ID SUSE-SU-2013:0292-1 Type suse Reporter Suse Modified 2013-02-13T23:04:32
Description
Mozilla Firefox was updated to the 10.0.12ESR release for
LTSS.
*
MFSA 2013-01: Mozilla developers identified and fixed
several memory safety bugs in the browser engine used in
Firefox and other Mozilla-based products. Some of these
bugs showed evidence of memory corruption under certain
circumstances, and we presume that with enough effort at
least some of these could be exploited to run arbitrary
code.
o Christoph Diehl, Christian Holler, Mats
Palmgren, and Chiaki Ishikawa reported memory safety
problems and crashes that affect Firefox ESR 10, Firefox
ESR 17, and Firefox 17. ( CVE-2013-0769
<<a rel="nofollow" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0769">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0769</a>
> ) o Bill Gianopoulos, Benoit Jacob, Christoph Diehl,
Christian Holler, Gary Kwong, Robert O'Callahan, and
Scoobidiver reported memory safety problems and crashes
that affect Firefox ESR 17 and Firefox 17. (CVE-2013-0749
<<a rel="nofollow" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0749">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0749</a>
> ) o Jesse Ruderman, Christian Holler, Julian Seward, and
Scoobidiver reported memory safety problems and crashes
that affect Firefox 17. (CVE-2013-0770
<<a rel="nofollow" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0770">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0770</a>
> )
*
MFSA 2013-02: Security researcher Abhishek Arya
(Inferno) of the Google Chrome Security Team discovered a
series critically rated of use-after-free, out of bounds
read, and buffer overflow issues using the Address
Sanitizer tool in shipped software. These issues are
potentially exploitable, allowing for remote code
execution. We would also like to thank Abhishek for
reporting three additional user-after-free and out of
bounds read flaws introduced during Firefox development
that were fixed before general release.
The following issue was fixed in Firefox 18:
o Global-buffer-overflow in
CharDistributionAnalysis::HandleOneChar (CVE-2013-0760
<<a rel="nofollow" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0760">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0760</a>
> )
The following issues were fixed in Firefox 18, ESR
17.0.1, and ESR 10.0.12:
o Heap-use-after-free in imgRequest::OnStopFrame
(CVE-2013-0762
<<a rel="nofollow" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0762">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0762</a>
> ) o Heap-use-after-free in ~nsHTMLEditRules
(CVE-2013-0766
<<a rel="nofollow" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0766">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0766</a>
> ) o Out of bounds read in
nsSVGPathElement::GetPathLengthScale ( CVE-2013-0767
<<a rel="nofollow" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0767">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0767</a>
> )
The following issues were fixed in Firefox 18 and ESR
17.0.1:
o Heap-use-after-free in
mozilla::TrackUnionStream::EndTrack ( CVE-2013-0761
<<a rel="nofollow" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0761">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0761</a>
> ) o Heap-use-after-free in Mesa, triggerable by resizing
a WebGL canvas (CVE-2013-0763
<<a rel="nofollow" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0763">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0763</a>
> ) o Heap-buffer-overflow in
gfxTextRun::ShrinkToLigatureBoundaries (CVE-2013-0771
<<a rel="nofollow" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0771">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0771</a>
> )
The following issue was fixed in Firefox 18 and in
the earlier ESR 10.0.11 release:
o Heap-buffer-overflow in nsWindow::OnExposeEvent
(CVE-2012-5829
<<a rel="nofollow" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5829">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5829</a>
> )
*
MFSA 2013-03: Security researcher miaubiz used the
Address Sanitizer tool to discover a buffer overflow in
Canvas when specific bad height and width values were given
through HTML. This could lead to a potentially exploitable
crash. (CVE-2013-0768
<<a rel="nofollow" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0768">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0768</a>
> )
Miaubiz also found a potentially exploitable crash
when 2D and 3D content was mixed which was introduced
during Firefox development and fixed before general release.
*
MFSA 2013-04: Security researcher Masato Kinugawa
found a flaw in which the displayed URL values within the
addressbar can be spoofed by a page during loading. This
allows for phishing attacks where a malicious page can
spoof the identify of another site. ( CVE-2013-0759
<<a rel="nofollow" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0759">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0759</a>
> )
*
MFSA 2013-05: Using the Address Sanitizer tool,
security researcher Atte Kettunen from OUSPG discovered
that the combination of large numbers of columns and column
groups in a table could cause the array containing the
columns during rendering to overwrite itself. This can lead
to a user-after-free causing a potentially exploitable
crash. ( CVE-2013-0744
<<a rel="nofollow" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0744">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0744</a>
> )
*
MFSA 2013-06: Mozilla developer Wesley Johnston
reported that when there are two or more iframes on the
same HTML page, an iframe is able to see the touch events
and their targets that occur within the other iframes on
the page. If the iframes are from the same origin, they can
also access the properties and methods of the targets of
other iframes but same-origin policy (SOP) restricts access
across domains. This allows for information leakage and
possibilities for cross-site scripting (XSS) if another
vulnerability can be used to get around SOP restrictions.
(CVE-2013-0751
<<a rel="nofollow" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0751">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0751</a>
> )
*
MFSA 2013-07: Mozilla community member Jerry Baker
reported a crashing issue found through Thunderbird when
downloading messages over a Secure Sockets Layer (SSL)
connection. This was caused by a bug in the networking code
assuming that secure connections were entirely handled on
the socket transport thread when they can occur on a
variety of threads. The resulting crash was potentially
exploitable. (CVE-2013-0764
<<a rel="nofollow" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0764">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0764</a>
> )
*
MFSA 2013-08: Mozilla developer Olli Pettay
discovered that the AutoWrapperChanger class fails to keep
some javascript objects alive during garbage collection.
This can lead to an exploitable crash allowing for
arbitrary code execution. (CVE-2013-0745
<<a rel="nofollow" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0745">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0745</a>
> )
*
MFSA 2013-09: Mozilla developer Boris Zbarsky
reported reported a problem where jsval-returning
quickstubs fail to wrap their return values, causing a
compartment mismatch. This mismatch can cause garbage
collection to occur incorrectly and lead to a potentially
exploitable crash. (CVE-2013-0746
<<a rel="nofollow" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0746">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0746</a>
> )
*
MFSA 2013-10: Mozilla security researcher Jesse
Ruderman reported that events in the plugin handler can be
manipulated by web content to bypass same-origin policy
(SOP) restrictions. This can allow for clickjacking on
malicious web pages. (CVE-2013-0747
<<a rel="nofollow" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0747">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0747</a>
> )
*
MFSA 2013-11: Mozilla security researcher Jesse
Ruderman discovered that using the toString function of XBL
objects can lead to inappropriate information leakage by
revealing the address space layout instead of just the ID
of the object. This layout information could potentially be
used to bypass ASLR and other security protections.
(CVE-2013-0748
<<a rel="nofollow" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0748">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0748</a>
> )
*
MFSA 2013-12: Security researcher pa_kt reported a
flaw via TippingPoint's Zero Day Initiative that an integer
overflow is possible when calculating the length for a
Javascript string concatenation, which is then used for
memory allocation. This results in a buffer overflow,
leading to a potentially exploitable memory corruption.
(CVE-2013-0750
<<a rel="nofollow" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0750">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0750</a>
> )
*
MFSA 2013-13: Security researcher Sviatoslav Chagaev
reported that when using an XBL file containing multiple
XML bindings with SVG content, a memory corruption can
occur. In concern with remote XUL, this can lead to an
exploitable crash. (CVE-2013-0752
<<a rel="nofollow" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0752">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0752</a>
> )
*
MFSA 2013-14: Security researcher Mariusz Mlynski
reported that it is possible to change the prototype of an
object and bypass Chrome Object Wrappers (COW) to gain
access to chrome privileged functions. This could allow for
arbitrary code execution. (CVE-2013-0757
<<a rel="nofollow" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0757">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0757</a>
> )
*
MFSA 2013-15: Security researcher Mariusz Mlynski
reported that it is possible to open a chrome privileged
web page through plugin objects through interaction with
SVG elements. This could allow for arbitrary code
execution. (CVE-2013-0758
<<a rel="nofollow" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0758">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0758</a>
> )
*
MFSA 2013-16: Security researcher regenrecht
reported, via TippingPoint's Zero Day Initiative, a
use-after-free in XMLSerializer by the exposing of
serializeToStream to web content. This can lead to
arbitrary code execution when exploited. (CVE-2013-0753
<<a rel="nofollow" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0753">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0753</a>
> )
*
MFSA 2013-17: Security researcher regenrecht
reported, via TippingPoint's Zero Day Initiative, a
use-after-free within the ListenerManager when garbage
collection is forced after data in listener objects have
been allocated in some circumstances. This results in a
use-after-free which can lead to arbitrary code execution.
(CVE-2013-0754
<<a rel="nofollow" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0754">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0754</a>
> )
*
MFSA 2013-18: Security researcher regenrecht
reported, via TippingPoint's Zero Day Initiative, a
use-after-free using the domDoc pointer within Vibrate
library. This can lead to arbitrary code execution when
exploited. (CVE-2013-0755
<<a rel="nofollow" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0755">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0755</a>
> )
*
MFSA 2013-19: Security researcher regenrecht
reported, via TippingPoint's Zero Day Initiative, a garbage
collection flaw in Javascript Proxy objects. This can lead
to a use-after-free leading to arbitrary code execution.
(CVE-2013-0756
<<a rel="nofollow" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0756">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0756</a>
> )
*
MFSA 2013-20: Google reported to Mozilla that
TURKTRUST, a certificate authority in Mozilla's root
program, had mis-issued two intermediate certificates to
customers. The issue was not specific to Firefox but there
was evidence that one of the certificates was used for
man-in-the-middle (MITM) traffic management of domain names
that the customer did not legitimately own or control. This
issue was resolved by revoking the trust for these specific
mis-issued certificates. (CVE-2013-0743
<<a rel="nofollow" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0743">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0743</a>
> )
{"enchantments": {"score": {"value": 9.2, "vector": "NONE", "modified": "2016-09-04T12:10:59", "rev": 2}, "dependencies": {"references": [{"type": "suse", "idList": ["SUSE-SU-2013:0048-1", "OPENSUSE-SU-2013:0131-1", "SUSE-SU-2013:0306-1", "OPENSUSE-SU-2013:0149-1", "SUSE-SU-2013:0049-1"]}, {"type": "nessus", "idList": ["MOZILLA_FIREFOX_10012.NASL", "MOZILLA_THUNDERBIRD_1702.NASL", "SUSE_11_FIREFOX-201301-130110.NASL", "MOZILLA_FIREFOX_180.NASL", "FREEBSD_PKG_A4ED66325AA911E28FCBC8600054B392.NASL", "UBUNTU_USN-1681-2.NASL", "SEAMONKEY_215.NASL", "UBUNTU_USN-1681-3.NASL", "SUSE_FIREFOX-201301-8426.NASL", "SUSE_SU-2013-0306-1.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:850391", "OPENVAS:841273", "OPENVAS:841307", "OPENVAS:1361412562310850391", "OPENVAS:1361412562310841272", "OPENVAS:1361412562310841273", "OPENVAS:1361412562310841307", "OPENVAS:1361412562310841289", "OPENVAS:841272", "OPENVAS:841289"]}, {"type": "ubuntu", "idList": ["USN-1681-1", "USN-1681-3", "USN-1681-4", "USN-1681-2"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:VULN:12816"]}, {"type": "freebsd", "idList": ["A4ED6632-5AA9-11E2-8FCB-C8600054B392"]}, {"type": "oraclelinux", "idList": ["ELSA-2013-0145", "ELSA-2013-0144"]}, {"type": "centos", "idList": ["CESA-2013:0144", "CESA-2013:0145"]}, {"type": "redhat", "idList": ["RHSA-2013:0145", "RHSA-2013:0144"]}, {"type": "mozilla", "idList": ["MFSA2013-02"]}, {"type": "cve", "idList": ["CVE-2013-0767", "CVE-2013-0756", "CVE-2013-0743", "CVE-2013-0757", "CVE-2013-0768", "CVE-2013-0760", "CVE-2013-0761", "CVE-2013-0770", "CVE-2013-0769", "CVE-2013-0759"]}], "modified": "2016-09-04T12:10:59", "rev": 2}, "vulnersScore": 9.2}, "reporter": "Suse", "id": "SUSE-SU-2013:0292-1", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "bulletinFamily": "unix", "viewCount": 2, "affectedPackage": [{"packageFilename": "mozilla-nss-tools-3.14.1-0.3.1.i586.rpm", "packageName": "mozilla-nss-tools", "arch": "i586", "operator": "lt", "packageVersion": "3.14.1-0.3.1", "OSVersion": "11.1", "OS": "SUSE Linux Enterprise Server LTSS"}, {"packageFilename": "MozillaFirefox-translations-10.0.12-0.4.3.x86_64.rpm", "packageName": "MozillaFirefox-translations", "arch": "x86_64", "operator": "lt", "packageVersion": "10.0.12-0.4.3", "OSVersion": "11.1", "OS": "SUSE Linux Enterprise Server for VMware LTSS"}, {"packageFilename": "mozilla-nss-tools-3.14.1-0.3.1.i586.rpm", "packageName": "mozilla-nss-tools", "arch": "i586", "operator": "lt", "packageVersion": "3.14.1-0.3.1", "OSVersion": "11.1", "OS": "SUSE Linux Enterprise Server for VMware LTSS"}, {"packageFilename": "mozilla-nspr-4.9.4-0.3.1.x86_64.rpm", "packageName": "mozilla-nspr", "arch": "x86_64", "operator": "lt", "packageVersion": "4.9.4-0.3.1", "OSVersion": "11.1", "OS": "SUSE Linux Enterprise Server LTSS"}, {"packageFilename": "mozilla-nspr-4.9.4-0.3.1.s390x.rpm", "packageName": "mozilla-nspr", "arch": "s390x", "operator": "lt", "packageVersion": "4.9.4-0.3.1", "OSVersion": "11.1", "OS": "SUSE Linux Enterprise Server LTSS"}, {"packageFilename": "libfreebl3-3.14.1-0.3.1.x86_64.rpm", "packageName": "libfreebl3", "arch": "x86_64", "operator": "lt", "packageVersion": "3.14.1-0.3.1", "OSVersion": "11.1", "OS": "SUSE Linux Enterprise Server for VMware LTSS"}, {"packageFilename": "mozilla-nss-3.14.1-0.3.1.i586.rpm", "packageName": "mozilla-nss", "arch": "i586", "operator": "lt", "packageVersion": "3.14.1-0.3.1", "OSVersion": "11.1", "OS": "SUSE Linux Enterprise Server for VMware LTSS"}, {"packageFilename": "mozilla-nss-32bit-3.14.1-0.3.1.x86_64.rpm", "packageName": "mozilla-nss-32bit", "arch": "x86_64", "operator": "lt", "packageVersion": "3.14.1-0.3.1", "OSVersion": "11.1", "OS": "SUSE Linux Enterprise Server for VMware LTSS"}, {"packageFilename": "MozillaFirefox-branding-SLES-for-VMware-7-0.4.2.102.i586.rpm", "packageName": "MozillaFirefox-branding-SLES-for-VMware-7", "arch": "i586", "operator": "lt", "packageVersion": "0.4.2.102", "OSVersion": "11.1", "OS": "SUSE Linux Enterprise Server for VMware LTSS"}, {"packageFilename": "mozilla-nspr-32bit-4.9.4-0.3.1.x86_64.rpm", "packageName": "mozilla-nspr-32bit", "arch": "x86_64", "operator": "lt", "packageVersion": "4.9.4-0.3.1", "OSVersion": "11.1", "OS": "SUSE Linux Enterprise Server LTSS"}, {"packageFilename": "MozillaFirefox-translations-10.0.12-0.4.3.x86_64.rpm", "packageName": "MozillaFirefox-translations", "arch": "x86_64", "operator": "lt", "packageVersion": "10.0.12-0.4.3", "OSVersion": "11.1", "OS": "SUSE Linux Enterprise Server LTSS"}, {"packageFilename": "mozilla-nspr-32bit-4.9.4-0.3.1.s390x.rpm", "packageName": "mozilla-nspr-32bit", "arch": "s390x", "operator": "lt", "packageVersion": "4.9.4-0.3.1", "OSVersion": "11.1", "OS": "SUSE Linux Enterprise Server LTSS"}, {"packageFilename": "MozillaFirefox-10.0.12-0.4.3.x86_64.rpm", "packageName": "MozillaFirefox", "arch": "x86_64", "operator": "lt", "packageVersion": "10.0.12-0.4.3", "OSVersion": "11.1", "OS": "SUSE Linux Enterprise Server for VMware LTSS"}, {"packageFilename": "mozilla-nss-3.14.1-0.3.1.i586.rpm", "packageName": "mozilla-nss", "arch": "i586", "operator": "lt", "packageVersion": "3.14.1-0.3.1", "OSVersion": "11.1", "OS": "SUSE Linux Enterprise Server LTSS"}, {"packageFilename": "libfreebl3-32bit-3.14.1-0.3.1.x86_64.rpm", "packageName": "libfreebl3-32bit", "arch": "x86_64", "operator": "lt", "packageVersion": "3.14.1-0.3.1", "OSVersion": "11.1", "OS": "SUSE Linux Enterprise Server