ID SECURITYVULNS:DOC:22697 Type securityvulns Reporter Securityvulns Modified 2009-10-28T00:00:00
Description
Mozilla Foundation Security Advisory 2009-54
Title: Crash with recursive web-worker calls
Impact: Critical
Announced: October 27, 2009
Reporter: Orlando Berrera
Products: Firefox 3.5
Fixed in: Firefox 3.5.4
Description
Security researcher Orlando Berrera of Sec Theory reported that recursive creation of JavaScript web-workers can be used to create a set of objects whose memory could be freed prior to their use. These conditions often result in a crash which could potentially be used by an attacker to run arbitrary code on a victim's computer.
Web Workers were introduced in Firefox 3.5 so this vulnerability did not affect earlier releases such as Firefox 3.
References
{"id": "SECURITYVULNS:DOC:22697", "bulletinFamily": "software", "title": "Mozilla Foundation Security Advisory 2009-54", "description": "Mozilla Foundation Security Advisory 2009-54\r\n\r\nTitle: Crash with recursive web-worker calls\r\nImpact: Critical\r\nAnnounced: October 27, 2009\r\nReporter: Orlando Berrera\r\nProducts: Firefox 3.5\r\n\r\nFixed in: Firefox 3.5.4\r\nDescription\r\n\r\nSecurity researcher Orlando Berrera of Sec Theory reported that recursive creation of JavaScript web-workers can be used to create a set of objects whose memory could be freed prior to their use. These conditions often result in a crash which could potentially be used by an attacker to run arbitrary code on a victim's computer.\r\n\r\nWeb Workers were introduced in Firefox 3.5 so this vulnerability did not affect earlier releases such as Firefox 3.\r\nReferences\r\n\r\n * https://bugzilla.mozilla.org/show_bug.cgi?id=514554\r\n * CVE-2009-3371\r\n", "published": "2009-10-28T00:00:00", "modified": "2009-10-28T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:22697", "reporter": "Securityvulns", "references": [], "cvelist": ["CVE-2009-3371"], "type": "securityvulns", "lastseen": "2018-08-31T11:10:32", "edition": 1, "viewCount": 1, "enchantments": {"score": {"value": 7.8, "vector": "NONE", "modified": "2018-08-31T11:10:32", "rev": 2}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2009-3371"]}, {"type": "seebug", "idList": ["SSV:12560"]}, {"type": "openvas", "idList": ["OPENVAS:66237", "OPENVAS:136141256231066229", "OPENVAS:136141256231066228", "OPENVAS:801133", "OPENVAS:66228", "OPENVAS:1361412562310801133", "OPENVAS:66229", "OPENVAS:1361412562310801132", "OPENVAS:801132", "OPENVAS:136141256231066237"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:VULN:10356"]}, {"type": "nessus", "idList": ["UBUNTU_USN-853-2.NASL", "SUSE_MOZILLA-XULRUNNER190-6617.NASL", "REDHAT-RHSA-2009-1530.NASL", "CENTOS_RHSA-2009-1530.NASL", "MANDRIVA_MDVSA-2009-294.NASL", "UBUNTU_USN-853-1.NASL", "SUSE_11_0_MOZILLAFIREFOX-091103.NASL", "SUSE_MOZILLAFIREFOX-6609.NASL", "ORACLELINUX_ELSA-2009-1530.NASL", "SUSE_MOZILLA-XULRUNNER190-6616.NASL"]}, {"type": "ubuntu", "idList": ["USN-853-2", "USN-853-1"]}, {"type": "suse", "idList": ["SUSE-SA:2009:052"]}, {"type": "freebsd", "idList": ["C87AA2D2-C3C4-11DE-AB08-000F20797EDE"]}, {"type": "gentoo", "idList": ["GLSA-201301-01"]}], "modified": "2018-08-31T11:10:32", "rev": 2}, "vulnersScore": 7.8}, "affectedSoftware": []}
{"cve": [{"lastseen": "2021-02-02T05:40:05", "description": "Use-after-free vulnerability in Mozilla Firefox 3.5.x before 3.5.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code by creating JavaScript web-workers recursively.", "edition": 4, "cvss3": {}, "published": "2009-10-29T14:30:00", "title": "CVE-2009-3371", "type": "cve", "cwe": ["CWE-399"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2009-3371"], "modified": "2017-09-19T01:29:00", "cpe": ["cpe:/a:mozilla:firefox:3.5.3", "cpe:/a:mozilla:firefox:3.5.1", "cpe:/a:mozilla:firefox:3.5.4", "cpe:/a:mozilla:firefox:3.5.2"], "id": "CVE-2009-3371", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-3371", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:mozilla:firefox:3.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5.2:*:*:*:*:*:*:*"]}], "seebug": [{"lastseen": "2017-11-19T18:32:45", "description": "BUGTRAQ ID: 36854\r\nCVE(CAN) ID: CVE-2009-3371\r\n\r\nFirefox\u662f\u4e00\u6b3e\u6d41\u884c\u7684\u5f00\u6e90WEB\u6d4f\u89c8\u5668\u3002\r\n\r\nFirefox\u9012\u5f52\u5730\u521b\u5efaJavaScript web-worker\u53ef\u80fd\u4f1a\u521b\u5efa\u89e6\u53d1\u91ca\u653e\u540e\u4f7f\u7528\u7684\u5bf9\u8c61\u96c6\uff0c\u7528\u6237\u6253\u5f00\u6076\u610f\u7f51\u9875\u5c31\u53ef\u80fd\u5bfc\u81f4\u6d4f\u89c8\u5668\u5d29\u6e83\u6216\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002\n\nMozilla Firefox 3.5.x\n\u5382\u5546\u8865\u4e01\uff1a\r\n\r\nMozilla\r\n-------\r\n\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u8fd9\u4e2a\u5b89\u5168\u95ee\u9898\uff0c\u8bf7\u5230\u5382\u5546\u7684\u4e3b\u9875\u4e0b\u8f7d\uff1a\r\n\r\nhttp://www.mozilla.org/", "published": "2009-11-03T00:00:00", "title": "Firefox JavaScript Web-Worker\u8c03\u7528\u91ca\u653e\u540e\u4f7f\u7528\u6f0f\u6d1e", "type": "seebug", "bulletinFamily": "exploit", "cvelist": ["CVE-2009-3371"], "modified": "2009-11-03T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-12560", "id": "SSV:12560", "sourceData": "\n https://bugzilla.mozilla.org/attachment.cgi?id=398496\n ", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "sourceHref": "https://www.seebug.org/vuldb/ssvid-12560"}], "openvas": [{"lastseen": "2017-07-02T21:14:11", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-3379", "CVE-2009-3383", "CVE-2009-3371", "CVE-2009-3377", "CVE-2009-3381", "CVE-2009-3378"], "description": "This host is installed with Mozilla Firefox and is prone to multiple\n memory vorruption vulnerabilities.", "modified": "2016-12-28T00:00:00", "published": "2009-11-02T00:00:00", "id": "OPENVAS:801133", "href": "http://plugins.openvas.org/nasl.php?oid=801133", "type": "openvas", "title": "Mozilla Firefox Multiple Memory Corruption Vulnerabilities Nov-09 (Linux)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_firefox_mult_mem_crptn_vuln_nov09_lin.nasl 4865 2016-12-28 16:16:43Z teissa $\n#\n# Mozilla Firefox Multiple Memory Corruption Vulnerabilities Nov-09 (Linux)\n#\n# Authors:\n# Sharath S <sharaths@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_impact = \"Successful exploitation will let attacker to cause Denial of Service or\n memory corrption on the user's system.\n Impact Level: Application/System\";\ntag_affected = \"Firefox version 3.5 before 3.5.4 on Linux.\";\ntag_insight = \"- An error exists when creating JavaScript web-workers recursively that can\n be exploited to trigger the use of freed memory.\n - An error in the embedded 'liboggz' or 'libvorbis' library that can be\n exploited to cause a crash.\n - An error exists in the 'oggplay_data_handle_theora_frame' function in\n media/liboggplay/src/liboggplay/oggplay_data.c in 'liboggplay' library that\n can be exploited to cause a crash.\";\ntag_solution = \"Upgrade to Firefox version 3.5.4\n http://www.mozilla.com/en-US/firefox/all.html\";\ntag_summary = \"This host is installed with Mozilla Firefox and is prone to multiple\n memory vorruption vulnerabilities.\";\n\nif(description)\n{\n script_id(801133);\n script_version(\"$Revision: 4865 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2016-12-28 17:16:43 +0100 (Wed, 28 Dec 2016) $\");\n script_tag(name:\"creation_date\", value:\"2009-11-02 14:39:30 +0100 (Mon, 02 Nov 2009)\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_cve_id(\"CVE-2009-3371\", \"CVE-2009-3377\", \"CVE-2009-3378\",\n \"CVE-2009-3379\", \"CVE-2009-3381\", \"CVE-2009-3383\");\n script_bugtraq_id(36854, 36872, 36873, 36875, 36870, 36869);\n script_name(\"Mozilla Firefox Multiple Memory Corruption Vulnerabilities Nov-09 (Linux)\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2009/mfsa2009-54.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2009/mfsa2009-63.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2009/mfsa2009-64.html\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Denial of Service\");\n script_dependencies(\"gb_firefox_detect_lin.nasl\");\n script_require_keys(\"Firefox/Linux/Ver\");\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\nffVer = get_kb_item(\"Firefox/Linux/Ver\");\nif(!ffVer){\n exit(0);\n}\n\n# Check for Firefox version 3.5 < 3.5.4\nif(version_in_range(version:ffVer, test_version:\"3.5\", test_version2:\"3.5.3\")) {\n security_message(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2020-04-29T22:26:38", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-3379", "CVE-2009-3383", "CVE-2009-3371", "CVE-2009-3377", "CVE-2009-3381", "CVE-2009-3378"], "description": "This host is installed with Mozilla Firefox and is prone to multiple\n memory vorruption vulnerabilities.", "modified": "2020-04-27T00:00:00", "published": "2009-11-02T00:00:00", "id": "OPENVAS:1361412562310801133", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310801133", "type": "openvas", "title": "Mozilla Firefox Multiple Memory Corruption Vulnerabilities Nov-09 (Linux)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mozilla Firefox Multiple Memory Corruption Vulnerabilities Nov-09 (Linux)\n#\n# Authors:\n# Sharath S <sharaths@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.801133\");\n script_version(\"2020-04-27T09:00:11+0000\");\n script_tag(name:\"last_modification\", value:\"2020-04-27 09:00:11 +0000 (Mon, 27 Apr 2020)\");\n script_tag(name:\"creation_date\", value:\"2009-11-02 14:39:30 +0100 (Mon, 02 Nov 2009)\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_cve_id(\"CVE-2009-3371\", \"CVE-2009-3377\", \"CVE-2009-3378\",\n \"CVE-2009-3379\", \"CVE-2009-3381\", \"CVE-2009-3383\");\n script_bugtraq_id(36854, 36872, 36873, 36875, 36870, 36869);\n script_name(\"Mozilla Firefox Multiple Memory Corruption Vulnerabilities Nov-09 (Linux)\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2009/mfsa2009-54.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2009/mfsa2009-63.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2009/mfsa2009-64.html\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Denial of Service\");\n script_dependencies(\"gb_firefox_detect_lin.nasl\");\n script_mandatory_keys(\"Firefox/Linux/Ver\");\n script_tag(name:\"impact\", value:\"Successful exploitation will let attacker to cause Denial of Service or\n memory corrption on the user's system.\");\n script_tag(name:\"affected\", value:\"Firefox version 3.5 before 3.5.4 on Linux.\");\n script_tag(name:\"insight\", value:\"- An error exists when creating JavaScript web-workers recursively that can\n be exploited to trigger the use of freed memory.\n\n - An error in the embedded 'liboggz' or 'libvorbis' library that can be\n exploited to cause a crash.\n\n - An error exists in the 'oggplay_data_handle_theora_frame' function in\n media/liboggplay/src/liboggplay/oggplay_data.c in 'liboggplay' library that\n can be exploited to cause a crash.\");\n script_tag(name:\"solution\", value:\"Upgrade to Firefox version 3.5.4.\");\n script_tag(name:\"summary\", value:\"This host is installed with Mozilla Firefox and is prone to multiple\n memory vorruption vulnerabilities.\");\n script_tag(name:\"qod_type\", value:\"executable_version_unreliable\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\ninclude(\"version_func.inc\");\n\nffVer = get_kb_item(\"Firefox/Linux/Ver\");\nif(!ffVer)\n exit(0);\n\nif(version_in_range(version:ffVer, test_version:\"3.5\", test_version2:\"3.5.3\")) {\n report = report_fixed_ver(installed_version:ffVer, vulnerable_range:\"3.5 - 3.5.3\");\n security_message(port: 0, data: report);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-04-29T22:26:30", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-3379", "CVE-2009-3383", "CVE-2009-3371", "CVE-2009-3377", "CVE-2009-3381", "CVE-2009-3378"], "description": "This host is installed with Mozilla Firefox and is prone to multiple\n Memory Corruption vulnerabilities.", "modified": "2020-04-27T00:00:00", "published": "2009-11-02T00:00:00", "id": "OPENVAS:1361412562310801132", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310801132", "type": "openvas", "title": "Mozilla Firefox Multiple Memory Corruption Vulnerabilities Nov-09 (Windows)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mozilla Firefox Multiple Memory Corruption Vulnerabilities Nov-09 (Windows)\n#\n# Authors:\n# Sharath S <sharaths@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.801132\");\n script_version(\"2020-04-27T09:00:11+0000\");\n script_tag(name:\"last_modification\", value:\"2020-04-27 09:00:11 +0000 (Mon, 27 Apr 2020)\");\n script_tag(name:\"creation_date\", value:\"2009-11-02 14:39:30 +0100 (Mon, 02 Nov 2009)\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_cve_id(\"CVE-2009-3371\", \"CVE-2009-3377\", \"CVE-2009-3378\",\n \"CVE-2009-3379\", \"CVE-2009-3381\", \"CVE-2009-3383\");\n script_bugtraq_id(36854, 36872, 36873, 36875, 36870, 36869);\n script_name(\"Mozilla Firefox Multiple Memory Corruption Vulnerabilities Nov-09 (Windows)\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2009/mfsa2009-54.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2009/mfsa2009-63.html\");\n script_xref(name:\"URL\", value:\"http://www.mozilla.org/security/announce/2009/mfsa2009-64.html\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Denial of Service\");\n script_dependencies(\"gb_firefox_detect_portable_win.nasl\");\n script_mandatory_keys(\"Firefox/Win/Ver\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will let attacker to cause Denial of Service or\n memory corrption on the user's system.\");\n\n script_tag(name:\"affected\", value:\"Firefox version 3.5 before 3.5.4 on Windows.\");\n\n script_tag(name:\"insight\", value:\"- An error exists when creating JavaScript web-workers recursively that can\n be exploited to trigger the use of freed memory.\n\n - An error in the embedded 'liboggz' or 'libvorbis' library that can be\n exploited to cause a crash.\n\n - An error exists in the 'oggplay_data_handle_theora_frame' function in\n media/liboggplay/src/liboggplay/oggplay_data.c in 'liboggplay' library that\n can be exploited to cause a crash.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Firefox version 3.5.4.\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Mozilla Firefox and is prone to multiple\n Memory Corruption vulnerabilities.\");\n\n script_tag(name:\"qod_type\", value:\"registry\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"version_func.inc\");\n\nffVer = get_kb_item(\"Firefox/Win/Ver\");\nif(!ffVer){\n exit(0);\n}\n\nif(version_in_range(version:ffVer, test_version:\"3.5\", test_version2:\"3.5.3\")) {\n report = report_fixed_ver(installed_version:ffVer, vulnerable_range:\"3.5 - 3.5.3\");\n security_message(port: 0, data: report);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2017-07-02T21:14:01", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-3379", "CVE-2009-3383", "CVE-2009-3371", "CVE-2009-3377", "CVE-2009-3381", "CVE-2009-3378"], "description": "This host is installed with Mozilla Firefox and is prone to multiple\n Memory Corruption vulnerabilities.", "modified": "2016-12-28T00:00:00", "published": "2009-11-02T00:00:00", "id": "OPENVAS:801132", "href": "http://plugins.openvas.org/nasl.php?oid=801132", "type": "openvas", "title": "Mozilla Firefox Multiple Memory Corruption Vulnerabilities Nov-09 (Windows)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_firefox_mult_mem_crptn_vuln_nov09_win.nasl 4865 2016-12-28 16:16:43Z teissa $\n#\n# Mozilla Firefox Multiple Memory Corruption Vulnerabilities Nov-09 (Windows)\n#\n# Authors:\n# Sharath S <sharaths@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_impact = \"Successful exploitation will let attacker to cause Denial of Service or\n memory corrption on the user's system.\n Impact Level: Application/System\";\ntag_affected = \"Firefox version 3.5 before 3.5.4 on Windows.\";\ntag_insight = \"- An error exists when creating JavaScript web-workers recursively that can\n be exploited to trigger the use of freed memory.\n - An error in the embedded 'liboggz' or 'libvorbis' library that can be\n exploited to cause a crash.\n - An error exists in the 'oggplay_data_handle_theora_frame' function in\n media/liboggplay/src/liboggplay/oggplay_data.c in 'liboggplay' library that\n can be exploited to cause a crash.\";\ntag_solution = \"Upgrade to Firefox version 3.5.4\n http://www.mozilla.com/en-US/firefox/all.html\";\ntag_summary = \"This host is installed with Mozilla Firefox and is prone to multiple\n Memory Corruption vulnerabilities.\";\n\nif(description)\n{\n script_id(801132);\n script_version(\"$Revision: 4865 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2016-12-28 17:16:43 +0100 (Wed, 28 Dec 2016) $\");\n script_tag(name:\"creation_date\", value:\"2009-11-02 14:39:30 +0100 (Mon, 02 Nov 2009)\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_cve_id(\"CVE-2009-3371\", \"CVE-2009-3377\", \"CVE-2009-3378\",\n \"CVE-2009-3379\", \"CVE-2009-3381\", \"CVE-2009-3383\");\n script_bugtraq_id(36854, 36872, 36873, 36875, 36870, 36869);\n script_name(\"Mozilla Firefox Multiple Memory Corruption Vulnerabilities Nov-09 (Windows)\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2009/mfsa2009-54.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2009/mfsa2009-63.html\");\n script_xref(name : \"URL\" , value : \"http://www.mozilla.org/security/announce/2009/mfsa2009-64.html\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Denial of Service\");\n script_dependencies(\"gb_firefox_detect_win.nasl\");\n script_require_keys(\"Firefox/Win/Ver\");\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"registry\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\nffVer = get_kb_item(\"Firefox/Win/Ver\");\nif(!ffVer){\n exit(0);\n}\n\n# Check for Firefox version 3.5 < 3.5.4\nif(version_in_range(version:ffVer, test_version:\"3.5\", test_version2:\"3.5.3\")) {\n security_message(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-26T08:56:02", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-3376", "CVE-2009-3274", "CVE-2009-3380", "CVE-2009-3373", "CVE-2009-3383", "CVE-2009-3372", "CVE-2009-3375", "CVE-2009-0689", "CVE-2009-3374", "CVE-2009-3371", "CVE-2009-3382", "CVE-2009-3370", "CVE-2009-3381"], "description": "The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n mozilla-xulrunner190\n mozilla-xulrunner190-gnomevfs\n mozilla-xulrunner190-translations\n\n\nMore details may also be found by searching for the SuSE\nEnterprise Server 10 patch database located at\nhttp://download.novell.com/patch/finder/", "modified": "2017-07-11T00:00:00", "published": "2009-11-11T00:00:00", "id": "OPENVAS:66237", "href": "http://plugins.openvas.org/nasl.php?oid=66237", "type": "openvas", "title": "SLES10: Security update for Mozilla XULRunner", "sourceData": "#\n#VID slesp2-mozilla-xulrunner190-6616\n# OpenVAS Vulnerability Test\n# $\n# Description: Security update for Mozilla XULRunner\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_summary = \"The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n mozilla-xulrunner190\n mozilla-xulrunner190-gnomevfs\n mozilla-xulrunner190-translations\n\n\nMore details may also be found by searching for the SuSE\nEnterprise Server 10 patch database located at\nhttp://download.novell.com/patch/finder/\";\n\ntag_solution = \"Please install the updates provided by SuSE.\";\n\nif(description)\n{\n script_id(66237);\n script_version(\"$Revision: 6666 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-11 15:13:36 +0200 (Tue, 11 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-11-11 15:56:44 +0100 (Wed, 11 Nov 2009)\");\n script_cve_id(\"CVE-2009-0689\", \"CVE-2009-3380\", \"CVE-2009-3274\", \"CVE-2009-3381\", \"CVE-2009-3382\", \"CVE-2009-3383\", \"CVE-2009-3371\", \"CVE-2009-3370\", \"CVE-2009-3373\", \"CVE-2009-3372\", \"CVE-2009-3375\", \"CVE-2009-3374\", \"CVE-2009-3376\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"SLES10: Security update for Mozilla XULRunner\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse_sles\", \"ssh/login/rpms\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"mozilla-xulrunner190\", rpm:\"mozilla-xulrunner190~1.9.0.15~0.4.1\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"mozilla-xulrunner190-gnomevfs\", rpm:\"mozilla-xulrunner190-gnomevfs~1.9.0.15~0.4.1\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"mozilla-xulrunner190-translations\", rpm:\"mozilla-xulrunner190-translations~1.9.0.15~0.4.1\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-26T08:55:36", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-3376", "CVE-2009-3274", "CVE-2009-3380", "CVE-2009-3373", "CVE-2009-3383", "CVE-2009-3372", "CVE-2009-3375", "CVE-2009-0689", "CVE-2009-3374", "CVE-2009-3371", "CVE-2009-3382", "CVE-2009-3370", "CVE-2009-3381"], "description": "The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n mozilla-xulrunner190\n mozilla-xulrunner190-gnomevfs\n mozilla-xulrunner190-translations\n\n\nMore details may also be found by searching for the SuSE\nEnterprise Server 11 patch database located at\nhttp://download.novell.com/patch/finder/", "modified": "2017-07-11T00:00:00", "published": "2009-11-11T00:00:00", "id": "OPENVAS:66229", "href": "http://plugins.openvas.org/nasl.php?oid=66229", "type": "openvas", "title": "SLES11: Security update for Mozilla XULRunner", "sourceData": "#\n#VID 04c6e38838a85fc92531b3e56904b052\n# OpenVAS Vulnerability Test\n# $\n# Description: Security update for Mozilla XULRunner\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_summary = \"The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n mozilla-xulrunner190\n mozilla-xulrunner190-gnomevfs\n mozilla-xulrunner190-translations\n\n\nMore details may also be found by searching for the SuSE\nEnterprise Server 11 patch database located at\nhttp://download.novell.com/patch/finder/\";\n\ntag_solution = \"Please install the updates provided by SuSE.\";\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://bugzilla.novell.com/show_bug.cgi?id=545277\");\n script_id(66229);\n script_version(\"$Revision: 6666 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-11 15:13:36 +0200 (Tue, 11 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-11-11 15:56:44 +0100 (Wed, 11 Nov 2009)\");\n script_cve_id(\"CVE-2009-0689\", \"CVE-2009-3380\", \"CVE-2009-3274\", \"CVE-2009-3381\", \"CVE-2009-3382\", \"CVE-2009-3383\", \"CVE-2009-3371\", \"CVE-2009-3370\", \"CVE-2009-3373\", \"CVE-2009-3372\", \"CVE-2009-3375\", \"CVE-2009-3374\", \"CVE-2009-3376\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"SLES11: Security update for Mozilla XULRunner\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse_sles\", \"ssh/login/rpms\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"mozilla-xulrunner190\", rpm:\"mozilla-xulrunner190~1.9.0.15~0.1.2\", rls:\"SLES11.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"mozilla-xulrunner190-gnomevfs\", rpm:\"mozilla-xulrunner190-gnomevfs~1.9.0.15~0.1.2\", rls:\"SLES11.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"mozilla-xulrunner190-translations\", rpm:\"mozilla-xulrunner190-translations~1.9.0.15~0.1.2\", rls:\"SLES11.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-04-06T11:39:45", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-3376", "CVE-2009-3274", "CVE-2009-3380", "CVE-2009-3373", "CVE-2009-3383", "CVE-2009-3372", "CVE-2009-3375", "CVE-2009-0689", "CVE-2009-3374", "CVE-2009-3371", "CVE-2009-3382", "CVE-2009-3370", "CVE-2009-3381"], "description": "The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n mozilla-xulrunner190\n mozilla-xulrunner190-gnomevfs\n mozilla-xulrunner190-translations\n\n\nMore details may also be found by searching for the SuSE\nEnterprise Server 10 patch database located at\nhttp://download.novell.com/patch/finder/", "modified": "2018-04-06T00:00:00", "published": "2009-11-11T00:00:00", "id": "OPENVAS:136141256231066237", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231066237", "type": "openvas", "title": "SLES10: Security update for Mozilla XULRunner", "sourceData": "#\n#VID slesp2-mozilla-xulrunner190-6616\n# OpenVAS Vulnerability Test\n# $\n# Description: Security update for Mozilla XULRunner\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_summary = \"The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n mozilla-xulrunner190\n mozilla-xulrunner190-gnomevfs\n mozilla-xulrunner190-translations\n\n\nMore details may also be found by searching for the SuSE\nEnterprise Server 10 patch database located at\nhttp://download.novell.com/patch/finder/\";\n\ntag_solution = \"Please install the updates provided by SuSE.\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.66237\");\n script_version(\"$Revision: 9350 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-11-11 15:56:44 +0100 (Wed, 11 Nov 2009)\");\n script_cve_id(\"CVE-2009-0689\", \"CVE-2009-3380\", \"CVE-2009-3274\", \"CVE-2009-3381\", \"CVE-2009-3382\", \"CVE-2009-3383\", \"CVE-2009-3371\", \"CVE-2009-3370\", \"CVE-2009-3373\", \"CVE-2009-3372\", \"CVE-2009-3375\", \"CVE-2009-3374\", \"CVE-2009-3376\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"SLES10: Security update for Mozilla XULRunner\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse_sles\", \"ssh/login/rpms\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"mozilla-xulrunner190\", rpm:\"mozilla-xulrunner190~1.9.0.15~0.4.1\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"mozilla-xulrunner190-gnomevfs\", rpm:\"mozilla-xulrunner190-gnomevfs~1.9.0.15~0.4.1\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"mozilla-xulrunner190-translations\", rpm:\"mozilla-xulrunner190-translations~1.9.0.15~0.4.1\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-04-06T11:38:25", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-3376", "CVE-2009-3274", "CVE-2009-3380", "CVE-2009-3373", "CVE-2009-3383", "CVE-2009-3372", "CVE-2009-3375", "CVE-2009-0689", "CVE-2009-3374", "CVE-2009-3371", "CVE-2009-3382", "CVE-2009-3370", "CVE-2009-3381"], "description": "The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n mozilla-xulrunner190\n mozilla-xulrunner190-gnomevfs\n mozilla-xulrunner190-translations\n\n\nMore details may also be found by searching for the SuSE\nEnterprise Server 11 patch database located at\nhttp://download.novell.com/patch/finder/", "modified": "2018-04-06T00:00:00", "published": "2009-11-11T00:00:00", "id": "OPENVAS:136141256231066229", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231066229", "type": "openvas", "title": "SLES11: Security update for Mozilla XULRunner", "sourceData": "#\n#VID 04c6e38838a85fc92531b3e56904b052\n# OpenVAS Vulnerability Test\n# $\n# Description: Security update for Mozilla XULRunner\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_summary = \"The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n mozilla-xulrunner190\n mozilla-xulrunner190-gnomevfs\n mozilla-xulrunner190-translations\n\n\nMore details may also be found by searching for the SuSE\nEnterprise Server 11 patch database located at\nhttp://download.novell.com/patch/finder/\";\n\ntag_solution = \"Please install the updates provided by SuSE.\";\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://bugzilla.novell.com/show_bug.cgi?id=545277\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.66229\");\n script_version(\"$Revision: 9350 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-11-11 15:56:44 +0100 (Wed, 11 Nov 2009)\");\n script_cve_id(\"CVE-2009-0689\", \"CVE-2009-3380\", \"CVE-2009-3274\", \"CVE-2009-3381\", \"CVE-2009-3382\", \"CVE-2009-3383\", \"CVE-2009-3371\", \"CVE-2009-3370\", \"CVE-2009-3373\", \"CVE-2009-3372\", \"CVE-2009-3375\", \"CVE-2009-3374\", \"CVE-2009-3376\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"SLES11: Security update for Mozilla XULRunner\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse_sles\", \"ssh/login/rpms\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"mozilla-xulrunner190\", rpm:\"mozilla-xulrunner190~1.9.0.15~0.1.2\", rls:\"SLES11.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"mozilla-xulrunner190-gnomevfs\", rpm:\"mozilla-xulrunner190-gnomevfs~1.9.0.15~0.1.2\", rls:\"SLES11.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"mozilla-xulrunner190-translations\", rpm:\"mozilla-xulrunner190-translations~1.9.0.15~0.1.2\", rls:\"SLES11.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-12-04T11:30:08", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-3376", "CVE-2009-3274", "CVE-2009-3380", "CVE-2009-3373", "CVE-2009-3383", "CVE-2009-3372", "CVE-2009-3375", "CVE-2009-0689", "CVE-2009-3374", "CVE-2009-3371", "CVE-2009-3377", "CVE-2009-3382", "CVE-2009-3370", "CVE-2009-3381"], "description": "The remote host is missing an update to xulrunner-1.9.1\nannounced via advisory USN-853-1.\n\nA number of security issues affecting xulrunner and Firefox\nhave been corrected. For details, please visit the referenced\nsecurity advisories.", "modified": "2017-12-01T00:00:00", "published": "2009-11-23T00:00:00", "id": "OPENVAS:66304", "href": "http://plugins.openvas.org/nasl.php?oid=66304", "type": "openvas", "title": "Ubuntu USN-853-1 (xulrunner-1.9.1)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: ubuntu_853_1.nasl 7969 2017-12-01 09:23:16Z santu $\n# $Id: ubuntu_853_1.nasl 7969 2017-12-01 09:23:16Z santu $\n# Description: Auto-generated from advisory USN-853-1 (xulrunner-1.9.1)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_solution = \"The problem can be corrected by upgrading your system to the\n following package versions:\n\nUbuntu 8.04 LTS:\n firefox-3.0 3.0.15+nobinonly-0ubuntu0.8.04.1\n xulrunner-1.9 1.9.0.15+nobinonly-0ubuntu0.8.04.1\n\nUbuntu 8.10:\n abrowser 3.0.15+nobinonly-0ubuntu0.8.10.1\n firefox-3.0 3.0.15+nobinonly-0ubuntu0.8.10.1\n xulrunner-1.9 1.9.0.15+nobinonly-0ubuntu0.8.10.1\n\nUbuntu 9.04:\n abrowser 3.0.15+nobinonly-0ubuntu0.9.04.1\n firefox-3.0 3.0.15+nobinonly-0ubuntu0.9.04.1\n xulrunner-1.9 1.9.0.15+nobinonly-0ubuntu0.9.04.1\n\nUbuntu 9.10:\n firefox-3.5 3.5.4+nobinonly-0ubuntu0.9.10.1\n xulrunner-1.9.1 1.9.1.4+nobinonly-0ubuntu0.9.10.1\n\nAfter a standard system upgrade you need to restart Firefox and any\napplications that use xulrunner, such as Epiphany, to effect the necessary\nchanges.