntu05.10.2_powerpc.deb\r\n Size/MD5: 77364 c7b1e38a5d83594885bbeb987b477865\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.8-0ubuntu05.10.2_powerpc.deb\r\n Size/MD5: 10489086 b2665fa914781ad11bf4e826c5825a1a\r\n\r\n sparc architecture (Sun SPARC/UltraSPARC)\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.8-0ubuntu05.10.2_sparc.deb\r\n Size/MD5: 3286920 dd3b7e55abd608360b81e0db14b4376f\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.8-0ubuntu05.10.2_sparc.deb\r\n Size/MD5: 138920 2709c330b93517f8dfa3676ee1f2aa92\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.8-0ubuntu05.10.2_sparc.deb\r\n Size/MD5: 28268 feba2248d1093bed5fa21f463a8ea3a0\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.8-0ubuntu05.10.2_sparc.deb\r\n Size/MD5: 75314 d609546dfa5ff12c5e5c4a0e33efbf34\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.8-0ubuntu05.10.2_sparc.deb\r\n Size/MD5: 10165076 b9aaeb254fb107435156f01d70b64e9e", "edition": 1, "modified": "2006-07-27T00:00:00", "published": "2006-07-27T00:00:00", "id": "SECURITYVULNS:DOC:13643", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:13643", "title": "[USN-297-3] Thunderbird vulnerabilities", "type": "securityvulns", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:10:18", "bulletinFamily": "software", "cvelist": ["CVE-2006-2780", "CVE-2006-2784", "CVE-2006-2785", "CVE-2006-2776", "CVE-2006-2778", "CVE-2006-2779", "CVE-2006-2781", "CVE-2005-0752", "CVE-2006-2786", "CVE-2006-1729", "CVE-2006-2783", "CVE-2006-2787", "CVE-2006-2777", "CVE-2006-2775", "CVE-2006-2782"], "description": "=========================================================== \r\nUbuntu Security Notice USN-323-1 July 25, 2006\r\nmozilla vulnerabilities\r\nCVE-2006-2775, CVE-2006-2776, CVE-2006-2777, CVE-2006-2778,\r\nCVE-2006-2779, CVE-2006-2780, CVE-2006-2781, CVE-2006-2782,\r\nCVE-2006-2783, CVE-2006-2784, CVE-2006-2785, CVE-2006-2786,\r\nCVE-2006-2787\r\n===========================================================\r\n\r\nA security issue affects the following Ubuntu releases:\r\n\r\nUbuntu 5.04\r\nUbuntu 5.10\r\n\r\nThis advisory also applies to the corresponding versions of\r\nKubuntu, Edubuntu, and Xubuntu.\r\n\r\nThe problem can be corrected by upgrading your system to the\r\nfollowing package versions:\r\n\r\nUbuntu 5.04:\r\n mozilla-browser 2:1.7.13-0ubuntu05.04.1\r\n mozilla-mailnews 2:1.7.13-0ubuntu05.04.1\r\n mozilla-psm 2:1.7.13-0ubuntu05.04.1\r\n\r\nUbuntu 5.10:\r\n mozilla-browser 2:1.7.13-0ubuntu5.10.1\r\n mozilla-mailnews 2:1.7.13-0ubuntu5.10.1\r\n mozilla-psm 2:1.7.13-0ubuntu5.10.1\r\n\r\nAfter a standard system upgrade you need to restart Mozilla to effect\r\nthe necessary changes.\r\n\r\nDetails follow:\r\n\r\nJonas Sicking discovered that under some circumstances persisted XUL\r\nattributes are associated with the wrong URL. A malicious web site\r\ncould exploit this to execute arbitrary code with the privileges of\r\nthe user. (MFSA 2006-35, CVE-2006-2775)\r\n\r\nPaul Nickerson discovered that content-defined setters on an object\r\nprototype were getting called by privileged UI code. It was\r\ndemonstrated that this could be exploited to run arbitrary web script\r\nwith full user privileges (MFSA 2006-37, CVE-2006-2776). A similar\r\nattack was discovered by moz_bug_r_a4 that leveraged SelectionObject\r\nnotifications that were called in privileged context. (MFSA 