LTSS"}, {"packageFilename": "mozilla-nss-3.14.1-0.3.1.s390x.rpm", "packageName": "mozilla-nss", "arch": "s390x", "operator": "lt", "packageVersion": "3.14.1-0.3.1", "OSVersion": "11.1", "OS": "SUSE Linux Enterprise Server LTSS"}, {"packageFilename": "libfreebl3-32bit-3.14.1-0.3.1.x86_64.rpm", "packageName": "libfreebl3-32bit", "arch": "x86_64", "operator": "lt", "packageVersion": "3.14.1-0.3.1", "OSVersion": "11.1", "OS": "SUSE Linux Enterprise Server for VMware LTSS"}, {"packageFilename": "MozillaFirefox-branding-SLED-7-0.6.7.103.i586.rpm", "packageName": "MozillaFirefox-branding-SLED", "arch": "i586", "operator": "lt", "packageVersion": "7-0.6.7.103", "OSVersion": "11.1", "OS": "SUSE Linux Enterprise Server LTSS"}, {"packageFilename": "MozillaFirefox-10.0.12-0.4.3.x86_64.rpm", "packageName": "MozillaFirefox", "arch": "x86_64", "operator": "lt", "packageVersion": "10.0.12-0.4.3", "OSVersion": "11.1", "OS": "SUSE Linux Enterprise Server LTSS"}, {"packageFilename": "MozillaFirefox-branding-SLED-7-0.6.7.103.x86_64.rpm", "packageName": "MozillaFirefox-branding-SLED", "arch": "x86_64", "operator": "lt", "packageVersion": "7-0.6.7.103", "OSVersion": "11.1", "OS": "SUSE Linux Enterprise Server LTSS"}, {"packageFilename": "mozilla-nspr-4.9.4-0.3.1.i586.rpm", "packageName": "mozilla-nspr", "arch": "i586", "operator": "lt", "packageVersion": "4.9.4-0.3.1", "OSVersion": "11.1", "OS": "SUSE Linux Enterprise Server LTSS"}, {"packageFilename": "mozilla-nss-tools-3.14.1-0.3.1.x86_64.rpm", "packageName": "mozilla-nss-tools", "arch": "x86_64", "operator": "lt", "packageVersion": "3.14.1-0.3.1", "OSVersion": "11.1", "OS": "SUSE Linux Enterprise Server LTSS"}, {"packageFilename": "MozillaFirefox-translations-10.0.12-0.4.3.i586.rpm", "packageName": "MozillaFirefox-translations", "arch": "i586", "operator": "lt", "packageVersion": "10.0.12-0.4.3", "OSVersion": "11.1", "OS": "SUSE Linux Enterprise Server LTSS"}, {"packageFilename": "mozilla-nss-3.14.1-0.3.1.x86_64.rpm", "packageName": "mozilla-nss", "arch": "x86_64", "operator": "lt", "packageVersion": "3.14.1-0.3.1", "OSVersion": "11.1", "OS": "SUSE Linux Enterprise Server for VMware LTSS"}, {"packageFilename": "MozillaFirefox-branding-SLED-7-0.6.7.103.s390x.rpm", "packageName": "MozillaFirefox-branding-SLED", "arch": "s390x", "operator": "lt", "packageVersion": "7-0.6.7.103", "OSVersion": "11.1", "OS": "SUSE Linux Enterprise Server LTSS"}, {"packageFilename": "mozilla-nss-3.14.1-0.3.1.x86_64.rpm", "packageName": "mozilla-nss", "arch": "x86_64", "operator": "lt", "packageVersion": "3.14.1-0.3.1", "OSVersion": "11.1", "OS": "SUSE Linux Enterprise Server LTSS"}, {"packageFilename": "libfreebl3-32bit-3.14.1-0.3.1.s390x.rpm", "packageName": "libfreebl3-32bit", "arch": "s390x", "operator": "lt", "packageVersion": "3.14.1-0.3.1", "OSVersion": "11.1", "OS": "SUSE Linux Enterprise Server LTSS"}, {"packageFilename": "MozillaFirefox-branding-SLES-for-VMware-7-0.4.2.102.x86_64.rpm", "packageName": "MozillaFirefox-branding-SLES-for-VMware-7", "arch": "x86_64", "operator": "lt", "packageVersion": "0.4.2.102", "OSVersion": "11.1", "OS": "SUSE Linux Enterprise Server for VMware LTSS"}, {"packageFilename": "mozilla-nss-tools-3.14.1-0.3.1.s390x.rpm", "packageName": "mozilla-nss-tools", "arch": "s390x", "operator": "lt", "packageVersion": "3.14.1-0.3.1", "OSVersion": "11.1", "OS": "SUSE Linux Enterprise Server LTSS"}, {"packageFilename": "mozilla-nss-tools-3.14.1-0.3.1.x86_64.rpm", "packageName": "mozilla-nss-tools", "arch": "x86_64", "operator": "lt", "packageVersion": "3.14.1-0.3.1", "OSVersion": "11.1", "OS": "SUSE Linux Enterprise Server for VMware LTSS"}, {"packageFilename": "MozillaFirefox-translations-10.0.12-0.4.3.s390x.rpm", "packageName": "MozillaFirefox-translations", "arch": "s390x", "operator": "lt", "packageVersion": "10.0.12-0.4.3", "OSVersion": "11.1", "OS": "SUSE Linux Enterprise Server LTSS"}, {"packageFilename": "mozilla-nspr-4.9.4-0.3.1.x86_64.rpm", "packageName": "mozilla-nspr", "arch": "x86_64", "operator": "lt", "packageVersion": "4.9.4-0.3.1", "OSVersion": "11.1", "OS": "SUSE Linux Enterprise Server for VMware LTSS"}, {"packageFilename": "mozilla-nspr-4.9.4-0.3.1.i586.rpm", "packageName": "mozilla-nspr", "arch": "i586", "operator": "lt", "packageVersion": "4.9.4-0.3.1", "OSVersion": "11.1", "OS": "SUSE Linux Enterprise Server for VMware LTSS"}, {"packageFilename": "mozilla-nspr-32bit-4.9.4-0.3.1.x86_64.rpm", "packageName": "mozilla-nspr-32bit", "arch": "x86_64", "operator": "lt", "packageVersion": "4.9.4-0.3.1", "OSVersion": "11.1", "OS": "SUSE Linux Enterprise Server for VMware LTSS"}, {"packageFilename": "libfreebl3-3.14.1-0.3.1.s390x.rpm", "packageName": "libfreebl3", "arch": "s390x", "operator": "lt", "packageVersion": "3.14.1-0.3.1", "OSVersion": "11.1", "OS": "SUSE Linux Enterprise Server LTSS"}, {"packageFilename": "libfreebl3-3.14.1-0.3.1.i586.rpm", "packageName": "libfreebl3", "arch": "i586", "operator": "lt", "packageVersion": "3.14.1-0.3.1", "OSVersion": "11.1", "OS": "SUSE Linux Enterprise Server LTSS"}, {"packageFilename": "MozillaFirefox-translations-10.0.12-0.4.3.i586.rpm", "packageName": "MozillaFirefox-translations", "arch": "i586", "operator": "lt", "packageVersion": "10.0.12-0.4.3", "OSVersion": "11.1", "OS": "SUSE Linux Enterprise Server for VMware LTSS"}, {"packageFilename": "libfreebl3-3.14.1-0.3.1.i586.rpm", "packageName": "libfreebl3", "arch": "i586", "operator": "lt", "packageVersion": "3.14.1-0.3.1", "OSVersion": "11.1", "OS": "SUSE Linux Enterprise Server for VMware LTSS"}, {"packageFilename": "libfreebl3-3.14.1-0.3.1.x86_64.rpm", "packageName": "libfreebl3", "arch": "x86_64", "operator": "lt", "packageVersion": "3.14.1-0.3.1", "OSVersion": "11.1", "OS": "SUSE Linux Enterprise Server LTSS"}, {"packageFilename": "mozilla-nss-32bit-3.14.1-0.3.1.s390x.rpm", "packageName": "mozilla-nss-32bit", "arch": "s390x", "operator": "lt", "packageVersion": "3.14.1-0.3.1", "OSVersion": "11.1", "OS": "SUSE Linux Enterprise Server LTSS"}, {"packageFilename": "MozillaFirefox-10.0.12-0.4.3.s390x.rpm", "packageName": "MozillaFirefox", "arch": "s390x", "operator": "lt", "packageVersion": "10.0.12-0.4.3", "OSVersion": "11.1", "OS": "SUSE Linux Enterprise Server LTSS"}, {"packageFilename": "MozillaFirefox-10.0.12-0.4.3.i586.rpm", "packageName": "MozillaFirefox", "arch": "i586", "operator": "lt", "packageVersion": "10.0.12-0.4.3", "OSVersion": "11.1", "OS": "SUSE Linux Enterprise Server LTSS"}, {"packageFilename": "mozilla-nss-32bit-3.14.1-0.3.1.x86_64.rpm", "packageName": "mozilla-nss-32bit", "arch": "x86_64", "operator": "lt", "packageVersion": "3.14.1-0.3.1", "OSVersion": "11.1", "OS": "SUSE Linux Enterprise Server LTSS"}, {"packageFilename": "MozillaFirefox-10.0.12-0.4.3.i586.rpm", "packageName": "MozillaFirefox", "arch": "i586", "operator": "lt", "packageVersion": "10.0.12-0.4.3", "OSVersion": "11.1", "OS": "SUSE Linux Enterprise Server for VMware LTSS"}], "modified": "2013-02-13T23:04:32", "published": "2013-02-13T23:04:32", "references": ["https://bugzilla.novell.com/796895", "http://download.novell.com/patch/finder/?keywords=b16b31709d6161048a780e6c97c5aeb2"], "cvelist": ["CVE-2013-0743", "CVE-2013-0763", "CVE-2013-0746", "CVE-2012-5829", "CVE-2013-0766", "CVE-2013-0747", "CVE-2013-0751", "CVE-2013-0744", "CVE-2013-0748", "CVE-2013-0768", "CVE-2013-0755", "CVE-2013-0752", "CVE-2013-0754", "CVE-2013-0769", "CVE-2013-0771", "CVE-2013-0757", "CVE-2013-0749", "CVE-2013-0761", "CVE-2013-0745", "CVE-2013-0756", "CVE-2013-0760", "CVE-2013-0767", "CVE-2013-0762", "CVE-2013-0753", "CVE-2013-0750", "CVE-2013-0759", "CVE-2013-0770", "CVE-2013-0758", "CVE-2013-0764"], "description": "Mozilla Firefox was updated to the 10.0.12ESR release for\n LTSS.\n\n *\n\n MFSA 2013-01: Mozilla developers identified and fixed\n several memory safety bugs in the browser engine used in\n Firefox and other Mozilla-based products. Some of these\n bugs showed evidence of memory corruption under certain\n circumstances, and we presume that with enough effort at\n least some of these could be exploited to run arbitrary\n code.\n\n o Christoph Diehl, Christian Holler, Mats\n Palmgren, and Chiaki Ishikawa reported memory safety\n problems and crashes that affect Firefox ESR 10, Firefox\n ESR 17, and Firefox 17. ( CVE-2013-0769\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0769\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0769</a>\n > ) o Bill Gianopoulos, Benoit Jacob, Christoph Diehl,\n Christian Holler, Gary Kwong, Robert O'Callahan, and\n Scoobidiver reported memory safety problems and crashes\n that affect Firefox ESR 17 and Firefox 17. (CVE-2013-0749\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0749\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0749</a>\n > ) o Jesse Ruderman, Christian Holler, Julian Seward, and\n Scoobidiver reported memory safety problems and crashes\n that affect Firefox 17. (CVE-2013-0770\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0770\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0770</a>\n > )\n *\n\n MFSA 2013-02: Security researcher Abhishek Arya\n (Inferno) of the Google Chrome Security Team discovered a\n series critically rated of use-after-free, out of bounds\n read, and buffer overflow issues using the Address\n Sanitizer tool in shipped software. These issues are\n potentially exploitable, allowing for remote code\n execution. We would also like to thank Abhishek for\n reporting three additional user-after-free and out of\n bounds read flaws introduced during Firefox development\n that were fixed before general release.\n\n The following issue was fixed in Firefox 18:\n\n o Global-buffer-overflow in\n CharDistributionAnalysis::HandleOneChar (CVE-2013-0760\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0760\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0760</a>\n > )\n\n The following issues were fixed in Firefox 18, ESR\n 17.0.1, and ESR 10.0.12:\n\n o Heap-use-after-free in imgRequest::OnStopFrame\n (CVE-2013-0762\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0762\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0762</a>\n > ) o Heap-use-after-free in ~nsHTMLEditRules\n (CVE-2013-0766\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0766\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0766</a>\n > ) o Out of bounds read in\n nsSVGPathElement::GetPathLengthScale ( CVE-2013-0767\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0767\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0767</a>\n > )\n\n The following issues were fixed in Firefox 18 and ESR\n 17.0.1:\n\n o Heap-use-after-free in\n mozilla::TrackUnionStream::EndTrack ( CVE-2013-0761\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0761\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0761</a>\n > ) o Heap-use-after-free in Mesa, triggerable by resizing\n a WebGL canvas (CVE-2013-0763\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0763\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0763</a>\n > ) o Heap-buffer-overflow in\n gfxTextRun::ShrinkToLigatureBoundaries (CVE-2013-0771\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0771\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0771</a>\n > )\n\n The following issue was fixed in Firefox 18 and in\n the earlier ESR 10.0.11 release:\n\n o Heap-buffer-overflow in nsWindow::OnExposeEvent\n (CVE-2012-5829\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5829\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5829</a>\n > )\n *\n\n MFSA 2013-03: Security researcher miaubiz used the\n Address Sanitizer tool to discover a buffer overflow in\n Canvas when specific bad height and width values were given\n through HTML. This could lead to a potentially exploitable\n crash. (CVE-2013-0768\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0768\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0768</a>\n > )\n\n Miaubiz also found a potentially exploitable crash\n when 2D and 3D content was mixed which was introduced\n during Firefox development and fixed before general release.\n\n *\n\n MFSA 2013-04: Security researcher Masato Kinugawa\n found a flaw in which the displayed URL values within the\n addressbar can be spoofed by a page during loading. This\n allows for phishing attacks where a malicious page can\n spoof the identify of another site. ( CVE-2013-0759\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0759\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0759</a>\n > )\n\n *\n\n MFSA 2013-05: Using the Address Sanitizer tool,\n security researcher Atte Kettunen from OUSPG discovered\n that the combination of large numbers of columns and column\n groups in a table could cause the array containing the\n columns during rendering to overwrite itself. This can lead\n to a user-after-free causing a potentially exploitable\n crash. ( CVE-2013-0744\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0744\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0744</a>\n > )\n\n *\n\n MFSA 2013-06: Mozilla developer Wesley Johnston\n reported that when there are two or more iframes on the\n same HTML page, an iframe is able to see the touch events\n and their targets that occur within the other iframes on\n the page. If the iframes are from the same origin, they can\n also access the properties and methods of the targets of\n other iframes but same-origin policy (SOP) restricts access\n across domains. This allows for information leakage and\n possibilities for cross-site scripting (XSS) if another\n vulnerability can be used to get around SOP restrictions.\n (CVE-2013-0751\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0751\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0751</a>\n > )\n\n *\n\n MFSA 2013-07: Mozilla community member Jerry Baker\n reported a crashing issue found through Thunderbird when\n downloading messages over a Secure Sockets Layer (SSL)\n connection. This was caused by a bug in the networking code\n assuming that secure connections were entirely handled on\n the socket transport thread when they can occur on a\n variety of threads. The resulting crash was potentially\n exploitable. (CVE-2013-0764\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0764\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0764</a>\n > )\n\n *\n\n MFSA 2013-08: Mozilla developer Olli Pettay\n discovered that the AutoWrapperChanger class fails to keep\n some javascript objects alive during garbage collection.\n This can lead to an exploitable crash allowing for\n arbitrary code execution. (CVE-2013-0745\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0745\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0745</a>\n > )\n\n *\n\n MFSA 2013-09: Mozilla developer Boris Zbarsky\n reported reported a problem where jsval-returning\n quickstubs fail to wrap their return values, causing a\n compartment mismatch. This mismatch can cause garbage\n collection to occur incorrectly and lead to a potentially\n exploitable crash. (CVE-2013-0746\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0746\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0746</a>\n > )\n\n *\n\n MFSA 2013-10: Mozilla security researcher Jesse\n Ruderman reported that events in the plugin handler can be\n manipulated by web content to bypass same-origin policy\n (SOP) restrictions. This can allow for clickjacking on\n malicious web pages. (CVE-2013-0747\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0747\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0747</a>\n > )\n\n *\n\n MFSA 2013-11: Mozilla security researcher Jesse\n Ruderman discovered that using the toString function of XBL\n objects can lead to inappropriate information leakage by\n revealing the address space layout instead of just the ID\n of the object. This layout information could potentially be\n used to bypass ASLR and other security protections.\n (CVE-2013-0748\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0748\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0748</a>\n > )\n\n *\n\n MFSA 2013-12: Security researcher pa_kt reported a\n flaw via TippingPoint's Zero Day Initiative that an integer\n overflow is possible when calculating the length for a\n Javascript string concatenation, which is then used for\n memory allocation. This results in a buffer overflow,\n leading to a potentially exploitable memory corruption.\n (CVE-2013-0750\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0750\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0750</a>\n > )\n\n *\n\n MFSA 2013-13: Security researcher Sviatoslav Chagaev\n reported that when using an XBL file containing multiple\n XML bindings with SVG content, a memory corruption can\n occur. In concern with remote XUL, this can lead to an\n exploitable crash. (CVE-2013-0752\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0752\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0752</a>\n > )\n\n *\n\n MFSA 2013-14: Security researcher Mariusz Mlynski\n reported that it is possible to change the prototype of an\n object and bypass Chrome Object Wrappers (COW) to gain\n access to chrome privileged functions. This could allow for\n arbitrary code execution. (CVE-2013-0757\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0757\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0757</a>\n > )\n\n *\n\n MFSA 2013-15: Security researcher Mariusz Mlynski\n reported that it is possible to open a chrome privileged\n web page through plugin objects through interaction with\n SVG elements. This could allow for arbitrary code\n execution. (CVE-2013-0758\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0758\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0758</a>\n > )\n\n *\n\n MFSA 2013-16: Security researcher regenrecht\n reported, via TippingPoint's Zero Day Initiative, a\n use-after-free in XMLSerializer by the exposing of\n serializeToStream to web content. This can lead to\n arbitrary code execution when exploited. (CVE-2013-0753\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0753\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0753</a>\n > )\n\n *\n\n MFSA 2013-17: Security researcher regenrecht\n reported, via TippingPoint's Zero Day Initiative, a\n use-after-free within the ListenerManager when garbage\n collection is forced after data in listener objects have\n been allocated in some circumstances. This results in a\n use-after-free which can lead to arbitrary code execution.\n (CVE-2013-0754\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0754\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0754</a>\n > )\n\n *\n\n MFSA 2013-18: Security researcher regenrecht\n reported, via TippingPoint's Zero Day Initiative, a\n use-after-free using the domDoc pointer within Vibrate\n library. This can lead to arbitrary code execution when\n exploited. (CVE-2013-0755\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0755\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0755</a>\n > )\n\n *\n\n MFSA 2013-19: Security researcher regenrecht\n reported, via TippingPoint's Zero Day Initiative, a garbage\n collection flaw in Javascript Proxy objects. This can lead\n to a use-after-free leading to arbitrary code execution.\n (CVE-2013-0756\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0756\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0756</a>\n > )\n\n *\n\n MFSA 2013-20: Google reported to Mozilla that\n TURKTRUST, a certificate authority in Mozilla's root\n program, had mis-issued two intermediate certificates to\n customers. The issue was not specific to Firefox but there\n was evidence that one of the certificates was used for\n man-in-the-middle (MITM) traffic management of domain names\n that the customer did not legitimately own or control. This\n issue was resolved by revoking the trust for these specific\n mis-issued certificates. (CVE-2013-0743\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0743\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0743</a>\n > )\n", "type": "suse", "href": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00008.html", "lastseen": "2016-09-04T12:10:59", "edition": 1, "title": "Security update for MozillaFirefox (important)"}
