ID SSA-2011-249-01
Type slackware
Reporter Slackware Linux Project
Modified 2011-09-06T23:34:10
Description
New mozilla-firefox packages are available for Slackware 13.0, 13.1, 13.37,
and -current to fix security issues.
Here are the details from the Slackware 13.37 ChangeLog:
patches/packages/mozilla-firefox-6.0.2-i486-1_slack13.37.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/firefox36.html
http://www.mozilla.org/security/known-vulnerabilities/firefox.html
http://www.mozilla.org/security/announce/2011/mfsa2011-34.html
( Security fix )
Where to find the new packages:
Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)
Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.
Updated package for Slackware 13.0:
ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/mozilla-firefox-3.6.22-i686-1.txz
Updated package for Slackware x86_64 13.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/mozilla-firefox-3.6.22-x86_64-1_slack13.0.txz
Updated package for Slackware 13.1:
ftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/mozilla-firefox-3.6.22-i686-1.txz
Updated package for Slackware x86_64 13.1:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/mozilla-firefox-3.6.22-x86_64-1_slack13.1.txz
Updated package for Slackware 13.37:
ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/mozilla-firefox-6.0.2-i486-1_slack13.37.txz
Updated package for Slackware x86_64 13.37:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/mozilla-firefox-6.0.2-x86_64-1_slack13.37.txz
Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/xap/mozilla-firefox-6.0.2-i486-1.txz
Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/xap/mozilla-firefox-6.0.2-x86_64-1.txz
MD5 signatures:
Slackware 13.0 package:
f28fa8ac39636e6fde23b294187da4cb mozilla-firefox-3.6.22-i686-1.txz
Slackware x86_64 13.0 package:
095bd6c089e9a4d430cf3e102ac87eb2 mozilla-firefox-3.6.22-x86_64-1_slack13.0.txz
Slackware 13.1 package:
e48591b5b698db7f76a7daa28d68d070 mozilla-firefox-3.6.22-i686-1.txz
Slackware x86_64 13.1 package:
038b87c66384ab97d50c984e76b494d0 mozilla-firefox-3.6.22-x86_64-1_slack13.1.txz
Slackware 13.37 package:
3f4b299fabe595840f6b893f5a53e312 mozilla-firefox-6.0.2-i486-1_slack13.37.txz
Slackware x86_64 13.37 package:
ef9dc913a8440824223f72f7e7ed52f1 mozilla-firefox-6.0.2-x86_64-1_slack13.37.txz
Slackware -current package:
a35022a4d110b48c415887098d1a0a51 xap/mozilla-firefox-6.0.2-i486-1.txz
Slackware x86_64 -current package:
de91edd05abcbf2da453c41c6808c00a xap/mozilla-firefox-6.0.2-x86_64-1.txz
Installation instructions:
Upgrade the package as root.
{"id": "SSA-2011-249-01", "type": "slackware", "bulletinFamily": "unix", "title": "[slackware-security] mozilla-firefox", "description": "New mozilla-firefox packages are available for Slackware 13.0, 13.1, 13.37,\nand -current to fix security issues.\n\n\nHere are the details from the Slackware 13.37 ChangeLog:\n\npatches/packages/mozilla-firefox-6.0.2-i486-1_slack13.37.txz: Upgraded.\n This release contains security fixes and improvements.\n For more information, see:\n http://www.mozilla.org/security/known-vulnerabilities/firefox36.html\n http://www.mozilla.org/security/known-vulnerabilities/firefox.html\n http://www.mozilla.org/security/announce/2011/mfsa2011-34.html\n (* Security fix *)\n\nWhere to find the new packages:\n\nThanks to the friendly folks at the OSU Open Source Lab\n(http://osuosl.org) for donating FTP and rsync hosting\nto the Slackware project! :-)\n\nAlso see the \"Get Slack\" section on http://slackware.com for\nadditional mirror sites near you.