2006-43,\r\nCVE-2006-2777)\r\n\r\nMikolaj Habryn discovered a buffer overflow in the crypto.signText()\r\nfunction. By tricking a user to visit a site with an SSL certificate\r\nwith specially crafted optional Certificate Authority name\r\narguments, this could potentially be exploited to execute arbitrary\r\ncode with the user's privileges. (MFSA 2006-38, CVE-2006-2778)\r\n\r\nThe Mozilla developer team discovered several bugs that lead to\r\ncrashes with memory corruption. These might be exploitable by\r\nmalicious web sites to execute arbitrary code with the privileges of\r\nthe user. (MFSA 2006-32, CVE-2006-2779, CVE-2006-2780)\r\n\r\nMasatoshi Kimura discovered a memory corruption (double-free) when\r\nprocessing a large VCard with invalid base64 characters in it. By\r\nsending a maliciously crafted set of VCards to a user, this could\r\npotentially be exploited to execute arbitrary code with the user's\r\nprivileges. (MFSA 2006-40, CVE-2006-2781)\r\n\r\nChuck McAuley reported that the fix for CVE-2006-1729 (file stealing\r\nby changing input type) was not sufficient to prevent all variants of\r\nexploitation. (MFSA 2006-41, CVE-2006-2782)\r\n\r\nMasatoshi Kimura found a way to bypass web input sanitizers which\r\nfilter out JavaScript. By inserting 'Unicode Byte-order-Mark (BOM)'\r\ncharacters into the HTML code (e. g. '<scr[BOM]ipt>'), these filters\r\nmight not recognize the tags anymore; however, Mozilla would still\r\nexecute them since BOM markers are filtered out before processing the\r\npage. (MFSA 2006-42, CVE-2006-2783)\r\n\r\nPaul Nickerson noticed that the fix for CVE-2005-0752 (JavaScript\r\nprivilege escalation on the plugins page) was not sufficient to\r\nprevent all variants of exploitation. (MFSA 2006-36, CVE-2006-2784)\r\n\r\nPaul Nickerson demonstrated that if an attacker could convince a user\r\nto right-click on a broken image and choose "View Image" from the\r\ncontext menu then he could get JavaScript to run on a site of the\r\nattacker's choosing. This could be used to steal login cookies or\r\nother confidential information from the target site. (MFSA 2006-34,\r\nCVE-2006-2785)\r\n\r\nKazuho Oku discovered various ways to perform HTTP response smuggling\r\nwhen used with certain proxy servers. Due to different interpretation\r\nof nonstandard HTTP headers in Mozilla and the proxy server, a\r\nmalicious web site can exploit this to send back two responses to one\r\nrequest. The second response could be used to steal login cookies or\r\nother sensitive data from another opened web site. (MFSA 2006-33,\r\nCVE-2006-2786)\r\n\r\n\r\nUpdated packages for Ubuntu 5.04:\r\n\r\n Source archives:\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/mozilla_1.7.13-0ubuntu05.04.1.diff.gz\r\n Size/MD5: 337800 2db7b990124c6c1c1b8e9672ca5d6513\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/mozilla_1.7.13-0ubuntu05.04.1.dsc\r\n Size/MD5: 1140 dff39e5ce49d9743de85eec224192a32\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/mozilla_1.7.13.orig.tar.gz\r\n Size/MD5: 38788839 db906560b5abe488286ad1edc21d52b6\r\n\r\n amd64 architecture (Athlon64, Opteron, EM64T Xeon)\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/libnspr-dev_1.7.13-0ubuntu05.04.1_amd64.deb\r\n Size/MD5: 168074 ad1b6c33075e971bbda9f2b1fb105acd\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/libnspr4_1.7.13-0ubuntu05.04.1_amd64.deb\r\n Size/MD5: 