{"suse": [{"lastseen": "2016-09-04T11:41:56", "bulletinFamily": "unix", "cvelist": ["CVE-2013-0743", "CVE-2013-0763", "CVE-2013-0746", "CVE-2012-5829", "CVE-2013-0766", "CVE-2013-0747", "CVE-2013-0751", "CVE-2013-0744", "CVE-2013-0748", "CVE-2013-0768", "CVE-2013-0755", "CVE-2013-0752", "CVE-2013-0754", "CVE-2013-0769", "CVE-2013-0771", "CVE-2013-0757", "CVE-2013-0749", "CVE-2013-0761", "CVE-2013-0745", "CVE-2013-0756", "CVE-2013-0760", "CVE-2013-0767", "CVE-2013-0762", "CVE-2013-0753", "CVE-2013-0750", "CVE-2013-0759", "CVE-2013-0770", "CVE-2013-0758", "CVE-2013-0764"], "description": "Mozilla Firefox was updated to the 10.0.12ESR release.\n\n *\n\n MFSA 2013-01: Mozilla developers identified and fixed\n several memory safety bugs in the browser engine used in\n Firefox and other Mozilla-based products. Some of these\n bugs showed evidence of memory corruption under certain\n circumstances, and we presume that with enough effort at\n least some of these could be exploited to run arbitrary\n code.\n\n o Christoph Diehl, Christian Holler, Mats\n Palmgren, and Chiaki Ishikawa reported memory safety\n problems and crashes that affect Firefox ESR 10, Firefox\n ESR 17, and Firefox 17. ( CVE-2013-0769\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0769\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0769</a>\n > ) o Bill Gianopoulos, Benoit Jacob, Christoph Diehl,\n Christian Holler, Gary Kwong, Robert O'Callahan, and\n Scoobidiver reported memory safety problems and crashes\n that affect Firefox ESR 17 and Firefox 17. (CVE-2013-0749\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0749\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0749</a>\n > ) o Jesse Ruderman, Christian Holler, Julian Seward, and\n Scoobidiver reported memory safety problems and crashes\n that affect Firefox 17. (CVE-2013-0770\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0770\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0770</a>\n > )\n *\n\n MFSA 2013-02: Security researcher Abhishek Arya\n (Inferno) of the Google Chrome Security Team discovered a\n series critically rated of use-after-free, out of bounds\n read, and buffer overflow issues using the Address\n Sanitizer tool in shipped software. These issues are\n potentially exploitable, allowing for remote code\n execution. We would also like to thank Abhishek for\n reporting three additional user-after-free and out of\n bounds read flaws introduced during Firefox development\n that were fixed before general release.\n\n The following issue was fixed in Firefox 18:\n\n o Global-buffer-overflow in\n CharDistributionAnalysis::HandleOneChar (CVE-2013-0760\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0760\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0760</a>\n > )\n\n The following issues were fixed in Firefox 18, ESR\n 17.0.1, and ESR 10.0.12:\n\n o Heap-use-after-free in imgRequest::OnStopFrame\n (CVE-2013-0762\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0762\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0762</a>\n > ) o Heap-use-after-free in ~nsHTMLEditRules\n (CVE-2013-0766\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0766\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0766</a>\n > ) o Out of bounds read in\n nsSVGPathElement::GetPathLengthScale ( CVE-2013-0767\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0767\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0767</a>\n > )\n\n The following issues were fixed in Firefox 18 and ESR\n 17.0.1:\n\n o Heap-use-after-free in\n mozilla::TrackUnionStream::EndTrack ( CVE-2013-0761\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0761\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0761</a>\n > ) o Heap-use-after-free in Mesa, triggerable by resizing\n a WebGL canvas (CVE-2013-0763\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0763\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0763</a>\n > ) o Heap-buffer-overflow in\n gfxTextRun::ShrinkToLigatureBoundaries (CVE-2013-0771\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0771\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0771</a>\n > )\n\n The following issue was fixed in Firefox 18 and in\n the earlier ESR 10.0.11 release:\n\n o Heap-buffer-overflow in nsWindow::OnExposeEvent\n (CVE-2012-5829\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5829\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5829</a>\n > )\n *\n\n MFSA 2013-03: Security researcher miaubiz used the\n Address Sanitizer tool to discover a buffer overflow in\n Canvas when specific bad height and width values were given\n through HTML. This could lead to a potentially exploitable\n crash. (CVE-2013-0768\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0768\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0768</a>\n > )\n\n Miaubiz also found a potentially exploitable crash\n when 2D and 3D content was mixed which was introduced\n during Firefox development and fixed before general release.\n\n *\n\n MFSA 2013-04: Security researcher Masato Kinugawa\n found a flaw in which the displayed URL values within the\n addressbar can be spoofed by a page during loading. This\n allows for phishing attacks where a malicious page can\n spoof the identify of another site. ( CVE-2013-0759\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0759\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0759</a>\n > )\n\n *\n\n MFSA 2013-05: Using the Address Sanitizer tool,\n security researcher Atte Kettunen from OUSPG discovered\n that the combination of large numbers of columns and column\n groups in a table could cause the array containing the\n columns during rendering to overwrite itself. This can lead\n to a user-after-free causing a potentially exploitable\n crash. ( CVE-2013-0744\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0744\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0744</a>\n > )\n\n *\n\n MFSA 2013-06: Mozilla developer Wesley Johnston\n reported that when there are two or more iframes on the\n same HTML page, an iframe is able to see the touch events\n and their targets that occur within the other iframes on\n the page. If the iframes are from the same origin, they can\n also access the properties and methods of the targets of\n other iframes but same-origin policy (SOP) restricts access\n across domains. This allows for information leakage and\n possibilities for cross-site scripting (XSS) if another\n vulnerability can be used to get around SOP restrictions.\n (CVE-2013-0751\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0751\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0751</a>\n > )\n\n *\n\n MFSA 2013-07: Mozilla community member Jerry Baker\n reported a crashing issue found through Thunderbird when\n downloading messages over a Secure Sockets Layer (SSL)\n connection. This was caused by a bug in the networking code\n assuming that secure connections were entirely handled on\n the socket transport thread when they can occur on a\n variety of threads. The resulting crash was potentially\n exploitable. (CVE-2013-0764\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0764\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0764</a>\n > )\n\n *\n\n MFSA 2013-08: Mozilla developer Olli Pettay\n discovered that the AutoWrapperChanger class fails to keep\n some javascript objects alive during garbage collection.\n This can lead to an exploitable crash allowing for\n arbitrary code execution. (CVE-2013-0745\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0745\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0745</a>\n > )\n\n *\n\n MFSA 2013-09: Mozilla developer Boris Zbarsky\n reported reported a problem where jsval-returning\n quickstubs fail to wrap their return values, causing a\n compartment mismatch. This mismatch can cause garbage\n collection to occur incorrectly and lead to a potentially\n exploitable crash. (CVE-2013-0746\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0746\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0746</a>\n > )\n\n *\n\n MFSA 2013-10: Mozilla security researcher Jesse\n Ruderman reported that events in the plugin handler can be\n manipulated by web content to bypass same-origin policy\n (SOP) restrictions. This can allow for clickjacking on\n malicious web pages. (CVE-2013-0747\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0747\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0747</a>\n > )\n\n *\n\n MFSA 2013-11: Mozilla security researcher Jesse\n Ruderman discovered that using the toString function of XBL\n objects can lead to inappropriate information leakage by\n revealing the address space layout instead of just the ID\n of the object. This layout information could potentially be\n used to bypass ASLR and other security protections.\n (CVE-2013-0748\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0748\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0748</a>\n > )\n\n *\n\n MFSA 2013-12: Security researcher pa_kt reported a\n flaw via TippingPoint's Zero Day Initiative that an integer\n overflow is possible when calculating the length for a\n Javascript string concatenation, which is then used for\n memory allocation. This results in a buffer overflow,\n leading to a potentially exploitable memory corruption.\n (CVE-2013-0750\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0750\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0750</a>\n > )\n\n *\n\n MFSA 2013-13: Security researcher Sviatoslav Chagaev\n reported that when using an XBL file containing multiple\n XML bindings with SVG content, a memory corruption can\n occur. In concern with remote XUL, this can lead to an\n exploitable crash. (CVE-2013-0752\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0752\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0752</a>\n > )\n\n *\n\n MFSA 2013-14: Security researcher Mariusz Mlynski\n reported that it is possible to change the prototype of an\n object and bypass Chrome Object Wrappers (COW) to gain\n access to chrome privileged functions. This could allow for\n arbitrary code execution. (CVE-2013-0757\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0757\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0757</a>\n > )\n\n *\n\n MFSA 2013-15: Security researcher Mariusz Mlynski\n reported that it is possible to open a chrome privileged\n web page through plugin objects through interaction with\n SVG elements. This could allow for arbitrary code\n execution. (CVE-2013-0758\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0758\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0758</a>\n > )\n\n *\n\n MFSA 2013-16: Security researcher regenrecht\n reported, via TippingPoint's Zero Day Initiative, a\n use-after-free in XMLSerializer by the exposing of\n serializeToStream to web content. This can lead to\n arbitrary code execution when exploited. (CVE-2013-0753\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0753\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0753</a>\n > )\n\n *\n\n MFSA 2013-17: Security researcher regenrecht\n reported, via TippingPoint's Zero Day Initiative, a\n use-after-free within the ListenerManager when garbage\n collection is forced after data in listener objects have\n been allocated in some circumstances. This results in a\n use-after-free which can lead to arbitrary code execution.\n (CVE-2013-0754\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0754\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0754</a>\n > )\n\n *\n\n MFSA 2013-18: Security researcher regenrecht\n reported, via TippingPoint's Zero Day Initiative, a\n use-after-free using the domDoc pointer within Vibrate\n library. This can lead to arbitrary code execution when\n exploited. (CVE-2013-0755\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0755\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0755</a>\n > )\n\n *\n\n MFSA 2013-19: Security researcher regenrecht\n reported, via TippingPoint's Zero Day Initiative, a garbage\n collection flaw in Javascript Proxy objects. This can lead\n to a use-after-free leading to arbitrary code execution.\n (CVE-2013-0756\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0756\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0756</a>\n > )\n\n *\n\n MFSA 2013-20: Google reported to Mozilla that\n TURKTRUST, a certificate authority in Mozilla's root\n program, had mis-issued two intermediate certificates to\n customers. The issue was not specific to Firefox but there\n was evidence that one of the certificates was used for\n man-in-the-middle (MITM) traffic management of domain names\n that the customer did not legitimately own or control. This\n issue was resolved by revoking the trust for these specific\n mis-issued certificates. (CVE-2013-0743\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0743\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0743</a>\n > )\n\n", "edition": 1, "modified": "2013-01-18T19:04:49", "published": "2013-01-18T19:04:49", "id": "SUSE-SU-2013:0048-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html", "type": "suse", "title": "Security update for MozillaFirefox (important)", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2016-09-04T11:35:06", "bulletinFamily": "unix", "cvelist": ["CVE-2013-0743", "CVE-2013-0763", "CVE-2013-0746", "CVE-2012-5829", "CVE-2013-0766", "CVE-2013-0747", "CVE-2013-0751", "CVE-2013-0744", "CVE-2013-0748", "CVE-2013-0768", "CVE-2013-0755", "CVE-2013-0752", "CVE-2013-0754", "CVE-2013-0769", "CVE-2013-0771", "CVE-2013-0757", "CVE-2013-0749", "CVE-2013-0761", "CVE-2013-0745", "CVE-2013-0756", "CVE-2013-0760", "CVE-2013-0767", "CVE-2013-0762", "CVE-2013-0753", "CVE-2013-0750", "CVE-2013-0759", "CVE-2013-0770", "CVE-2013-0758", "CVE-2013-0764"], "description": "Mozilla Firefox was updated to the 10.0.12ESR release.\n\n *\n\n MFSA 2013-01: Mozilla developers identified and fixed\n several memory safety bugs in the browser engine used in\n Firefox and other Mozilla-based products. Some of these\n bugs showed evidence of memory corruption under certain\n circumstances, and we presume that with enough effort at\n least some of these could be exploited to run arbitrary\n code.\n\n o Christoph Diehl, Christian Holler, Mats\n Palmgren, and Chiaki Ishikawa reported memory safety\n problems and crashes that affect Firefox ESR 10, Firefox\n ESR 17, and Firefox 17. ( CVE-2013-0769\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0769\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0769</a>\n > ) o Bill Gianopoulos, Benoit Jacob, Christoph Diehl,\n Christian Holler, Gary Kwong, Robert O'Callahan, and\n Scoobidiver reported memory safety problems and crashes\n that affect Firefox ESR 17 and Firefox 17. (CVE-2013-0749\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0749\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0749</a>\n > ) o Jesse Ruderman, Christian Holler, Julian Seward, and\n Scoobidiver reported memory safety problems and crashes\n that affect Firefox 17. (CVE-2013-0770\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0770\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0770</a>\n > )\n *\n\n MFSA 2013-02: Security researcher Abhishek Arya\n (Inferno) of the Google Chrome Security Team discovered a\n series critically rated of use-after-free, out of bounds\n read, and buffer overflow issues using the Address\n Sanitizer tool in shipped software. These issues are\n potentially exploitable, allowing for remote code\n execution. We would also like to thank Abhishek for\n reporting three additional user-after-free and out of\n bounds read flaws introduced during Firefox development\n that were fixed before general release.