\n\nhttps://secure1.securityspace.com/smysecure/catid.html?in=USN-853-1\";\n\ntag_summary = \"The remote host is missing an update to xulrunner-1.9.1\nannounced via advisory USN-853-1.\n\nA number of security issues affecting xulrunner and Firefox\nhave been corrected. For details, please visit the referenced\nsecurity advisories.\";\n\n \n\n\nif(description)\n{\n script_id(66304);\n script_version(\"$Revision: 7969 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-01 10:23:16 +0100 (Fri, 01 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-11-23 20:51:51 +0100 (Mon, 23 Nov 2009)\");\n script_cve_id(\"CVE-2009-0689\", \"CVE-2009-3380\", \"CVE-2009-3274\", \"CVE-2009-3381\", \"CVE-2009-3382\", \"CVE-2009-3383\", \"CVE-2009-3371\", \"CVE-2009-3370\", \"CVE-2009-3373\", \"CVE-2009-3372\", \"CVE-2009-3375\", \"CVE-2009-3374\", \"CVE-2009-3377\", \"CVE-2009-3376\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"Ubuntu USN-853-1 (xulrunner-1.9.1)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n script_xref(name: \"URL\" , value: \"http://www.ubuntu.com/usn/usn-853-1/\");\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\");\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"firefox-dev\", ver:\"3.0.15+nobinonly-0ubuntu0.8.04.1\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-gnome-support\", ver:\"3.0.15+nobinonly-0ubuntu0.8.04.1\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-granparadiso-dev\", ver:\"3.0.15+nobinonly-0ubuntu0.8.04.1\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-trunk-dev\", ver:\"3.0.15+nobinonly-0ubuntu0.8.04.1\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox\", ver:\"3.0.15+nobinonly-0ubuntu0.8.04.1\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-3.0-dom-inspector\", ver:\"3.0.15+nobinonly-0ubuntu0.8.04.1\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-3.0-venkman\", ver:\"3.0.15+nobinonly-0ubuntu0.8.04.1\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-dom-inspector\", ver:\"3.0.15+nobinonly-0ubuntu0.8.04.1\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-granparadiso-dom-inspector\", ver:\"3.0.15+nobinonly-0ubuntu0.8.04.1\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-granparadiso-gnome-support\", ver:\"3.0.15+nobinonly-0ubuntu0.8.04.1\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-granparadiso\", ver:\"3.0.15+nobinonly-0ubuntu0.8.04.1\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-libthai\", ver:\"3.0.15+nobinonly-0ubuntu0.8.04.1\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-trunk-dom-inspector\", ver:\"3.0.15+nobinonly-0ubuntu0.8.04.1\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-trunk-gnome-support\", ver:\"3.0.15+nobinonly-0ubuntu0.8.04.1\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-trunk-venkman\", ver:\"3.0.15+nobinonly-0ubuntu0.8.04.1\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-trunk\", ver:\"3.0.15+nobinonly-0ubuntu0.8.04.1\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"xulrunner-1.9-dom-inspector\", ver:\"1.9.0.15+nobinonly-0ubuntu0.8.04.1\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"xulrunner-1.9-venkman\", ver:\"1.9.0.15+nobinonly-0ubuntu0.8.04.1\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-3.0-dev\", ver:\"3.0.15+nobinonly-0ubuntu0.8.04.1\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-3.0-gnome-support\", ver:\"3.0.15+nobinonly-0ubuntu0.8.04.1\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-3.0\", ver:\"3.0.15+nobinonly-0ubuntu0.8.04.1\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"xulrunner-1.9-dev\", ver:\"1.9.0.15+nobinonly-0ubuntu0.8.04.1\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"xulrunner-1.9-gnome-support\", ver:\"1.9.0.15+nobinonly-0ubuntu0.8.04.1\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"xulrunner-1.9\", ver:\"1.9.0.15+nobinonly-0ubuntu0.8.04.1\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"abrowser\", ver:\"3.0.15+nobinonly-0ubuntu0.8.10.1\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-dev\", ver:\"3.0.15+nobinonly-0ubuntu0.8.10.1\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-gnome-support\", ver:\"3.0.15+nobinonly-0ubuntu0.8.10.1\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-granparadiso-dev\", ver:\"3.0.15+nobinonly-0ubuntu0.8.10.1\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-trunk-dev\", ver:\"3.0.15+nobinonly-0ubuntu0.8.10.1\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox\", ver:\"3.0.15+nobinonly-0ubuntu0.8.10.1\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-3.0-dom-inspector\", ver:\"3.0.15+nobinonly-0ubuntu0.8.10.1\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-3.0-venkman\", ver:\"3.0.15+nobinonly-0ubuntu0.8.10.1\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-dom-inspector\", ver:\"3.0.15+nobinonly-0ubuntu0.8.10.1\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-granparadiso-dom-inspector\", ver:\"3.0.15+nobinonly-0ubuntu0.8.10.1\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-granparadiso-gnome-support\", ver:\"3.0.15+nobinonly-0ubuntu0.8.10.1\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-granparadiso\", ver:\"3.0.15+nobinonly-0ubuntu0.8.10.1\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-libthai\", ver:\"3.0.15+nobinonly-0ubuntu0.8.10.1\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-trunk-dom-inspector\", ver:\"3.0.15+nobinonly-0ubuntu0.8.10.1\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-trunk-gnome-support\", ver:\"3.0.15+nobinonly-0ubuntu0.8.10.1\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-trunk-venkman\", ver:\"3.0.15+nobinonly-0ubuntu0.8.10.1\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-trunk\", ver:\"3.0.15+nobinonly-0ubuntu0.8.10.1\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"xulrunner-1.9-dom-inspector\", ver:\"1.9.0.15+nobinonly-0ubuntu0.8.10.1\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"xulrunner-1.9-venkman\", ver:\"1.9.0.15+nobinonly-0ubuntu0.8.10.1\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"abrowser-3.0-branding\", ver:\"3.0.15+nobinonly-0ubuntu0.8.10.1\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-3.0-branding\", ver:\"3.0.15+nobinonly-0ubuntu0.8.10.1\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-3.0-dev\", ver:\"3.0.15+nobinonly-0ubuntu0.8.10.1\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-3.0-gnome-support\", ver:\"3.0.15+nobinonly-0ubuntu0.8.10.1\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-3.0\", ver:\"3.0.15+nobinonly-0ubuntu0.8.10.1\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"xulrunner-1.9-dev\", ver:\"1.9.0.15+nobinonly-0ubuntu0.8.10.1\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"xulrunner-1.9-gnome-support\", ver:\"1.9.0.15+nobinonly-0ubuntu0.8.10.1\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"xulrunner-1.9\", ver:\"1.9.0.15+nobinonly-0ubuntu0.8.10.1\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"xulrunner-dev\", ver:\"1.9.0.15+nobinonly-0ubuntu0.8.10.1\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"abrowser\", ver:\"3.0.15+nobinonly-0ubuntu0.9.04.1\", rls:\"UBUNTU9.04\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-dev\", ver:\"3.0.15+nobinonly-0ubuntu0.9.04.1\", rls:\"UBUNTU9.04\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-gnome-support\", ver:\"3.0.15+nobinonly-0ubuntu0.9.04.1\", rls:\"UBUNTU9.04\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-granparadiso-dev\", ver:\"3.0.15+nobinonly-0ubuntu0.9.04.1\", rls:\"UBUNTU9.04\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-trunk-dev\", ver:\"3.0.15+nobinonly-0ubuntu0.9.04.1\", rls:\"UBUNTU9.04\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox\", ver:\"3.0.15+nobinonly-0ubuntu0.9.04.1\", rls:\"UBUNTU9.04\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-3.0-dom-inspector\", ver:\"3.0.15+nobinonly-0ubuntu0.9.04.1\", rls:\"UBUNTU9.04\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-3.0-venkman\", ver:\"3.0.15+nobinonly-0ubuntu0.9.04.1\", rls:\"UBUNTU9.04\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-dom-inspector\", ver:\"3.0.15+nobinonly-0ubuntu0.9.04.1\", rls:\"UBUNTU9.04\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-granparadiso-dom-inspector\", ver:\"3.0.15+nobinonly-0ubuntu0.9.04.1\", rls:\"UBUNTU9.04\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-granparadiso-gnome-support\", ver:\"3.0.15+nobinonly-0ubuntu0.9.04.1\", rls:\"UBUNTU9.04\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-granparadiso\", ver:\"3.0.15+nobinonly-0ubuntu0.9.04.1\", rls:\"UBUNTU9.04\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-libthai\", ver:\"3.0.15+nobinonly-0ubuntu0.9.04.1\", rls:\"UBUNTU9.04\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-trunk-dom-inspector\", ver:\"3.0.15+nobinonly-0ubuntu0.9.04.1\", rls:\"UBUNTU9.04\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-trunk-gnome-support\", ver:\"3.0.15+nobinonly-0ubuntu0.9.04.1\", rls:\"UBUNTU9.04\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-trunk-venkman\", ver:\"3.0.15+nobinonly-0ubuntu0.9.04.1\", rls:\"UBUNTU9.04\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-trunk\", ver:\"3.0.15+nobinonly-0ubuntu0.9.04.1\", rls:\"UBUNTU9.04\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"xulrunner-1.9-dom-inspector\", ver:\"1.9.0.15+nobinonly-0ubuntu0.9.04.1\", rls:\"UBUNTU9.04\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"xulrunner-1.9-venkman\", ver:\"1.9.0.15+nobinonly-0ubuntu0.9.04.1\", rls:\"UBUNTU9.04\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"abrowser-3.0-branding\", ver:\"3.0.15+nobinonly-0ubuntu0.9.04.1\", rls:\"UBUNTU9.04\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-3.0-branding\", ver:\"3.0.15+nobinonly-0ubuntu0.9.04.1\", rls:\"UBUNTU9.04\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-3.0-dev\", ver:\"3.0.15+nobinonly-0ubuntu0.9.04.1\", rls:\"UBUNTU9.04\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-3.0-gnome-support\", ver:\"3.0.15+nobinonly-0ubuntu0.9.04.1\", rls:\"UBUNTU9.04\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-3.0\", ver:\"3.0.15+nobinonly-0ubuntu0.9.04.1\", rls:\"UBUNTU9.04\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"xulrunner-1.9-dev\", ver:\"1.9.0.15+nobinonly-0ubuntu0.9.04.1\", rls:\"UBUNTU9.04\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"xulrunner-1.9-gnome-support\", ver:\"1.9.0.15+nobinonly-0ubuntu0.9.04.1\", rls:\"UBUNTU9.04\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"xulrunner-1.9\", ver:\"1.9.0.15+nobinonly-0ubuntu0.9.04.1\", rls:\"UBUNTU9.04\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"xulrunner-dev\", ver:\"1.9.0.15+nobinonly-0ubuntu0.9.04.1\", rls:\"UBUNTU9.04\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"abrowser\", ver:\"3.5.4+nobinonly-0ubuntu0.9.10.1\", rls:\"UBUNTU9.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-3.0-dev\", ver:\"3.5.4+nobinonly-0ubuntu0.9.10.1\", rls:\"UBUNTU9.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-3.1-dbg\", ver:\"3.5.4+nobinonly-0ubuntu0.9.10.1\", rls:\"UBUNTU9.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-3.1-dev\", ver:\"3.5.4+nobinonly-0ubuntu0.9.10.1\", rls:\"UBUNTU9.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-gnome-support\", ver:\"3.5.4+nobinonly-0ubuntu0.9.10.1\", rls:\"UBUNTU9.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox\", ver:\"3.5.4+nobinonly-0ubuntu0.9.10.1\", rls:\"UBUNTU9.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"abrowser-3.0-branding\", ver:\"3.5.4+nobinonly-0ubuntu0.9.10.1\", rls:\"UBUNTU9.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"abrowser-3.0\", ver:\"3.5.4+nobinonly-0ubuntu0.9.10.1\", rls:\"UBUNTU9.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"abrowser-3.1-branding\", ver:\"3.5.4+nobinonly-0ubuntu0.9.10.1\", rls:\"UBUNTU9.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"abrowser-3.1\", ver:\"3.5.4+nobinonly-0ubuntu0.9.10.1\", rls:\"UBUNTU9.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"abrowser-3.5\", ver:\"3.5.4+nobinonly-0ubuntu0.9.10.1\", rls:\"UBUNTU9.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-3.0-branding\", ver:\"3.5.4+nobinonly-0ubuntu0.9.10.1\", rls:\"UBUNTU9.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-3.0-dom-inspector\", ver:\"3.5.4+nobinonly-0ubuntu0.9.10.1\", rls:\"UBUNTU9.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-3.0-gnome-support\", ver:\"3.5.4+nobinonly-0ubuntu0.9.10.1\", rls:\"UBUNTU9.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-3.0-venkman\", ver:\"3.5.4+nobinonly-0ubuntu0.9.10.1\", rls:\"UBUNTU9.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-3.0\", ver:\"3.5.4+nobinonly-0ubuntu0.9.10.1\", rls:\"UBUNTU9.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-3.1-branding\", ver:\"3.5.4+nobinonly-0ubuntu0.9.10.1\", rls:\"UBUNTU9.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-3.1-gnome-support\", ver:\"3.5.4+nobinonly-0ubuntu0.9.10.1\", rls:\"UBUNTU9.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-3.1\", ver:\"3.5.4+nobinonly-0ubuntu0.9.10.1\", rls:\"UBUNTU9.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-dom-inspector\", ver:\"3.5.4+nobinonly-0ubuntu0.9.10.1\", rls:\"UBUNTU9.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"abrowser-3.5-branding\", ver:\"3.5.4+nobinonly-0ubuntu0.9.10.1\", rls:\"UBUNTU9.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-3.5-branding\", ver:\"3.5.4+nobinonly-0ubuntu0.9.10.1\", rls:\"UBUNTU9.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-3.5-dbg\", ver:\"3.5.4+nobinonly-0ubuntu0.9.10.1\", rls:\"UBUNTU9.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-3.5-dev\", ver:\"3.5.4+nobinonly-0ubuntu0.9.10.1\", rls:\"UBUNTU9.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-3.5-gnome-support\", ver:\"3.5.4+nobinonly-0ubuntu0.9.10.1\", rls:\"UBUNTU9.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"firefox-3.5\", ver:\"3.5.4+nobinonly-0ubuntu0.9.10.1\", rls:\"UBUNTU9.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"xulrunner-1.9.1-dbg\", ver:\"1.9.1.4+nobinonly-0ubuntu0.9.10.1\", rls:\"UBUNTU9.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"xulrunner-1.9.1-dev\", ver:\"1.9.1.4+nobinonly-0ubuntu0.9.10.1\", rls:\"UBUNTU9.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"xulrunner-1.9.1-gnome-support\", ver:\"1.9.1.4+nobinonly-0ubuntu0.9.10.1\", rls:\"UBUNTU9.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"xulrunner-1.9.1-testsuite-dev\", ver:\"1.9.1.4+nobinonly-0ubuntu0.9.10.1\", rls:\"UBUNTU9.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"xulrunner-1.9.1\", ver:\"1.9.1.4+nobinonly-0ubuntu0.9.10.1\", rls:\"UBUNTU9.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"xulrunner-dev\", ver:\"1.9.1.4+nobinonly-0ubuntu0.9.10.1\", rls:\"UBUNTU9.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"xulrunner-1.9.1-testsuite\", ver:\"1.9.1.4+nobinonly-0ubuntu0.9.10.1\", rls:\"UBUNTU9.10\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-02T21:13:48", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-3376", "CVE-2009-3379", "CVE-2009-3274", "CVE-2009-3380", "CVE-2009-3373", "CVE-2009-3383", "CVE-2009-3372", "CVE-2009-3375", "CVE-2009-0689", "CVE-2009-3374", "CVE-2009-3371", "CVE-2009-3377", "CVE-2009-3382", "CVE-2009-3370", "CVE-2009-3381", "CVE-2009-3378"], "description": "The remote host is missing an update to the system\nas announced in the referenced advisory.", "modified": "2016-12-21T00:00:00", "published": "2009-11-11T00:00:00", "id": "OPENVAS:66159", "href": "http://plugins.openvas.org/nasl.php?oid=66159", "type": "openvas", "title": "FreeBSD Ports: firefox", "sourceData": "#\n#VID c87aa2d2-c3c4-11de-ab08-000f20797ede\n# OpenVAS Vulnerability Test\n# $\n# Description: Auto generated from VID c87aa2d2-c3c4-11de-ab08-000f20797ede\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The following packages are affected:\n firefox\n linux-firefox\n seamonkey\n linux-seamonkey\n\nFor details on the issues addressed with this update,\nplease visit the referenced security advisories.\";\ntag_solution = \"Update your system with the appropriate patches or\nsoftware upgrades.\n\nhttp://www.mozilla.org/security/announce/2009/mfsa2009-64.html\nhttp://www.mozilla.org/security/announce/2009/mfsa2009-63.html\nhttp://www.mozilla.org/security/announce/2009/mfsa2009-62.html\nhttp://www.mozilla.org/security/announce/2009/mfsa2009-61.html\nhttp://www.mozilla.org/security/announce/2009/mfsa2009-59.html\nhttp://www.mozilla.org/security/announce/2009/mfsa2009-57.html\nhttp://www.mozilla.org/security/announce/2009/mfsa2009-56.html\nhttp://www.mozilla.org/security/announce/2009/mfsa2009-55.html\nhttp://www.mozilla.org/security/announce/2009/mfsa2009-54.html\nhttp://www.mozilla.org/security/announce/2009/mfsa2009-53.html\nhttp://www.mozilla.org/security/announce/2009/mfsa2009-52.html\nhttp://www.vuxml.org/freebsd/c87aa2d2-c3c4-11de-ab08-000f20797ede.html\";\ntag_summary = \"The remote host is missing an update to the system\nas announced in the referenced advisory.\";\n\n\n\nif(description)\n{\n script_id(66159);\n script_version(\"$Revision: 4824 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2016-12-21 09:49:38 +0100 (Wed, 21 Dec 2016) $\");\n script_tag(name:\"creation_date\", value:\"2009-11-11 15:56:44 +0100 (Wed, 11 Nov 2009)\");\n script_cve_id(\"CVE-2009-3370\", \"CVE-2009-0689\", \"CVE-2009-3379\", \"CVE-2009-3378\", \"CVE-2009-3380\", \"CVE-2009-3381\", \"CVE-2009-3382\", \"CVE-2009-3383\", \"CVE-2009-3371\", \"CVE-2009-3274\", \"CVE-2009-3373\", \"CVE-2009-3372\", \"CVE-2009-3375\", \"CVE-2009-3374\", \"CVE-2009-3377\", \"CVE-2009-3376\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"FreeBSD Ports: firefox\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"FreeBSD Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/freebsdrel\", \"login/SSH/success\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-bsd.inc\");\n\ntxt = \"\";\nvuln = 0;\nbver = portver(pkg:\"firefox\");\nif(!isnull(bver) && revcomp(a:bver, b:\"3.5.*,1\")>0 && revcomp(a:bver, b:\"3.5.4,1\")<0) {\n txt += 'Package firefox version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\nif(!isnull(bver) && revcomp(a:bver, b:\"3.*,1\")>0 && revcomp(a:bver, b:\"3.0.15,1\")<0) {\n txt += 'Package firefox version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\nbver = portver(pkg:\"linux-firefox\");\nif(!isnull(bver) && revcomp(a:bver, b:\"3.0.15\")<0) {\n txt += 'Package linux-firefox version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\nbver = portver(pkg:\"seamonkey\");\nif(!isnull(bver) && revcomp(a:bver, b:\"0\")>0) {\n txt += 'Package seamonkey version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\nbver = portver(pkg:\"linux-seamonkey\");\nif(!isnull(bver) && revcomp(a:bver, b:\"0\")>0) {\n txt += 'Package linux-seamonkey version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\n\nif(vuln) {\n security_message(data:string(txt));\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "ubuntu": [{"lastseen": "2020-07-09T01:40:13", "bulletinFamily": "unix", "cvelist": ["CVE-2009-1563", "CVE-2009-3376", "CVE-2009-3274", "CVE-2009-3380", "CVE-2009-3373", "CVE-2009-3383", "CVE-2009-3372", "CVE-2009-3375", "CVE-2009-3374", "CVE-2009-3371", "CVE-2009-3377", "CVE-2009-3382", "CVE-2009-3370", "CVE-2009-3381"], "description": "Alin Rad Pop discovered a heap-based buffer overflow in Firefox when it \nconverted strings to floating point numbers. If a user were tricked into \nviewing a malicious website, a remote attacker could cause a denial of service \nor possibly execute arbitrary code with the privileges of the user invoking the \nprogram. (CVE-2009-1563)\n\nJeremy Brown discovered that the Firefox Download Manager was vulnerable to \nsymlink attacks. A local attacker could exploit this to create or overwrite \nfiles with the privileges of the user invoking the program. (CVE-2009-3274)\n\nPaul Stone discovered a flaw in the Firefox form history. If a user were \ntricked into viewing a malicious website, a remote attacker could access this \ndata to steal confidential information. (CVE-2009-3370)\n\nOrlando Berrera discovered that Firefox did not properly free memory when using \nweb-workers. If a user were tricked into viewing a malicious website, a remote \nattacker could cause a denial of service or possibly execute arbitrary code \nwith the privileges of the user invoking the program. This issue only \naffected Ubuntu 9.10. (CVE-2009-3371)\n\nA flaw was discovered in the way Firefox processed Proxy Auto-configuration \n(PAC) files. If a user configured the browser to use PAC files with certain \nregular expressions, an attacker could cause a denial of service or possibly \nexecute arbitrary code with the privileges of the user invoking the program. \n(CVE-2009-3372)\n\nA heap-based buffer overflow was discovered in Mozilla's GIF image parser. If a \nuser were tricked into viewing a malicious website, a remote attacker could \ncause a denial of service or possibly execute arbitrary code with the \nprivileges of the user invoking the program. (CVE-2009-3373)\n\nA flaw was discovered in the JavaScript engine of Firefox. An attacker could \nexploit this to execute scripts from page content with chrome privileges. \n(CVE-2009-3374)\n\nGregory Fleischer discovered that the same-origin check in Firefox could be \nbypassed by utilizing the document.getSelection function. An attacker could \nexploit this to read data from other domains. (CVE-2009-3375)\n\nJesse Ruderman and Sid Stamm discovered that Firefox did not properly display \nfilenames containing right-to-left (RTL) override characters. If a user were \ntricked into downloading a malicious file with a crafted filename, an attacker \ncould exploit this to trick the user into opening a different file than the \nuser expected. (CVE-2009-3376)\n\nSeveral flaws were discovered in third party media libraries. If a user were \ntricked into opening a crafted media file, a remote attacker could cause a \ndenial of service or possibly execute arbitrary code with the privileges of the \nuser invoking the program. This issue only affected Ubuntu 9.10. \n(CVE-2009-3377)\n\nVladimir Vukicevic, Jesse Ruderman, Martijn Wargers, Daniel Banchero, David \nKeeler, Boris Zbarsky, Thomas Frederiksen, Marcia Knous, Carsten Book, Kevin \nBrosnan, David Anderson and Jeff Walden discovered various flaws in the browser \nand JavaScript engines of Firefox. If a user were tricked into viewing a \nmalicious website, a remote attacker could cause a denial of service or \npossibly execute arbitrary code with the privileges of the user invoking the \nprogram. (CVE-2009-3380, CVE-2009-3381, CVE-2009-3382, CVE-2009-3383)", "edition": 5, "modified": "2009-10-31T00:00:00", "published": "2009-10-31T00:00:00", "id": "USN-853-1", "href": "https://ubuntu.com/security/notices/USN-853-1", "title": "Firefox and Xulrunner vulnerabilities", "type": "ubuntu", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-07-09T01:37:03", "bulletinFamily": "unix", "cvelist": ["CVE-2009-1563", "CVE-2009-3376", "CVE-2009-3274", "CVE-2009-3380", "CVE-2009-3373", "CVE-2009-3383", "CVE-2009-3372", "CVE-2009-3375", "CVE-2009-3374", "CVE-2009-3371", "CVE-2009-3377", "CVE-2009-3382", "CVE-2009-3370", "CVE-2009-3381"], "description": "USN-853-1 fixed vulnerabilities in Firefox and Xulrunner. The upstream \nchanges introduced regressions that could lead to crashes when processing \ncertain malformed GIF images, fonts and web pages. This update fixes the \nproblem.\n\nWe apologize for the inconvenience.\n\nOriginal advisory details:\n\nAlin Rad Pop discovered a heap-based buffer overflow in Firefox when it \nconverted strings to floating point numbers. If a user were tricked into \nviewing a malicious website, a remote attacker could cause a denial of service \nor possibly execute arbitrary code with the privileges of the user invoking the \nprogram. (CVE-2009-1563)\n\nJeremy Brown discovered that the Firefox Download Manager was vulnerable to \nsymlink attacks. A local attacker could exploit this to create or overwrite \nfiles with the privileges of the user invoking the program. (CVE-2009-3274)\n\nPaul Stone discovered a flaw in the Firefox form history. If a user were \ntricked into viewing a malicious website, a remote attacker could access this \ndata to steal confidential information. (CVE-2009-3370)\n\nOrlando Berrera discovered that Firefox did not properly free memory when using \nweb-workers. If a user were tricked into viewing a malicious website, a remote \nattacker could cause a denial of service or possibly execute arbitrary code \nwith the privileges of the user invoking the program. This issue only \naffected Ubuntu 9.10. (CVE-2009-3371)\n\nA flaw was discovered in the way Firefox processed Proxy Auto-configuration \n(PAC) files. If a user configured the browser to use PAC files with certain \nregular expressions, an attacker could cause a denial of service or possibly \nexecute arbitrary code with the privileges of the user invoking the program. \n(CVE-2009-3372)\n\nA heap-based buffer overflow was discovered in Mozilla's GIF image parser. If a \nuser were tricked into viewing a malicious website, a remote attacker could \ncause a denial of service or possibly execute arbitrary code with the \nprivileges of the user invoking the program. (CVE-2009-3373)\n\nA flaw was discovered in the JavaScript engine of Firefox. An attacker could \nexploit this to execute scripts from page content with chrome privileges. \n(CVE-2009-3374)\n\nGregory Fleischer discovered that the same-origin check in Firefox could be \nbypassed by utilizing the document.getSelection function. An attacker could \nexploit this to read data from other domains. (CVE-2009-3375)\n\nJesse Ruderman and Sid Stamm discovered that Firefox did not properly display \nfilenames containing right-to-left (RTL) override characters. If a user were \ntricked into downloading a malicious file with a crafted filename, an attacker \ncould exploit this to trick the user into opening a different file than the \nuser expected. (CVE-2009-3376)\n\nSeveral flaws were discovered in third party media libraries. If a user were \ntricked into opening a crafted media file, a remote attacker could cause a \ndenial of service or possibly execute arbitrary code with the privileges of the \nuser invoking the program. This issue only affected Ubuntu 9.10. \n(CVE-2009-3377)\n\nVladimir Vukicevic, Jesse Ruderman, Martijn Wargers, Daniel Banchero, David \nKeeler, Boris Zbarsky, Thomas Frederiksen, Marcia Knous, Carsten Book, Kevin \nBrosnan, David Anderson and Jeff Walden discovered various flaws in the browser \nand JavaScript engines of Firefox. If a user were tricked into viewing a \nmalicious website, a remote attacker could cause a denial of service or \npossibly execute arbitrary code with the privileges of the user invoking the \nprogram. (CVE-2009-3380, CVE-2009-3381, CVE-2009-3382, CVE-2009-3383)", "edition": 5, "modified": "2009-11-11T00:00:00", "published": "2009-11-11T00:00:00", "id": "USN-853-2", "href": "https://ubuntu.com/security/notices/USN-853-2", "title": "Firefox and Xulrunner regression", "type": "ubuntu", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "nessus": [{"lastseen": "2021-01-17T14:46:37", "description": "The Mozilla XULRunner engine was updated to version 1.9.0.15 to fix\nvarious bugs and security issues.\n\nThe following security issues have been fixed :\n\n - Security researcher Paul Stone reported that a user's\n form history, both from web content as well as the smart\n location bar, was vulnerable to theft. A malicious web\n page could synthesize events such as mouse focus and key\n presses on behalf of the victim and trick the browser\n into auto-filling the form fields with history entries\n and then reading the entries. (MFSA 2009-52 /\n CVE-2009-3370)\n\n - Security researcher Jeremy Brown reported that the file\n naming scheme used for downloading a file which already\n exists in the downloads folder is predictable. If an\n attacker had local access to a victim's computer and\n knew the name of a file the victim intended to open\n through the Download Manager, he could use this\n vulnerability to place a malicious file in the\n world-writable directory used to save temporary\n downloaded files and cause the browser to choose the\n incorrect file when opening it. Since this attack\n requires local access to the victim's machine, the\n severity of this vulnerability was determined to be low.\n (MFSA 2009-53 / CVE-2009-3274)\n\n - Security researcher Orlando Berrera of Sec Theory\n reported that recursive creation of JavaScript\n web-workers can be used to create a set of objects whose\n memory could be freed prior to their use. These\n conditions often result in a crash which could\n potentially be used by an attacker to run arbitrary code\n on a victim's computer. (MFSA 2009-54 / CVE-2009-3371)\n\n - Security researcher Marco C. reported a flaw in the\n parsing of regular expressions used in Proxy\n Auto-configuration (PAC) files. In certain cases this\n flaw could be used by an attacker to crash a victim's\n browser and run arbitrary code on their computer. Since\n this vulnerability requires the victim to have PAC\n configured in their environment with specific regular\n expresssions which can trigger the crash, the severity\n of the issue was determined to be moderate. (MFSA\n 2009-55 / CVE-2009-3372)\n\n - Security research firm iDefense reported that researcher\n regenrecht discovered a heap-based buffer overflow in\n Mozilla's GIF image parser. This vulnerability could\n potentially be used by an attacker to crash a victim's\n browser and run arbitrary code on their computer. (MFSA\n 2009-56 / CVE-2009-3373)\n\n - Mozilla security researcher moz_bug_r_a4 reported that\n the XPCOM utility XPCVariant::VariantDataToJS unwrapped\n doubly-wrapped objects before returning them to chrome\n callers. This could result in chrome privileged code\n calling methods on an object which had previously been\n created or modified by web content, potentially\n executing malicious JavaScript code with chrome\n privileges. (MFSA 2009-57 / CVE-2009-3374)\n\n - Security researcher Alin Rad Pop of Secunia Research\n reported a heap-based buffer overflow in Mozilla's\n string to floating point number conversion routines.