\n\nUpdated package for Slackware 13.0:\nftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/mozilla-firefox-3.6.22-i686-1.txz\n\nUpdated package for Slackware x86_64 13.0:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/mozilla-firefox-3.6.22-x86_64-1_slack13.0.txz\n\nUpdated package for Slackware 13.1:\nftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/mozilla-firefox-3.6.22-i686-1.txz\n\nUpdated package for Slackware x86_64 13.1:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/mozilla-firefox-3.6.22-x86_64-1_slack13.1.txz\n\nUpdated package for Slackware 13.37:\nftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/mozilla-firefox-6.0.2-i486-1_slack13.37.txz\n\nUpdated package for Slackware x86_64 13.37:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/mozilla-firefox-6.0.2-x86_64-1_slack13.37.txz\n\nUpdated package for Slackware -current:\nftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/xap/mozilla-firefox-6.0.2-i486-1.txz\n\nUpdated package for Slackware x86_64 -current:\nftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/xap/mozilla-firefox-6.0.2-x86_64-1.txz\n\n\nMD5 signatures:\n\nSlackware 13.0 package:\nf28fa8ac39636e6fde23b294187da4cb mozilla-firefox-3.6.22-i686-1.txz\n\nSlackware x86_64 13.0 package:\n095bd6c089e9a4d430cf3e102ac87eb2 mozilla-firefox-3.6.22-x86_64-1_slack13.0.txz\n\nSlackware 13.1 package:\ne48591b5b698db7f76a7daa28d68d070 mozilla-firefox-3.6.22-i686-1.txz\n\nSlackware x86_64 13.1 package:\n038b87c66384ab97d50c984e76b494d0 mozilla-firefox-3.6.22-x86_64-1_slack13.1.txz\n\nSlackware 13.37 package:\n3f4b299fabe595840f6b893f5a53e312 mozilla-firefox-6.0.2-i486-1_slack13.37.txz\n\nSlackware x86_64 13.37 package:\nef9dc913a8440824223f72f7e7ed52f1 mozilla-firefox-6.0.2-x86_64-1_slack13.37.txz\n\nSlackware -current package:\na35022a4d110b48c415887098d1a0a51 xap/mozilla-firefox-6.0.2-i486-1.txz\n\nSlackware x86_64 -current package:\nde91edd05abcbf2da453c41c6808c00a xap/mozilla-firefox-6.0.2-x86_64-1.txz\n\n\nInstallation instructions:\n\nUpgrade the package as root.", "published": "2011-09-06T23:34:10", "modified": "2011-09-06T23:34:10", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.450340", "reporter": "Slackware Linux Project", "references": [], "cvelist": [], "lastseen": "2020-10-25T16:35:52", "viewCount": 0, "enchantments": {"score": {"value": 3.3, "vector": "NONE", "modified": "2020-10-25T16:35:52", "rev": 2}, "dependencies": {"references": [{"type": "openvas", "idList": ["OPENVAS:71960", "OPENVAS:136141256231071960"]}, {"type": "nessus", "idList": ["SLACKWARE_SSA_2011-249-01.NASL"]}], "modified": "2020-10-25T16:35:52", "rev": 2}, "vulnersScore": 3.3}, "affectedPackage": [{"OS": "Slackware", "OSVersion": "13.0", "arch": "i686", "packageName": "mozilla-firefox", "packageVersion": "3.6.22", "packageFilename": "mozilla-firefox-3.6.22-i686-1.txz", "operator": "lt"}, {"OS": "Slackware", "OSVersion": "13.0", "arch": "x86_64", "packageName": "mozilla-firefox", "packageVersion": "3.6.22", "packageFilename": "mozilla-firefox-3.6.22-x86_64-1_slack13.0.txz", "operator": "lt"}, {"OS": "Slackware", "OSVersion": "13.1", "arch": "i686", "packageName": "mozilla-firefox", "packageVersion": "3.6.22", "packageFilename": "mozilla-firefox-3.6.22-i686-1.txz", "operator": "lt"}, {"OS": "Slackware", "OSVersion": "13.1", "arch": "x86_64", "packageName": "mozilla-firefox", "packageVersion": "3.6.22", "packageFilename": "mozilla-firefox-3.6.22-x86_64-1_slack13.1.txz", "operator": "lt"}, {"OS": "Slackware", "OSVersion": "13.37", "arch": "i486", "packageName": "mozilla-firefox", "packageVersion": "6.0.2", "packageFilename": "mozilla-firefox-6.0.2-i486-1_slack13.37.txz", "operator": "lt"}, {"OS": "Slackware", "OSVersion": "13.37", "arch": "x86_64", "packageName": "mozilla-firefox", "packageVersion": "6.0.2", "packageFilename": "mozilla-firefox-6.0.2-x86_64-1_slack13.37.txz", "operator": "lt"}, {"OS": "Slackware", "OSVersion": "current", "arch": "i486", "packageName": "mozilla-firefox", "packageVersion": "6.0.2", "packageFilename": "mozilla-firefox-6.0.2-i486-1.txz", "operator": "lt"}, {"OS": "Slackware", "OSVersion": "current", "arch": "x86_64", "packageName": "mozilla-firefox", "packageVersion": "6.0.2", "packageFilename": "mozilla-firefox-6.0.2-x86_64-1.txz", "operator": "lt"}]}