\n\n The following issue was fixed in Firefox 18:\n\n o Global-buffer-overflow in\n CharDistributionAnalysis::HandleOneChar (CVE-2013-0760\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0760\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0760</a>\n > )\n\n The following issues were fixed in Firefox 18, ESR\n 17.0.1, and ESR 10.0.12:\n\n o Heap-use-after-free in imgRequest::OnStopFrame\n (CVE-2013-0762\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0762\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0762</a>\n > ) o Heap-use-after-free in ~nsHTMLEditRules\n (CVE-2013-0766\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0766\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0766</a>\n > ) o Out of bounds read in\n nsSVGPathElement::GetPathLengthScale ( CVE-2013-0767\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0767\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0767</a>\n > )\n\n The following issues were fixed in Firefox 18 and ESR\n 17.0.1:\n\n o Heap-use-after-free in\n mozilla::TrackUnionStream::EndTrack ( CVE-2013-0761\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0761\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0761</a>\n > ) o Heap-use-after-free in Mesa, triggerable by resizing\n a WebGL canvas (CVE-2013-0763\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0763\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0763</a>\n > ) o Heap-buffer-overflow in\n gfxTextRun::ShrinkToLigatureBoundaries (CVE-2013-0771\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0771\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0771</a>\n > )\n\n The following issue was fixed in Firefox 18 and in\n the earlier ESR 10.0.11 release:\n\n o Heap-buffer-overflow in nsWindow::OnExposeEvent\n (CVE-2012-5829\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5829\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5829</a>\n > )\n *\n\n MFSA 2013-03: Security researcher miaubiz used the\n Address Sanitizer tool to discover a buffer overflow in\n Canvas when specific bad height and width values were given\n through HTML. This could lead to a potentially exploitable\n crash. (CVE-2013-0768\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0768\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0768</a>\n > )\n\n Miaubiz also found a potentially exploitable crash\n when 2D and 3D content was mixed which was introduced\n during Firefox development and fixed before general release.\n\n *\n\n MFSA 2013-04: Security researcher Masato Kinugawa\n found a flaw in which the displayed URL values within the\n addressbar can be spoofed by a page during loading. This\n allows for phishing attacks where a malicious page can\n spoof the identify of another site. ( CVE-2013-0759\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0759\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0759</a>\n > )\n\n *\n\n MFSA 2013-05: Using the Address Sanitizer tool,\n security researcher Atte Kettunen from OUSPG discovered\n that the combination of large numbers of columns and column\n groups in a table could cause the array containing the\n columns during rendering to overwrite itself. This can lead\n to a user-after-free causing a potentially exploitable\n crash. ( CVE-2013-0744\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0744\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0744</a>\n > )\n\n *\n\n MFSA 2013-06: Mozilla developer Wesley Johnston\n reported that when there are two or more iframes on the\n same HTML page, an iframe is able to see the touch events\n and their targets that occur within the other iframes on\n the page. If the iframes are from the same origin, they can\n also access the properties and methods of the targets of\n other iframes but same-origin policy (SOP) restricts access\n across domains. This allows for information leakage and\n possibilities for cross-site scripting (XSS) if another\n vulnerability can be used to get around SOP restrictions.\n (CVE-2013-0751\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0751\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0751</a>\n > )\n\n *\n\n MFSA 2013-07: Mozilla community member Jerry Baker\n reported a crashing issue found through Thunderbird when\n downloading messages over a Secure Sockets Layer (SSL)\n connection. This was caused by a bug in the networking code\n assuming that secure connections were entirely handled on\n the socket transport thread when they can occur on a\n variety of threads. The resulting crash was potentially\n exploitable. (CVE-2013-0764\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0764\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0764</a>\n > )\n\n *\n\n MFSA 2013-08: Mozilla developer Olli Pettay\n discovered that the AutoWrapperChanger class fails to keep\n some javascript objects alive during garbage collection.\n This can lead to an exploitable crash allowing for\n arbitrary code execution. (CVE-2013-0745\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0745\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0745</a>\n > )\n\n *\n\n MFSA 2013-09: Mozilla developer Boris Zbarsky\n reported reported a problem where jsval-returning\n quickstubs fail to wrap their return values, causing a\n compartment mismatch. This mismatch can cause garbage\n collection to occur incorrectly and lead to a potentially\n exploitable crash. (CVE-2013-0746\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0746\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0746</a>\n > )\n\n *\n\n MFSA 2013-10: Mozilla security researcher Jesse\n Ruderman reported that events in the plugin handler can be\n manipulated by web content to bypass same-origin policy\n (SOP) restrictions. This can allow for clickjacking on\n malicious web pages. (CVE-2013-0747\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0747\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0747</a>\n > )\n\n *\n\n MFSA 2013-11: Mozilla security researcher Jesse\n Ruderman discovered that using the toString function of XBL\n objects can lead to inappropriate information leakage by\n revealing the address space layout instead of just the ID\n of the object. This layout information could potentially be\n used to bypass ASLR and other security protections.\n (CVE-2013-0748\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0748\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0748</a>\n > )\n\n *\n\n MFSA 2013-12: Security researcher pa_kt reported a\n flaw via TippingPoint's Zero Day Initiative that an integer\n overflow is possible when calculating the length for a\n Javascript string concatenation, which is then used for\n memory allocation. This results in a buffer overflow,\n leading to a potentially exploitable memory corruption.\n (CVE-2013-0750\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0750\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0750</a>\n > )\n\n *\n\n MFSA 2013-13: Security researcher Sviatoslav Chagaev\n reported that when using an XBL file containing multiple\n XML bindings with SVG content, a memory corruption can\n occur. In concern with remote XUL, this can lead to an\n exploitable crash. (CVE-2013-0752\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0752\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0752</a>\n > )\n\n *\n\n MFSA 2013-14: Security researcher Mariusz Mlynski\n reported that it is possible to change the prototype of an\n object and bypass Chrome Object Wrappers (COW) to gain\n access to chrome privileged functions. This could allow for\n arbitrary code execution. (CVE-2013-0757\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0757\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0757</a>\n > )\n\n *\n\n MFSA 2013-15: Security researcher Mariusz Mlynski\n reported that it is possible to open a chrome privileged\n web page through plugin objects through interaction with\n SVG elements. This could allow for arbitrary code\n execution. (CVE-2013-0758\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0758\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0758</a>\n > )\n\n *\n\n MFSA 2013-16: Security researcher regenrecht\n reported, via TippingPoint's Zero Day Initiative, a\n use-after-free in XMLSerializer by the exposing of\n serializeToStream to web content. This can lead to\n arbitrary code execution when exploited. (CVE-2013-0753\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0753\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0753</a>\n > )\n\n *\n\n MFSA 2013-17: Security researcher regenrecht\n reported, via TippingPoint's Zero Day Initiative, a\n use-after-free within the ListenerManager when garbage\n collection is forced after data in listener objects have\n been allocated in some circumstances. This results in a\n use-after-free which can lead to arbitrary code execution.\n (CVE-2013-0754\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0754\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0754</a>\n > )\n\n *\n\n MFSA 2013-18: Security researcher regenrecht\n reported, via TippingPoint's Zero Day Initiative, a\n use-after-free using the domDoc pointer within Vibrate\n library. This can lead to arbitrary code execution when\n exploited. (CVE-2013-0755\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0755\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0755</a>\n > )\n\n *\n\n MFSA 2013-19: Security researcher regenrecht\n reported, via TippingPoint's Zero Day Initiative, a garbage\n collection flaw in Javascript Proxy objects. This can lead\n to a use-after-free leading to arbitrary code execution.\n (CVE-2013-0756\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0756\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0756</a>\n > )\n\n *\n\n MFSA 2013-20: Google reported to Mozilla that\n TURKTRUST, a certificate authority in Mozilla's root\n program, had mis-issued two intermediate certificates to\n customers. The issue was not specific to Firefox but there\n was evidence that one of the certificates was used for\n man-in-the-middle (MITM) traffic management of domain names\n that the customer did not legitimately own or control. This\n issue was resolved by revoking the trust for these specific\n mis-issued certificates. (CVE-2013-0743\n <<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0743\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0743</a>\n > )\n\n\n", "edition": 1, "modified": "2013-01-18T20:04:36", "published": "2013-01-18T20:04:36", "id": "SUSE-SU-2013:0049-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00007.html", "type": "suse", "title": "Security update for MozillaFirefox (important)", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2016-09-04T12:05:07", "bulletinFamily": "unix", "cvelist": ["CVE-2013-0743", "CVE-2013-0763", "CVE-2013-0746", "CVE-2012-5829", "CVE-2013-0766", "CVE-2013-0747", "CVE-2013-0751", "CVE-2013-0744", "CVE-2013-0748", "CVE-2013-0768", "CVE-2013-0755", "CVE-2013-0752", "CVE-2013-0754", "CVE-2013-0769", "CVE-2013-0771", "CVE-2013-0757", "CVE-2013-0749", "CVE-2013-0745", "CVE-2013-0756", "CVE-2013-0760", "CVE-2013-0762", "CVE-2013-0753", "CVE-2013-0750", "CVE-2013-0759", "CVE-2013-0770", "CVE-2013-0758", "CVE-2013-0764"], "description": "Mozilla Firefox is updated to the 10.0.12ESR version.\n\n This is a roll-up update for LTSS.\n\n It fixes a lot of security issues and bugs. 10.0.12ESR\n fixes specifically:\n\n *\n\n MFSA 2013-01: Mozilla developers identified and fixed\n several memory safety bugs in the browser engine used in\n Firefox and other Mozilla-based products. Some of these\n bugs showed evidence of memory corruption under certain\n circumstances, and we presume that with enough effort at\n least some of these could be exploited to run arbitrary\n code.\n\n Christoph Diehl, Christian Holler, Mats Palmgren, and\n Chiaki Ishikawa reported memory safety problems and crashes\n that affect Firefox ESR 10, Firefox ESR 17, and Firefox 17.\n (CVE-2013-0769)\n\n Bill Gianopoulos, Benoit Jacob, Christoph Diehl,\n Christian Holler, Gary Kwong, Robert O'Callahan, and\n Scoobidiver reported memory safety problems and crashes\n that affect Firefox ESR 17 and Firefox 17. (CVE-2013-0749)\n\n Jesse Ruderman, Christian Holler, Julian Seward, and\n Scoobidiver reported memory safety problems and crashes\n that affect Firefox 17. (CVE-2013-0770)\n\n *\n\n MFSA 2013-02: Security researcher Abhishek Arya\n (Inferno) of the Google Chrome Security Team discovered a\n series critically rated of use-after-free, out of bounds\n read, and buffer overflow issues using the Address\n Sanitizer tool in shipped software. These issues are\n potentially exploitable, allowing for remote code\n execution. We would also like to thank Abhishek for\n reporting three additional user-after-free and out of\n bounds read flaws introduced during Firefox development\n that were fixed before general release.\n\n The following issue has been fixed in Firefox 18:\n\n o Global-buffer-overflow in\n CharDistributionAnalysis::HandleOneChar (CVE-2013-0760)\n\n The following issues has been fixed in Firefox 18,\n ESR 17.0.1, and ESR 10.0.12:\n\n o Heap-use-after-free in imgRequest::OnStopFrame\n (CVE-2013-0762) o Heap-use-after-free in ~nsHTMLEditRules\n (CVE-2013-0766) o Out of bounds read in\n nsSVGPathElement::GetPathLengthScale (CVE-2013-0763) o\n Heap-buffer-overflow in\n gfxTextRun::ShrinkToLigatureBoundaries (CVE-2013-0771)\n\n The following issue has been fixed in Firefox 18 and\n in the earlier ESR 10.0.11 release:\n\n o Heap-buffer-overflow in nsWindow::OnExposeEvent\n (CVE-2012-5829)\n *\n\n MFSA 2013-03: Security researcher miaubiz used the\n Address Sanitizer tool to discover a buffer overflow in\n Canvas when specific bad height and width values were given\n through HTML. This could lead to a potentially exploitable\n crash. (CVE-2013-0768)\n\n Miaubiz also found a potentially exploitable crash\n when 2D and 3D content was mixed which was introduced\n during Firefox development and fixed before general release.\n\n *\n\n MFSA 2013-04: Security researcher Masato Kinugawa\n found a flaw in which the displayed URL values within the\n addressbar can be spoofed by a page during loading. This\n allows for phishing attacks where a malicious page can\n spoof the identify of another site. (CVE-2013-0759)\n\n *\n\n MFSA 2013-05: Using the Address Sanitizer tool,\n security researcher Atte Kettunen from OUSPG discovered\n that the combination of large numbers of columns and column\n groups in a table could cause the array containing the\n columns during rendering to overwrite itself. This can lead\n to a user-after-free causing a potentially exploitable\n crash. (CVE-2013-0744)\n\n *\n\n MFSA 2013-06: Mozilla developer Wesley Johnston\n reported that when there are two or more iframes on the\n same HTML page, an iframe is able to see the touch events\n and their targets that occur within the other iframes on\n the page. If the iframes are from the same origin, they can\n also access the properties and methods of the targets of\n other iframes but same-origin policy (SOP) restricts access\n across domains. This allows for information leakage and\n possibilities for cross-site scripting (XSS) if another\n vulnerability can be used to get around SOP restrictions.\n (CVE-2013-0751)\n\n *\n\n MFSA 2013-07: Mozilla community member Jerry Baker\n reported a crashing issue found through Thunderbird when\n downloading messages over a Secure Sockets Layer (SSL)\n connection. This was caused by a bug in the networking code\n assuming that secure connections were entirely handled on\n the socket transport thread when they can occur on a\n variety of threads. The resulting crash was potentially\n exploitable. (CVE-2013-0764)\n\n *\n\n MFSA 2013-08: Mozilla developer Olli Pettay\n discovered that the AutoWrapperChanger class fails to keep\n some javascript objects alive during garbage collection.\n This can lead to an exploitable crash allowing for\n arbitrary code execution. (CVE-2013-0745)\n\n *\n\n MFSA 2013-09: Mozilla developer Boris Zbarsky\n reported reported a problem where jsval-returning\n quickstubs fail to wrap their return values, causing a\n compartment mismatch. This mismatch can cause garbage\n collection to occur incorrectly and lead to a potentially\n exploitable crash. (CVE-2013-0746)\n\n *\n\n MFSA 2013-10: Mozilla security researcher Jesse\n Ruderman reported that events in the plugin handler can be\n manipulated by web content to bypass same-origin policy\n (SOP) restrictions. This can allow for clickjacking on\n malicious web pages. (CVE-2013-0747)\n\n *\n\n MFSA 2013-11: Mozilla security researcher Jesse\n Ruderman discovered that using the toString function of XBL\n objects can lead to inappropriate information leakage by\n revealing the address space layout instead of just the ID\n of the object. This layout information could potentially be\n used to bypass ASLR and other security protections.\n (CVE-2013-0748)\n\n *\n\n MFSA 2013-12: Security researcher pa_kt reported a\n flaw via TippingPoint's Zero Day Initiative that an integer\n overflow is possible when calculating the length for a\n Javascript string concatenation, which is then used for\n memory allocation. This results in a buffer overflow,\n leading to a potentially exploitable memory corruption.