\n Using this vulnerability an attacker could craft some\n malicious JavaScript code containing a very long string\n to be converted to a floating point number which would\n result in improper memory allocation and the execution\n of an arbitrary memory location. This vulnerability\n could thus be leveraged by the attacker to run arbitrary\n code on a victim's computer. (MFSA 2009-59 /\n CVE-2009-1563)\n\n - Security researcher Gregory Fleischer reported that text\n within a selection on a web page can be read by\n JavaScript in a different domain using the\n document.getSelection function, violating the\n same-origin policy. Since this vulnerability requires\n user interaction to exploit, its severity was determined\n to be moderate. (MFSA 2009-61 / CVE-2009-3375)\n\n - Mozilla security researchers Jesse Ruderman and Sid\n Stamm reported that when downloading a file containing a\n right-to-left override character (RTL) in the filename,\n the name displayed in the dialog title bar conflicts\n with the name of the file shown in the dialog body. An\n attacker could use this vulnerability to obfuscate the\n name and file extension of a file to be downloaded and\n opened, potentially causing a user to run an executable\n file when they expected to open a non-executable file.\n (MFSA 2009-62 / CVE-2009-3376)\n\n - Mozilla developers and community members identified and\n fixed several stability bugs in the browser engine used\n in Firefox and other Mozilla-based products. Some of\n these crashes showed evidence of memory corruption under\n certain circumstances and we presume that with enough\n effort at least some of these could be exploited to run\n arbitrary code. (MFSA 2009-64 / CVE-2009-3380 /\n CVE-2009-3381 / CVE-2009-3382 / CVE-2009-3383)", "edition": 25, "published": "2010-10-11T00:00:00", "title": "SuSE 10 Security Update : Mozilla XULRunner (ZYPP Patch Number 6617)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-1563", "CVE-2009-3376", "CVE-2009-3274", "CVE-2009-3380", "CVE-2009-3373", "CVE-2009-3383", "CVE-2009-3372", "CVE-2009-3375", "CVE-2009-0689", "CVE-2009-3374", "CVE-2009-3371", "CVE-2009-3382", "CVE-2009-3370", "CVE-2009-3381"], "modified": "2010-10-11T00:00:00", "cpe": ["cpe:/o:suse:suse_linux"], "id": "SUSE_MOZILLA-XULRUNNER190-6617.NASL", "href": "https://www.tenable.com/plugins/nessus/49897", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The text description of this plugin is (C) Novell, Inc.\n#\n\nif (NASL_LEVEL < 3000) exit(0);\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(49897);\n script_version(\"1.14\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2009-0689\", \"CVE-2009-3274\", \"CVE-2009-3370\", \"CVE-2009-3371\", \"CVE-2009-3372\", \"CVE-2009-3373\", \"CVE-2009-3374\", \"CVE-2009-3375\", \"CVE-2009-3376\", \"CVE-2009-3380\", \"CVE-2009-3381\", \"CVE-2009-3382\", \"CVE-2009-3383\");\n\n script_name(english:\"SuSE 10 Security Update : Mozilla XULRunner (ZYPP Patch Number 6617)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SuSE 10 host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The Mozilla XULRunner engine was updated to version 1.9.0.15 to fix\nvarious bugs and security issues.\n\nThe following security issues have been fixed :\n\n - Security researcher Paul Stone reported that a user's\n form history, both from web content as well as the smart\n location bar, was vulnerable to theft. A malicious web\n page could synthesize events such as mouse focus and key\n presses on behalf of the victim and trick the browser\n into auto-filling the form fields with history entries\n and then reading the entries. (MFSA 2009-52 /\n CVE-2009-3370)\n\n - Security researcher Jeremy Brown reported that the file\n naming scheme used for downloading a file which already\n exists in the downloads folder is predictable. If an\n attacker had local access to a victim's computer and\n knew the name of a file the victim intended to open\n through the Download Manager, he could use this\n vulnerability to place a malicious file in the\n world-writable directory used to save temporary\n downloaded files and cause the browser to choose the\n incorrect file when opening it. Since this attack\n requires local access to the victim's machine, the\n severity of this vulnerability was determined to be low.\n (MFSA 2009-53 / CVE-2009-3274)\n\n - Security researcher Orlando Berrera of Sec Theory\n reported that recursive creation of JavaScript\n web-workers can be used to create a set of objects whose\n memory could be freed prior to their use. These\n conditions often result in a crash which could\n potentially be used by an attacker to run arbitrary code\n on a victim's computer. (MFSA 2009-54 / CVE-2009-3371)\n\n - Security researcher Marco C. reported a flaw in the\n parsing of regular expressions used in Proxy\n Auto-configuration (PAC) files. In certain cases this\n flaw could be used by an attacker to crash a victim's\n browser and run arbitrary code on their computer. Since\n this vulnerability requires the victim to have PAC\n configured in their environment with specific regular\n expresssions which can trigger the crash, the severity\n of the issue was determined to be moderate. (MFSA\n 2009-55 / CVE-2009-3372)\n\n - Security research firm iDefense reported that researcher\n regenrecht discovered a heap-based buffer overflow in\n Mozilla's GIF image parser. This vulnerability could\n potentially be used by an attacker to crash a victim's\n browser and run arbitrary code on their computer. (MFSA\n 2009-56 / CVE-2009-3373)\n\n - Mozilla security researcher moz_bug_r_a4 reported that\n the XPCOM utility XPCVariant::VariantDataToJS unwrapped\n doubly-wrapped objects before returning them to chrome\n callers. This could result in chrome privileged code\n calling methods on an object which had previously been\n created or modified by web content, potentially\n executing malicious JavaScript code with chrome\n privileges. (MFSA 2009-57 / CVE-2009-3374)\n\n - Security researcher Alin Rad Pop of Secunia Research\n reported a heap-based buffer overflow in Mozilla's\n string to floating point number conversion routines.\n Using this vulnerability an attacker could craft some\n malicious JavaScript code containing a very long string\n to be converted to a floating point number which would\n result in improper memory allocation and the execution\n of an arbitrary memory location. This vulnerability\n could thus be leveraged by the attacker to run arbitrary\n code on a victim's computer. (MFSA 2009-59 /\n CVE-2009-1563)\n\n - Security researcher Gregory Fleischer reported that text\n within a selection on a web page can be read by\n JavaScript in a different domain using the\n document.getSelection function, violating the\n same-origin policy. Since this vulnerability requires\n user interaction to exploit, its severity was determined\n to be moderate. (MFSA 2009-61 / CVE-2009-3375)\n\n - Mozilla security researchers Jesse Ruderman and Sid\n Stamm reported that when downloading a file containing a\n right-to-left override character (RTL) in the filename,\n the name displayed in the dialog title bar conflicts\n with the name of the file shown in the dialog body. An\n attacker could use this vulnerability to obfuscate the\n name and file extension of a file to be downloaded and\n opened, potentially causing a user to run an executable\n file when they expected to open a non-executable file.\n (MFSA 2009-62 / CVE-2009-3376)\n\n - Mozilla developers and community members identified and\n fixed several stability bugs in the browser engine used\n in Firefox and other Mozilla-based products. Some of\n these crashes showed evidence of memory corruption under\n certain circumstances and we presume that with enough\n effort at least some of these could be exploited to run\n arbitrary code. (MFSA 2009-64 / CVE-2009-3380 /\n CVE-2009-3381 / CVE-2009-3382 / CVE-2009-3383)\"\n );\n # http://www.mozilla.org/security/announce/2009/mfsa2009-52.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2009-52/\"\n );\n # http://www.mozilla.org/security/announce/2009/mfsa2009-53.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2009-53/\"\n );\n # http://www.mozilla.org/security/announce/2009/mfsa2009-54.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2009-54/\"\n );\n # http://www.mozilla.org/security/announce/2009/mfsa2009-55.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2009-55/\"\n );\n # http://www.mozilla.org/security/announce/2009/mfsa2009-56.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2009-56/\"\n );\n # http://www.mozilla.org/security/announce/2009/mfsa2009-57.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2009-57/\"\n );\n # http://www.mozilla.org/security/announce/2009/mfsa2009-59.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2009-59/\"\n );\n # http://www.mozilla.org/security/announce/2009/mfsa2009-61.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2009-61/\"\n );\n # http://www.mozilla.org/security/announce/2009/mfsa2009-62.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2009-62/\"\n );\n # http://www.mozilla.org/security/announce/2009/mfsa2009-64.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2009-64/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2009-1563.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2009-3274.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2009-3370.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2009-3371.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2009-3372.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2009-3373.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2009-3374.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2009-3375.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2009-3376.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2009-3380.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2009-3381.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2009-3382.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2009-3383.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Apply ZYPP patch number 6617.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_cwe_id(16, 119, 264, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:suse:suse_linux\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2009/09/21\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/11/02\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/10/11\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2010-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) exit(0, \"Local checks are not enabled.\");\nif (!get_kb_item(\"Host/SuSE/release\")) exit(0, \"The host is not running SuSE.\");\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) exit(1, \"Could not obtain the list of installed packages.\");\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) exit(1, \"Failed to determine the architecture type.\");\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") exit(1, \"Local checks for SuSE 10 on the '\"+cpu+\"' architecture have not been implemented.\");\n\n\nflag = 0;\nif (rpm_check(release:\"SLED10\", sp:3, reference:\"mozilla-xulrunner190-1.9.0.15-0.4.2\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:3, reference:\"mozilla-xulrunner190-gnomevfs-1.9.0.15-0.4.2\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:3, reference:\"mozilla-xulrunner190-translations-1.9.0.15-0.4.2\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:3, cpu:\"x86_64\", reference:\"mozilla-xulrunner190-32bit-1.9.0.15-0.4.2\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:3, cpu:\"x86_64\", reference:\"mozilla-xulrunner190-gnomevfs-32bit-1.9.0.15-0.4.2\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:3, cpu:\"x86_64\", reference:\"mozilla-xulrunner190-translations-32bit-1.9.0.15-0.4.2\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:3, reference:\"mozilla-xulrunner190-1.9.0.15-0.4.2\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:3, reference:\"mozilla-xulrunner190-gnomevfs-1.9.0.15-0.4.2\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:3, reference:\"mozilla-xulrunner190-translations-1.9.0.15-0.4.2\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:3, cpu:\"x86_64\", reference:\"mozilla-xulrunner190-32bit-1.9.0.15-0.4.2\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:3, cpu:\"x86_64\", reference:\"mozilla-xulrunner190-gnomevfs-32bit-1.9.0.15-0.4.2\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:3, cpu:\"x86_64\", reference:\"mozilla-xulrunner190-translations-32bit-1.9.0.15-0.4.2\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse exit(0, \"The host is not affected.\");\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-17T14:02:53", "description": "The Mozilla Firefox browser was updated to version 3.0.0.15 to fix\nvarious bugs and security issues.\n\nFollowing security issues have been fixed: MFSA 2009-52 /\nCVE-2009-3370: Security researcher Paul Stone reported that a user's\nform history, both from web content as well as the smart location bar,\nwas vulnerable to theft. A malicious web page could synthesize events\nsuch as mouse focus and key presses on behalf of the victim and trick\nthe browser into auto-filling the form fields with history entries and\nthen reading the entries.\n\nMFSA 2009-53 / CVE-2009-3274: Security researcher Jeremy Brown\nreported that the file naming scheme used for downloading a file which\nalready exists in the downloads folder is predictable. If an attacker\nhad local access to a victim's computer and knew the name of a file\nthe victim intended to open through the Download Manager, he could use\nthis vulnerability to place a malicious file in the world-writable\ndirectory used to save temporary downloaded files and cause the\nbrowser to choose the incorrect file when opening it. Since this\nattack requires local access to the victim's machine, the severity of\nthis vulnerability was determined to be low.\n\nMFSA 2009-54 / CVE-2009-3371: Security researcher Orlando Berrera of\nSec Theory reported that recursive creation of JavaScript web-workers\ncan be used to create a set of objects whose memory could be freed\nprior to their use. These conditions often result in a crash which\ncould potentially be used by an attacker to run arbitrary code on a\nvictim's computer.\n\nMFSA 2009-55 / CVE-2009-3372: Security researcher Marco C. reported a\nflaw in the parsing of regular expressions used in Proxy\nAuto-configuration (PAC) files. In certain cases this flaw could be\nused by an attacker to crash a victim's browser and run arbitrary code\non their computer. Since this vulnerability requires the victim to\nhave PAC configured in their environment with specific regular\nexpresssions which can trigger the crash, the severity of the issue\nwas determined to be moderate.\n\nMFSA 2009-56 / CVE-2009-3373: Security research firm iDefense reported\nthat researcher regenrecht discovered a heap-based buffer overflow in\nMozilla's GIF image parser. This vulnerability could potentially be\nused by an attacker to crash a victim's browser and run arbitrary code\non their computer.\n\nMFSA 2009-57 / CVE-2009-3374: Mozilla security researcher moz_bug_r_a4\nreported that the XPCOM utility XPCVariant::VariantDataToJS unwrapped\ndoubly-wrapped objects before returning them to chrome callers. This\ncould result in chrome privileged code calling methods on an object\nwhich had previously been created or modified by web content,\npotentially executing malicious JavaScript code with chrome\nprivileges.\n\nMFSA 2009-59 / CVE-2009-1563: Security researcher Alin Rad Pop of\nSecunia Research reported a heap-based buffer overflow in Mozilla's\nstring to floating point number conversion routines. Using this\nvulnerability an attacker could craft some malicious JavaScript code\ncontaining a very long string to be converted to a floating point\nnumber which would result in improper memory allocation and the\nexecution of an arbitrary memory location. This vulnerability could\nthus be leveraged by the attacker to run arbitrary code on a victim's\ncomputer.\n\nMFSA 2009-61 / CVE-2009-3375: Security researcher Gregory Fleischer\nreported that text within a selection on a web page can be read by\nJavaScript in a different domain using the document.getSelection\nfunction, violating the same-origin policy. Since this vulnerability\nrequires user interaction to exploit, its severity was determined to\nbe moderate.\n\nMFSA 2009-62 / CVE-2009-3376: Mozilla security researchers Jesse\nRuderman and Sid Stamm reported that when downloading a file\ncontaining a right-to-left override character (RTL) in the filename,\nthe name displayed in the dialog title bar conflicts with the name of\nthe file shown in the dialog body. An attacker could use this\nvulnerability to obfuscate the name and file extension of a file to be\ndownloaded and opened, potentially causing a user to run an executable\nfile when they expected to open a non-executable file.\n\nMFSA 2009-64 / CVE-2009-3380 / CVE-2009-3381 / CVE-2009-3382 /\nCVE-2009-3383: Mozilla developers and community members identified and\nfixed several stability bugs in the browser engine used in Firefox and\nother Mozilla-based products. Some of these crashes showed evidence of\nmemory corruption under certain circumstances and we presume that with\nenough effort at least some of these could be exploited to run\narbitrary code.", "edition": 25, "published": "2009-11-05T00:00:00", "title": "openSUSE Security Update : MozillaFirefox (MozillaFirefox-1499)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-1563", "CVE-2009-3376", "CVE-2009-3274", "CVE-2009-3380", "CVE-2009-3373", "CVE-2009-3383", "CVE-2009-3372", "CVE-2009-3375", "CVE-2009-0689", "CVE-2009-3374", "CVE-2009-3371", "CVE-2009-3382", "CVE-2009-3370", "CVE-2009-3381"], "modified": "2009-11-05T00:00:00", "cpe": ["cpe:/o:novell:opensuse:11.0", "p-cpe:/a:novell:opensuse:mozilla-xulrunner190-gnomevfs-32bit", "p-cpe:/a:novell:opensuse:MozillaFirefox-translations", "p-cpe:/a:novell:opensuse:mozilla-xulrunner190-32bit", "p-cpe:/a:novell:opensuse:mozilla-xulrunner190-translations-32bit", "p-cpe:/a:novell:opensuse:mozilla-xulrunner190-devel", "p-cpe:/a:novell:opensuse:mozilla-xulrunner190-translations", "p-cpe:/a:novell:opensuse:MozillaFirefox", "p-cpe:/a:novell:opensuse:mozilla-xulrunner190", "p-cpe:/a:novell:opensuse:mozilla-xulrunner190-gnomevfs"], "id": "SUSE_11_0_MOZILLAFIREFOX-091103.NASL", "href": "https://www.tenable.com/plugins/nessus/42388", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update MozillaFirefox-1499.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(42388);\n script_version(\"1.13\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2009-0689\", \"CVE-2009-3274\", \"CVE-2009-3370\", \"CVE-2009-3371\", \"CVE-2009-3372\", \"CVE-2009-3373\", \"CVE-2009-3374\", \"CVE-2009-3375\", \"CVE-2009-3376\", \"CVE-2009-3380\", \"CVE-2009-3381\", \"CVE-2009-3382\", \"CVE-2009-3383\");\n\n script_name(english:\"openSUSE Security Update : MozillaFirefox (MozillaFirefox-1499)\");\n script_summary(english:\"Check for the MozillaFirefox-1499 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The Mozilla Firefox browser was updated to version 3.0.0.15 to fix\nvarious bugs and security issues.\n\nFollowing security issues have been fixed: MFSA 2009-52 /\nCVE-2009-3370: Security researcher Paul Stone reported that a user's\nform history, both from web content as well as the smart location bar,\nwas vulnerable to theft. A malicious web page could synthesize events\nsuch as mouse focus and key presses on behalf of the victim and trick\nthe browser into auto-filling the form fields with history entries and\nthen reading the entries.\n\nMFSA 2009-53 / CVE-2009-3274: Security researcher Jeremy Brown\nreported that the file naming scheme used for downloading a file which\nalready exists in the downloads folder is predictable. If an attacker\nhad local access to a victim's computer and knew the name of a file\nthe victim intended to open through the Download Manager, he could use\nthis vulnerability to place a malicious file in the world-writable\ndirectory used to save temporary downloaded files and cause the\nbrowser to choose the incorrect file when opening it. Since this\nattack requires local access to the victim's machine, the severity of\nthis vulnerability was determined to be low.\n\nMFSA 2009-54 / CVE-2009-3371: Security researcher Orlando Berrera of\nSec Theory reported that recursive creation of JavaScript web-workers\ncan be used to create a set of objects whose memory could be freed\nprior to their use. These conditions often result in a crash which\ncould potentially be used by an attacker to run arbitrary code on a\nvictim's computer.\n\nMFSA 2009-55 / CVE-2009-3372: Security researcher Marco C. reported a\nflaw in the parsing of regular expressions used in Proxy\nAuto-configuration (PAC) files. In certain cases this flaw could be\nused by an attacker to crash a victim's browser and run arbitrary code\non their computer. Since this vulnerability requires the victim to\nhave PAC configured in their environment with specific regular\nexpresssions which can trigger the crash, the severity of the issue\nwas determined to be moderate.\n\nMFSA 2009-56 / CVE-2009-3373: Security research firm iDefense reported\nthat researcher regenrecht discovered a heap-based buffer overflow in\nMozilla's GIF image parser. This vulnerability could potentially be\nused by an attacker to crash a victim's browser and run arbitrary code\non their computer.\n\nMFSA 2009-57 / CVE-2009-3374: Mozilla security researcher moz_bug_r_a4\nreported that the XPCOM utility XPCVariant::VariantDataToJS unwrapped\ndoubly-wrapped objects before returning them to chrome callers. This\ncould result in chrome privileged code calling methods on an object\nwhich had previously been created or modified by web content,\npotentially executing malicious JavaScript code with chrome\nprivileges.\n\nMFSA 2009-59 / CVE-2009-1563: Security researcher Alin Rad Pop of\nSecunia Research reported a heap-based buffer overflow in Mozilla's\nstring to floating point number conversion routines. Using this\nvulnerability an attacker could craft some malicious JavaScript code\ncontaining a very long string to be converted to a floating point\nnumber which would result in improper memory allocation and the\nexecution of an arbitrary memory location. This vulnerability could\nthus be leveraged by the attacker to run arbitrary code on a victim's\ncomputer.\n\nMFSA 2009-61 / CVE-2009-3375: Security researcher Gregory Fleischer\nreported that text within a selection on a web page can be read by\nJavaScript in a different domain using the document.getSelection\nfunction, violating the same-origin policy. Since this vulnerability\nrequires user interaction to exploit, its severity was determined to\nbe moderate.\n\nMFSA 2009-62 / CVE-2009-3376: Mozilla security researchers Jesse\nRuderman and Sid Stamm reported that when downloading a file\ncontaining a right-to-left override character (RTL) in the filename,\nthe name displayed in the dialog title bar conflicts with the name of\nthe file shown in the dialog body. An attacker could use this\nvulnerability to obfuscate the name and file extension of a file to be\ndownloaded and opened, potentially causing a user to run an executable\nfile when they expected to open a non-executable file.\n\nMFSA 2009-64 / CVE-2009-3380 / CVE-2009-3381 / CVE-2009-3382 /\nCVE-2009-3383: Mozilla developers and community members identified and\nfixed several stability bugs in the browser engine used in Firefox and\nother Mozilla-based products. Some of these crashes showed evidence of\nmemory corruption under certain circumstances and we presume that with\nenough effort at least some of these could be exploited to run\narbitrary code.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=545277\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected MozillaFirefox packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_cwe_id(16, 119, 264, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:MozillaFirefox\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:MozillaFirefox-translations\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-xulrunner190\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-xulrunner190-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-xulrunner190-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-xulrunner190-gnomevfs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-xulrunner190-gnomevfs-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-xulrunner190-translations\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-xulrunner190-translations-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:11.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/11/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/11/05\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE11\\.0)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"11.0\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE11.0\", reference:\"MozillaFirefox-3.0.15-0.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.0\", reference:\"MozillaFirefox-translations-3.0.15-0.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.0\", reference:\"mozilla-xulrunner190-1.9.0.15-0.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.0\", reference:\"mozilla-xulrunner190-devel-1.9.0.15-0.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.0\", reference:\"mozilla-xulrunner190-gnomevfs-1.9.0.15-0.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.0\", reference:\"mozilla-xulrunner190-translations-1.9.0.15-0.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.0\", cpu:\"x86_64\", reference:\"mozilla-xulrunner190-32bit-1.9.0.15-0.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.0\", cpu:\"x86_64\", reference:\"mozilla-xulrunner190-gnomevfs-32bit-1.9.0.15-0.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.0\", cpu:\"x86_64\", reference:\"mozilla-xulrunner190-translations-32bit-1.9.0.15-0.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"MozillaFirefox\");\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-17T14:13:32", "description": "The Mozilla XULRunner engine was updated to version 1.9.0.15 to fix\nvarious bugs and security issues.\n\nThe following security issues have been fixed :\n\n - Security researcher Paul Stone reported that a user's\n form history, both from web content as well as the smart\n location bar, was vulnerable to theft. A malicious web\n page could synthesize events such as mouse focus and key\n presses on behalf of the victim and trick the browser\n into auto-filling the form fields with history entries\n and then reading the entries. (MFSA 2009-52 /\n CVE-2009-3370)\n\n - Security researcher Jeremy Brown reported that the file\n naming scheme used for downloading a file which already\n exists in the downloads folder is predictable. If an\n attacker had local access to a victim's computer and\n knew the name of a file the victim intended to open\n through the Download Manager, he could use this\n vulnerability to place a malicious file in the\n world-writable directory used to save temporary\n downloaded files and cause the browser to choose the\n incorrect file when opening it. Since this attack\n requires local access to the victim's machine, the\n severity of this vulnerability was determined to be low.\n (MFSA 2009-53 / CVE-2009-3274)\n\n - Security researcher Orlando Berrera of Sec Theory\n reported that recursive creation of JavaScript\n web-workers can be used to create a set of objects whose\n memory could be freed prior to their use. These\n conditions often result in a crash which could\n potentially be used by an attacker to run arbitrary code\n on a victim's computer. (MFSA 2009-54 / CVE-2009-3371)\n\n - Security researcher Marco C. reported a flaw in the\n parsing of regular expressions used in Proxy\n Auto-configuration (PAC) files. In certain cases this\n flaw could be used by an attacker to crash a victim's\n browser and run arbitrary code on their computer. Since\n this vulnerability requires the victim to have PAC\n configured in their environment with specific regular\n expresssions which can trigger the crash, the severity\n of the issue was determined to be moderate. (MFSA\n 2009-55 / CVE-2009-3372)\n\n - Security research firm iDefense reported that researcher\n regenrecht discovered a heap-based buffer overflow in\n Mozilla's GIF image parser. This vulnerability could\n potentially be used by an attacker to crash a victim's\n browser and run arbitrary code on their computer. (MFSA\n 2009-56 / CVE-2009-3373)\n\n - Mozilla security researcher moz_bug_r_a4 reported that\n the XPCOM utility XPCVariant::VariantDataToJS unwrapped\n doubly-wrapped objects before returning them to chrome\n callers. This could result in chrome privileged code\n calling methods on an object which had previously been\n created or modified by web content, potentially\n executing malicious JavaScript code with chrome\n privileges. (MFSA 2009-57 / CVE-2009-3374)\n\n - Security researcher Alin Rad Pop of Secunia Research\n reported a heap-based buffer overflow in Mozilla's\n string to floating point number conversion routines.\n Using this vulnerability an attacker could craft some\n malicious JavaScript code containing a very long string\n to be converted to a floating point number which would\n result in improper memory allocation and the execution\n of an arbitrary memory location. This vulnerability\n could thus be leveraged by the attacker to run arbitrary\n code on a victim's computer. (MFSA 2009-59 /\n CVE-2009-1563)\n\n - Security researcher Gregory Fleischer reported that text\n within a selection on a web page can be read by\n JavaScript in a different domain using the\n document.getSelection function, violating the\n same-origin policy. Since this vulnerability requires\n user interaction to exploit, its severity was determined\n to be moderate. (MFSA 2009-61 / CVE-2009-3375)\n\n - Mozilla security researchers Jesse Ruderman and Sid\n Stamm reported that when downloading a file containing a\n right-to-left override character (RTL) in the filename,\n the name displayed in the dialog title bar conflicts\n with the name of the file shown in the dialog body. An\n attacker could use this vulnerability to obfuscate the\n name and file extension of a file to be downloaded and\n opened, potentially causing a user to run an executable\n file when they expected to open a non-executable file.