{"openvas": [{"lastseen": "2017-07-24T12:51:16", "bulletinFamily": "scanner", "cvelist": [], "description": "The remote host is missing an update as announced\nvia advisory SSA:2011-249-01.", "modified": "2017-07-06T00:00:00", "published": "2012-09-10T00:00:00", "id": "OPENVAS:71960", "href": "http://plugins.openvas.org/nasl.php?oid=71960", "type": "openvas", "title": "Slackware Advisory SSA:2011-249-01 mozilla-firefox ", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: esoft_slk_ssa_2011_249_01.nasl 6581 2017-07-06 13:58:51Z cfischer $\n# Description: Auto-generated from advisory SSA:2011-249-01\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"New mozilla-firefox packages are available for Slackware 13.0, 13.1, 13.37,\nand -current to fix security issues.\";\ntag_summary = \"The remote host is missing an update as announced\nvia advisory SSA:2011-249-01.\";\n\ntag_solution = \"https://secure1.securityspace.com/smysecure/catid.html?in=SSA:2011-249-01\";\n \nif(description)\n{\n script_id(71960);\n script_version(\"$Revision: 6581 $\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-06 15:58:51 +0200 (Thu, 06 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2012-09-10 07:16:18 -0400 (Mon, 10 Sep 2012)\");\n script_name(\"Slackware Advisory SSA:2011-249-01 mozilla-firefox \");\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Slackware Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/slackware_linux\", \"ssh/login/slackpack\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-slack.inc\");\nvuln = 0;\nif(isslkpkgvuln(pkg:\"mozilla-firefox\", ver:\"3.6.22-i686-1\", rls:\"SLK13.0\")) {\n vuln = 1;\n}\nif(isslkpkgvuln(pkg:\"mozilla-firefox\", ver:\"3.6.22-i686-1\", rls:\"SLK13.1\")) {\n vuln = 1;\n}\nif(isslkpkgvuln(pkg:\"mozilla-firefox\", ver:\"6.0.2-i486-1_slack13.37\", rls:\"SLK13.37\")) {\n vuln = 1;\n}\n\nif(vuln) {\n security_message(0);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2019-03-18T14:42:07", "bulletinFamily": "scanner", "cvelist": [], "description": "The remote host is missing an update as announced\nvia advisory SSA:2011-249-01.", "modified": "2019-03-15T00:00:00", "published": "2012-09-10T00:00:00", "id": "OPENVAS:136141256231071960", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231071960", "type": "openvas", "title": "Slackware Advisory SSA:2011-249-01 mozilla-firefox", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: esoft_slk_ssa_2011_249_01.nasl 14202 2019-03-15 09:16:15Z cfischer $\n# Description: Auto-generated from advisory SSA:2011-249-01\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.71960\");\n script_version(\"$Revision: 14202 $\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 10:16:15 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2012-09-10 07:16:18 -0400 (Mon, 10 Sep 2012)\");\n script_name(\"Slackware Advisory SSA:2011-249-01 mozilla-firefox\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Slackware Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/slackware_linux\", \"ssh/login/slackpack\", re:\"ssh/login/release=SLK(13\\.0|13\\.1|13\\.37)\");\n\n script_xref(name:\"URL\", value:\"https://secure1.securityspace.com/smysecure/catid.html?in=SSA:2011-249-01\");\n\n script_tag(name:\"insight\", value:\"New mozilla-firefox packages are available for Slackware 13.0, 13.1, 13.37,\nand -current to fix security issues.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to the new package(s).\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update as announced\nvia advisory SSA:2011-249-01.\");\n\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-slack.inc\");\n\nreport = \"\";\nres = \"\";\n\nif((res = isslkpkgvuln(pkg:\"mozilla-firefox\", ver:\"3.6.22-i686-1\", rls:\"SLK13.0\")) != NULL) {\n report += res;\n}\nif((res = isslkpkgvuln(pkg:\"mozilla-firefox\", ver:\"3.6.22-i686-1\", rls:\"SLK13.1\")) != NULL) {\n report += res;\n}\nif((res = isslkpkgvuln(pkg:\"mozilla-firefox\", ver:\"6.0.2-i486-1_slack13.37\", rls:\"SLK13.37\")) != NULL) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if(__pkg_match) {\n exit(99);\n}", "cvss": {"score": 