\n (CVE-2013-0750)\n\n *\n\n MFSA 2013-13: Security researcher Sviatoslav Chagaev\n reported that when using an XBL file containing multiple\n XML bindings with SVG content, a memory corruption can\n occur. In concern with remote XUL, this can lead to an\n exploitable crash. (CVE-2013-0752)\n\n *\n\n MFSA 2013-14: Security researcher Mariusz Mlynski\n reported that it is possible to change the prototype of an\n object and bypass Chrome Object Wrappers (COW) to gain\n access to chrome privileged functions. This could allow for\n arbitrary code execution. (CVE-2013-0757)\n\n *\n\n MFSA 2013-15: Security researcher Mariusz Mlynski\n reported that it is possible to open a chrome privileged\n web page through plugin objects through interaction with\n SVG elements. This could allow for arbitrary code\n execution. (CVE-2013-0758)\n\n *\n\n MFSA 2013-16: Security researcher regenrecht\n reported, via TippingPoint's Zero Day Initiative, a\n use-after-free in XMLSerializer by the exposing of\n serializeToStream to web content. This can lead to\n arbitrary code execution when exploited. (CVE-2013-0753)\n\n *\n\n MFSA 2013-17: Security researcher regenrecht\n reported, via TippingPoint's Zero Day Initiative, a\n use-after-free within the ListenerManager when garbage\n collection is forced after data in listener objects have\n been allocated in some circumstances. This results in a\n use-after-free which can lead to arbitrary code execution.\n (CVE-2013-0754)\n\n *\n\n MFSA 2013-18: Security researcher regenrecht\n reported, via TippingPoint's Zero Day Initiative, a\n use-after-free using the domDoc pointer within Vibrate\n library. This can lead to arbitrary code execution when\n exploited. (CVE-2013-0755)\n\n *\n\n MFSA 2013-19: Security researcher regenrecht\n reported, via TippingPoint's Zero Day Initiative, a garbage\n collection flaw in Javascript Proxy objects. This can lead\n to a use-after-free leading to arbitrary code execution.\n (CVE-2013-0756)\n\n *\n\n MFSA 2013-20: Google reported to Mozilla that\n TURKTRUST, a certificate authority in Mozilla's root\n program, had mis-issued two intermediate certificates to\n customers. The issue was not specific to Firefox but there\n was evidence that one of the certificates was used for\n man-in-the-middle (MITM) traffic management of domain names\n that the customer did not legitimately own or control. This\n issue was resolved by revoking the trust for these specific\n mis-issued certificates. (CVE-2013-0743)\n", "edition": 1, "modified": "2013-02-18T18:04:29", "published": "2013-02-18T18:04:29", "id": "SUSE-SU-2013:0306-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00012.html", "title": "Security update for Mozilla Firefox (important)", "type": "suse", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2016-09-04T11:45:49", "bulletinFamily": "unix", "cvelist": ["CVE-2013-0743", "CVE-2013-0763", "CVE-2013-0746", "CVE-2012-5829", "CVE-2013-0766", "CVE-2013-0747", "CVE-2013-0751", "CVE-2013-0744", "CVE-2013-0748", "CVE-2013-0768", "CVE-2013-0755", "CVE-2013-0752", "CVE-2013-0754", "CVE-2013-0769", "CVE-2013-0771", "CVE-2013-0757", "CVE-2013-0749", "CVE-2013-0761", "CVE-2012-0759", "CVE-2013-0745", "CVE-2013-0756", "CVE-2013-0760", "CVE-2013-0767", "CVE-2013-0762", "CVE-2013-0753", "CVE-2013-0750", "CVE-2013-0770", "CVE-2013-0758", "CVE-2013-0764"], "description": "The Mozilla January 8th 2013 security release contains\n updates:\n\n Mozilla Firefox was updated to version 18.0. Mozilla\n Seamonkey was updated to version 2.15. Mozilla Thunderbird\n was updated to version 17.0.2.\n\n * MFSA 2013-01/CVE-2013-0749/CVE-2013-0769/CVE-2013-0770\n Miscellaneous memory safety hazards\n * MFSA\n 2013-02/CVE-2013-0760/CVE-2013-0762/CVE-2013-0766/CVE-2013-0\n 767\n CVE-2013-0761/CVE-2013-0763/CVE-2013-0771/CVE-2012-5829\n Use-after-free and buffer overflow issues found using\n Address Sanitizer\n * MFSA 2013-03/CVE-2013-0768 (bmo#815795) Buffer Overflow\n in Canvas\n * MFSA 2013-04/CVE-2012-0759 (bmo#802026) URL spoofing in\n addressbar during page loads\n * MFSA 2013-05/CVE-2013-0744 (bmo#814713) Use-after-free\n when displaying table with many columns and column groups\n * MFSA 2013-06/CVE-2013-0751 (bmo#790454) Touch events are\n shared across iframes\n * MFSA 2013-07/CVE-2013-0764 (bmo#804237) Crash due to\n handling of SSL on threads\n * MFSA 2013-08/CVE-2013-0745 (bmo#794158)\n AutoWrapperChanger fails to keep objects alive during\n garbage collection\n * MFSA 2013-09/CVE-2013-0746 (bmo#816842) Compartment\n mismatch with quickstubs returned values\n * MFSA 2013-10/CVE-2013-0747 (bmo#733305) Event\n manipulation in plugin handler to bypass same-origin\n policy\n * MFSA 2013-11/CVE-2013-0748 (bmo#806031) Address space\n layout leaked in XBL objects\n * MFSA 2013-12/CVE-2013-0750 (bmo#805121) Buffer overflow\n in Javascript string concatenation\n * MFSA 2013-13/CVE-2013-0752 (bmo#805024) Memory corruption\n in XBL with XML bindings containing SVG\n * MFSA 2013-14/CVE-2013-0757 (bmo#813901) Chrome Object\n Wrapper (COW) bypass through changing prototype\n * MFSA 2013-15/CVE-2013-0758 (bmo#813906) Privilege\n escalation through plugin objects\n * MFSA 2013-16/CVE-2013-0753 (bmo#814001) Use-after-free in\n serializeToStream\n * MFSA 2013-17/CVE-2013-0754 (bmo#814026) Use-after-free in\n ListenerManager\n * MFSA 2013-18/CVE-2013-0755 (bmo#814027) Use-after-free in\n Vibrate\n * MFSA 2013-19/CVE-2013-0756 (bmo#814029) Use-after-free in\n Javascript Proxy objects\n\n Mozilla NSPR was updated to 4.9.4, containing some small\n bugfixes and new features.\n\n Mozilla NSS was updated to 3.14.1 containing various new\n features, security fix and bugfixes:\n\n * MFSA 2013-20/CVE-2013-0743 (bmo#825022, bnc#796628)\n revoke mis-issued intermediate certificates from TURKTRUST\n\n Cryptographic changes done:\n * Support for TLS 1.1 (RFC 4346)\n * Experimental support for DTLS 1.0 (RFC 4347) and\n DTLS-SRTP (RFC 5764)\n * Support for AES-CTR, AES-CTS, and AES-GCM\n * Support for Keying Material Exporters for TLS (RFC 5705)\n * Support for certificate signatures using the MD5 hash\n algorithm is now disabled by default\n * The NSS license has changed to MPL 2.0. Previous releases\n were released under a MPL 1.1/GPL 2.0/LGPL 2.1\n tri-license. For more information about MPL 2.0, please\n see <a rel=\"nofollow\" href=\"http://www.mozilla.org/MPL/2.0/FAQ.html\">http://www.mozilla.org/MPL/2.0/FAQ.html</a>. For an\n additional explanation on GPL/LGPL compatibility, see\n security/nss/COPYING in the source code.\n * Export and DES cipher suites are disabled by default.\n Non-ECC AES and Triple DES cipher suites are enabled by\n default\n\n Please see <a rel=\"nofollow\" href=\"http://www.mozilla.org/security/announce/\">http://www.mozilla.org/security/announce/</a> for\n more information.\n\n", "edition": 1, "modified": "2013-01-23T14:04:54", "published": "2013-01-23T14:04:54", "id": "OPENSUSE-SU-2013:0131-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html", "type": "suse", "title": "Mozilla Januarys (important)", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2016-09-04T12:42:58", "bulletinFamily": "unix", "cvelist": ["CVE-2013-0743", "CVE-2013-0763", "CVE-2013-0746", "CVE-2012-5829", "CVE-2013-0766", "CVE-2013-0747", "CVE-2013-0751", "CVE-2013-0744", "CVE-2013-0748", "CVE-2013-0768", "CVE-2013-0755", "CVE-2013-0752", "CVE-2013-0754", "CVE-2013-0769", "CVE-2013-0771", "CVE-2013-0757", "CVE-2013-0749", "CVE-2013-0761", "CVE-2012-0759", "CVE-2013-0745", "CVE-2013-0756", "CVE-2013-0760", "CVE-2013-0767", "CVE-2013-0762", "CVE-2013-0753", "CVE-2013-0750", "CVE-2013-0759", "CVE-2013-0770", "CVE-2013-0758", "CVE-2013-0764"], "description": "The Mozilla January 8th 2013 security release contains\n updates:\n\n Mozilla Firefox was updated to version 18.0. Mozilla\n Seamonkey was updated to version 2.15. Mozilla Thunderbird\n was updated to version 17.0.2. Mozilla XULRunner was\n updated to version 17.0.2.\n\n * MFSA 2013-01/CVE-2013-0749/CVE-2013-0769/CVE-2013-0770\n Miscellaneous memory safety hazards\n * MFSA\n 2013-02/CVE-2013-0760/CVE-2013-0762/CVE-2013-0766/CVE-2013-0\n 767\n CVE-2013-0761/CVE-2013-0763/CVE-2013-0771/CVE-2012-5829\n Use-after-free and buffer overflow issues found using\n Address Sanitizer\n * MFSA 2013-03/CVE-2013-0768 (bmo#815795) Buffer Overflow\n in Canvas\n * MFSA 2013-04/CVE-2012-0759 (bmo#802026) URL spoofing in\n addressbar during page loads\n * MFSA 2013-05/CVE-2013-0744 (bmo#814713) Use-after-free\n when displaying table with many columns and column groups\n * MFSA 2013-06/CVE-2013-0751 (bmo#790454) Touch events are\n shared across iframes\n * MFSA 2013-07/CVE-2013-0764 (bmo#804237) Crash due to\n handling of SSL on threads\n * MFSA 2013-08/CVE-2013-0745 (bmo#794158)\n AutoWrapperChanger fails to keep objects alive during\n garbage collection\n * MFSA 2013-09/CVE-2013-0746 (bmo#816842) Compartment\n mismatch with quickstubs returned values\n * MFSA 2013-10/CVE-2013-0747 (bmo#733305) Event\n manipulation in plugin handler to bypass same-origin\n policy\n * MFSA 2013-11/CVE-2013-0748 (bmo#806031) Address space\n layout leaked in XBL objects\n * MFSA 2013-12/CVE-2013-0750 (bmo#805121) Buffer overflow\n in Javascript string concatenation\n * MFSA 2013-13/CVE-2013-0752 (bmo#805024) Memory corruption\n in XBL with XML bindings containing SVG\n * MFSA 2013-14/CVE-2013-0757 (bmo#813901) Chrome Object\n Wrapper (COW) bypass through changing prototype\n * MFSA 2013-15/CVE-2013-0758 (bmo#813906) Privilege\n escalation through plugin objects\n * MFSA 2013-16/CVE-2013-0753 (bmo#814001) Use-after-free in\n serializeToStream\n * MFSA 2013-17/CVE-2013-0754 (bmo#814026) Use-after-free in\n ListenerManager\n * MFSA 2013-18/CVE-2013-0755 (bmo#814027) Use-after-free in\n Vibrate\n * MFSA 2013-19/CVE-2013-0756 (bmo#814029) Use-after-free in\n Javascript Proxy objects\n\n Mozilla NSPR was updated to 4.9.4, containing some small\n bugfixes and new features.\n\n Mozilla NSS was updated to 3.14.1 containing various new\n features, security fix and bugfixes:\n\n * MFSA 2013-20/CVE-2013-0743 (bmo#825022, bnc#796628)\n revoke mis-issued intermediate certificates from TURKTRUST\n\n Cryptographic changes done:\n * Support for TLS 1.1 (RFC 4346)\n * Experimental support for DTLS 1.0 (RFC 4347) and\n DTLS-SRTP (RFC 5764)\n * Support for AES-CTR, AES-CTS, and AES-GCM\n * Support for Keying Material Exporters for TLS (RFC 5705)\n * Support for certificate signatures using the MD5 hash\n algorithm is now disabled by default\n * The NSS license has changed to MPL 2.0. Previous releases\n were released under a MPL 1.1/GPL 2.0/LGPL 2.1\n tri-license. For more information about MPL 2.0, please\n see <a rel=\"nofollow\" href=\"http://www.mozilla.org/MPL/2.0/FAQ.html\">http://www.mozilla.org/MPL/2.0/FAQ.html</a>. For an\n additional explanation on GPL/LGPL compatibility, see\n security/nss/COPYING in the source code.\n * Export and DES cipher suites are disabled by default.\n Non-ECC AES and Triple DES cipher suites are enabled by\n default\n\n Please see <a rel=\"nofollow\" href=\"http://www.mozilla.org/security/announce/\">http://www.mozilla.org/security/announce/</a> for\n more information.\n\n", "edition": 1, "modified": "2013-01-23T14:05:53", "published": "2013-01-23T14:05:53", "id": "OPENSUSE-SU-2013:0149-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html", "type": "suse", "title": "Mozilla Januarys (important)", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "securityvulns": [{"lastseen": "2018-08-31T11:09:50", "bulletinFamily": "software", "cvelist": ["CVE-2013-0743", "CVE-2013-0763", "CVE-2013-0746", "CVE-2012-5829", "CVE-2013-0766", "CVE-2013-0747", "CVE-2013-0751", "CVE-2013-0744", "CVE-2013-0748", "CVE-2013-0768", "CVE-2013-0755", "CVE-2013-0752", "CVE-2013-0754", "CVE-2013-0769", "CVE-2013-0771", "CVE-2013-0757", "CVE-2013-0749", "CVE-2013-0761", "CVE-2013-0745", "CVE-2013-0756", "CVE-2013-0760", "CVE-2013-0767", "CVE-2013-0762", "CVE-2013-0753", "CVE-2013-0750", "CVE-2013-0759", "CVE-2013-0770", "CVE-2013-0758", "CVE-2013-0764"], "description": "Multiple memory corruptions, buffer overflows, privilege escalations, address spoofing, misissued certificate.", "edition": 1, "modified": "2013-01-10T00:00:00", "published": "2013-01-10T00:00:00", "id": "SECURITYVULNS:VULN:12816", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:12816", "title": "Mozilla Firefox / Thunderbird / Seamonkey multiple security vulnerabilities", "type": "securityvulns", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "freebsd": [{"lastseen": "2019-05-29T18:33:41", "bulletinFamily": "unix", "cvelist": ["CVE-2013-0743", "CVE-2013-0763", "CVE-2013-0746", "CVE-2012-5829", "CVE-2013-0766", "CVE-2013-0747", "CVE-2013-0751", "CVE-2013-0744", "CVE-2013-0748", "CVE-2013-0768", "CVE-2013-0755", "CVE-2013-0752", "CVE-2013-0754", "CVE-2013-0769", "CVE-2013-0771", "CVE-2013-0757", "CVE-2013-0749", "CVE-2013-0761", "CVE-2013-0745", "CVE-2013-0756", "CVE-2013-0760", "CVE-2013-0767", "CVE-2013-0762", "CVE-2013-0753", "CVE-2013-0750", "CVE-2013-0759", "CVE-2013-0770", "CVE-2013-0758", "CVE-2013-0764"], "description": "\nThe Mozilla Project reports:\n\nMFSA 2013-01 Miscellaneous memory safety hazards (rv:18.0/\n\t rv:10.0.12 / rv:17.0.2)\nMFSA 2013-02 Use-after-free and buffer overflow issues found using\n\t Address Sanitizer\nMFSA 2013-03 Buffer Overflow in Canvas\nMFSA 2013-04 URL spoofing in addressbar during page loads\nMFSA 2013-05 Use-after-free when displaying table with many\n\t columns and column groups\nMFSA 2013-06 Touch events are shared across iframes\nMFSA 2013-07 Crash due to handling of SSL on threads\nMFSA 2013-08 AutoWrapperChanger fails to keep objects alive during\n\t garbage collection\nMFSA 2013-09 Compartment mismatch with quickstubs returned values\nMFSA 2013-10 Event manipulation in plugin handler to bypass\n\t same-origin policy\nMFSA 2013-11 Address space layout leaked in XBL objects\nMFSA 2013-12 Buffer overflow in Javascript string concatenation\nMFSA 2013-13 Memory corruption in XBL with XML bindings containing\n\t SVG\nMFSA 2013-14 Chrome Object Wrapper (COW) bypass through changing\n\t prototype\nMFSA 2013-15 Privilege escalation through plugin objects\nMFSA 2013-16 Use-after-free in serializeToStream\nMFSA 2013-17 Use-after-free in ListenerManager\nMFSA 2013-18 Use-after-free in Vibrate\nMFSA 2013-19 Use-after-free in Javascript Proxy objects\nMFSA 2013-20 Mis-issued TURKTRUST certificates\n\n", "edition": 4, "modified": "2013-01-08T00:00:00", "published": "2013-01-08T00:00:00", "id": "A4ED6632-5AA9-11E2-8FCB-C8600054B392", "href": "https://vuxml.freebsd.org/freebsd/a4ed6632-5aa9-11e2-8fcb-c8600054b392.html", "title": "mozilla -- multiple vulnerabilities", "type": "freebsd", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "nessus": [{"lastseen": "2021-01-20T15:14:12", "description": "Mozilla Firefox was updated to the 10.0.12ESR release.\n\n - Mozilla developers identified and fixed several memory\n safety bugs in the browser engine used in Firefox and\n other Mozilla-based products. Some of these bugs showed\n evidence of memory corruption under certain\n circumstances, and we presume that with enough effort at\n least some of these could be exploited to run arbitrary\n code. (MFSA 2013-01)\n\n o Christoph Diehl, Christian Holler, Mats Palmgren, and\n Chiaki Ishikawa reported memory safety problems and\n crashes that affect Firefox ESR 10, Firefox ESR 17, and\n Firefox 17. (CVE-2013-0769) o Bill Gianopoulos, Benoit\n Jacob, Christoph Diehl, Christian Holler, Gary Kwong,\n Robert O'Callahan, and Scoobidiver reported memory\n safety problems and crashes that affect Firefox ESR 17\n and Firefox 17. (CVE-2013-0749) o Jesse Ruderman,\n Christian Holler, Julian Seward, and Scoobidiver\n reported memory safety problems and crashes that affect\n Firefox 17. (CVE-2013-0770)\n\n - Security researcher Abhishek Arya (Inferno) of the\n Google Chrome Security Team discovered a series\n critically rated of use-after-free, out of bounds read,\n and buffer overflow issues using the Address Sanitizer\n tool in shipped software. These issues are potentially\n exploitable, allowing for remote code execution. We\n would also like to thank Abhishek for reporting three\n additional user-after-free and out of bounds read flaws\n introduced during Firefox development that were fixed\n before general release. (MFSA 2013-02)\n\n The following issue was fixed in Firefox 18 :\n\no Global-buffer-overflow in CharDistributionAnalysis::HandleOneChar.\n(CVE-2013-0760)\n\nThe following issues were fixed in Firefox 18, ESR 17.0.1,\nand ESR 10.0.12 :\n\no Heap-use-after-free in imgRequest::OnStopFrame (CVE-2013-0762) o\nHeap-use-after-free in ~nsHTMLEditRules (CVE-2013-0766) o Out of\nbounds read in nsSVGPathElement::GetPathLengthScale. (CVE-2013-0767)\n\nThe following issues were fixed in Firefox 18 and ESR \n17.0.1 :\n\no Heap-use-after-free in mozilla::TrackUnionStream::EndTrack\n(CVE-2013-0761) o Heap-use-after-free in Mesa, triggerable by resizing\na WebGL canvas (CVE-2013-0763) o Heap-buffer-overflow in\ngfxTextRun::ShrinkToLigatureBoundaries. (CVE-2013-0771)\n\nThe following issue was fixed in Firefox 18 and in the\nearlier ESR 10.0.11 release :\n\no Heap-buffer-overflow in nsWindow::OnExposeEvent. (CVE-2012-5829)\n\n - Security researcher miaubiz used the Address Sanitizer\n tool to discover a buffer overflow in Canvas when\n specific bad height and width values were given through\n HTML. This could lead to a potentially exploitable\n crash. (CVE-2013-0768). (MFSA 2013-03)\n\n Miaubiz also found a potentially exploitable crash when\n 2D and 3D content was mixed which was introduced during\n Firefox development and fixed before general release.\n\n - Security researcher Masato Kinugawa found a flaw in\n which the displayed URL values within the addressbar can\n be spoofed by a page during loading. This allows for\n phishing attacks where a malicious page can spoof the\n identify of another site. (CVE-2013-0759). (MFSA\n 2013-04)\n\n - Using the Address Sanitizer tool, security researcher\n Atte Kettunen from OUSPG discovered that the combination\n of large numbers of columns and column groups in a table\n could cause the array containing the columns during\n rendering to overwrite itself. This can lead to a\n user-after-free causing a potentially exploitable crash.