\n (MFSA 2009-62 / CVE-2009-3376)\n\n - Mozilla developers and community members identified and\n fixed several stability bugs in the browser engine used\n in Firefox and other Mozilla-based products. Some of\n these crashes showed evidence of memory corruption under\n certain circumstances and we presume that with enough\n effort at least some of these could be exploited to run\n arbitrary code. (MFSA 2009-64 / CVE-2009-3380 /\n CVE-2009-3381 / CVE-2009-3382 / CVE-2009-3383)", "edition": 25, "published": "2009-11-04T00:00:00", "title": "SuSE 11 Security Update : Mozilla XULRunner (SAT Patch Number 1493)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-1563", "CVE-2009-3376", "CVE-2009-3274", "CVE-2009-3380", "CVE-2009-3373", "CVE-2009-3383", "CVE-2009-3372", "CVE-2009-3375", "CVE-2009-0689", "CVE-2009-3374", "CVE-2009-3371", "CVE-2009-3382", "CVE-2009-3370", "CVE-2009-3381"], "modified": "2009-11-04T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:11:mozilla-xulrunner190-translations-32bit", "cpe:/o:novell:suse_linux:11", "p-cpe:/a:novell:suse_linux:11:mozilla-xulrunner190", "p-cpe:/a:novell:suse_linux:11:mozilla-xulrunner190-32bit", "p-cpe:/a:novell:suse_linux:11:mozilla-xulrunner190-translations", "p-cpe:/a:novell:suse_linux:11:mozilla-xulrunner190-gnomevfs", "p-cpe:/a:novell:suse_linux:11:mozilla-xulrunner190-gnomevfs-32bit"], "id": "SUSE_11_MOZILLA-XULRUNNER190-091030.NASL", "href": "https://www.tenable.com/plugins/nessus/42364", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from SuSE 11 update information. The text itself is\n# copyright (C) Novell, Inc.\n#\n\nif (NASL_LEVEL < 3000) exit(0);\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(42364);\n script_version(\"1.16\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2009-0689\", \"CVE-2009-3274\", \"CVE-2009-3370\", \"CVE-2009-3371\", \"CVE-2009-3372\", \"CVE-2009-3373\", \"CVE-2009-3374\", \"CVE-2009-3375\", \"CVE-2009-3376\", \"CVE-2009-3380\", \"CVE-2009-3381\", \"CVE-2009-3382\", \"CVE-2009-3383\");\n\n script_name(english:\"SuSE 11 Security Update : Mozilla XULRunner (SAT Patch Number 1493)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SuSE 11 host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The Mozilla XULRunner engine was updated to version 1.9.0.15 to fix\nvarious bugs and security issues.\n\nThe following security issues have been fixed :\n\n - Security researcher Paul Stone reported that a user's\n form history, both from web content as well as the smart\n location bar, was vulnerable to theft. A malicious web\n page could synthesize events such as mouse focus and key\n presses on behalf of the victim and trick the browser\n into auto-filling the form fields with history entries\n and then reading the entries. (MFSA 2009-52 /\n CVE-2009-3370)\n\n - Security researcher Jeremy Brown reported that the file\n naming scheme used for downloading a file which already\n exists in the downloads folder is predictable. If an\n attacker had local access to a victim's computer and\n knew the name of a file the victim intended to open\n through the Download Manager, he could use this\n vulnerability to place a malicious file in the\n world-writable directory used to save temporary\n downloaded files and cause the browser to choose the\n incorrect file when opening it. Since this attack\n requires local access to the victim's machine, the\n severity of this vulnerability was determined to be low.\n (MFSA 2009-53 / CVE-2009-3274)\n\n - Security researcher Orlando Berrera of Sec Theory\n reported that recursive creation of JavaScript\n web-workers can be used to create a set of objects whose\n memory could be freed prior to their use. These\n conditions often result in a crash which could\n potentially be used by an attacker to run arbitrary code\n on a victim's computer. (MFSA 2009-54 / CVE-2009-3371)\n\n - Security researcher Marco C. reported a flaw in the\n parsing of regular expressions used in Proxy\n Auto-configuration (PAC) files. In certain cases this\n flaw could be used by an attacker to crash a victim's\n browser and run arbitrary code on their computer. Since\n this vulnerability requires the victim to have PAC\n configured in their environment with specific regular\n expresssions which can trigger the crash, the severity\n of the issue was determined to be moderate. (MFSA\n 2009-55 / CVE-2009-3372)\n\n - Security research firm iDefense reported that researcher\n regenrecht discovered a heap-based buffer overflow in\n Mozilla's GIF image parser. This vulnerability could\n potentially be used by an attacker to crash a victim's\n browser and run arbitrary code on their computer. (MFSA\n 2009-56 / CVE-2009-3373)\n\n - Mozilla security researcher moz_bug_r_a4 reported that\n the XPCOM utility XPCVariant::VariantDataToJS unwrapped\n doubly-wrapped objects before returning them to chrome\n callers. This could result in chrome privileged code\n calling methods on an object which had previously been\n created or modified by web content, potentially\n executing malicious JavaScript code with chrome\n privileges. (MFSA 2009-57 / CVE-2009-3374)\n\n - Security researcher Alin Rad Pop of Secunia Research\n reported a heap-based buffer overflow in Mozilla's\n string to floating point number conversion routines.\n Using this vulnerability an attacker could craft some\n malicious JavaScript code containing a very long string\n to be converted to a floating point number which would\n result in improper memory allocation and the execution\n of an arbitrary memory location. This vulnerability\n could thus be leveraged by the attacker to run arbitrary\n code on a victim's computer. (MFSA 2009-59 /\n CVE-2009-1563)\n\n - Security researcher Gregory Fleischer reported that text\n within a selection on a web page can be read by\n JavaScript in a different domain using the\n document.getSelection function, violating the\n same-origin policy. Since this vulnerability requires\n user interaction to exploit, its severity was determined\n to be moderate. (MFSA 2009-61 / CVE-2009-3375)\n\n - Mozilla security researchers Jesse Ruderman and Sid\n Stamm reported that when downloading a file containing a\n right-to-left override character (RTL) in the filename,\n the name displayed in the dialog title bar conflicts\n with the name of the file shown in the dialog body. An\n attacker could use this vulnerability to obfuscate the\n name and file extension of a file to be downloaded and\n opened, potentially causing a user to run an executable\n file when they expected to open a non-executable file.\n (MFSA 2009-62 / CVE-2009-3376)\n\n - Mozilla developers and community members identified and\n fixed several stability bugs in the browser engine used\n in Firefox and other Mozilla-based products. Some of\n these crashes showed evidence of memory corruption under\n certain circumstances and we presume that with enough\n effort at least some of these could be exploited to run\n arbitrary code. (MFSA 2009-64 / CVE-2009-3380 /\n CVE-2009-3381 / CVE-2009-3382 / CVE-2009-3383)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.mozilla.org/security/announce/2009/mfsa2009-52.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.mozilla.org/security/announce/2009/mfsa2009-53.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.mozilla.org/security/announce/2009/mfsa2009-54.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.mozilla.org/security/announce/2009/mfsa2009-55.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.mozilla.org/security/announce/2009/mfsa2009-56.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.mozilla.org/security/announce/2009/mfsa2009-57.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.mozilla.org/security/announce/2009/mfsa2009-59.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.mozilla.org/security/announce/2009/mfsa2009-61.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.mozilla.org/security/announce/2009/mfsa2009-62.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.mozilla.org/security/announce/2009/mfsa2009-64.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=545277\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2009-1563.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2009-3274.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2009-3370.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2009-3371.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2009-3372.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2009-3373.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2009-3374.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2009-3375.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2009-3376.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2009-3380.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2009-3381.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2009-3382.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2009-3383.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Apply SAT patch number 1493.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_cwe_id(16, 119, 264, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:mozilla-xulrunner190\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:mozilla-xulrunner190-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:mozilla-xulrunner190-gnomevfs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:mozilla-xulrunner190-gnomevfs-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:mozilla-xulrunner190-translations\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:mozilla-xulrunner190-translations-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:11\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/10/30\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/11/04\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)11\") audit(AUDIT_OS_NOT, \"SuSE 11\");\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SuSE 11\", cpu);\n\npl = get_kb_item(\"Host/SuSE/patchlevel\");\nif (pl) audit(AUDIT_OS_NOT, \"SuSE 11.0\");\n\n\nflag = 0;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"i586\", reference:\"mozilla-xulrunner190-1.9.0.15-0.1.2\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"i586\", reference:\"mozilla-xulrunner190-gnomevfs-1.9.0.15-0.1.2\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"i586\", reference:\"mozilla-xulrunner190-translations-1.9.0.15-0.1.2\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"x86_64\", reference:\"mozilla-xulrunner190-1.9.0.15-0.1.2\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"x86_64\", reference:\"mozilla-xulrunner190-32bit-1.9.0.15-0.1.2\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"x86_64\", reference:\"mozilla-xulrunner190-gnomevfs-1.9.0.15-0.1.2\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"x86_64\", reference:\"mozilla-xulrunner190-gnomevfs-32bit-1.9.0.15-0.1.2\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"x86_64\", reference:\"mozilla-xulrunner190-translations-1.9.0.15-0.1.2\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"x86_64\", reference:\"mozilla-xulrunner190-translations-32bit-1.9.0.15-0.1.2\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:0, reference:\"mozilla-xulrunner190-1.9.0.15-0.1.2\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:0, reference:\"mozilla-xulrunner190-gnomevfs-1.9.0.15-0.1.2\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:0, reference:\"mozilla-xulrunner190-translations-1.9.0.15-0.1.2\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:0, cpu:\"s390x\", reference:\"mozilla-xulrunner190-32bit-1.9.0.15-0.1.2\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:0, cpu:\"x86_64\", reference:\"mozilla-xulrunner190-32bit-1.9.0.15-0.1.2\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-07T11:52:23", "description": "Security issues were identified and fixed in firefox 3.5.x :\n\nSecurity researcher Alin Rad Pop of Secunia Research reported a\nheap-based buffer overflow in Mozilla's string to floating point\nnumber conversion routines. Using this vulnerability an attacker could\ncraft some malicious JavaScript code containing a very long string to\nbe converted to a floating point number which would result in improper\nmemory allocation and the execution of an arbitrary memory location.\nThis vulnerability could thus be leveraged by the attacker to run\narbitrary code on a victim's computer (CVE-2009-1563).\n\nSecurity researcher Jeremy Brown reported that the file naming scheme\nused for downloading a file which already exists in the downloads\nfolder is predictable. If an attacker had local access to a victim's\ncomputer and knew the name of a file the victim intended to open\nthrough the Download Manager, he could use this vulnerability to place\na malicious file in the world-writable directory used to save\ntemporary downloaded files and cause the browser to choose the\nincorrect file when opening it. Since this attack requires local\naccess to the victim's machine, the severity of this vulnerability was\ndetermined to be low (CVE-2009-3274).\n\nSecurity researcher Paul Stone reported that a user's form history,\nboth from web content as well as the smart location bar, was\nvulnerable to theft. A malicious web page could synthesize events such\nas mouse focus and key presses on behalf of the victim and trick the\nbrowser into auto-filling the form fields with history entries and\nthen reading the entries (CVE-2009-3370).\n\nSecurity researcher Orlando Berrera of Sec Theory reported that\nrecursive creation of JavaScript web-workers can be used to create a\nset of objects whose memory could be freed prior to their use. These\nconditions often result in a crash which could potentially be used by\nan attacker to run arbitrary code on a victim's computer\n(CVE-2009-3371).\n\nSecurity researcher Marco C. reported a flaw in the parsing of regular\nexpressions used in Proxy Auto-configuration (PAC) files. In certain\ncases this flaw could be used by an attacker to crash a victim's\nbrowser and run arbitrary code on their computer. Since this\nvulnerability requires the victim to have PAC configured in their\nenvironment with specific regular expresssions which can trigger the\ncrash, the severity of the issue was determined to be moderate\n(CVE-2009-3372).\n\nSecurity research firm iDefense reported that researcher regenrecht\ndiscovered a heap-based buffer overflow in Mozilla's GIF image parser.\nThis vulnerability could potentially be used by an attacker to crash a\nvictim's browser and run arbitrary code on their computer\n(CVE-2009-3373).\n\nMozilla security researcher moz_bug_r_a4 reported that the XPCOM\nutility XPCVariant::VariantDataToJS unwrapped doubly-wrapped objects\nbefore returning them to chrome callers. This could result in chrome\nprivileged code calling methods on an object which had previously been\ncreated or modified by web content, potentially executing malicious\nJavaScript code with chrome privileges (CVE-2009-3374).\n\nSecurity researcher Gregory Fleischer reported that text within a\nselection on a web page can be read by JavaScript in a different\ndomain using the document.getSelection function, violating the\nsame-origin policy. Since this vulnerability requires user interaction\nto exploit, its severity was determined to be moderate\n(CVE-2009-3375).\n\nMozilla security researchers Jesse Ruderman and Sid Stamm reported\nthat when downloading a file containing a right-to-left override\ncharacter (RTL) in the filename, the name displayed in the dialog\ntitle bar conflicts with the name of the file shown in the dialog\nbody. An attacker could use this vulnerability to obfuscate the name\nand file extension of a file to be downloaded and opened, potentially\ncausing a user to run an executable file when they expected to open a\nnon-executable file (CVE-2009-3376).\n\nMozilla upgraded several third-party libraries used in media rendering\nto address multiple memory safety and stability bugs identified by\nmembers of the Mozilla community. Some of the bugs discovered could\npotentially be used by an attacker to crash a victim's browser and\nexecute arbitrary code on their computer. liboggz, libvorbis, and\nliboggplay were all upgraded to address these issues (CVE-2009-3377,\nCVE-2009-3379, CVE-2009-3378).\n\nMozilla developers and community members identified and fixed several\nstability bugs in the browser engine used in Firefox and other\nMozilla-based products. Some of these crashes showed evidence of\nmemory corruption under certain circumstances and we presume that with\nenough effort at least some of these could be exploited to run\narbitrary code (CVE-2009-3380).\n\nAdditionally, some packages which require so, have been rebuilt and\nare being provided as updates.", "edition": 28, "published": "2010-07-30T00:00:00", "title": "Mandriva Linux Security Advisory : firefox (MDVSA-2009:294)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-1563", "CVE-2009-3376", "CVE-2009-3379", "CVE-2009-3274", "CVE-2009-3380", "CVE-2009-3373", "CVE-2009-3372", "CVE-2009-3375", "CVE-2009-0689", "CVE-2009-3374", "CVE-2009-3371", "CVE-2009-3377", "CVE-2009-3370", "CVE-2009-3378"], "modified": "2010-07-30T00:00:00", "cpe": ["p-cpe:/a:mandriva:linux:lib64google-gadgets-devel", "p-cpe:/a:mandriva:linux:firefox-mn", "p-cpe:/a:mandriva:linux:firefox-zh_CN", "p-cpe:/a:mandriva:linux:libggadget-webkitjs0", "p-cpe:/a:mandriva:linux:epiphany-devel", "p-cpe:/a:mandriva:linux:libxulrunner-devel", "p-cpe:/a:mandriva:linux:firefox-sv_SE", "p-cpe:/a:mandriva:linux:lib64ggadget-gtk1.0_0", "p-cpe:/a:mandriva:linux:google-gadgets-common", "p-cpe:/a:mandriva:linux:libggadget1.0_0", "p-cpe:/a:mandriva:linux:firefox-ext-r-kiosk", "p-cpe:/a:mandriva:linux:firefox-sk", "p-cpe:/a:mandriva:linux:lib64ggadget-xdg1.0_0", "p-cpe:/a:mandriva:linux:gnome-python-gtkmozembed", "p-cpe:/a:mandriva:linux:libggadget-qt1.0_0", "p-cpe:/a:mandriva:linux:firefox-eu", "p-cpe:/a:mandriva:linux:firefox-oc", "p-cpe:/a:mandriva:linux:mozilla-plugin-opensc", "p-cpe:/a:mandriva:linux:firefox-ext-beagle", "p-cpe:/a:mandriva:linux:firefox-de", "p-cpe:/a:mandriva:linux:firefox-id", "p-cpe:/a:mandriva:linux:firefox", "p-cpe:/a:mandriva:linux:beagle-doc", "p-cpe:/a:mandriva:linux:libopensc2", "p-cpe:/a:mandriva:linux:firefox-sl", "p-cpe:/a:mandriva:linux:firefox-es_ES", "p-cpe:/a:mandriva:linux:firefox-el", "p-cpe:/a:mandriva:linux:lib64xulrunner-devel", "p-cpe:/a:mandriva:linux:xulrunner", "p-cpe:/a:mandriva:linux:firefox-gl", "p-cpe:/a:mandriva:linux:firefox-ext-scribefire", "p-cpe:/a:mandriva:linux:firefox-fi", "p-cpe:/a:mandriva:linux:firefox-be", "p-cpe:/a:mandriva:linux:lib64ggadget-js1.0_0", "p-cpe:/a:mandriva:linux:firefox-af", "p-cpe:/a:mandriva:linux:firefox-ja", "p-cpe:/a:mandriva:linux:firefox-ku", "p-cpe:/a:mandriva:linux:gnome-python-gda", "p-cpe:/a:mandriva:linux:gnome-python-gtkhtml2", "p-cpe:/a:mandriva:linux:firefox-is", "p-cpe:/a:mandriva:linux:firefox-lv", "p-cpe:/a:mandriva:linux:libgoogle-gadgets-devel", "p-cpe:/a:mandriva:linux:firefox-pa_IN", "p-cpe:/a:mandriva:linux:lib64ggadget-webkitjs0", "p-cpe:/a:mandriva:linux:firefox-tr", "p-cpe:/a:mandriva:linux:firefox-ga_IE", "p-cpe:/a:mandriva:linux:yelp", "p-cpe:/a:mandriva:linux:firefox-nl", "p-cpe:/a:mandriva:linux:firefox-lt", "p-cpe:/a:mandriva:linux:firefox-ext-mozvoikko", "p-cpe:/a:mandriva:linux:firefox-ro", "p-cpe:/a:mandriva:linux:firefox-it", "p-cpe:/a:mandriva:linux:firefox-theme-kde4ff", "p-cpe:/a:mandriva:linux:beagle-evolution", "p-cpe:/a:mandriva:linux:firefox-fy", "p-cpe:/a:mandriva:linux:firefox-es_AR", "p-cpe:/a:mandriva:linux:lib64xulrunner1.9.1.4", "p-cpe:/a:mandriva:linux:firefox-bn", "p-cpe:/a:mandriva:linux:firefox-sq", "p-cpe:/a:mandriva:linux:firefox-ka", "p-cpe:/a:mandriva:linux:firefox-ru", "p-cpe:/a:mandriva:linux:lib64ggadget-npapi1.0_0", "p-cpe:/a:mandriva:linux:opensc", "p-cpe:/a:mandriva:linux:lib64ggadget-dbus1.0_0", "p-cpe:/a:mandriva:linux:lib64ggadget-qt1.0_0", "p-cpe:/a:mandriva:linux:firefox-fr", "p-cpe:/a:mandriva:linux:firefox-zh_TW", "p-cpe:/a:mandriva:linux:google-gadgets-gtk", "p-cpe:/a:mandriva:linux:libggadget-npapi1.0_0", "p-cpe:/a:mandriva:linux:firefox-te", "p-cpe:/a:mandriva:linux:firefox-eo", "p-cpe:/a:mandriva:linux:mozilla-thunderbird-beagle", "p-cpe:/a:mandriva:linux:libopensc-devel", "cpe:/o:mandriva:linux:2010.0", "p-cpe:/a:mandriva:linux:firefox-mk", "p-cpe:/a:mandriva:linux:epiphany-extensions", "p-cpe:/a:mandriva:linux:python-xpcom", "p-cpe:/a:mandriva:linux:firefox-ca", "p-cpe:/a:mandriva:linux:firefox-bg", "p-cpe:/a:mandriva:linux:firefox-et", "p-cpe:/a:mandriva:linux:epiphany", "p-cpe:/a:mandriva:linux:firefox-si", "p-cpe:/a:mandriva:linux:firefox-pt_PT", "p-cpe:/a:mandriva:linux:firefox-ext-blogrovr", "p-cpe:/a:mandriva:linux:libggadget-gtk1.0_0", "p-cpe:/a:mandriva:linux:firefox-cy", "p-cpe:/a:mandriva:linux:libxulrunner1.9.1.4", "p-cpe:/a:mandriva:linux:beagle", "p-cpe:/a:mandriva:linux:firefox-ko", "p-cpe:/a:mandriva:linux:lib64opensc-devel", "p-cpe:/a:mandriva:linux:beagle-gui-qt", "p-cpe:/a:mandriva:linux:firefox-nb_NO", "p-cpe:/a:mandriva:linux:firefox-uk", "p-cpe:/a:mandriva:linux:firefox-kn", "p-cpe:/a:mandriva:linux:lib64ggadget1.0_0", "p-cpe:/a:mandriva:linux:firefox-devel", "p-cpe:/a:mandriva:linux:beagle-libs", "p-cpe:/a:mandriva:linux:libggadget-js1.0_0", "p-cpe:/a:mandriva:linux:lib64opensc2", "p-cpe:/a:mandriva:linux:firefox-ar", "p-cpe:/a:mandriva:linux:firefox-nn_NO", "p-cpe:/a:mandriva:linux:firefox-pt_BR", "p-cpe:/a:mandriva:linux:libggadget-xdg1.0_0", "p-cpe:/a:mandriva:linux:gnome-python-gdl", "p-cpe:/a:mandriva:linux:firefox-da", "p-cpe:/a:mandriva:linux:firefox-hu", "p-cpe:/a:mandriva:linux:firefox-ext-plasmanotify", "p-cpe:/a:mandriva:linux:google-gadgets-qt", "p-cpe:/a:mandriva:linux:firefox-sr", "p-cpe:/a:mandriva:linux:firefox-pl", "p-cpe:/a:mandriva:linux:gnome-python-gda-devel", "p-cpe:/a:mandriva:linux:beagle-crawl-system", "p-cpe:/a:mandriva:linux:firefox-gu_IN", "p-cpe:/a:mandriva:linux:firefox-cs", "p-cpe:/a:mandriva:linux:gnome-python-extras", "p-cpe:/a:mandriva:linux:firefox-hi", "p-cpe:/a:mandriva:linux:firefox-th", "p-cpe:/a:mandriva:linux:firefox-en_GB", "p-cpe:/a:mandriva:linux:firefox-mr", "p-cpe:/a:mandriva:linux:firefox-ext-foxmarks", "p-cpe:/a:mandriva:linux:firefox-he", "p-cpe:/a:mandriva:linux:libggadget-dbus1.0_0", "p-cpe:/a:mandriva:linux:beagle-gui", "p-cpe:/a:mandriva:linux:gnome-python-gtkspell"], "id": "MANDRIVA_MDVSA-2009-294.NASL", "href": "https://www.tenable.com/plugins/nessus/48157", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Mandriva Linux Security Advisory MDVSA-2009:294. \n# The text itself is copyright (C) Mandriva S.A.\n#\n\nif (NASL_LEVEL < 3000) exit(0);\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(48157);\n script_version(\"1.23\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2009-0689\", \"CVE-2009-3274\", \"CVE-2009-3370\", \"CVE-2009-3371\", \"CVE-2009-3372\", \"CVE-2009-3373\", \"CVE-2009-3374\", \"CVE-2009-3375\", \"CVE-2009-3376\", \"CVE-2009-3377\", \"CVE-2009-3378\", \"CVE-2009-3379\", \"CVE-2009-3380\");\n script_bugtraq_id(36851, 36852, 36853, 36854, 36855, 36856, 36857, 36858, 36867, 36871, 36872, 36873, 36875);\n script_xref(name:\"MDVSA\", value:\"2009:294\");\n\n script_name(english:\"Mandriva Linux Security Advisory : firefox (MDVSA-2009:294)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Mandriva Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Security issues were identified and fixed in firefox 3.5.x :\n\nSecurity researcher Alin Rad Pop of Secunia Research reported a\nheap-based buffer overflow in Mozilla's string to floating point\nnumber conversion routines. Using this vulnerability an attacker could\ncraft some malicious JavaScript code containing a very long string to\nbe converted to a floating point number which would result in improper\nmemory allocation and the execution of an arbitrary memory location.\nThis vulnerability could thus be leveraged by the attacker to run\narbitrary code on a victim's computer (CVE-2009-1563).\n\nSecurity researcher Jeremy Brown reported that the file naming scheme\nused for downloading a file which already exists in the downloads\nfolder is predictable. If an attacker had local access to a victim's\ncomputer and knew the name of a file the victim intended to open\nthrough the Download Manager, he could use this vulnerability to place\na malicious file in the world-writable directory used to save\ntemporary downloaded files and cause the browser to choose the\nincorrect file when opening it. Since this attack requires local\naccess to the victim's machine, the severity of this vulnerability was\ndetermined to be low (CVE-2009-3274).\n\nSecurity researcher Paul Stone reported that a user's form history,\nboth from web content as well as the smart location bar, was\nvulnerable to theft. A malicious web page could synthesize events such\nas mouse focus and key presses on behalf of the victim and trick the\nbrowser into auto-filling the form fields with history entries and\nthen reading the entries (CVE-2009-3370).\n\nSecurity researcher Orlando Berrera of Sec Theory reported that\nrecursive creation of JavaScript web-workers can be used to create a\nset of objects whose memory could be freed prior to their use. These\nconditions often result in a crash which could potentially be used by\nan attacker to run arbitrary code on a victim's computer\n(CVE-2009-3371).\n\nSecurity researcher Marco C. reported a flaw in the parsing of regular\nexpressions used in Proxy Auto-configuration (PAC) files. In certain\ncases this flaw could be used by an attacker to crash a victim's\nbrowser and run arbitrary code on their computer. Since this\nvulnerability requires the victim to have PAC configured in their\nenvironment with specific regular expresssions which can trigger the\ncrash, the severity of the issue was determined to be moderate\n(CVE-2009-3372).\n\nSecurity research firm iDefense reported that researcher regenrecht\ndiscovered a heap-based buffer overflow in Mozilla's GIF image parser.\nThis vulnerability could potentially be used by an attacker to crash a\nvictim's browser and run arbitrary code on their computer\n(CVE-2009-3373).\n\nMozilla security researcher moz_bug_r_a4 reported that the XPCOM\nutility XPCVariant::VariantDataToJS unwrapped doubly-wrapped objects\nbefore returning them to chrome callers. This could result in chrome\nprivileged code calling methods on an object which had previously been\ncreated or modified by web content, potentially executing malicious\nJavaScript code with chrome privileges (CVE-2009-3374).\n\nSecurity researcher Gregory Fleischer reported that text within a\nselection on a web page can be read by JavaScript in a different\ndomain using the document.getSelection function, violating the\nsame-origin policy. Since this vulnerability requires user interaction\nto exploit, its severity was determined to be moderate\n(CVE-2009-3375).\n\nMozilla security researchers Jesse Ruderman and Sid Stamm reported\nthat when downloading a file containing a right-to-left override\ncharacter (RTL) in the filename, the name displayed in the dialog\ntitle bar conflicts with the name of the file shown in the dialog\nbody. An attacker could use this vulnerability to obfuscate the name\nand file extension of a file to be downloaded and opened, potentially\ncausing a user to run an executable file when they expected to open a\nnon-executable file (CVE-2009-3376).\n\nMozilla upgraded several third-party libraries used in media rendering\nto address multiple memory safety and stability bugs identified by\nmembers of the Mozilla community. Some of the bugs discovered could\npotentially be used by an attacker to crash a victim's browser and\nexecute arbitrary code on their computer. liboggz, libvorbis, and\nliboggplay were all upgraded to address these issues (CVE-2009-3377,\nCVE-2009-3379, CVE-2009-3378).\n\nMozilla developers and community members identified and fixed several\nstability bugs in the browser engine used in Firefox and other\nMozilla-based products. Some of these crashes showed evidence of\nmemory corruption under certain circumstances and we presume that with\nenough effort at least some of these could be exploited to run\narbitrary code (CVE-2009-3380).\n\nAdditionally, some packages which require so, have been rebuilt and\nare being provided as updates.