141800 26fe9cb2a488851d5a08f008eccb1286\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/libnss-dev_1.7.13-0ubuntu05.04.1_amd64.deb\r\n Size/MD5: 184958 e70af6a5c0c0ebd475977cede7dd2d0e\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/libnss3_1.7.13-0ubuntu05.04.1_amd64.deb\r\n Size/MD5: 710626 8a7cb0a2c698fbb25a19cb372012cc25\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/mozilla-browser_1.7.13-0ubuntu05.04.1_amd64.deb\r\n Size/MD5: 10610980 33b6ff77510c97ad410648acfa60969d\r\n http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-calendar_1.7.13-0ubuntu05.04.1_amd64.deb\r\n Size/MD5: 403276 503bd265002378861042e9145adca4e5\r\n http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-chatzilla_1.7.13-0ubuntu05.04.1_amd64.deb\r\n Size/MD5: 158328 a3a78547d1739fa489b5eaf06e2bb775\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/mozilla-dev_1.7.13-0ubuntu05.04.1_amd64.deb\r\n Size/MD5: 3352288 f136491aa7a81cafefbb3c7ecdc5f358\r\n http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-dom-inspector_1.7.13-0ubuntu05.04.1_amd64.deb\r\n Size/MD5: 121188 9047e6b7ddc935e553ef96869a0697b1\r\n http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-js-debugger_1.7.13-0ubuntu05.04.1_amd64.deb\r\n Size/MD5: 204152 5ddbdbe777cf61007db5946793386778\r\n http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-mailnews_1.7.13-0ubuntu05.04.1_amd64.deb\r\n Size/MD5: 1935856 e72372370e4e6ad8f232649faab04c1e\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/mozilla-psm_1.7.13-0ubuntu05.04.1_amd64.deb\r\n Size/MD5: 204518 694f522af956a4e0450fc40c0fec1681\r\n http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla_1.7.13-0ubuntu05.04.1_amd64.deb\r\n Size/MD5: 1042 e6281edcb4a65fa6d05ea72eb83b6cc6\r\n\r\n i386 architecture (x86 compatible Intel/AMD)\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/libnspr-dev_1.7.13-0ubuntu05.04.1_i386.deb\r\n Size/MD5: 168070 81c685cd991f0ff3b109be63f80130c5\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/libnspr4_1.7.13-0ubuntu05.04.1_i386.deb\r\n Size/MD5: 128448 77877720eaad8970b2675ead1eeaaf76\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/libnss-dev_1.7.13-0ubuntu05.04.1_i386.deb\r\n Size/MD5: 184934 cf8811d7050bd397343b9a6f16e43be6\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/libnss3_1.7.13-0ubuntu05.04.1_i386.deb\r\n Size/MD5: 640510 4919807173e6d2e47a9d3c04ba7ba2b8\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/mozilla-browser_1.7.13-0ubuntu05.04.1_i386.deb\r\n Size/MD5: 9625412 8b357311b8d2ca54dec002ab45c8be2a\r\n http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-calendar_1.7.13-0ubuntu05.04.1_i386.deb\r\n Size/MD5: 403294 b32aca483d56c4ce22e7c985b29e2fc4\r\n http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-chatzilla_1.7.13-0ubuntu05.04.1_i386.deb\r\n Size/MD5: 158332 8186f8e0eed294d42d40deaa635620df\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/mozilla-dev_1.7.13-0ubuntu05.04.1_i386.deb\r\n Size/MD5: 3344850 258d820d93386ad62ef54a6427dc80a8\r\n http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-dom-inspector_1.7.13-0ubuntu05.04.1_i386.deb\r\n Size/MD5: 115832 cb1f8880d0afe7e6d7c7a62df15817ed\r\n http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-js-debugger_1.7.13-0ubuntu05.04.1_i386.deb\r\n Size/MD5: 204160 6631b13c4025bbe77715589c86c28de7\r\n http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-mailnews_1.7.13-0ubuntu05.04.1_i386.deb\r\n