\n (CVE-2013-0744). (MFSA 2013-05)\n\n - Mozilla developer Wesley Johnston reported that when\n there are two or more iframes on the same HTML page, an\n iframe is able to see the touch events and their targets\n that occur within the other iframes on the page. If the\n iframes are from the same origin, they can also access\n the properties and methods of the targets of other\n iframes but same-origin policy (SOP) restricts access\n across domains. This allows for information leakage and\n possibilities for cross-site scripting (XSS) if another\n vulnerability can be used to get around SOP\n restrictions. (CVE-2013-0751). (MFSA 2013-06)\n\n - Mozilla community member Jerry Baker reported a crashing\n issue found through Thunderbird when downloading\n messages over a Secure Sockets Layer (SSL) connection.\n This was caused by a bug in the networking code assuming\n that secure connections were entirely handled on the\n socket transport thread when they can occur on a variety\n of threads. The resulting crash was potentially\n exploitable. (CVE-2013-0764). (MFSA 2013-07)\n\n - Mozilla developer Olli Pettay discovered that the\n AutoWrapperChanger class fails to keep some JavaScript\n objects alive during garbage collection. This can lead\n to an exploitable crash allowing for arbitrary code\n execution. (CVE-2013-0745). (MFSA 2013-08)\n\n - Mozilla developer Boris Zbarsky reported reported a\n problem where jsval-returning quickstubs fail to wrap\n their return values, causing a compartment mismatch.\n This mismatch can cause garbage collection to occur\n incorrectly and lead to a potentially exploitable crash.\n (CVE-2013-0746). (MFSA 2013-09)\n\n - Mozilla security researcher Jesse Ruderman reported that\n events in the plugin handler can be manipulated by web\n content to bypass same-origin policy (SOP) restrictions.\n This can allow for clickjacking on malicious web pages.\n (CVE-2013-0747). (MFSA 2013-10)\n\n - Mozilla security researcher Jesse Ruderman discovered\n that using the toString function of XBL objects can lead\n to inappropriate information leakage by revealing the\n address space layout instead of just the ID of the\n object. This layout information could potentially be\n used to bypass ASLR and other security protections.\n (CVE-2013-0748). (MFSA 2013-11)\n\n - Security researcher pa_kt reported a flaw via\n TippingPoint's Zero Day Initiative that an integer\n overflow is possible when calculating the length for a\n JavaScript string concatenation, which is then used for\n memory allocation. This results in a buffer overflow,\n leading to a potentially exploitable memory corruption.\n (CVE-2013-0750). (MFSA 2013-12)\n\n - Security researcher Sviatoslav Chagaev reported that\n when using an XBL file containing multiple XML bindings\n with SVG content, a memory corruption can occur. In\n concern with remote XUL, this can lead to an exploitable\n crash. (CVE-2013-0752). (MFSA 2013-13)\n\n - Security researcher Mariusz Mlynski reported that it is\n possible to change the prototype of an object and bypass\n Chrome Object Wrappers (COW) to gain access to chrome\n privileged functions. This could allow for arbitrary\n code execution. (CVE-2013-0757). (MFSA 2013-14)\n\n - Security researcher Mariusz Mlynski reported that it is\n possible to open a chrome privileged web page through\n plugin objects through interaction with SVG elements.\n This could allow for arbitrary code execution.\n (CVE-2013-0758). (MFSA 2013-15)\n\n - Security researcher regenrecht reported, via\n TippingPoint's Zero Day Initiative, a use-after-free in\n XMLSerializer by the exposing of serializeToStream to\n web content. This can lead to arbitrary code execution\n when exploited. (CVE-2013-0753). (MFSA 2013-16)\n\n - Security researcher regenrecht reported, via\n TippingPoint's Zero Day Initiative, a use-after-free\n within the ListenerManager when garbage collection is\n forced after data in listener objects have been\n allocated in some circumstances. This results in a\n use-after-free which can lead to arbitrary code\n execution. (CVE-2013-0754). (MFSA 2013-17)\n\n - Security researcher regenrecht reported, via\n TippingPoint's Zero Day Initiative, a use-after-free\n using the domDoc pointer within Vibrate library. This\n can lead to arbitrary code execution when exploited.\n (CVE-2013-0755). (MFSA 2013-18)\n\n - Security researcher regenrecht reported, via\n TippingPoint's Zero Day Initiative, a garbage collection\n flaw in JavaScript Proxy objects. This can lead to a\n use-after-free leading to arbitrary code execution.\n (CVE-2013-0756). (MFSA 2013-19)\n\n - Google reported to Mozilla that TURKTRUST, a certificate\n authority in Mozilla's root program, had mis-issued two\n intermediate certificates to customers. The issue was\n not specific to Firefox but there was evidence that one\n of the certificates was used for man-in-the-middle\n (MITM) traffic management of domain names that the\n customer did not legitimately own or control. This issue\n was resolved by revoking the trust for these specific\n mis-issued certificates. (CVE-2013-0743). (MFSA 2013-20)", "edition": 18, "published": "2013-01-20T00:00:00", "title": "SuSE 10 Security Update : MozillaFirefox (ZYPP Patch Number 8426)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-0743", "CVE-2013-0763", "CVE-2013-0746", "CVE-2012-5829", "CVE-2013-0766", "CVE-2013-0747", "CVE-2013-0751", "CVE-2013-0744", "CVE-2013-0748", "CVE-2013-0768", "CVE-2013-0755", "CVE-2013-0752", "CVE-2013-0754", "CVE-2013-0769", "CVE-2013-0771", "CVE-2013-0757", "CVE-2013-0749", "CVE-2013-0761", "CVE-2013-0745", "CVE-2013-0756", "CVE-2013-0760", "CVE-2013-0767", "CVE-2013-0762", "CVE-2013-0753", "CVE-2013-0750", "CVE-2013-0759", "CVE-2013-0770", "CVE-2013-0758", "CVE-2013-0764"], "modified": "2013-01-20T00:00:00", "cpe": ["cpe:/o:suse:suse_linux"], "id": "SUSE_FIREFOX-201301-8426.NASL", "href": "https://www.tenable.com/plugins/nessus/63626", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The text description of this plugin is (C) Novell, Inc.\n#\n\nif (NASL_LEVEL < 3000) exit(0);\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(63626);\n script_version(\"1.16\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2012-5829\", \"CVE-2013-0744\", \"CVE-2013-0745\", \"CVE-2013-0746\", \"CVE-2013-0747\", \"CVE-2013-0748\", \"CVE-2013-0749\", \"CVE-2013-0750\", \"CVE-2013-0751\", \"CVE-2013-0752\", \"CVE-2013-0753\", \"CVE-2013-0754\", \"CVE-2013-0755\", \"CVE-2013-0756\", \"CVE-2013-0757\", \"CVE-2013-0758\", \"CVE-2013-0759\", \"CVE-2013-0760\", \"CVE-2013-0761\", \"CVE-2013-0762\", \"CVE-2013-0763\", \"CVE-2013-0764\", \"CVE-2013-0766\", \"CVE-2013-0767\", \"CVE-2013-0768\", \"CVE-2013-0769\", \"CVE-2013-0770\", \"CVE-2013-0771\");\n\n script_name(english:\"SuSE 10 Security Update : MozillaFirefox (ZYPP Patch Number 8426)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SuSE 10 host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Mozilla Firefox was updated to the 10.0.12ESR release.\n\n - Mozilla developers identified and fixed several memory\n safety bugs in the browser engine used in Firefox and\n other Mozilla-based products. Some of these bugs showed\n evidence of memory corruption under certain\n circumstances, and we presume that with enough effort at\n least some of these could be exploited to run arbitrary\n code. (MFSA 2013-01)\n\n o Christoph Diehl, Christian Holler, Mats Palmgren, and\n Chiaki Ishikawa reported memory safety problems and\n crashes that affect Firefox ESR 10, Firefox ESR 17, and\n Firefox 17. (CVE-2013-0769) o Bill Gianopoulos, Benoit\n Jacob, Christoph Diehl, Christian Holler, Gary Kwong,\n Robert O'Callahan, and Scoobidiver reported memory\n safety problems and crashes that affect Firefox ESR 17\n and Firefox 17. (CVE-2013-0749) o Jesse Ruderman,\n Christian Holler, Julian Seward, and Scoobidiver\n reported memory safety problems and crashes that affect\n Firefox 17. (CVE-2013-0770)\n\n - Security researcher Abhishek Arya (Inferno) of the\n Google Chrome Security Team discovered a series\n critically rated of use-after-free, out of bounds read,\n and buffer overflow issues using the Address Sanitizer\n tool in shipped software. These issues are potentially\n exploitable, allowing for remote code execution. We\n would also like to thank Abhishek for reporting three\n additional user-after-free and out of bounds read flaws\n introduced during Firefox development that were fixed\n before general release. (MFSA 2013-02)\n\n The following issue was fixed in Firefox 18 :\n\no Global-buffer-overflow in CharDistributionAnalysis::HandleOneChar.\n(CVE-2013-0760)\n\nThe following issues were fixed in Firefox 18, ESR 17.0.1,\nand ESR 10.0.12 :\n\no Heap-use-after-free in imgRequest::OnStopFrame (CVE-2013-0762) o\nHeap-use-after-free in ~nsHTMLEditRules (CVE-2013-0766) o Out of\nbounds read in nsSVGPathElement::GetPathLengthScale. (CVE-2013-0767)\n\nThe following issues were fixed in Firefox 18 and ESR \n17.0.1 :\n\no Heap-use-after-free in mozilla::TrackUnionStream::EndTrack\n(CVE-2013-0761) o Heap-use-after-free in Mesa, triggerable by resizing\na WebGL canvas (CVE-2013-0763) o Heap-buffer-overflow in\ngfxTextRun::ShrinkToLigatureBoundaries. (CVE-2013-0771)\n\nThe following issue was fixed in Firefox 18 and in the\nearlier ESR 10.0.11 release :\n\no Heap-buffer-overflow in nsWindow::OnExposeEvent. (CVE-2012-5829)\n\n - Security researcher miaubiz used the Address Sanitizer\n tool to discover a buffer overflow in Canvas when\n specific bad height and width values were given through\n HTML. This could lead to a potentially exploitable\n crash. (CVE-2013-0768). (MFSA 2013-03)\n\n Miaubiz also found a potentially exploitable crash when\n 2D and 3D content was mixed which was introduced during\n Firefox development and fixed before general release.\n\n - Security researcher Masato Kinugawa found a flaw in\n which the displayed URL values within the addressbar can\n be spoofed by a page during loading. This allows for\n phishing attacks where a malicious page can spoof the\n identify of another site. (CVE-2013-0759). (MFSA\n 2013-04)\n\n - Using the Address Sanitizer tool, security researcher\n Atte Kettunen from OUSPG discovered that the combination\n of large numbers of columns and column groups in a table\n could cause the array containing the columns during\n rendering to overwrite itself. This can lead to a\n user-after-free causing a potentially exploitable crash.\n (CVE-2013-0744). (MFSA 2013-05)\n\n - Mozilla developer Wesley Johnston reported that when\n there are two or more iframes on the same HTML page, an\n iframe is able to see the touch events and their targets\n that occur within the other iframes on the page. If the\n iframes are from the same origin, they can also access\n the properties and methods of the targets of other\n iframes but same-origin policy (SOP) restricts access\n across domains. This allows for information leakage and\n possibilities for cross-site scripting (XSS) if another\n vulnerability can be used to get around SOP\n restrictions. (CVE-2013-0751). (MFSA 2013-06)\n\n - Mozilla community member Jerry Baker reported a crashing\n issue found through Thunderbird when downloading\n messages over a Secure Sockets Layer (SSL) connection.\n This was caused by a bug in the networking code assuming\n that secure connections were entirely handled on the\n socket transport thread when they can occur on a variety\n of threads. The resulting crash was potentially\n exploitable. (CVE-2013-0764). (MFSA 2013-07)\n\n - Mozilla developer Olli Pettay discovered that the\n AutoWrapperChanger class fails to keep some JavaScript\n objects alive during garbage collection. This can lead\n to an exploitable crash allowing for arbitrary code\n execution. (CVE-2013-0745). (MFSA 2013-08)\n\n - Mozilla developer Boris Zbarsky reported reported a\n problem where jsval-returning quickstubs fail to wrap\n their return values, causing a compartment mismatch.\n This mismatch can cause garbage collection to occur\n incorrectly and lead to a potentially exploitable crash.\n (CVE-2013-0746). (MFSA 2013-09)\n\n - Mozilla security researcher Jesse Ruderman reported that\n events in the plugin handler can be manipulated by web\n content to bypass same-origin policy (SOP) restrictions.\n This can allow for clickjacking on malicious web pages.\n (CVE-2013-0747). (MFSA 2013-10)\n\n - Mozilla security researcher Jesse Ruderman discovered\n that using the toString function of XBL objects can lead\n to inappropriate information leakage by revealing the\n address space layout instead of just the ID of the\n object. This layout information could potentially be\n used to bypass ASLR and other security protections.\n (CVE-2013-0748). (MFSA 2013-11)\n\n - Security researcher pa_kt reported a flaw via\n TippingPoint's Zero Day Initiative that an integer\n overflow is possible when calculating the length for a\n JavaScript string concatenation, which is then used for\n memory allocation. This results in a buffer overflow,\n leading to a potentially exploitable memory corruption.\n (CVE-2013-0750). (MFSA 2013-12)\n\n - Security researcher Sviatoslav Chagaev reported that\n when using an XBL file containing multiple XML bindings\n with SVG content, a memory corruption can occur. In\n concern with remote XUL, this can lead to an exploitable\n crash. (CVE-2013-0752). (MFSA 2013-13)\n\n - Security researcher Mariusz Mlynski reported that it is\n possible to change the prototype of an object and bypass\n Chrome Object Wrappers (COW) to gain access to chrome\n privileged functions. This could allow for arbitrary\n code execution. (CVE-2013-0757). (MFSA 2013-14)\n\n - Security researcher Mariusz Mlynski reported that it is\n possible to open a chrome privileged web page through\n plugin objects through interaction with SVG elements.\n This could allow for arbitrary code execution.\n (CVE-2013-0758). (MFSA 2013-15)\n\n - Security researcher regenrecht reported, via\n TippingPoint's Zero Day Initiative, a use-after-free in\n XMLSerializer by the exposing of serializeToStream to\n web content. This can lead to arbitrary code execution\n when exploited. (CVE-2013-0753). (MFSA 2013-16)\n\n - Security researcher regenrecht reported, via\n TippingPoint's Zero Day Initiative, a use-after-free\n within the ListenerManager when garbage collection is\n forced after data in listener objects have been\n allocated in some circumstances. This results in a\n use-after-free which can lead to arbitrary code\n execution. (CVE-2013-0754). (MFSA 2013-17)\n\n - Security researcher regenrecht reported, via\n TippingPoint's Zero Day Initiative, a use-after-free\n using the domDoc pointer within Vibrate library. This\n can lead to arbitrary code execution when exploited.\n (CVE-2013-0755). (MFSA 2013-18)\n\n - Security researcher regenrecht reported, via\n TippingPoint's Zero Day Initiative, a garbage collection\n flaw in JavaScript Proxy objects. This can lead to a\n use-after-free leading to arbitrary code execution.\n (CVE-2013-0756). (MFSA 2013-19)\n\n - Google reported to Mozilla that TURKTRUST, a certificate\n authority in Mozilla's root program, had mis-issued two\n intermediate certificates to customers. The issue was\n not specific to Firefox but there was evidence that one\n of the certificates was used for man-in-the-middle\n (MITM) traffic management of domain names that the\n customer did not legitimately own or control. This issue\n was resolved by revoking the trust for these specific\n mis-issued certificates. (CVE-2013-0743). (MFSA 2013-20)\"\n );\n # http://www.mozilla.org/security/announce/2013/mfsa2013-01.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-01/\"\n );\n # http://www.mozilla.org/security/announce/2013/mfsa2013-02.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-02/\"\n );\n # http://www.mozilla.org/security/announce/2013/mfsa2013-03.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-03/\"\n );\n # http://www.mozilla.org/security/announce/2013/mfsa2013-04.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-04/\"\n );\n # http://www.mozilla.org/security/announce/2013/mfsa2013-05.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-05/\"\n );\n # http://www.mozilla.org/security/announce/2013/mfsa2013-06.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-06/\"\n );\n # http://www.mozilla.org/security/announce/2013/mfsa2013-07.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-07/\"\n );\n # http://www.mozilla.org/security/announce/2013/mfsa2013-08.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-08/\"\n );\n # http://www.mozilla.org/security/announce/2013/mfsa2013-09.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-09/\"\n );\n # http://www.mozilla.org/security/announce/2013/mfsa2013-10.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-10/\"\n );\n # http://www.mozilla.org/security/announce/2013/mfsa2013-11.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-11/\"\n );\n # http://www.mozilla.org/security/announce/2013/mfsa2013-12.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-12/\"\n );\n # http://www.mozilla.org/security/announce/2013/mfsa2013-13.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-13/\"\n );\n # http://www.mozilla.org/security/announce/2013/mfsa2013-14.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-14/\"\n );\n # http://www.mozilla.org/security/announce/2013/mfsa2013-15.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-15/\"\n );\n # http://www.mozilla.org/security/announce/2013/mfsa2013-16.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-16/\"\n );\n # http://www.mozilla.org/security/announce/2013/mfsa2013-17.