\"\n );\n # https://www.mozilla.org/en-US/security/known-vulnerabilities/firefox-3.5/#firefox3.5.4\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?9138152c\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_cwe_id(16, 119, 264, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:beagle\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:beagle-crawl-system\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:beagle-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:beagle-evolution\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:beagle-gui\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:beagle-gui-qt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:beagle-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:epiphany\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:epiphany-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:epiphany-extensions\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-af\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-ar\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-be\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-bg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-bn\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-ca\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-cs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-cy\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-da\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-de\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-el\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-en_GB\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-eo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-es_AR\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-es_ES\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-et\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-eu\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-ext-beagle\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-ext-blogrovr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-ext-foxmarks\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-ext-mozvoikko\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-ext-plasmanotify\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-ext-r-kiosk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-ext-scribefire\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-fi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-fr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-fy\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-ga_IE\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-gl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-gu_IN\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-he\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-hi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-hu\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-id\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-is\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-it\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-ja\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-ka\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-kn\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-ko\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-ku\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-lt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-lv\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-mk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-mn\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-mr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-nb_NO\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-nl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-nn_NO\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-oc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-pa_IN\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-pl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-pt_BR\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-pt_PT\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-ro\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-ru\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-si\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-sk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-sl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-sq\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-sr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-sv_SE\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-te\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-th\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-theme-kde4ff\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-tr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-uk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-zh_CN\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:firefox-zh_TW\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:gnome-python-extras\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:gnome-python-gda\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:gnome-python-gda-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:gnome-python-gdl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:gnome-python-gtkhtml2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:gnome-python-gtkmozembed\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:gnome-python-gtkspell\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:google-gadgets-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:google-gadgets-gtk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:google-gadgets-qt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64ggadget-dbus1.0_0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64ggadget-gtk1.0_0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64ggadget-js1.0_0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64ggadget-npapi1.0_0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64ggadget-qt1.0_0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64ggadget-webkitjs0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64ggadget-xdg1.0_0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64ggadget1.0_0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64google-gadgets-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64opensc-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64opensc2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64xulrunner-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64xulrunner1.9.1.4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libggadget-dbus1.0_0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libggadget-gtk1.0_0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libggadget-js1.0_0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libggadget-npapi1.0_0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libggadget-qt1.0_0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libggadget-webkitjs0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libggadget-xdg1.0_0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libggadget1.0_0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libgoogle-gadgets-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libopensc-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libopensc2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libxulrunner-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libxulrunner1.9.1.4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-plugin-opensc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mozilla-thunderbird-beagle\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:opensc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:python-xpcom\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:xulrunner\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:yelp\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:linux:2010.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/11/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/07/30\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2010-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Mandriva Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/Mandrake/release\", \"Host/Mandrake/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Mandrake/release\")) audit(AUDIT_OS_NOT, \"Mandriva / Mandake Linux\");\nif (!get_kb_item(\"Host/Mandrake/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^(amd64|i[3-6]86|x86_64)$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Mandriva / Mandrake Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"MDK2010.0\", reference:\"beagle-0.3.9-19.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"beagle-crawl-system-0.3.9-19.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"beagle-doc-0.3.9-19.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"beagle-evolution-0.3.9-19.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"beagle-gui-0.3.9-19.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"beagle-gui-qt-0.3.9-19.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"beagle-libs-0.3.9-19.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"epiphany-2.28.1-1.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"epiphany-devel-2.28.1-1.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"epiphany-extensions-2.28.1-1.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-3.5.4-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-af-3.5.4-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-ar-3.5.4-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-be-3.5.4-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-bg-3.5.4-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-bn-3.5.4-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-ca-3.5.4-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-cs-3.5.4-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-cy-3.5.4-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-da-3.5.4-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-de-3.5.4-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-devel-3.5.4-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-el-3.5.4-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-en_GB-3.5.4-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-eo-3.5.4-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-es_AR-3.5.4-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-es_ES-3.5.4-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-et-3.5.4-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-eu-3.5.4-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-ext-beagle-0.3.9-19.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-ext-blogrovr-1.1.804-6.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-ext-foxmarks-2.7.2-2.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-ext-mozvoikko-1.0-6.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-ext-plasmanotify-0.3.0-6.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-ext-r-kiosk-0.7.2-9.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-ext-scribefire-3.4.5-1.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-fi-3.5.4-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-fr-3.5.4-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-fy-3.5.4-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-ga_IE-3.5.4-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-gl-3.5.4-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-gu_IN-3.5.4-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-he-3.5.4-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-hi-3.5.4-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-hu-3.5.4-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-id-3.5.4-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-is-3.5.4-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-it-3.5.4-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-ja-3.5.4-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-ka-3.5.4-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-kn-3.5.4-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-ko-3.5.4-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-ku-3.5.4-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-lt-3.5.4-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-lv-3.5.4-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-mk-3.5.4-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-mn-3.5.4-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-mr-3.5.4-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-nb_NO-3.5.4-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-nl-3.5.4-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-nn_NO-3.5.4-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-oc-3.5.4-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-pa_IN-3.5.4-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-pl-3.5.4-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-pt_BR-3.5.4-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-pt_PT-3.5.4-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-ro-3.5.4-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-ru-3.5.4-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-si-3.5.4-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-sk-3.5.4-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-sl-3.5.4-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-sq-3.5.4-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-sr-3.5.4-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-sv_SE-3.5.4-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-te-3.5.4-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-th-3.5.4-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-theme-kde4ff-0.14-18.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-tr-3.5.4-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-uk-3.5.4-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-zh_CN-3.5.4-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"firefox-zh_TW-3.5.4-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"gnome-python-extras-2.25.3-10.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"gnome-python-gda-2.25.3-10.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"gnome-python-gda-devel-2.25.3-10.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"gnome-python-gdl-2.25.3-10.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"gnome-python-gtkhtml2-2.25.3-10.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"gnome-python-gtkmozembed-2.25.3-10.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"gnome-python-gtkspell-2.25.3-10.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"google-gadgets-common-0.11.1-2.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"google-gadgets-gtk-0.11.1-2.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"google-gadgets-qt-0.11.1-2.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"x86_64\", reference:\"lib64ggadget-dbus1.0_0-0.11.1-2.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"x86_64\", reference:\"lib64ggadget-gtk1.0_0-0.11.1-2.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"x86_64\", reference:\"lib64ggadget-js1.0_0-0.11.1-2.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"x86_64\", reference:\"lib64ggadget-npapi1.0_0-0.11.1-2.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"x86_64\", reference:\"lib64ggadget-qt1.0_0-0.11.1-2.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"x86_64\", reference:\"lib64ggadget-webkitjs0-0.11.1-2.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"x86_64\", reference:\"lib64ggadget-xdg1.0_0-0.11.1-2.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"x86_64\", reference:\"lib64ggadget1.0_0-0.11.1-2.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"x86_64\", reference:\"lib64google-gadgets-devel-0.11.1-2.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"x86_64\", reference:\"lib64opensc-devel-0.11.9-1.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"x86_64\", reference:\"lib64opensc2-0.11.9-1.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"x86_64\", reference:\"lib64xulrunner-devel-1.9.1.4-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"x86_64\", reference:\"lib64xulrunner1.9.1.4-1.9.1.4-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"libggadget-dbus1.0_0-0.11.1-2.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"libggadget-gtk1.0_0-0.11.1-2.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"libggadget-js1.0_0-0.11.1-2.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"libggadget-npapi1.0_0-0.11.1-2.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"libggadget-qt1.0_0-0.11.1-2.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"libggadget-webkitjs0-0.11.1-2.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"libggadget-xdg1.0_0-0.11.1-2.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"libggadget1.0_0-0.11.1-2.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"libgoogle-gadgets-devel-0.11.1-2.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"libopensc-devel-0.11.9-1.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"libopensc2-0.11.9-1.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"libxulrunner-devel-1.9.1.4-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"libxulrunner1.9.1.4-1.9.1.4-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"mozilla-plugin-opensc-0.11.9-1.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"mozilla-thunderbird-beagle-0.3.9-19.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"opensc-0.11.9-1.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"python-xpcom-1.9.1.4-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"xulrunner-1.9.1.4-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"yelp-2.28.0-1.1mdv2010.0\", yank:\"mdv\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-17T14:46:37", "description": "The Mozilla XULRunner engine was updated to version 1.9.0.15 to fix\nvarious bugs and security issues.\n\nThe following security issues have been fixed :\n\n - Security researcher Paul Stone reported that a user's\n form history, both from web content as well as the smart\n location bar, was vulnerable to theft. A malicious web\n page could synthesize events such as mouse focus and key\n presses on behalf of the victim and trick the browser\n into auto-filling the form fields with history entries\n and then reading the entries. (MFSA 2009-52 /\n CVE-2009-3370)\n\n - Security researcher Jeremy Brown reported that the file\n naming scheme used for downloading a file which already\n exists in the downloads folder is predictable. If an\n attacker had local access to a victim's computer and\n knew the name of a file the victim intended to open\n through the Download Manager, he could use this\n vulnerability to place a malicious file in the\n world-writable directory used to save temporary\n downloaded files and cause the browser to choose the\n incorrect file when opening it. Since this attack\n requires local access to the victim's machine, the\n severity of this vulnerability was determined to be low.\n (MFSA 2009-53 / CVE-2009-3274)\n\n - Security researcher Orlando Berrera of Sec Theory\n reported that recursive creation of JavaScript\n web-workers can be used to create a set of objects whose\n memory could be freed prior to their use. These\n conditions often result in a crash which could\n potentially be used by an attacker to run arbitrary code\n on a victim's computer. (MFSA 2009-54 / CVE-2009-3371)\n\n - Security researcher Marco C. reported a flaw in the\n parsing of regular expressions used in Proxy\n Auto-configuration (PAC) files. In certain cases this\n flaw could be used by an attacker to crash a victim's\n browser and run arbitrary code on their computer. Since\n this vulnerability requires the victim to have PAC\n configured in their environment with specific regular\n expresssions which can trigger the crash, the severity\n of the issue was determined to be moderate. (MFSA\n 2009-55 / CVE-2009-3372)\n\n - Security research firm iDefense reported that researcher\n regenrecht discovered a heap-based buffer overflow in\n Mozilla's GIF image parser. This vulnerability could\n potentially be used by an attacker to crash a victim's\n browser and run arbitrary code on their computer. (MFSA\n 2009-56 / CVE-2009-3373)\n\n - Mozilla security researcher moz_bug_r_a4 reported that\n the XPCOM utility XPCVariant::VariantDataToJS unwrapped\n doubly-wrapped objects before returning them to chrome\n callers. This could result in chrome privileged code\n calling methods on an object which had previously been\n created or modified by web content, potentially\n executing malicious JavaScript code with chrome\n privileges. (MFSA 2009-57 / CVE-2009-3374)\n\n - Security researcher Alin Rad Pop of Secunia Research\n reported a heap-based buffer overflow in Mozilla's\n string to floating point number conversion routines.\n Using this vulnerability an attacker could craft some\n malicious JavaScript code containing a very long string\n to be converted to a floating point number which would\n result in improper memory allocation and the execution\n of an arbitrary memory location. This vulnerability\n could thus be leveraged by the attacker to run arbitrary\n code on a victim's computer. (MFSA 2009-59 /\n CVE-2009-1563)\n\n - Security researcher Gregory Fleischer reported that text\n within a selection on a web page can be read by\n JavaScript in a different domain using the\n document.getSelection function, violating the\n same-origin policy. Since this vulnerability requires\n user interaction to exploit, its severity was determined\n to be moderate. (MFSA 2009-61 / CVE-2009-3375)\n\n - Mozilla security researchers Jesse Ruderman and Sid\n Stamm reported that when downloading a file containing a\n right-to-left override character (RTL) in the filename,\n the name displayed in the dialog title bar conflicts\n with the name of the file shown in the dialog body. An\n attacker could use this vulnerability to obfuscate the\n name and file extension of a file to be downloaded and\n opened, potentially causing a user to run an executable\n file when they expected to open a non-executable file.\n (MFSA 2009-62 / CVE-2009-3376)\n\n - Mozilla developers and community members identified and\n fixed several stability bugs in the browser engine used\n in Firefox and other Mozilla-based products. Some of\n these crashes showed evidence of memory corruption under\n certain circumstances and we presume that with enough\n effort at least some of these could be exploited to run\n arbitrary code. (MFSA 2009-64 / CVE-2009-3380 /\n CVE-2009-3381 / CVE-2009-3382 / CVE-2009-3383)", "edition": 25, "published": "2009-11-04T00:00:00", "title": "SuSE 10 Security Update : Mozilla XULRunner (ZYPP Patch Number 6616)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-1563", "CVE-2009-3376", "CVE-2009-3274", "CVE-2009-3380", "CVE-2009-3373", "CVE-2009-3383", "CVE-2009-3372", "CVE-2009-3375", "CVE-2009-0689", "CVE-2009-3374", "CVE-2009-3371", "CVE-2009-3382", "CVE-2009-3370", "CVE-2009-3381"], "modified": "2009-11-04T00:00:00", "cpe": ["cpe:/o:suse:suse_linux"], "id": "SUSE_MOZILLA-XULRUNNER190-6616.NASL", "href": "https://www.tenable.com/plugins/nessus/42366", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The text description of this plugin is (C) Novell, Inc.\n#\n\nif (NASL_LEVEL < 3000) exit(0);\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(42366);\n script_version(\"1.16\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2009-0689\", \"CVE-2009-3274\", \"CVE-2009-3370\", \"CVE-2009-3371\", \"CVE-2009-3372\", \"CVE-2009-3373\", \"CVE-2009-3374\", \"CVE-2009-3375\", \"CVE-2009-3376\", \"CVE-2009-3380\", \"CVE-2009-3381\", \"CVE-2009-3382\", \"CVE-2009-3383\");\n\n script_name(english:\"SuSE 10 Security Update : Mozilla XULRunner (ZYPP Patch Number 6616)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SuSE 10 host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The Mozilla XULRunner engine was updated to version 1.9.0.15 to fix\nvarious bugs and security issues.\n\nThe following security issues have been fixed :\n\n - Security researcher Paul Stone reported that a user's\n form history, both from web content as well as the smart\n location bar, was vulnerable to theft. A malicious web\n page could synthesize events such as mouse focus and key\n presses on behalf of the victim and trick the browser\n into auto-filling the form fields with history entries\n and then reading the entries. (MFSA 2009-52 /\n CVE-2009-3370)\n\n - Security researcher Jeremy Brown reported that the file\n naming scheme used for downloading a file which already\n exists in the downloads folder is predictable. If an\n attacker had local access to a victim's computer and\n knew the name of a file the victim intended to open\n through the Download Manager, he could use this\n vulnerability to place a malicious file in the\n world-writable directory used to save temporary\n downloaded files and cause the browser to choose the\n incorrect file when opening it. Since this attack\n requires local access to the victim's machine, the\n severity of this vulnerability was determined to be low.\n (MFSA 2009-53 / CVE-2009-3274)\n\n - Security researcher Orlando Berrera of Sec Theory\n reported that recursive creation of JavaScript\n web-workers can be used to create a set of objects whose\n memory could be freed prior to their use. These\n conditions often result in a crash which could\n potentially be used by an attacker to run arbitrary code\n on a victim's computer. (MFSA 2009-54 / CVE-2009-3371)\n\n - Security researcher Marco C. reported a flaw in the\n parsing of regular expressions used in Proxy\n Auto-configuration (PAC) files. In certain cases this\n flaw could be used by an attacker to crash a victim's\n browser and run arbitrary code on their computer. Since\n this vulnerability requires the victim to have PAC\n configured in their environment with specific regular\n expresssions which can trigger the crash, the severity\n of the issue was determined to be moderate. (MFSA\n 2009-55 / CVE-2009-3372)\n\n - Security research firm iDefense reported that researcher\n regenrecht discovered a heap-based buffer overflow in\n Mozilla's GIF image parser. This vulnerability could\n potentially be used by an attacker to crash a victim's\n browser and run arbitrary code on their computer. (MFSA\n 2009-56 / CVE-2009-3373)\n\n - Mozilla security researcher moz_bug_r_a4 reported that\n the XPCOM utility XPCVariant::VariantDataToJS unwrapped\n doubly-wrapped objects before returning them to chrome\n callers. This could result in chrome privileged code\n calling methods on an object which had previously been\n created or modified by web content, potentially\n executing malicious JavaScript code with chrome\n privileges. (MFSA 2009-57 / CVE-2009-3374)\n\n - Security researcher Alin Rad Pop of Secunia Research\n reported a heap-based buffer overflow in Mozilla's\n string to floating point number conversion routines.\n Using this vulnerability an attacker could craft some\n malicious JavaScript code containing a very long string\n to be converted to a floating point number which would\n result in improper memory allocation and the execution\n of an arbitrary memory location. This vulnerability\n could thus be leveraged by the attacker to run arbitrary\n code on a victim's computer. (MFSA 2009-59 /\n CVE-2009-1563)\n\n - Security researcher Gregory Fleischer reported that text\n within a selection on a web page can be read by\n JavaScript in a different domain using the\n document.getSelection function, violating the\n same-origin policy. Since this vulnerability requires\n user interaction to exploit, its severity was determined\n to be moderate. (MFSA 2009-61 / CVE-2009-3375)\n\n - Mozilla security researchers Jesse Ruderman and Sid\n Stamm reported that when downloading a file containing a\n right-to-left override character (RTL) in the filename,\n the name displayed in the dialog title bar conflicts\n with the name of the file shown in the dialog body. An\n attacker could use this vulnerability to obfuscate the\n name and file extension of a file to be downloaded and\n opened, potentially causing a user to run an executable\n file when they expected to open a non-executable file.\n (MFSA 2009-62 / CVE-2009-3376)\n\n - Mozilla developers and community members identified and\n fixed several stability bugs in the browser engine used\n in Firefox and other Mozilla-based products. Some of\n these crashes showed evidence of memory corruption under\n certain circumstances and we presume that with enough\n effort at least some of these could be exploited to run\n arbitrary code. (MFSA 2009-64 / CVE-2009-3380 /\n CVE-2009-3381 / CVE-2009-3382 / CVE-2009-3383)\"\n );\n # http://www.mozilla.org/security/announce/2009/mfsa2009-52.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2009-52/\"\n );\n # http://www.mozilla.org/security/announce/2009/mfsa2009-53.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2009-53/\"\n );\n # http://www.mozilla.org/security/announce/2009/mfsa2009-54.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2009-54/\"\n );\n # http://www.mozilla.org/security/announce/2009/mfsa2009-55.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2009-55/\"\n );\n # http://www.mozilla.org/security/announce/2009/mfsa2009-56.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2009-56/\"\n );\n # http://www.mozilla.org/security/announce/2009/mfsa2009-57.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2009-57/\"\n );\n # http://www.mozilla.org/security/announce/2009/mfsa2009-59.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2009-59/\"\n );\n # http://www.mozilla.org/security/announce/2009/mfsa2009-61.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2009-61/\"\n );\n # http://www.mozilla.org/security/announce/2009/mfsa2009-62.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2009-62/\"\n );\n # http://www.mozilla.org/security/announce/2009/mfsa2009-64.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2009-64/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2009-1563.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2009-3274.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2009-3370.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2009-3371.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2009-3372.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2009-3373.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2009-3374.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2009-3375.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2009-3376.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2009-3380.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2009-3381.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2009-3382.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2009-3383.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Apply ZYPP patch number 6616.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_cwe_id(16, 119, 264, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:suse:suse_linux\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2009/09/21\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/10/30\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/11/04\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) exit(0, \"Local checks are not enabled.\");\nif (!get_kb_item(\"Host/SuSE/release\")) exit(0, \"The host is not running SuSE.\");\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) exit(1, \"Could not obtain the list of installed packages.\");\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) exit(1, \"Failed to determine the architecture type.\");\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") exit(1, \"Local checks for SuSE 10 on the '\"+cpu+\"' architecture have not been implemented.