0.0, "vector": "NONE"}}], "nessus": [{"lastseen": "2021-01-17T09:10:36", "description": "New seamonkey packages are available for Slackware 13.37 and -current\nto fix security issues.", "edition": 21, "published": "2011-09-07T00:00:00", "title": "Slackware 13.37 / current : seamonkey (SSA:2011-249-03)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": [], "modified": "2011-09-07T00:00:00", "cpe": ["p-cpe:/a:slackware:slackware_linux:seamonkey-solibs", "cpe:/o:slackware:slackware_linux:13.37", "p-cpe:/a:slackware:slackware_linux:seamonkey", "cpe:/o:slackware:slackware_linux"], "id": "SLACKWARE_SSA_2011-249-03.NASL", "href": "https://www.tenable.com/plugins/nessus/56094", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Slackware Security Advisory 2011-249-03. The text \n# itself is copyright (C) Slackware Linux, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(56094);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_xref(name:\"SSA\", value:\"2011-249-03\");\n\n script_name(english:\"Slackware 13.37 / current : seamonkey (SSA:2011-249-03)\");\n script_summary(english:\"Checks for updated packages in /var/log/packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Slackware host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"New seamonkey packages are available for Slackware 13.37 and -current\nto fix security issues.\"\n );\n # http://www.slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.438517\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?bfefb0dd\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected seamonkey and / or seamonkey-solibs packages.\"\n );\n script_set_attribute(attribute:\"risk_factor\", value:\"High\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:slackware:slackware_linux:seamonkey\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:slackware:slackware_linux:seamonkey-solibs\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:slackware:slackware_linux\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:slackware:slackware_linux:13.37\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/09/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/09/07\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2011-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Slackware Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Slackware/release\", \"Host/Slackware/packages\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"slackware.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Slackware/release\")) audit(AUDIT_OS_NOT, \"Slackware\");\nif (!get_kb_item(\"Host/Slackware/packages\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Slackware\", cpu);\n\n\nflag = 0;\nif (slackware_check(osver:\"13.37\", pkgname:\"seamonkey\", pkgver:\"2.3.3\", pkgarch:\"i486\", pkgnum:\"1_slack13.37\")) flag++;\nif (slackware_check(osver:\"13.37\", pkgname:\"seamonkey-solibs\", pkgver:\"2.3.3\", pkgarch:\"i486\", pkgnum:\"1_slack13.37\")) flag++;\nif (slackware_check(osver:\"13.37\", arch:\"x86_64\", pkgname:\"seamonkey\", pkgver:\"2.3.3\", pkgarch:\"x86_64\", pkgnum:\"1_slack13.37\")) flag++;\nif (slackware_check(osver:\"13.37\", arch:\"x86_64\", pkgname:\"seamonkey-solibs\", pkgver:\"2.3.3\", pkgarch:\"x86_64\", pkgnum:\"1_slack13.37\")) flag++;\n\nif (slackware_check(osver:\"current\", pkgname:\"seamonkey\", pkgver:\"2.3.3\", pkgarch:\"i486\", pkgnum:\"1\")) flag++;\nif (slackware_check(osver:\"current\", pkgname:\"seamonkey-solibs\", pkgver:\"2.3.3\", pkgarch:\"i486\", pkgnum:\"1\")) flag++;\nif (slackware_check(osver:\"current\", arch:\"x86_64\", pkgname:\"seamonkey\", pkgver:\"2.3.3\", pkgarch:\"x86_64\", pkgnum:\"1\")) flag++;\nif (slackware_check(osver:\"current\", arch:\"x86_64\", pkgname:\"seamonkey-solibs\", pkgver:\"2.3.3\", pkgarch:\"x86_64\", pkgnum:\"1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:slackware_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2021-01-17T09:10:36", "description": "New mozilla-firefox packages are available for Slackware 13.0, 13.1,\n13.37, and -current to fix security