Size/MD5: 1780842 e2d26ad17ed1ee60cf7b3dcadff9080a\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/mozilla-psm_1.7.13-0ubuntu05.04.1_i386.deb\r\n Size/MD5: 188486 7722d3ca28defc86236a0a24ec0a31bb\r\n http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla_1.7.13-0ubuntu05.04.1_i386.deb\r\n Size/MD5: 1038 3122a3872c2860bf08471a77215a539f\r\n\r\n powerpc architecture (Apple Macintosh G3/G4/G5)\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/libnspr-dev_1.7.13-0ubuntu05.04.1_powerpc.deb\r\n Size/MD5: 168076 2df31cb514546f26e4dda5a13f234c55\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/libnspr4_1.7.13-0ubuntu05.04.1_powerpc.deb\r\n Size/MD5: 127186 f68d8a52426231ba404610958394f786\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/libnss-dev_1.7.13-0ubuntu05.04.1_powerpc.deb\r\n Size/MD5: 184950 2f0a1db9364ce06f9c5b0a5b984d2167\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/libnss3_1.7.13-0ubuntu05.04.1_powerpc.deb\r\n Size/MD5: 714848 8f18e6495b88346a54b806af6bbea813\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/mozilla-browser_1.7.13-0ubuntu05.04.1_powerpc.deb\r\n Size/MD5: 9177718 3d1e82b88c35c967c210b88ff54970dc\r\n http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-calendar_1.7.13-0ubuntu05.04.1_powerpc.deb\r\n Size/MD5: 403298 1c4691bde820ec913f3bbddf13c9cef6\r\n http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-chatzilla_1.7.13-0ubuntu05.04.1_powerpc.deb\r\n Size/MD5: 158338 407c8d0d588edb5dd6742ec47b912472\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/mozilla-dev_1.7.13-0ubuntu05.04.1_powerpc.deb\r\n Size/MD5: 3340480 80710d7291666df1ce959410928bbec4\r\n http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-dom-inspector_1.7.13-0ubuntu05.04.1_powerpc.deb\r\n Size/MD5: 114584 a3c957dc3151e896ff18e9bd2710e6fa\r\n http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-js-debugger_1.7.13-0ubuntu05.04.1_powerpc.deb\r\n Size/MD5: 204166 f4a827dd3800896f1dd36c9a0e563ff9\r\n http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-mailnews_1.7.13-0ubuntu05.04.1_powerpc.deb\r\n Size/MD5: 1643010 06882ef0b556a5db1adec008cd609370\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/mozilla-psm_1.7.13-0ubuntu05.04.1_powerpc.deb\r\n Size/MD5: 175714 a1f98dd0b17c838723cd06b4a4167a21\r\n http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla_1.7.13-0ubuntu05.04.1_powerpc.deb\r\n Size/MD5: 1046 3fff2d11475b3d408cb007f79583b486\r\n\r\nUpdated packages for Ubuntu 5.10:\r\n\r\n Source archives:\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/mozilla_1.7.13-0ubuntu5.10.1.diff.gz\r\n Size/MD5: 339739 f3417c36cc2f4edf0f56f2a3d291186f\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/mozilla_1.7.13-0ubuntu5.10.1.dsc\r\n Size/MD5: 1080 6633c093477fe6313ea31a05626c74fa\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/mozilla_1.7.13.orig.tar.gz\r\n Size/MD5: 38788839 db906560b5abe488286ad1edc21d52b6\r\n\r\n amd64 architecture (Athlon64, Opteron, EM64T Xeon)\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/libnspr-dev_1.7.13-0ubuntu5.10.1_amd64.deb\r\n Size/MD5: 168042 e7c77d1568c6c46f083ab05f038464ff\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/libnspr4_1.7.13-0ubuntu5.10.1_amd64.deb\r\n Size/MD5: 143820 446658c0da7878eca5977486d5aa71c8\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/libnss-dev_1.7.13-0ubuntu5.10.1_amd64.deb\r\n