\");\n\n\nflag = 0;\nif (rpm_check(release:\"SLED10\", sp:2, reference:\"mozilla-xulrunner190-1.9.0.15-0.4.1\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:2, reference:\"mozilla-xulrunner190-gnomevfs-1.9.0.15-0.4.1\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:2, reference:\"mozilla-xulrunner190-translations-1.9.0.15-0.4.1\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:2, cpu:\"x86_64\", reference:\"mozilla-xulrunner190-32bit-1.9.0.15-0.4.1\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:2, cpu:\"x86_64\", reference:\"mozilla-xulrunner190-gnomevfs-32bit-1.9.0.15-0.4.1\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:2, cpu:\"x86_64\", reference:\"mozilla-xulrunner190-translations-32bit-1.9.0.15-0.4.1\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, reference:\"mozilla-xulrunner190-1.9.0.15-0.4.1\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, reference:\"mozilla-xulrunner190-gnomevfs-1.9.0.15-0.4.1\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, reference:\"mozilla-xulrunner190-translations-1.9.0.15-0.4.1\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"x86_64\", reference:\"mozilla-xulrunner190-32bit-1.9.0.15-0.4.1\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"x86_64\", reference:\"mozilla-xulrunner190-gnomevfs-32bit-1.9.0.15-0.4.1\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"x86_64\", reference:\"mozilla-xulrunner190-translations-32bit-1.9.0.15-0.4.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse exit(0, \"The host is not affected.\");\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-17T14:03:51", "description": "The Mozilla Firefox browser was updated to version 3.0.0.15 to fix\nvarious bugs and security issues.\n\nFollowing security issues have been fixed: MFSA 2009-52 /\nCVE-2009-3370: Security researcher Paul Stone reported that a user's\nform history, both from web content as well as the smart location bar,\nwas vulnerable to theft. A malicious web page could synthesize events\nsuch as mouse focus and key presses on behalf of the victim and trick\nthe browser into auto-filling the form fields with history entries and\nthen reading the entries.\n\nMFSA 2009-53 / CVE-2009-3274: Security researcher Jeremy Brown\nreported that the file naming scheme used for downloading a file which\nalready exists in the downloads folder is predictable. If an attacker\nhad local access to a victim's computer and knew the name of a file\nthe victim intended to open through the Download Manager, he could use\nthis vulnerability to place a malicious file in the world-writable\ndirectory used to save temporary downloaded files and cause the\nbrowser to choose the incorrect file when opening it. Since this\nattack requires local access to the victim's machine, the severity of\nthis vulnerability was determined to be low.\n\nMFSA 2009-54 / CVE-2009-3371: Security researcher Orlando Berrera of\nSec Theory reported that recursive creation of JavaScript web-workers\ncan be used to create a set of objects whose memory could be freed\nprior to their use. These conditions often result in a crash which\ncould potentially be used by an attacker to run arbitrary code on a\nvictim's computer.\n\nMFSA 2009-55 / CVE-2009-3372: Security researcher Marco C. reported a\nflaw in the parsing of regular expressions used in Proxy\nAuto-configuration (PAC) files. In certain cases this flaw could be\nused by an attacker to crash a victim's browser and run arbitrary code\non their computer. Since this vulnerability requires the victim to\nhave PAC configured in their environment with specific regular\nexpresssions which can trigger the crash, the severity of the issue\nwas determined to be moderate.\n\nMFSA 2009-56 / CVE-2009-3373: Security research firm iDefense reported\nthat researcher regenrecht discovered a heap-based buffer overflow in\nMozilla's GIF image parser. This vulnerability could potentially be\nused by an attacker to crash a victim's browser and run arbitrary code\non their computer.\n\nMFSA 2009-57 / CVE-2009-3374: Mozilla security researcher moz_bug_r_a4\nreported that the XPCOM utility XPCVariant::VariantDataToJS unwrapped\ndoubly-wrapped objects before returning them to chrome callers. This\ncould result in chrome privileged code calling methods on an object\nwhich had previously been created or modified by web content,\npotentially executing malicious JavaScript code with chrome\nprivileges.\n\nMFSA 2009-59 / CVE-2009-1563: Security researcher Alin Rad Pop of\nSecunia Research reported a heap-based buffer overflow in Mozilla's\nstring to floating point number conversion routines. Using this\nvulnerability an attacker could craft some malicious JavaScript code\ncontaining a very long string to be converted to a floating point\nnumber which would result in improper memory allocation and the\nexecution of an arbitrary memory location. This vulnerability could\nthus be leveraged by the attacker to run arbitrary code on a victim's\ncomputer.\n\nMFSA 2009-61 / CVE-2009-3375: Security researcher Gregory Fleischer\nreported that text within a selection on a web page can be read by\nJavaScript in a different domain using the document.getSelection\nfunction, violating the same-origin policy. Since this vulnerability\nrequires user interaction to exploit, its severity was determined to\nbe moderate.\n\nMFSA 2009-62 / CVE-2009-3376: Mozilla security researchers Jesse\nRuderman and Sid Stamm reported that when downloading a file\ncontaining a right-to-left override character (RTL) in the filename,\nthe name displayed in the dialog title bar conflicts with the name of\nthe file shown in the dialog body. An attacker could use this\nvulnerability to obfuscate the name and file extension of a file to be\ndownloaded and opened, potentially causing a user to run an executable\nfile when they expected to open a non-executable file.\n\nMFSA 2009-64 / CVE-2009-3380 / CVE-2009-3381 / CVE-2009-3382 /\nCVE-2009-3383: Mozilla developers and community members identified and\nfixed several stability bugs in the browser engine used in Firefox and\nother Mozilla-based products. Some of these crashes showed evidence of\nmemory corruption under certain circumstances and we presume that with\nenough effort at least some of these could be exploited to run\narbitrary code.", "edition": 25, "published": "2009-11-05T00:00:00", "title": "openSUSE Security Update : MozillaFirefox (MozillaFirefox-1499)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-1563", "CVE-2009-3376", "CVE-2009-3274", "CVE-2009-3380", "CVE-2009-3373", "CVE-2009-3383", "CVE-2009-3372", "CVE-2009-3375", "CVE-2009-0689", "CVE-2009-3374", "CVE-2009-3371", "CVE-2009-3382", "CVE-2009-3370", "CVE-2009-3381"], "modified": "2009-11-05T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:mozilla-xulrunner190-gnomevfs-32bit", "p-cpe:/a:novell:opensuse:MozillaFirefox-translations", "p-cpe:/a:novell:opensuse:python-xpcom190", "cpe:/o:novell:opensuse:11.1", "p-cpe:/a:novell:opensuse:mozilla-xulrunner190-32bit", "p-cpe:/a:novell:opensuse:mozilla-xulrunner190-translations-32bit", "p-cpe:/a:novell:opensuse:MozillaFirefox-branding-upstream", "p-cpe:/a:novell:opensuse:mozilla-xulrunner190-devel", "p-cpe:/a:novell:opensuse:mozilla-xulrunner190-translations", "p-cpe:/a:novell:opensuse:MozillaFirefox", "p-cpe:/a:novell:opensuse:mozilla-xulrunner190", "p-cpe:/a:novell:opensuse:mozilla-xulrunner190-gnomevfs"], "id": "SUSE_11_1_MOZILLAFIREFOX-091102.NASL", "href": "https://www.tenable.com/plugins/nessus/42391", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update MozillaFirefox-1499.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(42391);\n script_version(\"1.13\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2009-0689\", \"CVE-2009-3274\", \"CVE-2009-3370\", \"CVE-2009-3371\", \"CVE-2009-3372\", \"CVE-2009-3373\", \"CVE-2009-3374\", \"CVE-2009-3375\", \"CVE-2009-3376\", \"CVE-2009-3380\", \"CVE-2009-3381\", \"CVE-2009-3382\", \"CVE-2009-3383\");\n\n script_name(english:\"openSUSE Security Update : MozillaFirefox (MozillaFirefox-1499)\");\n script_summary(english:\"Check for the MozillaFirefox-1499 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The Mozilla Firefox browser was updated to version 3.0.0.15 to fix\nvarious bugs and security issues.\n\nFollowing security issues have been fixed: MFSA 2009-52 /\nCVE-2009-3370: Security researcher Paul Stone reported that a user's\nform history, both from web content as well as the smart location bar,\nwas vulnerable to theft. A malicious web page could synthesize events\nsuch as mouse focus and key presses on behalf of the victim and trick\nthe browser into auto-filling the form fields with history entries and\nthen reading the entries.\n\nMFSA 2009-53 / CVE-2009-3274: Security researcher Jeremy Brown\nreported that the file naming scheme used for downloading a file which\nalready exists in the downloads folder is predictable. If an attacker\nhad local access to a victim's computer and knew the name of a file\nthe victim intended to open through the Download Manager, he could use\nthis vulnerability to place a malicious file in the world-writable\ndirectory used to save temporary downloaded files and cause the\nbrowser to choose the incorrect file when opening it. Since this\nattack requires local access to the victim's machine, the severity of\nthis vulnerability was determined to be low.\n\nMFSA 2009-54 / CVE-2009-3371: Security researcher Orlando Berrera of\nSec Theory reported that recursive creation of JavaScript web-workers\ncan be used to create a set of objects whose memory could be freed\nprior to their use. These conditions often result in a crash which\ncould potentially be used by an attacker to run arbitrary code on a\nvictim's computer.\n\nMFSA 2009-55 / CVE-2009-3372: Security researcher Marco C. reported a\nflaw in the parsing of regular expressions used in Proxy\nAuto-configuration (PAC) files. In certain cases this flaw could be\nused by an attacker to crash a victim's browser and run arbitrary code\non their computer. Since this vulnerability requires the victim to\nhave PAC configured in their environment with specific regular\nexpresssions which can trigger the crash, the severity of the issue\nwas determined to be moderate.\n\nMFSA 2009-56 / CVE-2009-3373: Security research firm iDefense reported\nthat researcher regenrecht discovered a heap-based buffer overflow in\nMozilla's GIF image parser. This vulnerability could potentially be\nused by an attacker to crash a victim's browser and run arbitrary code\non their computer.\n\nMFSA 2009-57 / CVE-2009-3374: Mozilla security researcher moz_bug_r_a4\nreported that the XPCOM utility XPCVariant::VariantDataToJS unwrapped\ndoubly-wrapped objects before returning them to chrome callers. This\ncould result in chrome privileged code calling methods on an object\nwhich had previously been created or modified by web content,\npotentially executing malicious JavaScript code with chrome\nprivileges.\n\nMFSA 2009-59 / CVE-2009-1563: Security researcher Alin Rad Pop of\nSecunia Research reported a heap-based buffer overflow in Mozilla's\nstring to floating point number conversion routines. Using this\nvulnerability an attacker could craft some malicious JavaScript code\ncontaining a very long string to be converted to a floating point\nnumber which would result in improper memory allocation and the\nexecution of an arbitrary memory location. This vulnerability could\nthus be leveraged by the attacker to run arbitrary code on a victim's\ncomputer.\n\nMFSA 2009-61 / CVE-2009-3375: Security researcher Gregory Fleischer\nreported that text within a selection on a web page can be read by\nJavaScript in a different domain using the document.getSelection\nfunction, violating the same-origin policy. Since this vulnerability\nrequires user interaction to exploit, its severity was determined to\nbe moderate.\n\nMFSA 2009-62 / CVE-2009-3376: Mozilla security researchers Jesse\nRuderman and Sid Stamm reported that when downloading a file\ncontaining a right-to-left override character (RTL) in the filename,\nthe name displayed in the dialog title bar conflicts with the name of\nthe file shown in the dialog body. An attacker could use this\nvulnerability to obfuscate the name and file extension of a file to be\ndownloaded and opened, potentially causing a user to run an executable\nfile when they expected to open a non-executable file.\n\nMFSA 2009-64 / CVE-2009-3380 / CVE-2009-3381 / CVE-2009-3382 /\nCVE-2009-3383: Mozilla developers and community members identified and\nfixed several stability bugs in the browser engine used in Firefox and\nother Mozilla-based products. Some of these crashes showed evidence of\nmemory corruption under certain circumstances and we presume that with\nenough effort at least some of these could be exploited to run\narbitrary code.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=545277\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected MozillaFirefox packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_cwe_id(16, 119, 264, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:MozillaFirefox\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:MozillaFirefox-branding-upstream\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:MozillaFirefox-translations\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-xulrunner190\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-xulrunner190-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-xulrunner190-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-xulrunner190-gnomevfs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-xulrunner190-gnomevfs-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-xulrunner190-translations\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mozilla-xulrunner190-translations-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:python-xpcom190\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:11.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/11/02\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/11/05\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE11\\.1)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"11.1\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE11.1\", reference:\"MozillaFirefox-3.0.15-0.1.2\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", reference:\"MozillaFirefox-branding-upstream-3.0.15-0.1.2\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", reference:\"MozillaFirefox-translations-3.0.15-0.1.2\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", reference:\"mozilla-xulrunner190-1.9.0.15-0.1.2\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", reference:\"mozilla-xulrunner190-devel-1.9.0.15-0.1.2\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", reference:\"mozilla-xulrunner190-gnomevfs-1.9.0.15-0.1.2\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", reference:\"mozilla-xulrunner190-translations-1.9.0.15-0.1.2\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", reference:\"python-xpcom190-1.9.0.15-0.1.2\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", cpu:\"x86_64\", reference:\"mozilla-xulrunner190-32bit-1.9.0.15-0.1.2\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", cpu:\"x86_64\", reference:\"mozilla-xulrunner190-gnomevfs-32bit-1.9.0.15-0.1.2\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", cpu:\"x86_64\", reference:\"mozilla-xulrunner190-translations-32bit-1.9.0.15-0.1.2\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"MozillaFirefox\");\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-20T15:44:46", "description": "Alin Rad Pop discovered a heap-based buffer overflow in Firefox when\nit converted strings to floating point numbers. If a user were tricked\ninto viewing a malicious website, a remote attacker could cause a\ndenial of service or possibly execute arbitrary code with the\nprivileges of the user invoking the program. (CVE-2009-1563)\n\nJeremy Brown discovered that the Firefox Download Manager was\nvulnerable to symlink attacks. A local attacker could exploit this to\ncreate or overwrite files with the privileges of the user invoking the\nprogram. (CVE-2009-3274)\n\nPaul Stone discovered a flaw in the Firefox form history. If a user\nwere tricked into viewing a malicious website, a remote attacker could\naccess this data to steal confidential information. (CVE-2009-3370)\n\nOrlando Berrera discovered that Firefox did not properly free memory\nwhen using web-workers. If a user were tricked into viewing a\nmalicious website, a remote attacker could cause a denial of service\nor possibly execute arbitrary code with the privileges of the user\ninvoking the program. This issue only affected Ubuntu 9.10.\n(CVE-2009-3371)\n\nA flaw was discovered in the way Firefox processed Proxy\nAuto-configuration (PAC) files. If a user configured the browser to\nuse PAC files with certain regular expressions, an attacker could\ncause a denial of service or possibly execute arbitrary code with the\nprivileges of the user invoking the program. (CVE-2009-3372)\n\nA heap-based buffer overflow was discovered in Mozilla's GIF image\nparser. If a user were tricked into viewing a malicious website, a\nremote attacker could cause a denial of service or possibly execute\narbitrary code with the privileges of the user invoking the program.\n(CVE-2009-3373)\n\nA flaw was discovered in the JavaScript engine of Firefox. An attacker\ncould exploit this to execute scripts from page content with chrome\nprivileges. (CVE-2009-3374)\n\nGregory Fleischer discovered that the same-origin check in Firefox\ncould be bypassed by utilizing the document.getSelection function. An\nattacker could exploit this to read data from other domains.\n(CVE-2009-3375)\n\nJesse Ruderman and Sid Stamm discovered that Firefox did not properly\ndisplay filenames containing right-to-left (RTL) override characters.\nIf a user were tricked into downloading a malicious file with a\ncrafted filename, an attacker could exploit this to trick the user\ninto opening a different file than the user expected. (CVE-2009-3376)\n\nSeveral flaws were discovered in third-party media libraries. If a\nuser were tricked into opening a crafted media file, a remote attacker\ncould cause a denial of service or possibly execute arbitrary code\nwith the privileges of the user invoking the program. This issue only\naffected Ubuntu 9.10. (CVE-2009-3377)\n\nVladimir Vukicevic, Jesse Ruderman, Martijn Wargers, Daniel Banchero,\nDavid Keeler, Boris Zbarsky, Thomas Frederiksen, Marcia Knous, Carsten\nBook, Kevin Brosnan, David Anderson and Jeff Walden discovered various\nflaws in the browser and JavaScript engines of Firefox. If a user were\ntricked into viewing a malicious website, a remote attacker could\ncause a denial of service or possibly execute arbitrary code with the\nprivileges of the user invoking the program. (CVE-2009-3380,\nCVE-2009-3381, CVE-2009-3382, CVE-2009-3383).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 29, "published": "2009-11-02T00:00:00", "title": "Ubuntu 8.04 LTS / 8.10 / 9.04 / 9.10 : firefox-3.0, firefox-3.5, xulrunner-1.9, xulrunner-1.9.1 vulnerabilities (USN-853-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-1563", "CVE-2009-3376", "CVE-2009-3274", "CVE-2009-3380", "CVE-2009-3373", "CVE-2009-3383", "CVE-2009-3372", "CVE-2009-3375", "CVE-2009-0689", "CVE-2009-3374", "CVE-2009-3371", "CVE-2009-3377", "CVE-2009-3382", "CVE-2009-3370", "CVE-2009-3381"], "modified": "2009-11-02T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:abrowser", "p-cpe:/a:canonical:ubuntu_linux:firefox-3.0-dev", "p-cpe:/a:canonical:ubuntu_linux:firefox-3.1-dbg", "p-cpe:/a:canonical:ubuntu_linux:xulrunner-1.9-venkman", "p-cpe:/a:canonical:ubuntu_linux:firefox-3.1-dev", "p-cpe:/a:canonical:ubuntu_linux:xulrunner-1.9.1-dev", "p-cpe:/a:canonical:ubuntu_linux:firefox-dom-inspector", "p-cpe:/a:canonical:ubuntu_linux:firefox-gnome-support", "p-cpe:/a:canonical:ubuntu_linux:xulrunner-1.9.1-gnome-support", "p-cpe:/a:canonical:ubuntu_linux:xulrunner-1.9-dom-inspector", "p-cpe:/a:canonical:ubuntu_linux:firefox-libthai", "p-cpe:/a:canonical:ubuntu_linux:abrowser-3.1", "p-cpe:/a:canonical:ubuntu_linux:abrowser-3.5-branding", "p-cpe:/a:canonical:ubuntu_linux:xulrunner-1.9.1-dbg", "p-cpe:/a:canonical:ubuntu_linux:xulrunner-dev", "p-cpe:/a:canonical:ubuntu_linux:xulrunner-1.9.1", "p-cpe:/a:canonical:ubuntu_linux:firefox-dev", "p-cpe:/a:canonical:ubuntu_linux:firefox", "p-cpe:/a:canonical:ubuntu_linux:firefox-3.0-dom-inspector", "p-cpe:/a:canonical:ubuntu_linux:firefox-3.0-gnome-support", "p-cpe:/a:canonical:ubuntu_linux:abrowser-3.5", "p-cpe:/a:canonical:ubuntu_linux:firefox-3.0-venkman", "p-cpe:/a:canonical:ubuntu_linux:firefox-3.5", "p-cpe:/a:canonical:ubuntu_linux:xulrunner-1.9.1-testsuite", "p-cpe:/a:canonical:ubuntu_linux:firefox-3.5-gnome-support", "p-cpe:/a:canonical:ubuntu_linux:firefox-3.5-dbg", "p-cpe:/a:canonical:ubuntu_linux:firefox-granparadiso-dom-inspector", "p-cpe:/a:canonical:ubuntu_linux:firefox-trunk-gnome-support", "p-cpe:/a:canonical:ubuntu_linux:xulrunner-1.9-dev", "cpe:/o:canonical:ubuntu_linux:8.04:-:lts", "p-cpe:/a:canonical:ubuntu_linux:firefox-3.5-branding", "p-cpe:/a:canonical:ubuntu_linux:firefox-3.1", "p-cpe:/a:canonical:ubuntu_linux:xulrunner-1.9.1-testsuite-dev", "cpe:/o:canonical:ubuntu_linux:9.10", "p-cpe:/a:canonical:ubuntu_linux:firefox-3.1-branding", "p-cpe:/a:canonical:ubuntu_linux:firefox-trunk", "p-cpe:/a:canonical:ubuntu_linux:firefox-granparadiso", "p-cpe:/a:canonical:ubuntu_linux:firefox-trunk-dom-inspector", "p-cpe:/a:canonical:ubuntu_linux:abrowser-3.0-branding", "p-cpe:/a:canonical:ubuntu_linux:firefox-3.5-dev", "p-cpe:/a:canonical:ubuntu_linux:firefox-granparadiso-gnome-support", "p-cpe:/a:canonical:ubuntu_linux:xulrunner-1.9-gnome-support", "p-cpe:/a:canonical:ubuntu_linux:firefox-3.1-gnome-support", "p-cpe:/a:canonical:ubuntu_linux:firefox-trunk-dev", "cpe:/o:canonical:ubuntu_linux:8.10", "cpe:/o:canonical:ubuntu_linux:9.04", "p-cpe:/a:canonical:ubuntu_linux:firefox-3.0", "p-cpe:/a:canonical:ubuntu_linux:firefox-granparadiso-dev", "p-cpe:/a:canonical:ubuntu_linux:firefox-3.0-branding", "p-cpe:/a:canonical:ubuntu_linux:abrowser-3.1-branding", "p-cpe:/a:canonical:ubuntu_linux:firefox-trunk-venkman", "p-cpe:/a:canonical:ubuntu_linux:abrowser-3.0", "p-cpe:/a:canonical:ubuntu_linux:xulrunner-1.9"], "id": "UBUNTU_USN-853-1.NASL", "href": "https://www.tenable.com/plugins/nessus/42335", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-853-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(42335);\n script_version(\"1.22\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2009-0689\", \"CVE-2009-3274\", \"CVE-2009-3370\", \"CVE-2009-3371\", \"CVE-2009-3372\", \"CVE-2009-3373\", \"CVE-2009-3374\", \"CVE-2009-3375\", \"CVE-2009-3376\", \"CVE-2009-3377\", \"CVE-2009-3380\", \"CVE-2009-3381\", \"CVE-2009-3382\", \"CVE-2009-3383\");\n script_xref(name:\"USN\", value:\"853-1\");\n\n script_name(english:\"Ubuntu 8.04 LTS / 8.10 / 9.04 / 9.10 : firefox-3.0, firefox-3.5, xulrunner-1.9, xulrunner-1.9.1 vulnerabilities (USN-853-1)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Alin Rad Pop discovered a heap-based buffer overflow in Firefox when\nit converted strings to floating point numbers. If a user were tricked\ninto viewing a malicious website, a remote attacker could cause a\ndenial of service or possibly execute arbitrary code with the\nprivileges of the user invoking the program. (CVE-2009-1563)\n\nJeremy Brown discovered that the Firefox Download Manager was\nvulnerable to symlink attacks. A local attacker could exploit this to\ncreate or overwrite files with the privileges of the user invoking the\nprogram. (CVE-2009-3274)\n\nPaul Stone discovered a flaw in the Firefox form history. If a user\nwere tricked into viewing a malicious website, a remote attacker could\naccess this data to steal confidential information. (CVE-2009-3370)\n\nOrlando Berrera discovered that Firefox did not properly free memory\nwhen using web-workers. If a user were tricked into viewing a\nmalicious website, a remote attacker could cause a denial of service\nor possibly execute arbitrary code with the privileges of the user\ninvoking the program. This issue only affected Ubuntu 9.10.\n(CVE-2009-3371)\n\nA flaw was discovered in the way Firefox processed Proxy\nAuto-configuration (PAC) files. If a user configured the browser to\nuse PAC files with certain regular expressions, an attacker could\ncause a denial of service or possibly execute arbitrary code with the\nprivileges of the user invoking the program. (CVE-2009-3372)\n\nA heap-based buffer overflow was discovered in Mozilla's GIF image\nparser. If a user were tricked into viewing a malicious website, a\nremote attacker could cause a denial of service or possibly execute\narbitrary code with the privileges of the user invoking the program.\n(CVE-2009-3373)\n\nA flaw was discovered in the JavaScript engine of Firefox. An attacker\ncould exploit this to execute scripts from page content with chrome\nprivileges. (CVE-2009-3374)\n\nGregory Fleischer discovered that the same-origin check in Firefox\ncould be bypassed by utilizing the document.getSelection function. An\nattacker could exploit this to read data from other domains.\n(CVE-2009-3375)\n\nJesse Ruderman and Sid Stamm discovered that Firefox did not properly\ndisplay filenames containing right-to-left (RTL) override characters.\nIf a user were tricked into downloading a malicious file with a\ncrafted filename, an attacker could exploit this to trick the user\ninto opening a different file than the user expected. (CVE-2009-3376)\n\nSeveral flaws were discovered in third-party media libraries. If a\nuser were tricked into opening a crafted media file, a remote attacker\ncould cause a denial of service or possibly execute arbitrary code\nwith the privileges of the user invoking the program. This issue only\naffected Ubuntu 9.10. (CVE-2009-3377)\n\nVladimir Vukicevic, Jesse Ruderman, Martijn Wargers, Daniel Banchero,\nDavid Keeler, Boris Zbarsky, Thomas Frederiksen, Marcia Knous, Carsten\nBook, Kevin Brosnan, David Anderson and Jeff Walden discovered various\nflaws in the browser and JavaScript engines of Firefox. If a user were\ntricked into viewing a malicious website, a remote attacker could\ncause a denial of service or possibly execute arbitrary code with the\nprivileges of the user invoking the program. (CVE-2009-3380,\nCVE-2009-3381, CVE-2009-3382, CVE-2009-3383).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/853-1/\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_cwe_id(16, 119, 264, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:abrowser\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:abrowser-3.0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:abrowser-3.0-branding\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:abrowser-3.1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:abrowser-3.1-branding\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:abrowser-3.5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:abrowser-3.5-branding\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-3.0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-3.0-branding\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-3.0-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-3.0-dom-inspector\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-3.0-gnome-support\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-3.0-venkman\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-3.1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-3.1-branding\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-3.1-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-3.1-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-3.1-gnome-support\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-3.5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-3.5-branding\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-3.5-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-3.5-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-3.5-gnome-support\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-dom-inspector\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-gnome-support\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-granparadiso\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-granparadiso-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-granparadiso-dom-inspector\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-granparadiso-gnome-support\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-libthai\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-trunk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-trunk-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-trunk-dom-inspector\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-trunk-gnome-support\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-trunk-venkman\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:xulrunner-1.9\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:xulrunner-1.9-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:xulrunner-1.9-dom-inspector\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:xulrunner-1.9-gnome-support\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:xulrunner-1.9-venkman\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:xulrunner-1.9.1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:xulrunner-1.9.1-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:xulrunner-1.9.1-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:xulrunner-1.9.1-gnome-support\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:xulrunner-1.9.1-testsuite\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:xulrunner-1.9.1-testsuite-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:xulrunner-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:8.