issues.", "edition": 21, "published": "2011-09-07T00:00:00", "title": "Slackware 13.0 / 13.1 / 13.37 / current : mozilla-firefox (SSA:2011-249-01)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": [], "modified": "2011-09-07T00:00:00", "cpe": ["cpe:/o:slackware:slackware_linux:13.37", "cpe:/o:slackware:slackware_linux:13.0", "cpe:/o:slackware:slackware_linux", "p-cpe:/a:slackware:slackware_linux:mozilla-firefox", "cpe:/o:slackware:slackware_linux:13.1"], "id": "SLACKWARE_SSA_2011-249-01.NASL", "href": "https://www.tenable.com/plugins/nessus/56092", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Slackware Security Advisory 2011-249-01. The text \n# itself is copyright (C) Slackware Linux, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(56092);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_xref(name:\"SSA\", value:\"2011-249-01\");\n\n script_name(english:\"Slackware 13.0 / 13.1 / 13.37 / current : mozilla-firefox (SSA:2011-249-01)\");\n script_summary(english:\"Checks for updated package in /var/log/packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Slackware host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"New mozilla-firefox packages are available for Slackware 13.0, 13.1,\n13.37, and -current to fix security issues.\"\n );\n # http://www.slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.450340\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?740aa617\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected mozilla-firefox package.\"\n );\n script_set_attribute(attribute:\"risk_factor\", value:\"High\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:slackware:slackware_linux:mozilla-firefox\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:slackware:slackware_linux\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:slackware:slackware_linux:13.0\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:slackware:slackware_linux:13.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:slackware:slackware_linux:13.37\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/09/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/09/07\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2011-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Slackware Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Slackware/release\", \"Host/Slackware/packages\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"slackware.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Slackware/release\")) audit(AUDIT_OS_NOT, \"Slackware\");\nif (!get_kb_item(\"Host/Slackware/packages\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Slackware\", cpu);\n\n\nflag = 0;\nif (slackware_check(osver:\"13.0\", pkgname:\"mozilla-firefox\", pkgver:\"3.6.22\", pkgarch:\"i686\", pkgnum:\"1\")) flag++;\nif (slackware_check(osver:\"13.0\", arch:\"x86_64\", pkgname:\"mozilla-firefox\", pkgver:\"3.6.22\", pkgarch:\"x86_64\", pkgnum:\"1_slack13.0\")) flag++;\n\nif (slackware_check(osver:\"13.1\", pkgname:\"mozilla-firefox\", pkgver:\"3.6.22\", pkgarch:\"i686\", pkgnum:\"1\")) flag++;\nif (slackware_check(osver:\"13.1\", arch:\"x86_64\", pkgname:\"mozilla-firefox\", pkgver:\"3.6.22\", pkgarch:\"x86_64\", pkgnum:\"1_slack13.1\")) flag++;\n\nif (slackware_check(osver:\"13.37\", pkgname:\"mozilla-firefox\", pkgver:\"6.0.2\", pkgarch:\"i486\", pkgnum:\"1_slack13.37\")) flag++;\nif (slackware_check(osver:\"13.37\", arch:\"x86_64\", pkgname:\"mozilla-firefox\", pkgver:\"6.0.2\", pkgarch:\"x86_64\", pkgnum:\"1_slack13.37\")) flag++;\n\nif (slackware_check(osver:\"current\", pkgname:\"mozilla-firefox\", pkgver:\"6.0.2\", pkgarch:\"i486\", pkgnum:\"1\")) flag++;\nif (slackware_check(osver:\"current\", arch:\"x86_64\", pkgname:\"mozilla-firefox\", pkgver:\"6.0.2\", pkgarch:\"x86_64\", pkgnum:\"1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:slackware_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2021-01-17T09:10:36", "description": "New mozilla-thunderbird packages are available for Slackware 13.0,\n13.1, 