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-17/\"\n );\n # http://www.mozilla.org/security/announce/2013/mfsa2013-18.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-18/\"\n );\n # http://www.mozilla.org/security/announce/2013/mfsa2013-19.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-19/\"\n );\n # http://www.mozilla.org/security/announce/2013/mfsa2013-20.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-20/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2012-5829.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2013-0743.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2013-0744.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2013-0745.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2013-0746.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2013-0747.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2013-0748.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2013-0749.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2013-0750.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2013-0751.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2013-0752.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2013-0753.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2013-0754.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2013-0755.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2013-0756.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2013-0757.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2013-0758.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2013-0759.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2013-0760.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2013-0761.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2013-0762.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2013-0763.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2013-0764.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2013-0766.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2013-0767.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2013-0768.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2013-0769.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2013-0770.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2013-0771.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Apply ZYPP patch number 8426.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Firefox 17.0.1 Flash Privileged Code Injection');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:suse:suse_linux\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2012/11/21\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/01/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/01/20\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) exit(0, \"Local checks are not enabled.\");\nif (!get_kb_item(\"Host/SuSE/release\")) exit(0, \"The host is not running SuSE.\");\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) exit(1, \"Could not obtain the list of installed packages.\");\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) exit(1, \"Failed to determine the architecture type.\");\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") exit(1, \"Local checks for SuSE 10 on the '\"+cpu+\"' architecture have not been implemented.\");\n\n\nflag = 0;\nif (rpm_check(release:\"SLED10\", sp:4, reference:\"MozillaFirefox-10.0.12-0.6.1\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:4, reference:\"MozillaFirefox-translations-10.0.12-0.6.1\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:4, reference:\"mozilla-nspr-4.9.4-0.6.1\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:4, reference:\"mozilla-nspr-devel-4.9.4-0.6.1\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:4, reference:\"mozilla-nss-3.14.1-0.6.1\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:4, reference:\"mozilla-nss-devel-3.14.1-0.6.1\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:4, reference:\"mozilla-nss-tools-3.14.1-0.6.1\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:4, cpu:\"x86_64\", reference:\"mozilla-nspr-32bit-4.9.4-0.6.1\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:4, cpu:\"x86_64\", reference:\"mozilla-nss-32bit-3.14.1-0.6.1\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:4, reference:\"MozillaFirefox-10.0.12-0.6.1\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:4, reference:\"MozillaFirefox-translations-10.0.12-0.6.1\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:4, reference:\"mozilla-nspr-4.9.4-0.6.1\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:4, reference:\"mozilla-nspr-devel-4.9.4-0.6.1\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:4, reference:\"mozilla-nss-3.14.1-0.6.1\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:4, reference:\"mozilla-nss-devel-3.14.1-0.6.1\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:4, reference:\"mozilla-nss-tools-3.14.1-0.6.1\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:4, cpu:\"x86_64\", reference:\"mozilla-nspr-32bit-4.9.4-0.6.1\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:4, cpu:\"x86_64\", reference:\"mozilla-nss-32bit-3.14.1-0.6.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse exit(0, \"The host is not affected.\");\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-20T14:37:52", "description": "Mozilla Firefox was updated to the 10.0.12ESR release.\n\n - Mozilla developers identified and fixed several memory\n safety bugs in the browser engine used in Firefox and\n other Mozilla-based products. Some of these bugs showed\n evidence of memory corruption under certain\n circumstances, and we presume that with enough effort at\n least some of these could be exploited to run arbitrary\n code. (MFSA 2013-01)\n\n - Christoph Diehl, Christian Holler, Mats Palmgren, and\n Chiaki Ishikawa reported memory safety problems and\n crashes that affect Firefox ESR 10, Firefox ESR 17, and\n Firefox 17. (CVE-2013-0769)\n\n - Bill Gianopoulos, Benoit Jacob, Christoph Diehl,\n Christian Holler, Gary Kwong, Robert O'Callahan, and\n Scoobidiver reported memory safety problems and crashes\n that affect Firefox ESR 17 and Firefox 17.\n (CVE-2013-0749)\n\n - Jesse Ruderman, Christian Holler, Julian Seward, and\n Scoobidiver reported memory safety problems and crashes\n that affect Firefox 17. (CVE-2013-0770)\n\n - Security researcher Abhishek Arya (Inferno) of the\n Google Chrome Security Team discovered a series\n critically rated of use-after-free, out of bounds read,\n and buffer overflow issues using the Address Sanitizer\n tool in shipped software. These issues are potentially\n exploitable, allowing for remote code execution. We\n would also like to thank Abhishek for reporting three\n additional user-after-free and out of bounds read flaws\n introduced during Firefox development that were fixed\n before general release. (MFSA 2013-02)\n\nThe following issue was fixed in Firefox 18 :\n\n - Global-buffer-overflow in\n CharDistributionAnalysis::HandleOneChar. (CVE-2013-0760)\n\nThe following issues were fixed in Firefox 18, ESR 17.0.1, and ESR\n10.0.12 :\n\n - Heap-use-after-free in imgRequest::OnStopFrame.\n (CVE-2013-0762)\n\n - Heap-use-after-free in ~nsHTMLEditRules. (CVE-2013-0766)\n\n - Out of bounds read in\n nsSVGPathElement::GetPathLengthScale. (CVE-2013-0767)\n\nThe following issues were fixed in Firefox 18 and ESR 17.0.1 :\n\n - Heap-use-after-free in\n mozilla::TrackUnionStream::EndTrack. (CVE-2013-0761)\n\n - Heap-use-after-free in Mesa, triggerable by resizing a\n WebGL canvas. (CVE-2013-0763)\n\n - Heap-buffer-overflow in\n gfxTextRun::ShrinkToLigatureBoundaries. (CVE-2013-0771)\n\nThe following issue was fixed in Firefox 18 and in the earlier ESR\n10.0.11 release :\n\n - Heap-buffer-overflow in nsWindow::OnExposeEvent.\n (CVE-2012-5829)\n\n - Security researcher miaubiz used the Address Sanitizer\n tool to discover a buffer overflow in Canvas when\n specific bad height and width values were given through\n HTML. This could lead to a potentially exploitable\n crash. (CVE-2013-0768). (MFSA 2013-03)\n\n Miaubiz also found a potentially exploitable crash when\n 2D and 3D content was mixed which was introduced during\n Firefox development and fixed before general release.\n\n - Security researcher Masato Kinugawa found a flaw in\n which the displayed URL values within the addressbar can\n be spoofed by a page during loading. This allows for\n phishing attacks where a malicious page can spoof the\n identify of another site. (CVE-2013-0759). (MFSA\n 2013-04)\n\n - Using the Address Sanitizer tool, security researcher\n Atte Kettunen from OUSPG discovered that the combination\n of large numbers of columns and column groups in a table\n could cause the array containing the columns during\n rendering to overwrite itself. This can lead to a\n user-after-free causing a potentially exploitable crash.\n (CVE-2013-0744). (MFSA 2013-05)\n\n - Mozilla developer Wesley Johnston reported that when\n there are two or more iframes on the same HTML page, an\n iframe is able to see the touch events and their targets\n that occur within the other iframes on the page. If the\n iframes are from the same origin, they can also access\n the properties and methods of the targets of other\n iframes but same-origin policy (SOP) restricts access\n across domains. This allows for information leakage and\n possibilities for cross-site scripting (XSS) if another\n vulnerability can be used to get around SOP\n restrictions. (CVE-2013-0751). (MFSA 2013-06)\n\n - Mozilla community member Jerry Baker reported a crashing\n issue found through Thunderbird when downloading\n messages over a Secure Sockets Layer (SSL) connection.\n This was caused by a bug in the networking code assuming\n that secure connections were entirely handled on the\n socket transport thread when they can occur on a variety\n of threads. The resulting crash was potentially\n exploitable. (CVE-2013-0764). (MFSA 2013-07)\n\n - Mozilla developer Olli Pettay discovered that the\n AutoWrapperChanger class fails to keep some JavaScript\n objects alive during garbage collection. This can lead\n to an exploitable crash allowing for arbitrary code\n execution. (CVE-2013-0745). (MFSA 2013-08)\n\n - Mozilla developer Boris Zbarsky reported reported a\n problem where jsval-returning quickstubs fail to wrap\n their return values, causing a compartment mismatch.\n This mismatch can cause garbage collection to occur\n incorrectly and lead to a potentially exploitable crash.\n (CVE-2013-0746). (MFSA 2013-09)\n\n - Mozilla security researcher Jesse Ruderman reported that\n events in the plugin handler can be manipulated by web\n content to bypass same-origin policy (SOP) restrictions.\n This can allow for clickjacking on malicious web pages.\n (CVE-2013-0747). (MFSA 2013-10)\n\n - Mozilla security researcher Jesse Ruderman discovered\n that using the toString function of XBL objects can lead\n to inappropriate information leakage by revealing the\n address space layout instead of just the ID of the\n object. This layout information could potentially be\n used to bypass ASLR and other security protections.\n (CVE-2013-0748). (MFSA 2013-11)\n\n - Security researcher pa_kt reported a flaw via\n TippingPoint's Zero Day Initiative that an integer\n overflow is possible when calculating the length for a\n JavaScript string concatenation, which is then used for\n memory allocation. This results in a buffer overflow,\n leading to a potentially exploitable memory corruption.\n (CVE-2013-0750). (MFSA 2013-12)\n\n - Security researcher Sviatoslav Chagaev reported that\n when using an XBL file containing multiple XML bindings\n with SVG content, a memory corruption can occur. In\n concern with remote XUL, this can lead to an exploitable\n crash. (CVE-2013-0752). (MFSA 2013-13)\n\n - Security researcher Mariusz Mlynski reported that it is\n possible to change the prototype of an object and bypass\n Chrome Object Wrappers (COW) to gain access to chrome\n privileged functions. This could allow for arbitrary\n code execution. (CVE-2013-0757). (MFSA 2013-14)\n\n - Security researcher Mariusz Mlynski reported that it is\n possible to open a chrome privileged web page through\n plugin objects through interaction with SVG elements.\n This could allow for arbitrary code execution.\n (CVE-2013-0758). (MFSA 2013-15)\n\n - Security researcher regenrecht reported, via\n TippingPoint's Zero Day Initiative, a use-after-free in\n XMLSerializer by the exposing of serializeToStream to\n web content. This can lead to arbitrary code execution\n when exploited. (CVE-2013-0753). (MFSA 2013-16)\n\n - Security researcher regenrecht reported, via\n TippingPoint's Zero Day Initiative, a use-after-free\n within the ListenerManager when garbage collection is\n forced after data in listener objects have been\n allocated in some circumstances. This results in a\n use-after-free which can lead to arbitrary code\n execution. (CVE-2013-0754). (MFSA 2013-17)\n\n - Security researcher regenrecht reported, via\n TippingPoint's Zero Day Initiative, a use-after-free\n using the domDoc pointer within Vibrate library. This\n can lead to arbitrary code execution when exploited.\n (CVE-2013-0755). (MFSA 2013-18)\n\n - Security researcher regenrecht reported, via\n TippingPoint's Zero Day Initiative, a garbage collection\n flaw in JavaScript Proxy objects. This can lead to a\n use-after-free leading to arbitrary code execution.\n (CVE-2013-0756). (MFSA 2013-19)\n\n - Google reported to Mozilla that TURKTRUST, a certificate\n authority in Mozilla's root program, had mis-issued two\n intermediate certificates to customers. The issue was\n not specific to Firefox but there was evidence that one\n of the certificates was used for man-in-the-middle\n (MITM) traffic management of domain names that the\n customer did not legitimately own or control. This issue\n was resolved by revoking the trust for these specific\n mis-issued certificates. (CVE-2013-0743). (MFSA 2013-20)", "edition": 18, "published": "2013-01-25T00:00:00", "title": "SuSE 11.2 Security Update : MozillaFirefox (SAT Patch Number 7224)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-0743", "CVE-2013-0763", "CVE-2013-0746", "CVE-2012-5829", "CVE-2013-0766", "CVE-2013-0747", "CVE-2013-0751", "CVE-2013-0744", "CVE-2013-0748", "CVE-2013-0768", "CVE-2013-0755", "CVE-2013-0752", "CVE-2013-0754", "CVE-2013-0769", "CVE-2013-0771", "CVE-2013-0757", "CVE-2013-0749", "CVE-2013-0761", "CVE-2013-0745", "CVE-2013-0756", "CVE-2013-0760", "CVE-2013-0767", "CVE-2013-0762", "CVE-2013-0753", "CVE-2013-0750", "CVE-2013-0759", "CVE-2013-0770", "CVE-2013-0758", "CVE-2013-0764"], "modified": "2013-01-25T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:11:mozilla-nss-32bit", "p-cpe:/a:novell:suse_linux:11:mozilla-nspr-32bit", "cpe:/o:novell:suse_linux:11", "p-cpe:/a:novell:suse_linux:11:mozilla-nss", "p-cpe:/a:novell:suse_linux:11:mozilla-nspr", "p-cpe:/a:novell:suse_linux:11:MozillaFirefox-translations", "p-cpe:/a:novell:suse_linux:11:MozillaFirefox", "p-cpe:/a:novell:suse_linux:11:mozilla-nss-tools", "p-cpe:/a:novell:suse_linux:11:libfreebl3", "p-cpe:/a:novell:suse_linux:11:libfreebl3-32bit"], "id": "SUSE_11_FIREFOX-201301-130110.NASL", "href": "https://www.tenable.com/plugins/nessus/64136", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from SuSE 11 update information. The text itself is\n# copyright (C) Novell, Inc.\n#\n\nif (NASL_LEVEL < 3000) exit(0);\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(64136);\n script_version(\"1.15\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2012-5829\", \"CVE-2013-0744\", \"CVE-2013-0745\", \"CVE-2013-0746\", \"CVE-2013-0747\", \"CVE-2013-0748\", \"CVE-2013-0749\", \"CVE-2013-0750\", \"CVE-2013-0751\", \"CVE-2013-0752\", \"CVE-2013-0753\", \"CVE-2013-0754\", \"CVE-2013-0755\", \"CVE-2013-0756\", \"CVE-2013-0757\", \"CVE-2013-0758\", \"CVE-2013-0759\", \"CVE-2013-0760\", \"CVE-2013-0761\", \"CVE-2013-0762\", \"CVE-2013-0763\", \"CVE-2013-0764\", \"CVE-2013-0766\", \"CVE-2013-0767\", \"CVE-2013-0768\", \"CVE-2013-0769\", \"CVE-2013-0770\", \"CVE-2013-0771\");\n\n script_name(english:\"SuSE 11.2 Security Update : MozillaFirefox (SAT Patch Number 7224)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SuSE 11 host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Mozilla Firefox was updated to the 10.0.12ESR release.\n\n - Mozilla developers identified and fixed several memory\n safety bugs in the browser engine used in Firefox and\n other Mozilla-based products. Some of these bugs showed\n evidence of memory corruption under certain\n circumstances, and we presume that with enough effort at\n least some of these could be exploited to run arbitrary\n code. (MFSA 2013-01)\n\n - Christoph Diehl, Christian Holler, Mats Palmgren, and\n Chiaki Ishikawa reported memory safety problems and\n crashes that affect Firefox ESR 10, Firefox ESR 17, and\n Firefox 17. (CVE-2013-0769)\n\n - Bill Gianopoulos, Benoit Jacob, Christoph Diehl,\n Christian Holler, Gary Kwong, Robert O'Callahan, and\n Scoobidiver reported memory safety problems and crashes\n that affect Firefox ESR 17 and Firefox 17.\n (CVE-2013-0749)\n\n - Jesse Ruderman, Christian Holler, Julian Seward, and\n Scoobidiver reported memory safety problems and crashes\n that affect Firefox 17. (CVE-2013-0770)\n\n - Security researcher Abhishek Arya (Inferno) of the\n Google Chrome Security Team discovered a series\n critically rated of use-after-free, out of bounds read,\n and buffer overflow issues using the Address Sanitizer\n tool in shipped software. These issues are potentially\n exploitable, allowing for remote code execution. We\n would also like to thank Abhishek for reporting three\n additional user-after-free and out of bounds read flaws\n introduced during Firefox development that were fixed\n before general release. (MFSA 2013-02)\n\nThe following issue was fixed in Firefox 18 :\n\n - Global-buffer-overflow in\n CharDistributionAnalysis::HandleOneChar. (CVE-2013-0760)\n\nThe following issues were fixed in Firefox 18, ESR 17.0.1, and ESR\n10.0.12 :\n\n - Heap-use-after-free in imgRequest::OnStopFrame.