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:8.10\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:9.04\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:9.10\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/10/30\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/11/02\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2009-2019 Canonical, Inc. / NASL script (C) 2009-2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! ereg(pattern:\"^(8\\.04|8\\.10|9\\.04|9\\.10)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 8.04 / 8.10 / 9.04 / 9.10\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"8.04\", pkgname:\"firefox\", pkgver:\"3.0.15+nobinonly-0ubuntu0.8.04.1\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"firefox-3.0\", pkgver:\"3.0.15+nobinonly-0ubuntu0.8.04.1\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"firefox-3.0-dev\", pkgver:\"3.0.15+nobinonly-0ubuntu0.8.04.1\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"firefox-3.0-dom-inspector\", pkgver:\"3.0.15+nobinonly-0ubuntu0.8.04.1\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"firefox-3.0-gnome-support\", pkgver:\"3.0.15+nobinonly-0ubuntu0.8.04.1\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"firefox-3.0-venkman\", pkgver:\"3.0.15+nobinonly-0ubuntu0.8.04.1\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"firefox-dev\", pkgver:\"3.0.15+nobinonly-0ubuntu0.8.04.1\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"firefox-dom-inspector\", pkgver:\"3.0.15+nobinonly-0ubuntu0.8.04.1\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"firefox-gnome-support\", pkgver:\"3.0.15+nobinonly-0ubuntu0.8.04.1\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"firefox-granparadiso\", pkgver:\"3.0.15+nobinonly-0ubuntu0.8.04.1\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"firefox-granparadiso-dev\", pkgver:\"3.0.15+nobinonly-0ubuntu0.8.04.1\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"firefox-granparadiso-dom-inspector\", pkgver:\"3.0.15+nobinonly-0ubuntu0.8.04.1\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"firefox-granparadiso-gnome-support\", pkgver:\"3.0.15+nobinonly-0ubuntu0.8.04.1\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"firefox-libthai\", pkgver:\"3.0.15+nobinonly-0ubuntu0.8.04.1\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"firefox-trunk\", pkgver:\"3.0.15+nobinonly-0ubuntu0.8.04.1\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"firefox-trunk-dev\", pkgver:\"3.0.15+nobinonly-0ubuntu0.8.04.1\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"firefox-trunk-dom-inspector\", pkgver:\"3.0.15+nobinonly-0ubuntu0.8.04.1\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"firefox-trunk-gnome-support\", pkgver:\"3.0.15+nobinonly-0ubuntu0.8.04.1\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"firefox-trunk-venkman\", pkgver:\"3.0.15+nobinonly-0ubuntu0.8.04.1\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"xulrunner-1.9\", pkgver:\"1.9.0.15+nobinonly-0ubuntu0.8.04.1\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"xulrunner-1.9-dev\", pkgver:\"1.9.0.15+nobinonly-0ubuntu0.8.04.1\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"xulrunner-1.9-dom-inspector\", pkgver:\"1.9.0.15+nobinonly-0ubuntu0.8.04.1\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"xulrunner-1.9-gnome-support\", pkgver:\"1.9.0.15+nobinonly-0ubuntu0.8.04.1\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"xulrunner-1.9-venkman\", pkgver:\"1.9.0.15+nobinonly-0ubuntu0.8.04.1\")) flag++;\nif (ubuntu_check(osver:\"8.10\", pkgname:\"abrowser\", pkgver:\"3.0.15+nobinonly-0ubuntu0.8.10.1\")) flag++;\nif (ubuntu_check(osver:\"8.10\", pkgname:\"abrowser-3.0-branding\", pkgver:\"3.0.15+nobinonly-0ubuntu0.8.10.1\")) flag++;\nif (ubuntu_check(osver:\"8.10\", pkgname:\"firefox\", pkgver:\"3.0.15+nobinonly-0ubuntu0.8.10.1\")) flag++;\nif (ubuntu_check(osver:\"8.10\", pkgname:\"firefox-3.0\", pkgver:\"3.0.15+nobinonly-0ubuntu0.8.10.1\")) flag++;\nif (ubuntu_check(osver:\"8.10\", pkgname:\"firefox-3.0-branding\", pkgver:\"3.0.15+nobinonly-0ubuntu0.8.10.1\")) flag++;\nif (ubuntu_check(osver:\"8.10\", pkgname:\"firefox-3.0-dev\", pkgver:\"3.0.15+nobinonly-0ubuntu0.8.10.1\")) flag++;\nif (ubuntu_check(osver:\"8.10\", pkgname:\"firefox-3.0-dom-inspector\", pkgver:\"3.0.15+nobinonly-0ubuntu0.8.10.1\")) flag++;\nif (ubuntu_check(osver:\"8.10\", pkgname:\"firefox-3.0-gnome-support\", pkgver:\"3.0.15+nobinonly-0ubuntu0.8.10.1\")) flag++;\nif (ubuntu_check(osver:\"8.10\", pkgname:\"firefox-3.0-venkman\", pkgver:\"3.0.15+nobinonly-0ubuntu0.8.10.1\")) flag++;\nif (ubuntu_check(osver:\"8.10\", pkgname:\"firefox-dev\", pkgver:\"3.0.15+nobinonly-0ubuntu0.8.10.1\")) flag++;\nif (ubuntu_check(osver:\"8.10\", pkgname:\"firefox-dom-inspector\", pkgver:\"3.0.15+nobinonly-0ubuntu0.8.10.1\")) flag++;\nif (ubuntu_check(osver:\"8.10\", pkgname:\"firefox-gnome-support\", pkgver:\"3.0.15+nobinonly-0ubuntu0.8.10.1\")) flag++;\nif (ubuntu_check(osver:\"8.10\", pkgname:\"firefox-granparadiso\", pkgver:\"3.0.15+nobinonly-0ubuntu0.8.10.1\")) flag++;\nif (ubuntu_check(osver:\"8.10\", pkgname:\"firefox-granparadiso-dev\", pkgver:\"3.0.15+nobinonly-0ubuntu0.8.10.1\")) flag++;\nif (ubuntu_check(osver:\"8.10\", pkgname:\"firefox-granparadiso-dom-inspector\", pkgver:\"3.0.15+nobinonly-0ubuntu0.8.10.1\")) flag++;\nif (ubuntu_check(osver:\"8.10\", pkgname:\"firefox-granparadiso-gnome-support\", pkgver:\"3.0.15+nobinonly-0ubuntu0.8.10.1\")) flag++;\nif (ubuntu_check(osver:\"8.10\", pkgname:\"firefox-libthai\", pkgver:\"3.0.15+nobinonly-0ubuntu0.8.10.1\")) flag++;\nif (ubuntu_check(osver:\"8.10\", pkgname:\"firefox-trunk\", pkgver:\"3.0.15+nobinonly-0ubuntu0.8.10.1\")) flag++;\nif (ubuntu_check(osver:\"8.10\", pkgname:\"firefox-trunk-dev\", pkgver:\"3.0.15+nobinonly-0ubuntu0.8.10.1\")) flag++;\nif (ubuntu_check(osver:\"8.10\", pkgname:\"firefox-trunk-dom-inspector\", pkgver:\"3.0.15+nobinonly-0ubuntu0.8.10.1\")) flag++;\nif (ubuntu_check(osver:\"8.10\", pkgname:\"firefox-trunk-gnome-support\", pkgver:\"3.0.15+nobinonly-0ubuntu0.8.10.1\")) flag++;\nif (ubuntu_check(osver:\"8.10\", pkgname:\"firefox-trunk-venkman\", pkgver:\"3.0.15+nobinonly-0ubuntu0.8.10.1\")) flag++;\nif (ubuntu_check(osver:\"8.10\", pkgname:\"xulrunner-1.9\", pkgver:\"1.9.0.15+nobinonly-0ubuntu0.8.10.1\")) flag++;\nif (ubuntu_check(osver:\"8.10\", pkgname:\"xulrunner-1.9-dev\", pkgver:\"1.9.0.15+nobinonly-0ubuntu0.8.10.1\")) flag++;\nif (ubuntu_check(osver:\"8.10\", pkgname:\"xulrunner-1.9-dom-inspector\", pkgver:\"1.9.0.15+nobinonly-0ubuntu0.8.10.1\")) flag++;\nif (ubuntu_check(osver:\"8.10\", pkgname:\"xulrunner-1.9-gnome-support\", pkgver:\"1.9.0.15+nobinonly-0ubuntu0.8.10.1\")) flag++;\nif (ubuntu_check(osver:\"8.10\", pkgname:\"xulrunner-1.9-venkman\", pkgver:\"1.9.0.15+nobinonly-0ubuntu0.8.10.1\")) flag++;\nif (ubuntu_check(osver:\"8.10\", pkgname:\"xulrunner-dev\", pkgver:\"1.9.0.15+nobinonly-0ubuntu0.8.10.1\")) flag++;\nif (ubuntu_check(osver:\"9.04\", pkgname:\"abrowser\", pkgver:\"3.0.15+nobinonly-0ubuntu0.9.04.1\")) flag++;\nif (ubuntu_check(osver:\"9.04\", pkgname:\"abrowser-3.0-branding\", pkgver:\"3.0.15+nobinonly-0ubuntu0.9.04.1\")) flag++;\nif (ubuntu_check(osver:\"9.04\", pkgname:\"firefox\", pkgver:\"3.0.15+nobinonly-0ubuntu0.9.04.1\")) flag++;\nif (ubuntu_check(osver:\"9.04\", pkgname:\"firefox-3.0\", pkgver:\"3.0.15+nobinonly-0ubuntu0.9.04.1\")) flag++;\nif (ubuntu_check(osver:\"9.04\", pkgname:\"firefox-3.0-branding\", pkgver:\"3.0.15+nobinonly-0ubuntu0.9.04.1\")) flag++;\nif (ubuntu_check(osver:\"9.04\", pkgname:\"firefox-3.0-dev\", pkgver:\"3.0.15+nobinonly-0ubuntu0.9.04.1\")) flag++;\nif (ubuntu_check(osver:\"9.04\", pkgname:\"firefox-3.0-dom-inspector\", pkgver:\"3.0.15+nobinonly-0ubuntu0.9.04.1\")) flag++;\nif (ubuntu_check(osver:\"9.04\", pkgname:\"firefox-3.0-gnome-support\", pkgver:\"3.0.15+nobinonly-0ubuntu0.9.04.1\")) flag++;\nif (ubuntu_check(osver:\"9.04\", pkgname:\"firefox-3.0-venkman\", pkgver:\"3.0.15+nobinonly-0ubuntu0.9.04.1\")) flag++;\nif (ubuntu_check(osver:\"9.04\", pkgname:\"firefox-dev\", pkgver:\"3.0.15+nobinonly-0ubuntu0.9.04.1\")) flag++;\nif (ubuntu_check(osver:\"9.04\", pkgname:\"firefox-dom-inspector\", pkgver:\"3.0.15+nobinonly-0ubuntu0.9.04.1\")) flag++;\nif (ubuntu_check(osver:\"9.04\", pkgname:\"firefox-gnome-support\", pkgver:\"3.0.15+nobinonly-0ubuntu0.9.04.1\")) flag++;\nif (ubuntu_check(osver:\"9.04\", pkgname:\"firefox-granparadiso\", pkgver:\"3.0.15+nobinonly-0ubuntu0.9.04.1\")) flag++;\nif (ubuntu_check(osver:\"9.04\", pkgname:\"firefox-granparadiso-dev\", pkgver:\"3.0.15+nobinonly-0ubuntu0.9.04.1\")) flag++;\nif (ubuntu_check(osver:\"9.04\", pkgname:\"firefox-granparadiso-dom-inspector\", pkgver:\"3.0.15+nobinonly-0ubuntu0.9.04.1\")) flag++;\nif (ubuntu_check(osver:\"9.04\", pkgname:\"firefox-granparadiso-gnome-support\", pkgver:\"3.0.15+nobinonly-0ubuntu0.9.04.1\")) flag++;\nif (ubuntu_check(osver:\"9.04\", pkgname:\"firefox-libthai\", pkgver:\"3.0.15+nobinonly-0ubuntu0.9.04.1\")) flag++;\nif (ubuntu_check(osver:\"9.04\", pkgname:\"firefox-trunk\", pkgver:\"3.0.15+nobinonly-0ubuntu0.9.04.1\")) flag++;\nif (ubuntu_check(osver:\"9.04\", pkgname:\"firefox-trunk-dev\", pkgver:\"3.0.15+nobinonly-0ubuntu0.9.04.1\")) flag++;\nif (ubuntu_check(osver:\"9.04\", pkgname:\"firefox-trunk-dom-inspector\", pkgver:\"3.0.15+nobinonly-0ubuntu0.9.04.1\")) flag++;\nif (ubuntu_check(osver:\"9.04\", pkgname:\"firefox-trunk-gnome-support\", pkgver:\"3.0.15+nobinonly-0ubuntu0.9.04.1\")) flag++;\nif (ubuntu_check(osver:\"9.04\", pkgname:\"firefox-trunk-venkman\", pkgver:\"3.0.15+nobinonly-0ubuntu0.9.04.1\")) flag++;\nif (ubuntu_check(osver:\"9.04\", pkgname:\"xulrunner-1.9\", pkgver:\"1.9.0.15+nobinonly-0ubuntu0.9.04.1\")) flag++;\nif (ubuntu_check(osver:\"9.04\", pkgname:\"xulrunner-1.9-dev\", pkgver:\"1.9.0.15+nobinonly-0ubuntu0.9.04.1\")) flag++;\nif (ubuntu_check(osver:\"9.04\", pkgname:\"xulrunner-1.9-dom-inspector\", pkgver:\"1.9.0.15+nobinonly-0ubuntu0.9.04.1\")) flag++;\nif (ubuntu_check(osver:\"9.04\", pkgname:\"xulrunner-1.9-gnome-support\", pkgver:\"1.9.0.15+nobinonly-0ubuntu0.9.04.1\")) flag++;\nif (ubuntu_check(osver:\"9.04\", pkgname:\"xulrunner-1.9-venkman\", pkgver:\"1.9.0.15+nobinonly-0ubuntu0.9.04.1\")) flag++;\nif (ubuntu_check(osver:\"9.04\", pkgname:\"xulrunner-dev\", pkgver:\"1.9.0.15+nobinonly-0ubuntu0.9.04.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"abrowser\", pkgver:\"3.5.4+nobinonly-0ubuntu0.9.10.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"abrowser-3.0\", pkgver:\"3.5.4+nobinonly-0ubuntu0.9.10.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"abrowser-3.0-branding\", pkgver:\"3.5.4+nobinonly-0ubuntu0.9.10.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"abrowser-3.1\", pkgver:\"3.5.4+nobinonly-0ubuntu0.9.10.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"abrowser-3.1-branding\", pkgver:\"3.5.4+nobinonly-0ubuntu0.9.10.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"abrowser-3.5\", pkgver:\"3.5.4+nobinonly-0ubuntu0.9.10.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"abrowser-3.5-branding\", pkgver:\"3.5.4+nobinonly-0ubuntu0.9.10.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"firefox\", pkgver:\"3.5.4+nobinonly-0ubuntu0.9.10.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"firefox-3.0\", pkgver:\"3.5.4+nobinonly-0ubuntu0.9.10.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"firefox-3.0-branding\", pkgver:\"3.5.4+nobinonly-0ubuntu0.9.10.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"firefox-3.0-dev\", pkgver:\"3.5.4+nobinonly-0ubuntu0.9.10.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"firefox-3.0-dom-inspector\", pkgver:\"3.5.4+nobinonly-0ubuntu0.9.10.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"firefox-3.0-gnome-support\", pkgver:\"3.5.4+nobinonly-0ubuntu0.9.10.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"firefox-3.0-venkman\", pkgver:\"3.5.4+nobinonly-0ubuntu0.9.10.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"firefox-3.1\", pkgver:\"3.5.4+nobinonly-0ubuntu0.9.10.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"firefox-3.1-branding\", pkgver:\"3.5.4+nobinonly-0ubuntu0.9.10.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"firefox-3.1-dbg\", pkgver:\"3.5.4+nobinonly-0ubuntu0.9.10.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"firefox-3.1-dev\", pkgver:\"3.5.4+nobinonly-0ubuntu0.9.10.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"firefox-3.1-gnome-support\", pkgver:\"3.5.4+nobinonly-0ubuntu0.9.10.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"firefox-3.5\", pkgver:\"3.5.4+nobinonly-0ubuntu0.9.10.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"firefox-3.5-branding\", pkgver:\"3.5.4+nobinonly-0ubuntu0.9.10.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"firefox-3.5-dbg\", pkgver:\"3.5.4+nobinonly-0ubuntu0.9.10.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"firefox-3.5-dev\", pkgver:\"3.5.4+nobinonly-0ubuntu0.9.10.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"firefox-3.5-gnome-support\", pkgver:\"3.5.4+nobinonly-0ubuntu0.9.10.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"firefox-dom-inspector\", pkgver:\"3.5.4+nobinonly-0ubuntu0.9.10.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"firefox-gnome-support\", pkgver:\"3.5.4+nobinonly-0ubuntu0.9.10.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"xulrunner-1.9.1\", pkgver:\"1.9.1.4+nobinonly-0ubuntu0.9.10.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"xulrunner-1.9.1-dbg\", pkgver:\"1.9.1.4+nobinonly-0ubuntu0.9.10.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"xulrunner-1.9.1-dev\", pkgver:\"1.9.1.4+nobinonly-0ubuntu0.9.10.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"xulrunner-1.9.1-gnome-support\", pkgver:\"1.9.1.4+nobinonly-0ubuntu0.9.10.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"xulrunner-1.9.1-testsuite\", pkgver:\"1.9.1.4+nobinonly-0ubuntu0.9.10.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"xulrunner-1.9.1-testsuite-dev\", pkgver:\"1.9.1.4+nobinonly-0ubuntu0.9.10.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"xulrunner-dev\", pkgver:\"1.9.1.4+nobinonly-0ubuntu0.9.10.1\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"abrowser / abrowser-3.0 / abrowser-3.0-branding / abrowser-3.1 / etc\");\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-20T15:44:46", "description": "USN-853-1 fixed vulnerabilities in Firefox and Xulrunner. The upstream\nchanges introduced regressions that could lead to crashes when\nprocessing certain malformed GIF images, fonts and web pages. This\nupdate fixes the problem.\n\nWe apologize for the inconvenience.\n\nAlin Rad Pop discovered a heap-based buffer overflow in Firefox when\nit converted strings to floating point numbers. If a user were tricked\ninto viewing a malicious website, a remote attacker could cause a\ndenial of service or possibly execute arbitrary code with the\nprivileges of the user invoking the program. (CVE-2009-1563)\n\nJeremy Brown discovered that the Firefox Download Manager\nwas vulnerable to symlink attacks. A local attacker could\nexploit this to create or overwrite files with the\nprivileges of the user invoking the program. (CVE-2009-3274)\n\nPaul Stone discovered a flaw in the Firefox form history. If\na user were tricked into viewing a malicious website, a\nremote attacker could access this data to steal confidential\ninformation. (CVE-2009-3370)\n\nOrlando Berrera discovered that Firefox did not properly\nfree memory when using web-workers. If a user were tricked\ninto viewing a malicious website, a remote attacker could\ncause a denial of service or possibly execute arbitrary code\nwith the privileges of the user invoking the program. This\nissue only affected Ubuntu 9.10. (CVE-2009-3371)\n\nA flaw was discovered in the way Firefox processed Proxy\nAuto-configuration (PAC) files. If a user configured the\nbrowser to use PAC files with certain regular expressions,\nan attacker could cause a denial of service or possibly\nexecute arbitrary code with the privileges of the user\ninvoking the program. (CVE-2009-3372)\n\nA heap-based buffer overflow was discovered in Mozilla's GIF\nimage parser. If a user were tricked into viewing a\nmalicious website, a remote attacker could cause a denial of\nservice or possibly execute arbitrary code with the\nprivileges of the user invoking the program. (CVE-2009-3373)\n\nA flaw was discovered in the JavaScript engine of Firefox.\nAn attacker could exploit this to execute scripts from page\ncontent with chrome privileges. (CVE-2009-3374)\n\nGregory Fleischer discovered that the same-origin check in\nFirefox could be bypassed by utilizing the\ndocument.getSelection function. An attacker could exploit\nthis to read data from other domains. (CVE-2009-3375)\n\nJesse Ruderman and Sid Stamm discovered that Firefox did not\nproperly display filenames containing right-to-left (RTL)\noverride characters. If a user were tricked into downloading\na malicious file with a crafted filename, an attacker could\nexploit this to trick the user into opening a different file\nthan the user expected. (CVE-2009-3376)\n\nSeveral flaws were discovered in third-party media\nlibraries. If a user were tricked into opening a crafted\nmedia file, a remote attacker could cause a denial of\nservice or possibly execute arbitrary code with the\nprivileges of the user invoking the program. This issue only\naffected Ubuntu 9.10. (CVE-2009-3377)\n\nVladimir Vukicevic, Jesse Ruderman, Martijn Wargers, Daniel\nBanchero, David Keeler, Boris Zbarsky, Thomas Frederiksen,\nMarcia Knous, Carsten Book, Kevin Brosnan, David Anderson\nand Jeff Walden discovered various flaws in the browser and\nJavaScript engines of Firefox. If a user were tricked into\nviewing a malicious website, a remote attacker could cause a\ndenial of service or possibly execute arbitrary code with\nthe privileges of the user invoking the program.\n(CVE-2009-3380, CVE-2009-3381, CVE-2009-3382, CVE-2009-3383).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 27, "published": "2009-11-12T00:00:00", "title": "Ubuntu 9.10 : firefox-3.5, xulrunner-1.9.1 regression (USN-853-2)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-1563", "CVE-2009-3376", "CVE-2009-3274", "CVE-2009-3380", "CVE-2009-3373", "CVE-2009-3383", "CVE-2009-3372", "CVE-2009-3375", "CVE-2009-0689", "CVE-2009-3374", "CVE-2009-3371", "CVE-2009-3377", "CVE-2009-3382", "CVE-2009-3370", "CVE-2009-3381"], "modified": "2009-11-12T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:abrowser", "p-cpe:/a:canonical:ubuntu_linux:firefox-3.0-dev", "p-cpe:/a:canonical:ubuntu_linux:firefox-3.1-dbg", "p-cpe:/a:canonical:ubuntu_linux:firefox-3.1-dev", "p-cpe:/a:canonical:ubuntu_linux:xulrunner-1.9.1-dev", "p-cpe:/a:canonical:ubuntu_linux:firefox-dom-inspector", "p-cpe:/a:canonical:ubuntu_linux:firefox-gnome-support", "p-cpe:/a:canonical:ubuntu_linux:xulrunner-1.9.1-gnome-support", "p-cpe:/a:canonical:ubuntu_linux:abrowser-3.1", "p-cpe:/a:canonical:ubuntu_linux:abrowser-3.5-branding", "p-cpe:/a:canonical:ubuntu_linux:xulrunner-1.9.1-dbg", "p-cpe:/a:canonical:ubuntu_linux:xulrunner-dev", "p-cpe:/a:canonical:ubuntu_linux:xulrunner-1.9.1", "p-cpe:/a:canonical:ubuntu_linux:firefox", "p-cpe:/a:canonical:ubuntu_linux:firefox-3.0-dom-inspector", "p-cpe:/a:canonical:ubuntu_linux:firefox-3.0-gnome-support", "p-cpe:/a:canonical:ubuntu_linux:abrowser-3.5", "p-cpe:/a:canonical:ubuntu_linux:firefox-3.0-venkman", "p-cpe:/a:canonical:ubuntu_linux:firefox-3.5", "p-cpe:/a:canonical:ubuntu_linux:xulrunner-1.9.1-testsuite", "p-cpe:/a:canonical:ubuntu_linux:firefox-3.5-gnome-support", "p-cpe:/a:canonical:ubuntu_linux:firefox-3.5-dbg", "p-cpe:/a:canonical:ubuntu_linux:firefox-3.5-branding", "p-cpe:/a:canonical:ubuntu_linux:firefox-3.1", "p-cpe:/a:canonical:ubuntu_linux:xulrunner-1.9.1-testsuite-dev", "cpe:/o:canonical:ubuntu_linux:9.10", "p-cpe:/a:canonical:ubuntu_linux:firefox-3.1-branding", "p-cpe:/a:canonical:ubuntu_linux:abrowser-3.0-branding", "p-cpe:/a:canonical:ubuntu_linux:firefox-3.5-dev", "p-cpe:/a:canonical:ubuntu_linux:firefox-3.1-gnome-support", "p-cpe:/a:canonical:ubuntu_linux:firefox-3.0", "p-cpe:/a:canonical:ubuntu_linux:firefox-3.0-branding", "p-cpe:/a:canonical:ubuntu_linux:abrowser-3.1-branding", "p-cpe:/a:canonical:ubuntu_linux:abrowser-3.0"], "id": "UBUNTU_USN-853-2.NASL", "href": "https://www.tenable.com/plugins/nessus/42474", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-853-2. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(42474);\n script_version(\"1.17\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2009-0689\", \"CVE-2009-3274\", \"CVE-2009-3370\", \"CVE-2009-3371\", \"CVE-2009-3372\", \"CVE-2009-3373\", \"CVE-2009-3374\", \"CVE-2009-3375\", \"CVE-2009-3376\", \"CVE-2009-3377\", \"CVE-2009-3380\", \"CVE-2009-3381\", \"CVE-2009-3382\", \"CVE-2009-3383\");\n script_xref(name:\"USN\", value:\"853-2\");\n\n script_name(english:\"Ubuntu 9.10 : firefox-3.5, xulrunner-1.9.1 regression (USN-853-2)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"USN-853-1 fixed vulnerabilities in Firefox and Xulrunner. The upstream\nchanges introduced regressions that could lead to crashes when\nprocessing certain malformed GIF images, fonts and web pages. This\nupdate fixes the problem.\n\nWe apologize for the inconvenience.\n\nAlin Rad Pop discovered a heap-based buffer overflow in Firefox when\nit converted strings to floating point numbers. If a user were tricked\ninto viewing a malicious website, a remote attacker could cause a\ndenial of service or possibly execute arbitrary code with the\nprivileges of the user invoking the program. (CVE-2009-1563)\n\nJeremy Brown discovered that the Firefox Download Manager\nwas vulnerable to symlink attacks. A local attacker could\nexploit this to create or overwrite files with the\nprivileges of the user invoking the program. (CVE-2009-3274)\n\nPaul Stone discovered a flaw in the Firefox form history. If\na user were tricked into viewing a malicious website, a\nremote attacker could access this data to steal confidential\ninformation. (CVE-2009-3370)\n\nOrlando Berrera discovered that Firefox did not properly\nfree memory when using web-workers. If a user were tricked\ninto viewing a malicious website, a remote attacker could\ncause a denial of service or possibly execute arbitrary code\nwith the privileges of the user invoking the program. This\nissue only affected Ubuntu 9.10. (CVE-2009-3371)\n\nA flaw was discovered in the way Firefox processed Proxy\nAuto-configuration (PAC) files. If a user configured the\nbrowser to use PAC files with certain regular expressions,\nan attacker could cause a denial of service or possibly\nexecute arbitrary code with the privileges of the user\ninvoking the program. (CVE-2009-3372)\n\nA heap-based buffer overflow was discovered in Mozilla's GIF\nimage parser. If a user were tricked into viewing a\nmalicious website, a remote attacker could cause a denial of\nservice or possibly execute arbitrary code with the\nprivileges of the user invoking the program. (CVE-2009-3373)\n\nA flaw was discovered in the JavaScript engine of Firefox.\nAn attacker could exploit this to execute scripts from page\ncontent with chrome privileges. (CVE-2009-3374)\n\nGregory Fleischer discovered that the same-origin check in\nFirefox could be bypassed by utilizing the\ndocument.getSelection function. An attacker could exploit\nthis to read data from other domains. (CVE-2009-3375)\n\nJesse Ruderman and Sid Stamm discovered that Firefox did not\nproperly display filenames containing right-to-left (RTL)\noverride characters. If a user were tricked into downloading\na malicious file with a crafted filename, an attacker could\nexploit this to trick the user into opening a different file\nthan the user expected. (CVE-2009-3376)\n\nSeveral flaws were discovered in third-party media\nlibraries. If a user were tricked into opening a crafted\nmedia file, a remote attacker could cause a denial of\nservice or possibly execute arbitrary code with the\nprivileges of the user invoking the program. This issue only\naffected Ubuntu 9.10. (CVE-2009-3377)\n\nVladimir Vukicevic, Jesse Ruderman, Martijn Wargers, Daniel\nBanchero, David Keeler, Boris Zbarsky, Thomas Frederiksen,\nMarcia Knous, Carsten Book, Kevin Brosnan, David Anderson\nand Jeff Walden discovered various flaws in the browser and\nJavaScript engines of Firefox. If a user were tricked into\nviewing a malicious website, a remote attacker could cause a\ndenial of service or possibly execute arbitrary code with\nthe privileges of the user invoking the program.\n(CVE-2009-3380, CVE-2009-3381, CVE-2009-3382, CVE-2009-3383).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/853-2/\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_cwe_id(16, 119, 264, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:abrowser\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:abrowser-3.0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:abrowser-3.0-branding\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:abrowser-3.1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:abrowser-3.1-branding\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:abrowser-3.5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:abrowser-3.5-branding\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-3.0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-3.0-branding\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-3.0-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-3.0-dom-inspector\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-3.0-gnome-support\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-3.0-venkman\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-3.1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-3.1-branding\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-3.1-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-3.1-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-3.1-gnome-support\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-3.5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-3.5-branding\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-3.5-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-3.5-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-3.5-gnome-support\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-dom-inspector\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-gnome-support\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:xulrunner-1.9.1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:xulrunner-1.9.1-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:xulrunner-1.9.1-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:xulrunner-1.9.1-gnome-support\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:xulrunner-1.9.1-testsuite\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:xulrunner-1.9.1-testsuite-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:xulrunner-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:9.10\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/11/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/11/12\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2009-2019 Canonical, Inc. / NASL script (C) 2009-2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! ereg(pattern:\"^(9\\.10)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 9.10\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"9.10\", pkgname:\"abrowser\", pkgver:\"3.5.5+nobinonly-0ubuntu0.9.10.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"abrowser-3.0\", pkgver:\"3.5.5+nobinonly-0ubuntu0.9.10.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"abrowser-3.0-branding\", pkgver:\"3.5.5+nobinonly-0ubuntu0.9.10.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"abrowser-3.1\", pkgver:\"3.5.5+nobinonly-0ubuntu0.9.10.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"abrowser-3.1-branding\", pkgver:\"3.5.5+nobinonly-0ubuntu0.9.10.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"abrowser-3.5\", pkgver:\"3.5.5+nobinonly-0ubuntu0.9.10.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"abrowser-3.5-branding\", pkgver:\"3.5.5+nobinonly-0ubuntu0.9.10.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"firefox\", pkgver:\"3.5.5+nobinonly-0ubuntu0.9.10.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"firefox-3.0\", pkgver:\"3.5.5+nobinonly-0ubuntu0.9.10.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"firefox-3.0-branding\", pkgver:\"3.5.5+nobinonly-0ubuntu0.9.10.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"firefox-3.0-dev\", pkgver:\"3.5.5+nobinonly-0ubuntu0.9.10.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"firefox-3.0-dom-inspector\", pkgver:\"3.5.5+nobinonly-0ubuntu0.9.10.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"firefox-3.0-gnome-support\", pkgver:\"3.5.5+nobinonly-0ubuntu0.9.10.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"firefox-3.0-venkman\", pkgver:\"3.5.5+nobinonly-0ubuntu0.9.10.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"firefox-3.1\", pkgver:\"3.5.5+nobinonly-0ubuntu0.9.10.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"firefox-3.1-branding\", pkgver:\"3.5.5+nobinonly-0ubuntu0.9.10.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"firefox-3.1-dbg\", pkgver:\"3.5.5+nobinonly-0ubuntu0.9.10.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"firefox-3.1-dev\", pkgver:\"3.5.5+nobinonly-0ubuntu0.9.10.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"firefox-3.1-gnome-support\", pkgver:\"3.5.5+nobinonly-0ubuntu0.9.10.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"firefox-3.5\", pkgver:\"3.5.5+nobinonly-0ubuntu0.9.10.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"firefox-3.5-branding\", pkgver:\"3.5.5+nobinonly-0ubuntu0.9.10.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"firefox-3.5-dbg\", pkgver:\"3.5.5+nobinonly-0ubuntu0.9.10.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"firefox-3.5-dev\", pkgver:\"3.5.5+nobinonly-0ubuntu0.9.10.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"firefox-3.5-gnome-support\", pkgver:\"3.5.5+nobinonly-0ubuntu0.9.10.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"firefox-dom-inspector\", pkgver:\"3.5.5+nobinonly-0ubuntu0.9.10.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"firefox-gnome-support\", pkgver:\"3.5.5+nobinonly-0ubuntu0.9.10.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"xulrunner-1.9.1\", pkgver:\"1.9.1.5+nobinonly-0ubuntu0.9.10.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"xulrunner-1.9.1-dbg\", pkgver:\"1.9.1.5+nobinonly-0ubuntu0.9.10.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"xulrunner-1.9.1-dev\", pkgver:\"1.9.1.5+nobinonly-0ubuntu0.9.10.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"xulrunner-1.9.1-gnome-support\", pkgver:\"1.9.1.5+nobinonly-0ubuntu0.9.10.