13.37, and -current to fix security issues.", "edition": 21, "published": "2011-09-07T00:00:00", "title": "Slackware 13.0 / 13.1 / 13.37 / current : mozilla-thunderbird (SSA:2011-249-02)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": [], "modified": "2011-09-07T00:00:00", "cpe": ["cpe:/o:slackware:slackware_linux:13.37", "cpe:/o:slackware:slackware_linux:13.0", "cpe:/o:slackware:slackware_linux", "cpe:/o:slackware:slackware_linux:13.1", "p-cpe:/a:slackware:slackware_linux:mozilla-thunderbird"], "id": "SLACKWARE_SSA_2011-249-02.NASL", "href": "https://www.tenable.com/plugins/nessus/56093", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Slackware Security Advisory 2011-249-02. The text \n# itself is copyright (C) Slackware Linux, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(56093);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_xref(name:\"SSA\", value:\"2011-249-02\");\n\n script_name(english:\"Slackware 13.0 / 13.1 / 13.37 / current : mozilla-thunderbird (SSA:2011-249-02)\");\n script_summary(english:\"Checks for updated package in /var/log/packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Slackware host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"New mozilla-thunderbird packages are available for Slackware 13.0,\n13.1, 13.37, and -current to fix security issues.\"\n );\n # http://www.slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.453304\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?ccf19bd1\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected mozilla-thunderbird package.\"\n );\n script_set_attribute(attribute:\"risk_factor\", value:\"High\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:slackware:slackware_linux:mozilla-thunderbird\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:slackware:slackware_linux\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:slackware:slackware_linux:13.0\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:slackware:slackware_linux:13.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:slackware:slackware_linux:13.37\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/09/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/09/07\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2011-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Slackware Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Slackware/release\", \"Host/Slackware/packages\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"slackware.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Slackware/release\")) audit(AUDIT_OS_NOT, \"Slackware\");\nif (!get_kb_item(\"Host/Slackware/packages\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Slackware\", cpu);\n\n\nflag = 0;\nif (slackware_check(osver:\"13.0\", pkgname:\"mozilla-thunderbird\", pkgver:\"3.1.13\", pkgarch:\"i686\", pkgnum:\"1\")) flag++;\nif (slackware_check(osver:\"13.0\", arch:\"x86_64\", pkgname:\"mozilla-thunderbird\", pkgver:\"3.1.13\", pkgarch:\"x86_64\", pkgnum:\"1_slack13.0\")) flag++;\n\nif (slackware_check(osver:\"13.1\", pkgname:\"mozilla-thunderbird\", pkgver:\"3.1.13\", pkgarch:\"i686\", pkgnum:\"1\")) flag++;\nif (slackware_check(osver:\"13.1\", arch:\"x86_64\", pkgname:\"mozilla-thunderbird\", pkgver:\"3.1.13\", pkgarch:\"x86_64\", pkgnum:\"1_slack13.1\")) flag++;\n\nif (slackware_check(osver:\"13.37\", pkgname:\"mozilla-thunderbird\", pkgver:\"3.1.13\", pkgarch:\"i486\", pkgnum:\"1_slack13.37\")) flag++;\nif (slackware_check(osver:\"13.37\", arch:\"x86_64\", pkgname:\"mozilla-thunderbird\", pkgver:\"3.1.13\", pkgarch:\"x86_64\", pkgnum:\"1_slack13.37\")) flag++;\n\nif (slackware_check(osver:\"current\", pkgname:\"mozilla-thunderbird\", pkgver:\"6.0.1\", pkgarch:\"i486\", pkgnum:\"1\")) flag++;\nif (slackware_check(osver:\"current\", arch:\"x86_64\", pkgname:\"mozilla-thunderbird\", pkgver:\"6.0.1\", pkgarch:\"x86_64\", pkgnum:\"1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:slackware_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 0.0, "vector": "NONE"}}]}