Size/MD5: 184942 8fc2cf6a6d115e63715f5c54b82c2d4a\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/libnss3_1.7.13-0ubuntu5.10.1_amd64.deb\r\n Size/MD5: 719348 fd2b0f552c07995dc65906b56b12a5bc\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/mozilla-browser_1.7.13-0ubuntu5.10.1_amd64.deb\r\n Size/MD5: 10666540 3b661ff62d97846c23e422fdb0f87bc8\r\n http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-calendar_1.7.13-0ubuntu5.10.1_amd64.deb\r\n Size/MD5: 403282 ab2167239e57b61676dc3fbd296a2ffc\r\n http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-chatzilla_1.7.13-0ubuntu5.10.1_amd64.deb\r\n Size/MD5: 158322 d0e08f0196752784b50d87191d878d0a\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/mozilla-dev_1.7.13-0ubuntu5.10.1_amd64.deb\r\n Size/MD5: 3347976 344d169cf65cb66bb67af5dbb4c19048\r\n http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-dom-inspector_1.7.13-0ubuntu5.10.1_amd64.deb\r\n Size/MD5: 122358 9db2a1a2d412846a541a5b113357a65b\r\n http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-js-debugger_1.7.13-0ubuntu5.10.1_amd64.deb\r\n Size/MD5: 204154 9e2f774e0c8b0bc75f60899b9ea518dd\r\n http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-mailnews_1.7.13-0ubuntu5.10.1_amd64.deb\r\n Size/MD5: 1962852 1baa399dd55eaccda81c2f707f225817\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/mozilla-psm_1.7.13-0ubuntu5.10.1_amd64.deb\r\n Size/MD5: 204202 e6f84c6501268f8cd8680d55ca8bc673\r\n http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla_1.7.13-0ubuntu5.10.1_amd64.deb\r\n Size/MD5: 1032 875ac9a3fccb0f396f537560047ca9e6\r\n\r\n i386 architecture (x86 compatible Intel/AMD)\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/libnspr-dev_1.7.13-0ubuntu5.10.1_i386.deb\r\n Size/MD5: 168048 257bbb4473be7bdfff3ded89b9d8a12b\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/libnspr4_1.7.13-0ubuntu5.10.1_i386.deb\r\n Size/MD5: 129200 eda6af1ceb30b9594442702ad99152ed\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/libnss-dev_1.7.13-0ubuntu5.10.1_i386.deb\r\n Size/MD5: 184932 f05d44d79b74e7887af887e6a9b09f1e\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/libnss3_1.7.13-0ubuntu5.10.1_i386.deb\r\n Size/MD5: 635378 a7808a9e8f431a16cc60baddc68b8139\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/mozilla-browser_1.7.13-0ubuntu5.10.1_i386.deb\r\n Size/MD5: 9185932 85d2251d70e3488a0cc388e0db41a4fc\r\n http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-calendar_1.7.13-0ubuntu5.10.1_i386.deb\r\n Size/MD5: 403280 7034e103d8a30f986ec57fe31160e487\r\n http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-chatzilla_1.7.13-0ubuntu5.10.1_i386.deb\r\n Size/MD5: 158324 a29a00a6e450d7d998d6e874987f10ba\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/mozilla-dev_1.7.13-0ubuntu5.10.1_i386.deb\r\n Size/MD5: 3337576 7094cd9a4464d4645d92489c371c6cab\r\n http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-dom-inspector_1.7.13-0ubuntu5.10.1_i386.deb\r\n Size/MD5: 115304 87dd3fb83b695986dda9ddeaedf47781\r\n http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-js-debugger_1.7.13-0ubuntu5.10.1_i386.deb\r\n Size/MD5: 204152 09352de0004e77e96ca17cb21d0715e3\r\n http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-mailnews_1.7.13-0ubuntu5.10.1_i386.deb\r\n Size/MD5: 1691482 