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"xulrunner-1.9.1-testsuite\", pkgver:\"1.9.1.5+nobinonly-0ubuntu0.9.10.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"xulrunner-1.9.1-testsuite-dev\", pkgver:\"1.9.1.5+nobinonly-0ubuntu0.9.10.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"xulrunner-dev\", pkgver:\"1.9.1.5+nobinonly-0ubuntu0.9.10.1\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"abrowser / abrowser-3.0 / abrowser-3.0-branding / abrowser-3.1 / etc\");\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-07T10:49:55", "description": "Mozilla Foundation reports :\n\nMFSA 2009-64 Crashes with evidence of memory corruption (rv:1.9.1.4/\n1.9.0.15)\n\nMFSA 2009-63 Upgrade media libraries to fix memory safety bugs\n\nMFSA 2009-62 Download filename spoofing with RTL override\n\nMFSA 2009-61 Cross-origin data theft through document.getSelection()\n\nMFSA 2009-59 Heap buffer overflow in string to number conversion\n\nMFSA 2009-57 Chrome privilege escalation in\nXPCVariant::VariantDataToJS()\n\nMFSA 2009-56 Heap buffer overflow in GIF color map parser\n\nMFSA 2009-55 Crash in proxy auto-configuration regexp parsing\n\nMFSA 2009-54 Crash with recursive web-worker calls\n\nMFSA 2009-53 Local downloaded file tampering\n\nMFSA 2009-52 Form history vulnerable to stealing", "edition": 26, "published": "2009-10-29T00:00:00", "title": "FreeBSD : mozilla -- multiple vulnerabilities (c87aa2d2-c3c4-11de-ab08-000f20797ede)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-3376", "CVE-2009-3379", "CVE-2009-3274", "CVE-2009-3380", "CVE-2009-3373", "CVE-2009-3383", "CVE-2009-3372", "CVE-2009-3375", "CVE-2009-0689", "CVE-2009-3374", "CVE-2009-3371", "CVE-2009-3377", "CVE-2009-3382", "CVE-2009-3370", "CVE-2009-3381", "CVE-2009-3378"], "modified": "2009-10-29T00:00:00", "cpe": ["p-cpe:/a:freebsd:freebsd:linux-firefox", "cpe:/o:freebsd:freebsd", "p-cpe:/a:freebsd:freebsd:seamonkey", "p-cpe:/a:freebsd:freebsd:linux-seamonkey", "p-cpe:/a:freebsd:freebsd:firefox"], "id": "FREEBSD_PKG_C87AA2D2C3C411DEAB08000F20797EDE.NASL", "href": "https://www.tenable.com/plugins/nessus/42298", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2018 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(42298);\n script_version(\"1.19\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2009-0689\", \"CVE-2009-3274\", \"CVE-2009-3370\", \"CVE-2009-3371\", \"CVE-2009-3372\", \"CVE-2009-3373\", \"CVE-2009-3374\", \"CVE-2009-3375\", \"CVE-2009-3376\", \"CVE-2009-3377\", \"CVE-2009-3378\", \"CVE-2009-3379\", \"CVE-2009-3380\", \"CVE-2009-3381\", \"CVE-2009-3382\", \"CVE-2009-3383\");\n\n script_name(english:\"FreeBSD : mozilla -- multiple vulnerabilities (c87aa2d2-c3c4-11de-ab08-000f20797ede)\");\n script_summary(english:\"Checks for updated packages in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote FreeBSD host is missing one or more security-related\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Mozilla Foundation reports :\n\nMFSA 2009-64 Crashes with evidence of memory corruption (rv:1.9.1.4/\n1.9.0.15)\n\nMFSA 2009-63 Upgrade media libraries to fix memory safety bugs\n\nMFSA 2009-62 Download filename spoofing with RTL override\n\nMFSA 2009-61 Cross-origin data theft through document.getSelection()\n\nMFSA 2009-59 Heap buffer overflow in string to number conversion\n\nMFSA 2009-57 Chrome privilege escalation in\nXPCVariant::VariantDataToJS()\n\nMFSA 2009-56 Heap buffer overflow in GIF color map parser\n\nMFSA 2009-55 Crash in proxy auto-configuration regexp parsing\n\nMFSA 2009-54 Crash with recursive web-worker calls\n\nMFSA 2009-53 Local downloaded file tampering\n\nMFSA 2009-52 Form history vulnerable to stealing\"\n );\n # http://www.mozilla.org/security/announce/2009/mfsa2009-64.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2009-64/\"\n );\n # http://www.mozilla.org/security/announce/2009/mfsa2009-63.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2009-63/\"\n );\n # http://www.mozilla.org/security/announce/2009/mfsa2009-62.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2009-62/\"\n );\n # http://www.mozilla.org/security/announce/2009/mfsa2009-61.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2009-61/\"\n );\n # http://www.mozilla.org/security/announce/2009/mfsa2009-59.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2009-59/\"\n );\n # http://www.mozilla.org/security/announce/2009/mfsa2009-57.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2009-57/\"\n );\n # http://www.mozilla.org/security/announce/2009/mfsa2009-56.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2009-56/\"\n );\n # http://www.mozilla.org/security/announce/2009/mfsa2009-55.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2009-55/\"\n );\n # http://www.mozilla.org/security/announce/2009/mfsa2009-54.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2009-54/\"\n );\n # http://www.mozilla.org/security/announce/2009/mfsa2009-53.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2009-53/\"\n );\n # http://www.mozilla.org/security/announce/2009/mfsa2009-52.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2009-52/\"\n );\n # https://vuxml.freebsd.org/freebsd/c87aa2d2-c3c4-11de-ab08-000f20797ede.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?037fddbc\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_cwe_id(16, 119, 264, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:firefox\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:linux-firefox\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:linux-seamonkey\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:seamonkey\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2009/10/27\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/10/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/10/29\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"firefox>3.5.*,1<3.5.4,1\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"firefox>3.*,1<3.0.15,1\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"linux-firefox<3.0.15\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"seamonkey<2.0\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"linux-seamonkey<2.0\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:pkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-03-01T04:09:41", "description": "The installed version of Firefox 3.5 is earlier than 3.5.4. Such\nversions are potentially affected by the following security issues :\n\n - It may be possible for a malicious web page to\n steal form history. (MFSA 2009-52)\n\n - By predicting the filename of an already \n downloaded file in the downloads directory, a\n local attacker may be able to trick the browser\n into opening an incorrect file. (MFSA 2009-53)\n\n - Recursive creation of JavaScript web-workers \n could crash the browser or allow execution of \n arbitrary code on the remote system.\n (MFSA 2009-54)\n\n - Provided the browser is configured to use Proxy\n Auto-configuration it may be possible for an \n attacker to crash the browser or execute \n arbitrary code. (MFSA 2009-55)\n\n - Mozilla's GIF image parser is affected by a \n heap-based buffer overflow. (MFSA 2009-56)\n\n - A vulnerability in XPCOM utility \n 'XPCVariant::VariantDataToJS' could allow \n executing arbitrary JavaScript code with chrome\n privileges. (MFSA 2009-57)\n\n - A vulnerability in Mozilla's string to floating\n point number conversion routine could allow \n arbitrary code execution on the remote system. \n (MFSA 2009-59)\n\n - It may be possible to read text from a web page \n using JavaScript function 'document.getSelection()\n from a different domain. (MFSA 2009-61)\n\n - If a file contains right-to-left override \n character (RTL) in the filename it may be possible\n for an attacker to obfuscate the filename and \n extension of the file being downloaded. \n (MFSA 2009-62)\n\n - Multiple memory safety bugs in media libraries\n could potentially allow arbitrary code execution.\n (MFSA 2009-63)\n\n - Multiple memory corruption vulnerabilities could\n potentially allow arbitrary code execution.\n (MFSA 2009-64)", "edition": 29, "published": "2009-10-29T00:00:00", "title": "Firefox 3.5.x < 3.5.4 Multiple Vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-3376", "CVE-2009-3379", "CVE-2009-3274", "CVE-2009-3380", "CVE-2009-3373", "CVE-2009-3383", "CVE-2009-3372", "CVE-2009-3375", "CVE-2009-0689", "CVE-2009-3374", "CVE-2009-3371", "CVE-2009-3377", "CVE-2009-3382", "CVE-2009-3370", "CVE-2009-3381", "CVE-2009-3378"], "modified": "2021-03-02T00:00:00", "cpe": ["cpe:/a:mozilla:firefox"], "id": "MOZILLA_FIREFOX_354.NASL", "href": "https://www.tenable.com/plugins/nessus/42306", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\nif (NASL_LEVEL < 3000) exit(0);\n\ninclude(\"compat.inc\");\n\n\nif (description)\n{\n script_id(42306);\n script_version(\"1.23\");\n\n script_cve_id(\n \"CVE-2009-0689\",\n # \"CVE-2009-3274\", # applies to Linux only.\n \"CVE-2009-3370\",\n \"CVE-2009-3371\",\n \"CVE-2009-3372\",\n \"CVE-2009-3373\",\n \"CVE-2009-3374\",\n \"CVE-2009-3375\",\n \"CVE-2009-3376\",\n \"CVE-2009-3377\",\n \"CVE-2009-3378\",\n \"CVE-2009-3379\",\n \"CVE-2009-3380\",\n \"CVE-2009-3381\",\n \"CVE-2009-3382\",\n \"CVE-2009-3383\"\n );\n script_bugtraq_id(\n 36851,\n # 36852, # applies to Linux only.\n 36853,\n 36854,\n 36855,\n 36856,\n 36857,\n 36858,\n 36866,\n 36867,\n 36869,\n 36870,\n 36871,\n 36872,\n 36873,\n 36875\n );\n script_xref(name:\"Secunia\", value:\"36649\");\n script_xref(name:\"Secunia\", value:\"36711\");\n\n script_name(english:\"Firefox 3.5.x < 3.5.4 Multiple Vulnerabilities\");\n script_summary(english:\"Checks version of Firefox\");\n\n script_set_attribute( attribute:\"synopsis\", value:\n\"The remote Windows host contains a web browser that is affected by\nmultiple vulnerabilities.\" );\n script_set_attribute( attribute:\"description\", value:\n\"The installed version of Firefox 3.5 is earlier than 3.5.4. Such\nversions are potentially affected by the following security issues :\n\n - It may be possible for a malicious web page to\n steal form history. (MFSA 2009-52)\n\n - By predicting the filename of an already \n downloaded file in the downloads directory, a\n local attacker may be able to trick the browser\n into opening an incorrect file. (MFSA 2009-53)\n\n - Recursive creation of JavaScript web-workers \n could crash the browser or allow execution of \n arbitrary code on the remote system.\n (MFSA 2009-54)\n\n - Provided the browser is configured to use Proxy\n Auto-configuration it may be possible for an \n attacker to crash the browser or execute \n arbitrary code. (MFSA 2009-55)\n\n - Mozilla's GIF image parser is affected by a \n heap-based buffer overflow. (MFSA 2009-56)\n\n - A vulnerability in XPCOM utility \n 'XPCVariant::VariantDataToJS' could allow \n executing arbitrary JavaScript code with chrome\n privileges. (MFSA 2009-57)\n\n - A vulnerability in Mozilla's string to floating\n point number conversion routine could allow \n arbitrary code execution on the remote system. \n (MFSA 2009-59)\n\n - It may be possible to read text from a web page \n using JavaScript function 'document.getSelection()\n from a different domain. (MFSA 2009-61)\n\n - If a file contains right-to-left override \n character (RTL) in the filename it may be possible\n for an attacker to obfuscate the filename and \n extension of the file being downloaded. \n (MFSA 2009-62)\n\n - Multiple memory safety bugs in media libraries\n could potentially allow arbitrary code execution.\n (MFSA 2009-63)\n\n - Multiple memory corruption vulnerabilities could\n potentially allow arbitrary code execution.\n (MFSA 2009-64)\" );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2009-52/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2009-53/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2009-54/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2009-55/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2009-56/\"\n );\n script_set_attribute( \n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2009-57/\"\n ); \n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2009-59/\"\n ); \n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2009-61/\"\n ); \n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2009-62/\"\n ); \n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2009-63/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2009-64/\"\n ); \n\n script_set_attribute(\n attribute:\"solution\",\n value:\"Upgrade to Firefox 3.5.4 or later.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_cwe_id(16, 119, 264, 399);\n script_set_attribute(\n attribute:\"vuln_publication_date\",\n value:\"2009/10/27\"\n );\n script_set_attribute(\n attribute:\"patch_publication_date\",\n value:\"2009/10/27\"\n );\n script_set_attribute(\n attribute:\"plugin_publication_date\",\n value:\"2009/10/29\"\n );\n script_cvs_date(\"Date: 2018/07/16 14:09:14\");\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:mozilla:firefox\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n script_copyright(english:\"This script is Copyright (C) 2009-2018 Tenable Network Security, Inc.\");\n script_dependencies(\"mozilla_org_installed.nasl\");\n script_require_keys(\"Mozilla/Firefox/Version\");\n exit(0);\n}\n\ninclude(\"mozilla_version.inc\");\nport = get_kb_item_or_exit(\"SMB/transport\"); \n\ninstalls = get_kb_list(\"SMB/Mozilla/Firefox/*\");\nif (isnull(installs)) audit(AUDIT_NOT_INST, \"Firefox\");\n\nmozilla_check_version(installs:installs, product:'firefox', esr:FALSE, fix:'3.5.4', min:'3.5', severity:SECURITY_HOLE);", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "suse": [{"lastseen": "2016-09-04T12:11:40", "bulletinFamily": "unix", "cvelist": ["CVE-2009-1563", "CVE-2009-3376", "CVE-2009-3379", "CVE-2009-3274", "CVE-2009-3380", "CVE-2009-3373", "CVE-2009-3383", "CVE-2009-3372", "CVE-2009-3375", "CVE-2009-3374", "CVE-2009-3371", "CVE-2009-3377", "CVE-2009-3382", "CVE-2009-3370", "CVE-2009-3381", "CVE-2009-3378"], "description": "The Mozilla Firefox browser was updated to fix various bugs and security issues.\n#### Solution\nThere is no known workaround, please install the update packages.", "edition": 1, "modified": "2009-11-04T14:24:35", "published": "2009-11-04T14:24:35", "id": "SUSE-SA:2009:052", "href": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00001.html", "type": "suse", "title": "remote code execution in MozillaFirefox", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "freebsd": [{"lastseen": "2019-05-29T18:34:11", "bulletinFamily": "unix", "cvelist": ["CVE-2009-1563", "CVE-2009-3376", "CVE-2009-3379", "CVE-2009-3274", "CVE-2009-3380", "CVE-2009-3373", "CVE-2009-3383", "CVE-2009-3372", "CVE-2009-3375", "CVE-2009-3374", "CVE-2009-3371", "CVE-2009-3377", "CVE-2009-3382", "CVE-2009-3370", "CVE-2009-3381", "CVE-2009-3378"], "description": "\nMozilla Foundation reports:\n\nMFSA 2009-64 Crashes with evidence of memory\n\t corruption (rv:1.9.1.4/ 1.9.0.15)\nMFSA 2009-63 Upgrade media libraries to fix memory\n\t safety bugs\nMFSA 2009-62 Download filename spoofing with RTL\n\t override\nMFSA 2009-61 Cross-origin data theft through\n\t document.getSelection()\nMFSA 2009-59 Heap buffer overflow in string to\n\t number conversion\nMFSA 2009-57 Chrome privilege escalation in\n\t XPCVariant::VariantDataToJS()\nMFSA 2009-56 Heap buffer overflow in GIF color map\n\t parser\nMFSA 2009-55 Crash in proxy auto-configuration\n\t regexp parsing\nMFSA 2009-54 Crash with recursive web-worker calls\nMFSA 2009-53 Local downloaded file tampering\nMFSA 2009-52 Form history vulnerable to stealing\n\n", "edition": 4, "modified": "2009-12-14T00:00:00", "published": "2009-10-27T00:00:00", "id": "C87AA2D2-C3C4-11DE-AB08-000F20797EDE", "href": "https://vuxml.freebsd.org/freebsd/c87aa2d2-c3c4-11de-ab08-000f20797ede.html", "title": "mozilla -- multiple vulnerabilities", "type": "freebsd", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "securityvulns": [{"lastseen": "2018-08-31T11:09:34", "bulletinFamily": "software", "cvelist": ["CVE-2009-1563", "CVE-2009-3376", "CVE-2009-3379", "CVE-2009-3274", "CVE-2009-3380", "CVE-2009-3373", "CVE-2009-3383", "CVE-2009-3372", "CVE-2009-3375", "CVE-2009-0689", "CVE-2009-3374", "CVE-2009-3371", "CVE-2009-3377", "CVE-2009-3382", "CVE-2009-3370", "CVE-2009-3381", "CVE-2009-3378"], "description": "Buffer ovefflows, privilege escalation, information leak, crossite scripting.", "edition": 1, "modified": "2009-11-05T00:00:00", "published": "2009-11-05T00:00:00", "id": "SECURITYVULNS:VULN:10356", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:10356", "title": "Mozilla Firefox / Seamonkey multiple security vulnerabilities", "type": "securityvulns", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "gentoo": [{"lastseen": "2016-09-06T19:46:13", "bulletinFamily": "unix", "cvelist": ["CVE-2012-1945", "CVE-2011-3648", "CVE-2009-0355", "CVE-2011-0061", "CVE-2011-0077", "CVE-2012-0478", "CVE-2012-4193", "CVE-2011-1202", "CVE-2012-0442", "CVE-2010-3772", "CVE-2011-0071", "CVE-2009-2470", "CVE-2010-0654", "CVE-2009-3388", "CVE-2012-1962", "CVE-2012-0443", "CVE-2011-3866", "CVE-2011-0068", "CVE-2012-5842", "CVE-2012-4212", "CVE-2009-2477", "CVE-2009-1563", "CVE-2010-0176", "CVE-2011-3640", "CVE-2011-0083", "CVE-2010-1203", "CVE-2009-3076", "CVE-2012-1970", "CVE-2009-3389", "CVE-2008-3835", "CVE-2012-3989", "CVE-2010-2762", "CVE-2012-5830", "CVE-2012-4210", "CVE-2009-1305", "CVE-2011-3026", "CVE-2009-3979", "CVE-2011-2370", "CVE-2012-0460", "CVE-2012-1973", "CVE-2009-3376", "CVE-2011-2369", "CVE-2011-2998", "CVE-2011-3654", "CVE-2011-2605", "CVE-2009-1833", "CVE-2010-0165", "CVE-2012-1974", "CVE-2010-0220", "CVE-2010-2766", "CVE-2011-2993", "CVE-2012-4195", "CVE-2010-0168", "CVE-2012-3986", "CVE-2010-0160", "CVE-2009-1169", "CVE-2011-2371", "CVE-2009-3379", "CVE-2012-4185", "CVE-2010-3777", "CVE-2012-3991", "CVE-2012-5354", "CVE-2012-4206", "CVE-2009-3071", "CVE-2012-3968", "CVE-2010-1214", "CVE-2012-3963", "CVE-2010-0174", "CVE-2010-0172", "CVE-2009-2535", "CVE-2012-0452", "CVE-2009-1312", "CVE-2012-1956", "CVE-2012-3978", "CVE-2012-3985", "CVE-2011-2995", "CVE-2012-5829", "CVE-2009-1571", "CVE-2008-5505", "CVE-2012-5838", "CVE-2011-2986", "CVE-2010-1205", "CVE-2009-2210", "CVE-2009-2478", "CVE-2008-6961", "CVE-2012-0479", "CVE-2012-0450", "CVE-2012-1940", "CVE-2012-3993", "CVE-2008-5500", "CVE-2012-5836", "CVE-2009-3274", "CVE-2010-1125", "CVE-2009-0772", "CVE-2012-3995", "CVE-2012-4201", "CVE-2010-0159", "CVE-2009-0773", "CVE-2011-3659", "CVE-2011-3663", "CVE-2010-3131", "CVE-2012-0470", "CVE-2012-0446", "CVE-2008-4063", "CVE-2012-3976", "CVE-2012-1972", "CVE-2010-1200", "CVE-2010-0175", "CVE-2010-0170", "CVE-2012-3988", "CVE-2012-0457", "CVE-2010-3778", "CVE-2012-3994", "CVE-2007-2436", "CVE-2012-3962", "CVE-2010-2770", "CVE-2010-3774", "CVE-2012-0459", "CVE-2011-2362", "CVE-2009-1304", "CVE-2010-1213", "CVE-2010-3177", "CVE-2012-5843", "CVE-2009-1835", "CVE-2011-0085", "CVE-2009-0352", "CVE-2009-3984", "CVE-2009-3380", "CVE-2008-5510", "CVE-2011-0080", "CVE-2012-1950", "CVE-2008-5502", "CVE-2009-3981", "CVE-2010-3765", "CVE-2010-0167", "CVE-2009-3373", "CVE-2009-3980", "CVE-2008-4070", "CVE-2012-4183", "CVE-2010-3178", "CVE-2012-1994", "CVE-2011-3661", "CVE-2009-3383", "CVE-2012-4181", "CVE-2011-3652", "CVE-2009-1311", "CVE-2011-1712", "CVE-2008-4067", "CVE-2010-1210", "CVE-2011-2364", "CVE-2009-2469", "CVE-2011-0073", "CVE-2010-1197", "CVE-2010-1207", "CVE-2009-0652", "CVE-2012-4186", "CVE-2012-1948", "CVE-2008-5012", "CVE-2011-2982", "CVE-2012-1938", "CVE-2012-0449", "CVE-2010-3769", "CVE-2012-3969", "CVE-2009-1838", "CVE-2012-1953", "CVE-2008-5013", "CVE-2012-1949", "CVE-2012-0456", "CVE-2011-2372", "CVE-2010-3773", "CVE-2009-1309", "CVE-2011-0079", "CVE-2010-3169", "CVE-2009-2662", "CVE-2012-3970", "CVE-2011-2997", "CVE-2011-0053", "CVE-2009-1832", "CVE-2012-5840", "CVE-2010-3176", "CVE-2012-4191", "CVE-2010-3174", "CVE-2012-1966", "CVE-2010-3768", "CVE-2009-3372", "CVE-2010-2763", "CVE-2011-0066", "CVE-2010-1212", "CVE-2009-1837", "CVE-2010-1206", "CVE-2010-1211", "CVE-2009-2464", "CVE-2011-2990", "CVE-2010-1121", "CVE-2009-0356", "CVE-2011-3389", "CVE-2010-0164", "CVE-2008-3836", "CVE-2010-3167", "CVE-2012-4202", "CVE-2007-2671", "CVE-2011-2984", "CVE-2010-3180", "CVE-2012-3957", "CVE-2011-3660", "CVE-2009-3986", "CVE-2012-1941", "CVE-2009-2408", "CVE-2010-3399", "CVE-2009-2665", "CVE-2008-4066", "CVE-2008-5018", "CVE-2009-3978", "CVE-2012-3984", "CVE-2009-0354", "CVE-2009-3079", "CVE-2011-0056", "CVE-2012-0444", "CVE-2011-3650", "CVE-2010-2753", "CVE-2012-1946", "CVE-2010-3776", "CVE-2010-1215", "CVE-2012-4182", "CVE-2011-2980", "CVE-2012-4187", "CVE-2008-4069", "CVE-2010-0166", "CVE-2011-3647", "CVE-2011-0065", "CVE-2011-0062", "CVE-2008-0016", "CVE-2009-0358", "CVE-2011-3101", "CVE-2010-3168", "CVE-2010-0173", "CVE-2009-1044", "CVE-2008-5513", "CVE-2008-4059", "CVE-2010-2764", "CVE-2011-0081", "CVE-2009-0771", "CVE-2009-1392", "CVE-2008-5504", "CVE-2008-5019", "CVE-2012-1954", "CVE-2009-0774", "CVE-2009-3375", "CVE-2012-0461", "CVE-2011-2376", "CVE-2009-2472", "CVE-2012-3958", "CVE-2009-0071", "CVE-2008-5023", "CVE-2012-0469", "CVE-2010-3171", "CVE-2009-3072", "CVE-2012-3973", "CVE-2008-5822", "CVE-2012-1975", "CVE-2011-0075", "CVE-2012-0464", "CVE-2012-1967", "CVE-2011-3653", "CVE-2010-0648", "CVE-2010-0178", "CVE-2010-3166", "CVE-2010-0177", "CVE-2011-0074", "CVE-2012-3956", "CVE-2010-2769", "CVE-2011-3649", "CVE-2012-3982", "CVE-2009-3555", "CVE-2011-2989", "CVE-2010-1196", "CVE-2008-3837", "CVE-2009-0357", "CVE-2008-5021", "CVE-2008-5017", "CVE-2012-3966", "CVE-2012-5839", "CVE-2011-2378", "CVE-2009-1308", "CVE-2010-3775", "CVE-2009-2467", "CVE-2012-1961", "CVE-2010-5074", "CVE-2011-2996", "CVE-2010-3173", "CVE-2012-4216", "CVE-2008-4062", "CVE-2010-3179", "CVE-2010-0182", "CVE-2012-3967", "CVE-2011-3651", "CVE-2008-4060", "CVE-2010-0181", "CVE-2012-1951", "CVE-2012-0475", "CVE-2012-3965", "CVE-2012-1952", "CVE-2010-1201", "CVE-2011-4688", "CVE-2009-1306", "CVE-2010-1585", "CVE-2009-2479", "CVE-2012-3959", "CVE-2012-0455", "CVE-2009-0777", "CVE-2010-2755", "CVE-2011-0084", "CVE-2011-0051", "CVE-2010-3767", "CVE-2012-1939", "CVE-2009-1834", "CVE-2010-3771", "CVE-2010-0183", "CVE-2012-0474", "CVE-2012-3975", "CVE-2010-2768", "CVE-2008-5014", "CVE-2008-0367", "CVE-2008-4058", "CVE-2011-3002", "CVE-2012-4184", "CVE-2011-0057", "CVE-2012-0447", "CVE-2011-3232", "CVE-2008-5913", "CVE-2007-3073", "CVE-2012-4205", "CVE-2010-2751", "CVE-2009-1836", "CVE-2011-0069", "CVE-2008-5022", "CVE-2008-5512", "CVE-2012-3992", "CVE-2009-3374", "CVE-2008-5501", "CVE-2008-4068", "CVE-2008-5016", "CVE-2011-3004", "CVE-2012-3980", "CVE-2008-5503", "CVE-2011-2374", "CVE-2012-1955", "CVE-2009-1839", "CVE-2012-1960", "CVE-2012-0445", "CVE-2009-3074", "CVE-2012-1965", "CVE-2011-3670", "CVE-2012-0462", "CVE-2010-1028", "CVE-2010-0162", "CVE-2011-2377", "CVE-2009-2463", "CVE-2009-2061", "CVE-2009-3070", "CVE-2012-3977", "CVE-2011-3000", "CVE-2010-2765", "CVE-2009-3069", "CVE-2010-0171", "CVE-2010-2767", "CVE-2009-0353", "CVE-2011-0078", "CVE-2012-3960", "CVE-2010-3175", "CVE-2009-0775", "CVE-2012-0451", "CVE-2011-3655", "CVE-2012-4180", "CVE-2009-2044", "CVE-2010-3182", "CVE-2009-0776", "CVE-2009-3371", "CVE-2009-3377", "CVE-2012-1959", "CVE-2011-2363", "CVE-2009-3075", "CVE-2010-0163", "CVE-2010-1208", "CVE-2011-0070", "CVE-2012-1947", "CVE-2009-1841", "CVE-2010-3170", "CVE-2011-3005", "CVE-2011-0059", "CVE-2012-1971", "CVE-2009-3983", "CVE-2012-4208", "CVE-2009-3987", "CVE-2011-3658", "CVE-2011-2373", "CVE-2008-5511", "CVE-2012-1957", "CVE-2012-1958", "CVE-2011-0054", "CVE-2012-4190", "CVE-2008-4064", "CVE-2012-1976", "CVE-2011-1187", "CVE-2012-5835", "CVE-2010-3183", "CVE-2009-2654", "CVE-2010-1202", "CVE-2012-0468", "CVE-2009-3982", "CVE-2009-3985", "CVE-2009-2065", "CVE-2009-1313", "CVE-2009-3382", "CVE-2008-5508", "CVE-2012-3972", "CVE-2012-4207", "CVE-2011-2988", "CVE-2010-3770", "CVE-2008-4061", "CVE-2010-1199", "CVE-2012-4204", "CVE-2008-0017", "CVE-2009-3988", "CVE-2010-3400", "CVE-2009-1302", "CVE-2011-2985", "CVE-2009-2466", "CVE-2012-4192", "CVE-2011-0058", "CVE-2011-2987", "CVE-2012-4188", "CVE-2012-0441", "CVE-2008-5024", "CVE-2011-0076", "CVE-2007-2437", "CVE-2012-5833", "CVE-2011-2999", "CVE-2012-3964", "CVE-2012-5841", "CVE-2010-0179", "CVE-2010-1209", "CVE-2010-2754", "CVE-2008-5507", "CVE-2009-2471", "CVE-2012-3990", "CVE-2011-2375", "CVE-2010-1198", "CVE-2008-4065", "CVE-2009-1840", "CVE-2011-3665", "CVE-2009-3381", "CVE-2011-0067", "CVE-2010-2760", "CVE-2012-1937", "CVE-2012-4215", "CVE-2009-2043", "CVE-2009-1307", "CVE-2009-2664", "CVE-2012-0463", "CVE-2010-4508", "CVE-2009-1310", "CVE-2009-3077", "CVE-2011-3003", "CVE-2011-2991", "CVE-2008-5015", "CVE-2011-0082", "CVE-2011-2983", "CVE-2012-4179", "CVE-2008-4582", "CVE-2011-3001", "CVE-2012-1964", "CVE-2009-2462", "CVE-2009-3378", "CVE-2011-3062", "CVE-2009-1303", "CVE-2012-0477", "CVE-2012-0473", "CVE-2012-4194", "CVE-2011-2365", "CVE-2012-4209", "CVE-2012-1963", "CVE-2012-4196", "CVE-2008-5506", "CVE-2009-2404", "CVE-2009-2465", "CVE-2012-0467", "CVE-2011-2981", "CVE-2012-0458", "CVE-2010-0169", "CVE-2010-2752", "CVE-2009-3078", "CVE-2012-0471", "CVE-2012-3961", "CVE-2010-3766", "CVE-2012-3971", "CVE-2008-5052", "CVE-2011-0055", "CVE-2009-1828", "CVE-2011-0072"], "description": "### Background\n\nMozilla Firefox is an open-source web browser and Mozilla Thunderbird an open-source email client, both from the Mozilla Project. The SeaMonkey project is a community effort to deliver production-quality releases of code derived from the application formerly known as the \u2018Mozilla Application Suite\u2019. XULRunner is a Mozilla runtime package that can be used to bootstrap XUL+XPCOM applications such as Firefox and Thunderbird. NSS is Mozilla\u2019s Network Security Services library that implements PKI support. IceCat is the GNU version of Firefox. \n\n### Description\n\nMultiple vulnerabilities have been discovered in Mozilla Firefox, Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner. Please review the CVE identifiers referenced below for details. \n\n### Impact\n\nA remote attacker could entice a user to view a specially crafted web page or email, possibly resulting in execution of arbitrary code or a Denial of Service condition. Furthermore, a remote attacker may be able to perform Man-in-the-Middle attacks, obtain sensitive information, bypass restrictions and protection mechanisms, force file downloads, conduct XML injection attacks, conduct XSS attacks, bypass the Same Origin Policy, spoof URL\u2019s for phishing attacks, trigger a vertical scroll, spoof the location bar, spoof an SSL indicator, modify the browser\u2019s font, conduct clickjacking attacks, or have other unspecified impact. \n\nA local attacker could gain escalated privileges, obtain sensitive information, or replace an arbitrary downloaded file. \n\n### Workaround\n\nThere is no known workaround at this time.\n\n### Resolution\n\nAll Mozilla Firefox users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=www-client/firefox-10.0.11\"\n \n\nAll users of the Mozilla Firefox binary package should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=www-client/firefox-bin-10.0.11\"\n \n\nAll Mozilla Thunderbird users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=mail-client/thunderbird-10.0.11\"\n \n\nAll users of the Mozilla Thunderbird binary package should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose\n \">=mail-client/thunderbird-bin-10.0.11\"\n \n\nAll Mozilla SeaMonkey users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=www-client/seamonkey-2.14-r1\"\n \n\nAll users of the Mozilla SeaMonkey binary package should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=www-client/seamonkey-bin-2.14\"\n \n\nAll NSS users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=dev-libs/nss-3.14\"\n \n\nThe \u201cwww-client/mozilla-firefox\u201d package has been merged into the \u201cwww-client/firefox\u201d package. To upgrade, please unmerge \u201cwww-client/mozilla-firefox\u201d and then emerge the latest \u201cwww-client/firefox\u201d package: \n \n \n # emerge --sync\n # emerge --unmerge \"www-client/mozilla-firefox\"\n # emerge --ask --oneshot --verbose \">=www-client/firefox-10.0.11\"\n \n\nThe \u201cwww-client/mozilla-firefox-bin\u201d package has been merged into the \u201cwww-client/firefox-bin\u201d package. To upgrade, please unmerge \u201cwww-client/mozilla-firefox-bin\u201d and then emerge the latest \u201cwww-client/firefox-bin\u201d package: \n \n \n # emerge --sync\n # emerge --unmerge \"www-client/mozilla-firefox-bin\"\n # emerge --ask --oneshot --verbose \">=www-client/firefox-bin-10.0.11\"\n \n\nThe \u201cmail-client/mozilla-thunderbird\u201d package has been merged into the \u201cmail-client/thunderbird\u201d package. To upgrade, please unmerge \u201cmail-client/mozilla-thunderbird\u201d and then emerge the latest \u201cmail-client/thunderbird\u201d package: \n \n \n # emerge --sync\n # emerge --unmerge \"mail-client/mozilla-thunderbird\"\n # emerge --ask --oneshot --verbose \">=mail-client/thunderbird-10.0.11\"\n \n\nThe \u201cmail-client/mozilla-thunderbird-bin\u201d package has been merged into the \u201cmail-client/thunderbird-bin\u201d package. To upgrade, please unmerge \u201cmail-client/mozilla-thunderbird-bin\u201d and then emerge the latest \u201cmail-client/thunderbird-bin\u201d package: \n \n \n # emerge --sync\n # emerge --unmerge \"mail-client/mozilla-thunderbird-bin\"\n # emerge --ask --oneshot --verbose\n \">=mail-client/thunderbird-bin-10.0.11\"\n \n\nGentoo discontinued support for GNU IceCat. We recommend that users unmerge GNU IceCat: \n \n \n # emerge --unmerge \"www-client/icecat\"\n \n\nGentoo discontinued support for XULRunner. We recommend that users unmerge XULRunner: \n \n \n # emerge --unmerge \"net-libs/xulrunner\"\n \n\nGentoo discontinued support for the XULRunner binary package. We recommend that users unmerge XULRunner: \n \n \n # emerge --unmerge \"net-libs/xulrunner-bin\"", "edition": 1, "modified": "2013-01-08T00:00:00", "published": "2013-01-08T00:00:00", "id": "GLSA-201301-01", "href": "https://security.gentoo.org/glsa/201301-01", "type": "gentoo", "title": "Mozilla Products: Multiple vulnerabilities", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}]}