6df8075f514d49d7f5411891bbc0e7f5\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/mozilla-psm_1.7.13-0ubuntu5.10.1_i386.deb\r\n Size/MD5: 178782 d2d5d1aa46de77fb2b54ec98ef3a7a14\r\n http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla_1.7.13-0ubuntu5.10.1_i386.deb\r\n Size/MD5: 1032 a3f4871c955138dd6d6e759ea114e4c8\r\n\r\n powerpc architecture (Apple Macintosh G3/G4/G5)\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/libnspr-dev_1.7.13-0ubuntu5.10.1_powerpc.deb\r\n Size/MD5: 168048 852ade578c01f279b8aff0a794a268a3\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/libnspr4_1.7.13-0ubuntu5.10.1_powerpc.deb\r\n Size/MD5: 130906 df3dd2deffe59449bf2442cf00f6689e\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/libnss-dev_1.7.13-0ubuntu5.10.1_powerpc.deb\r\n Size/MD5: 184932 4e6345c82ae5563193e1b5b201ef3043\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/libnss3_1.7.13-0ubuntu5.10.1_powerpc.deb\r\n Size/MD5: 696888 902ed7ec1cf327ea9931948f756d60e6\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/mozilla-browser_1.7.13-0ubuntu5.10.1_powerpc.deb\r\n Size/MD5: 9263244 87d38e3da8f8e9174e87552155add753\r\n http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-calendar_1.7.13-0ubuntu5.10.1_powerpc.deb\r\n Size/MD5: 403284 3a37460373177133ba2c687501b574a1\r\n http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-chatzilla_1.7.13-0ubuntu5.10.1_powerpc.deb\r\n Size/MD5: 158326 092102dfb58bfe5ea20ff0969f7f56f2\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/mozilla-dev_1.7.13-0ubuntu5.10.1_powerpc.deb\r\n Size/MD5: 3336540 8f37d1620049b2fefc1b651fd51c43b7\r\n http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-dom-inspector_1.7.13-0ubuntu5.10.1_powerpc.deb\r\n Size/MD5: 115348 bef4e6c32a92c26fa06395801657e367\r\n http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-js-debugger_1.7.13-0ubuntu5.10.1_powerpc.deb\r\n Size/MD5: 204158 60731a37272e50a8660ecb2cfae9aabf\r\n http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-mailnews_1.7.13-0ubuntu5.10.1_powerpc.deb\r\n Size/MD5: 1671422 3b3f3bedfbba4263f26773d93436e769\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/mozilla-psm_1.7.13-0ubuntu5.10.1_powerpc.deb\r\n Size/MD5: 175906 c6b918fa89cd2423d47b018f279c4d68\r\n http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla_1.7.13-0ubuntu5.10.1_powerpc.deb\r\n Size/MD5: 1032 cc69d04f87b79ff659067186cab9cfd9\r\n\r\n sparc architecture (Sun SPARC/UltraSPARC)\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/libnspr-dev_1.7.13-0ubuntu5.10.1_sparc.deb\r\n Size/MD5: 168054 0d954bebca6ea4131c28e11337bba7ad\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/libnspr4_1.7.13-0ubuntu5.10.1_sparc.deb\r\n Size/MD5: 127450 521963b1b21999ff9f42d35b884c23ed\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/libnss-dev_1.7.13-0ubuntu5.10.1_sparc.deb\r\n Size/MD5: 184948 74d53204904bf8bf02928f6cb0b3e787\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/libnss3_1.7.13-0ubuntu5.10.1_sparc.deb\r\n Size/MD5: 630704 0987af2fe353aff94cefddc61ac1c8e6\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/mozilla-browser_1.7.13-0ubuntu5.10.1_sparc.deb\r\n Size/MD5: 9013886 08e90ea95c75c3eb03d8533532314fdb\r\n http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-calendar_1.7.13-0ubuntu5.10.1_sparc.deb\r\n Size/MD5: 403286 f5a6f817c9926829a4012da7973b3fcc\r\n http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-chatzilla_1.7.13-0ubuntu5.10.1_sparc.deb\r\n Size/MD5: 158328 2b884313c4bd382d1609d01568b7013e\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/mozilla-dev_1.7.13-0ubuntu5.10.1_sparc.deb\r\n Size/MD5: 3336286 f1a166252e7c78d5d90a7ef91b7b6eb0\r\n http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-dom-inspector_1.7.13-0ubuntu5.10.1_sparc.deb\r\n Size/MD5: 113834 8df1183b10a5d69c1087634f81178a41\r\n http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-js-debugger_1.7.13-0ubuntu5.10.1_sparc.deb\r\n Size/MD5: 204152 e0177e963461936592387a9e6d5171bd\r\n http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla-mailnews_1.7.13-0ubuntu5.10.1_sparc.deb\r\n Size/MD5: 1629816 a02204343afa9a872f99f63e85170096\r\n http://security.ubuntu.com/ubuntu/pool/main/m/mozilla/mozilla-psm_1.7.13-0ubuntu5.10.1_sparc.deb\r\n Size/MD5: 170382 010d945bfd8636541e8202c036668e18\r\n http://security.ubuntu.com/ubuntu/pool/universe/m/mozilla/mozilla_1.7.13-0ubuntu5.10.1_sparc.deb\r\n Size/MD5: 1032 5d9b7b8e12b9746c44fd3fd41dec9f13", "edition": 1, "modified": "2006-07-27T00:00:00", "published": "2006-07-27T00:00:00", "id": "SECURITYVULNS:DOC:13644", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:13644", "title": "[USN-323-1] mozilla vulnerabilities", "type": "securityvulns", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "cve": [{"lastseen": "2020-10-03T11:48:16", "description": "Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 does not properly clear a JavaScript reference to a frame or window, which leaves a pointer to a deleted object that allows remote attackers to execute arbitrary native code.", "edition": 3, "cvss3": {}, "published": "2006-07-27T20:04:00", "title": "CVE-2006-3801", "type": "cve", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": true}, "cvelist": ["CVE-2006-3801"], "modified": "2018-10-17T21:30:00", "cpe": ["cpe:/a:mozilla:firefox:1.5.0.3", "cpe:/a:mozilla:firefox:1.5.0.2", "cpe:/a:mozilla:seamonkey:1.0.2", "cpe:/a:mozilla:seamonkey:1.0", "cpe:/a:mozilla:firefox:1.5.0.1", "cpe:/a:mozilla:firefox:1.5.0.4", "cpe:/a:mozilla:firefox:1.5", "cpe:/a:mozilla:seamonkey:1.0.1"], "id": "CVE-2006-3801", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-3801", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0:*:dev:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*"]}, {"lastseen": "2020-10-03T11:48:16", "description": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to hijack native DOM methods from objects in another domain and conduct cross-site scripting (XSS) attacks using DOM methods of the top-level object.", "edition": 3, "cvss3": {}, "published": "2006-07-27T20:04:00", "title": "CVE-2006-3802", "type": "cve", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2006-3802"], "modified": "2018-10-17T21:30:00", "cpe": ["cpe:/a:mozilla:firefox:1.5.0.3", "cpe:/a:mozilla:firefox:1.5.0.2", "cpe:/a:mozilla:seamonkey:1.0.2", "cpe:/a:mozilla:seamonkey:1.0", "cpe:/a:mozilla:firefox:1.5.0.1", "cpe:/a:mozilla:thunderbird:1.5.0.2", "cpe:/a:mozilla:thunderbird:1.5.0.4", "cpe:/a:mozilla:firefox:1.5.0.4", "cpe:/a:mozilla:firefox:1.5", "cpe:/a:mozilla:thunderbird:1.5", "cpe:/a:mozilla:seamonkey:1.0.1"], "id": "CVE-2006-3802", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-3802", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}, "cpe23": ["cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0:*:dev:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*"]}, {"lastseen": "2020-10-03T11:48:16", "description": "Race condition in the JavaScript garbage collection in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code by causing the garbage collector to delete a temporary variable while it is still being used during the creation of a new Function object.", "edition": 3, "cvss3": {}, "published": "2006-07-27T19:04:00", "title": "CVE-2006-3803", "type": "cve", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 4.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "HIGH", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 5.1, "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": true}, "cvelist": ["CVE-2006-3803"], "modified": "2018-10-17T21:30:00", "cpe": ["cpe:/a:mozilla:firefox:1.5.0.3", "cpe:/a:mozilla:firefox:1.5.0.2", "cpe:/a:mozilla:seamonkey:1.0.2", "cpe:/a:mozilla:seamonkey:1.0", "cpe:/a:mozilla:firefox:1.5.0.1", "cpe:/a:mozilla:thunderbird:1.5.0.2", "cpe:/a:mozilla:thunderbird:1.5.0.4", "cpe:/a:mozilla:firefox:1.5.0.4", "cpe:/a:mozilla:firefox:1.5", "cpe:/a:mozilla:thunderbird:1.5", "cpe:/a:mozilla:seamonkey:1.0.1"], "id": "CVE-2006-3803", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-3803", "cvss": {"score": 5.1, "vector": "AV:N/AC:H/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0:*:dev:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*"]}, {"lastseen": "2020-10-03T11:48:16", "description": "Mozilla Firefox before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote Proxy AutoConfig (PAC) servers to execute code with elevated privileges via a PAC script that sets the FindProxyForURL function to an eval method on a privileged object.", "edition": 3, "cvss3": {}, "published": "2006-07-27T20:04:00", "title": "CVE-2006-3808", "type": "cve", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": true}, "cvelist": ["CVE-2006-3808"], "modified": "2018-10-17T21:31:00", "cpe": ["cpe:/a:mozilla:firefox:1.5.0.3", "cpe:/a:mozilla:firefox:1.5.0.2", "cpe:/a:mozilla:seamonkey:1.0.2", "cpe:/a:mozilla:seamonkey:1.0", "cpe:/a:mozilla:firefox:1.5.0.1", "cpe:/a:mozilla:firefox:1.5.0.4", "cpe:/a:mozilla:firefox:1.5", "cpe:/a:mozilla:seamonkey:1.0.1"], "id": "CVE-2006-3808", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-3808", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0:*:dev:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*"]}, {"lastseen": "2020-10-03T11:48:16", "description": "Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code by changing certain properties of the window navigator object (window.navigator) that are accessed when Java starts up, which causes a crash that leads to code execution.", "edition": 3, "cvss3": {}, "published": "2006-07-27T19:04:00", "title": "CVE-2006-3677", "type": "cve", "cwe": ["CWE-16"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": true}, "cvelist": ["CVE-2006-3677"], "modified": "2018-10-18T16:48:00", "cpe": ["cpe:/a:mozilla:firefox:1.5.0.3", "cpe:/a:mozilla:firefox:1.5.0.2", "cpe:/a:mozilla:seamonkey:1.0.2", "cpe:/a:mozilla:seamonkey:1.0", "cpe:/a:mozilla:firefox:1.5.0.1", "cpe:/a:mozilla:firefox:1.5.0.4", "cpe:/a:mozilla:firefox:1.5", "cpe:/a:mozilla:seamonkey:1.0.1"], "id": "CVE-2006-3677", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-3677", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0:*:dev:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*"]}]}