\n (CVE-2013-0762)\n\n - Heap-use-after-free in ~nsHTMLEditRules. (CVE-2013-0766)\n\n - Out of bounds read in\n nsSVGPathElement::GetPathLengthScale. (CVE-2013-0767)\n\nThe following issues were fixed in Firefox 18 and ESR 17.0.1 :\n\n - Heap-use-after-free in\n mozilla::TrackUnionStream::EndTrack. (CVE-2013-0761)\n\n - Heap-use-after-free in Mesa, triggerable by resizing a\n WebGL canvas. (CVE-2013-0763)\n\n - Heap-buffer-overflow in\n gfxTextRun::ShrinkToLigatureBoundaries. (CVE-2013-0771)\n\nThe following issue was fixed in Firefox 18 and in the earlier ESR\n10.0.11 release :\n\n - Heap-buffer-overflow in nsWindow::OnExposeEvent.\n (CVE-2012-5829)\n\n - Security researcher miaubiz used the Address Sanitizer\n tool to discover a buffer overflow in Canvas when\n specific bad height and width values were given through\n HTML. This could lead to a potentially exploitable\n crash. (CVE-2013-0768). (MFSA 2013-03)\n\n Miaubiz also found a potentially exploitable crash when\n 2D and 3D content was mixed which was introduced during\n Firefox development and fixed before general release.\n\n - Security researcher Masato Kinugawa found a flaw in\n which the displayed URL values within the addressbar can\n be spoofed by a page during loading. This allows for\n phishing attacks where a malicious page can spoof the\n identify of another site. (CVE-2013-0759). (MFSA\n 2013-04)\n\n - Using the Address Sanitizer tool, security researcher\n Atte Kettunen from OUSPG discovered that the combination\n of large numbers of columns and column groups in a table\n could cause the array containing the columns during\n rendering to overwrite itself. This can lead to a\n user-after-free causing a potentially exploitable crash.\n (CVE-2013-0744). (MFSA 2013-05)\n\n - Mozilla developer Wesley Johnston reported that when\n there are two or more iframes on the same HTML page, an\n iframe is able to see the touch events and their targets\n that occur within the other iframes on the page. If the\n iframes are from the same origin, they can also access\n the properties and methods of the targets of other\n iframes but same-origin policy (SOP) restricts access\n across domains. This allows for information leakage and\n possibilities for cross-site scripting (XSS) if another\n vulnerability can be used to get around SOP\n restrictions. (CVE-2013-0751). (MFSA 2013-06)\n\n - Mozilla community member Jerry Baker reported a crashing\n issue found through Thunderbird when downloading\n messages over a Secure Sockets Layer (SSL) connection.\n This was caused by a bug in the networking code assuming\n that secure connections were entirely handled on the\n socket transport thread when they can occur on a variety\n of threads. The resulting crash was potentially\n exploitable. (CVE-2013-0764). (MFSA 2013-07)\n\n - Mozilla developer Olli Pettay discovered that the\n AutoWrapperChanger class fails to keep some JavaScript\n objects alive during garbage collection. This can lead\n to an exploitable crash allowing for arbitrary code\n execution. (CVE-2013-0745). (MFSA 2013-08)\n\n - Mozilla developer Boris Zbarsky reported reported a\n problem where jsval-returning quickstubs fail to wrap\n their return values, causing a compartment mismatch.\n This mismatch can cause garbage collection to occur\n incorrectly and lead to a potentially exploitable crash.\n (CVE-2013-0746). (MFSA 2013-09)\n\n - Mozilla security researcher Jesse Ruderman reported that\n events in the plugin handler can be manipulated by web\n content to bypass same-origin policy (SOP) restrictions.\n This can allow for clickjacking on malicious web pages.\n (CVE-2013-0747). (MFSA 2013-10)\n\n - Mozilla security researcher Jesse Ruderman discovered\n that using the toString function of XBL objects can lead\n to inappropriate information leakage by revealing the\n address space layout instead of just the ID of the\n object. This layout information could potentially be\n used to bypass ASLR and other security protections.\n (CVE-2013-0748). (MFSA 2013-11)\n\n - Security researcher pa_kt reported a flaw via\n TippingPoint's Zero Day Initiative that an integer\n overflow is possible when calculating the length for a\n JavaScript string concatenation, which is then used for\n memory allocation. This results in a buffer overflow,\n leading to a potentially exploitable memory corruption.\n (CVE-2013-0750). (MFSA 2013-12)\n\n - Security researcher Sviatoslav Chagaev reported that\n when using an XBL file containing multiple XML bindings\n with SVG content, a memory corruption can occur. In\n concern with remote XUL, this can lead to an exploitable\n crash. (CVE-2013-0752). (MFSA 2013-13)\n\n - Security researcher Mariusz Mlynski reported that it is\n possible to change the prototype of an object and bypass\n Chrome Object Wrappers (COW) to gain access to chrome\n privileged functions. This could allow for arbitrary\n code execution. (CVE-2013-0757). (MFSA 2013-14)\n\n - Security researcher Mariusz Mlynski reported that it is\n possible to open a chrome privileged web page through\n plugin objects through interaction with SVG elements.\n This could allow for arbitrary code execution.\n (CVE-2013-0758). (MFSA 2013-15)\n\n - Security researcher regenrecht reported, via\n TippingPoint's Zero Day Initiative, a use-after-free in\n XMLSerializer by the exposing of serializeToStream to\n web content. This can lead to arbitrary code execution\n when exploited. (CVE-2013-0753). (MFSA 2013-16)\n\n - Security researcher regenrecht reported, via\n TippingPoint's Zero Day Initiative, a use-after-free\n within the ListenerManager when garbage collection is\n forced after data in listener objects have been\n allocated in some circumstances. This results in a\n use-after-free which can lead to arbitrary code\n execution. (CVE-2013-0754). (MFSA 2013-17)\n\n - Security researcher regenrecht reported, via\n TippingPoint's Zero Day Initiative, a use-after-free\n using the domDoc pointer within Vibrate library. This\n can lead to arbitrary code execution when exploited.\n (CVE-2013-0755). (MFSA 2013-18)\n\n - Security researcher regenrecht reported, via\n TippingPoint's Zero Day Initiative, a garbage collection\n flaw in JavaScript Proxy objects. This can lead to a\n use-after-free leading to arbitrary code execution.\n (CVE-2013-0756). (MFSA 2013-19)\n\n - Google reported to Mozilla that TURKTRUST, a certificate\n authority in Mozilla's root program, had mis-issued two\n intermediate certificates to customers. The issue was\n not specific to Firefox but there was evidence that one\n of the certificates was used for man-in-the-middle\n (MITM) traffic management of domain names that the\n customer did not legitimately own or control. This issue\n was resolved by revoking the trust for these specific\n mis-issued certificates. (CVE-2013-0743). (MFSA 2013-20)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.mozilla.org/security/announce/2013/mfsa2013-01.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.mozilla.org/security/announce/2013/mfsa2013-02.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.mozilla.org/security/announce/2013/mfsa2013-03.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.mozilla.org/security/announce/2013/mfsa2013-04.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.mozilla.org/security/announce/2013/mfsa2013-05.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.mozilla.org/security/announce/2013/mfsa2013-06.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.mozilla.org/security/announce/2013/mfsa2013-07.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.mozilla.org/security/announce/2013/mfsa2013-08.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.mozilla.org/security/announce/2013/mfsa2013-09.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.mozilla.org/security/announce/2013/mfsa2013-10.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.mozilla.org/security/announce/2013/mfsa2013-11.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.mozilla.org/security/announce/2013/mfsa2013-12.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.mozilla.org/security/announce/2013/mfsa2013-13.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.mozilla.org/security/announce/2013/mfsa2013-14.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.mozilla.org/security/announce/2013/mfsa2013-15.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.mozilla.org/security/announce/2013/mfsa2013-16.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.mozilla.org/security/announce/2013/mfsa2013-17.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.mozilla.org/security/announce/2013/mfsa2013-18.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.mozilla.org/security/announce/2013/mfsa2013-19.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.mozilla.org/security/announce/2013/mfsa2013-20.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=796895\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2012-5829.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2013-0743.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2013-0744.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2013-0745.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2013-0746.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2013-0747.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2013-0748.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2013-0749.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2013-0750.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2013-0751.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2013-0752.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2013-0753.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2013-0754.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2013-0755.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2013-0756.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2013-0757.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2013-0758.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2013-0759.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2013-0760.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2013-0761.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2013-0762.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2013-0763.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2013-0764.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2013-0766.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2013-0767.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2013-0768.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2013-0769.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2013-0770.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2013-0771.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Apply SAT patch number 7224.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Firefox 17.0.1 Flash Privileged Code Injection');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:MozillaFirefox\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:MozillaFirefox-translations\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:libfreebl3\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:libfreebl3-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:mozilla-nspr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:mozilla-nspr-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:mozilla-nss\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:mozilla-nss-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:mozilla-nss-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:11\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/01/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/01/25\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)11\") audit(AUDIT_OS_NOT, \"SuSE 11\");\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SuSE 11\", cpu);\n\npl = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(pl) || int(pl) != 2) audit(AUDIT_OS_NOT, \"SuSE 11.2\");\n\n\nflag = 0;\nif (rpm_check(release:\"SLED11\", sp:2, cpu:\"i586\", reference:\"MozillaFirefox-10.0.12-0.4.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:2, cpu:\"i586\", reference:\"MozillaFirefox-translations-10.0.12-0.4.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:2, cpu:\"i586\", reference:\"libfreebl3-3.14.1-0.3.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:2, cpu:\"i586\", reference:\"mozilla-nspr-4.9.4-0.3.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:2, cpu:\"i586\", reference:\"mozilla-nss-3.14.1-0.3.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:2, cpu:\"i586\", reference:\"mozilla-nss-tools-3.14.1-0.3.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:2, cpu:\"x86_64\", reference:\"MozillaFirefox-10.0.12-0.4.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:2, cpu:\"x86_64\", reference:\"MozillaFirefox-translations-10.0.12-0.4.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:2, cpu:\"x86_64\", reference:\"libfreebl3-3.14.1-0.3.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:2, cpu:\"x86_64\", reference:\"libfreebl3-32bit-3.14.1-0.3.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:2, cpu:\"x86_64\", reference:\"mozilla-nspr-4.9.4-0.3.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:2, cpu:\"x86_64\", reference:\"mozilla-nspr-32bit-4.9.4-0.3.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:2, cpu:\"x86_64\", reference:\"mozilla-nss-3.14.1-0.3.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:2, cpu:\"x86_64\", reference:\"mozilla-nss-32bit-3.14.1-0.3.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:2, cpu:\"x86_64\", reference:\"mozilla-nss-tools-3.14.1-0.3.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:2, reference:\"MozillaFirefox-10.0.12-0.4.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:2, reference:\"MozillaFirefox-translations-10.0.12-0.4.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:2, reference:\"libfreebl3-3.14.1-0.3.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:2, reference:\"mozilla-nspr-4.9.4-0.3.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:2, reference:\"mozilla-nss-3.14.1-0.3.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:2, reference:\"mozilla-nss-tools-3.14.1-0.3.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:2, cpu:\"s390x\", reference:\"libfreebl3-32bit-3.14.1-0.3.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:2, cpu:\"s390x\", reference:\"mozilla-nspr-32bit-4.9.4-0.3.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:2, cpu:\"s390x\", reference:\"mozilla-nss-32bit-3.14.1-0.3.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:2, cpu:\"x86_64\", reference:\"libfreebl3-32bit-3.14.1-0.3.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:2, cpu:\"x86_64\", reference:\"mozilla-nspr-32bit-4.9.4-0.3.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:2, cpu:\"x86_64\", reference:\"mozilla-nss-32bit-3.14.1-0.3.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-20T14:43:01", "description": "Mozilla Firefox is updated to the 10.0.12ESR version.\n\nThis is a roll-up update for LTSS.\n\nIt fixes a lot of security issues and bugs. 10.0.12ESR fixes\nspecifically :\n\nMFSA 2013-01: Mozilla developers identified and fixed several memory\nsafety bugs in the browser engine used in Firefox and other\nMozilla-based products. Some of these bugs showed evidence of memory\ncorruption under certain circumstances, and we presume that with\nenough effort at least some of these could be exploited to run\narbitrary code.\n\nChristoph Diehl, Christian Holler, Mats Palmgren, and Chiaki\nIshikawa reported memory safety problems and crashes that\naffect Firefox ESR 10, Firefox ESR 17, and Firefox 17.\n(CVE-2013-0769)\n\nBill Gianopoulos, Benoit Jacob, Christoph Diehl, Christian\nHoller, Gary Kwong, Robert O'Callahan, and Scoobidiver\nreported memory safety problems and crashes that affect\nFirefox ESR 17 and Firefox 17. (CVE-2013-0749)\n\nJesse Ruderman, Christian Holler, Julian Seward, and\nScoobidiver reported memory safety problems and crashes that\naffect Firefox 17. (CVE-2013-0770)\n\nMFSA 2013-02: Security researcher Abhishek Arya (Inferno) of\nthe Google Chrome Security Team discovered a series\ncritically rated of use-after-free, out of bounds read, and\nbuffer overflow issues using the Address Sanitizer tool in\nshipped software. These issues are potentially exploitable,\nallowing for remote code execution. We would also like to\nthank Abhishek for reporting three additional\nuser-after-free and out of bounds read flaws introduced\nduring Firefox development that were fixed before general\nrelease.\n\nThe following issue has been fixed in Firefox 18 :\n\n - Global-buffer-overflow in\n CharDistributionAnalysis::HandleOneChar (CVE-2013-0760)\n\n The following issues has been fixed in Firefox 18, ESR\n 17.0.1, and ESR 10.0.12 :\n\n - Heap-use-after-free in imgRequest::OnStopFrame\n (CVE-2013-0762)\n - Heap-use-after-free in ~nsHTMLEditRules (CVE-2013-0766)\n - Out of bounds read in\n nsSVGPathElement::GetPathLengthScale (CVE-2013-0763)\n - Heap-buffer-overflow in\n gfxTextRun::ShrinkToLigatureBoundaries (CVE-2013-0771)\n\n The following issue has been fixed in Firefox 18 and in\n the earlier ESR 10.0.11 release :\n\n - Heap-buffer-overflow in nsWindow::OnExposeEvent\n (CVE-2012-5829) MFSA 2013-03: Security researcher\n miaubiz used the Address Sanitizer tool to discover a\n buffer overflow in Canvas when specific bad height and\n width values were given through HTML. This could lead to\n a potentially exploitable crash. (CVE-2013-0768)\n\n Miaubiz also found a potentially exploitable crash when\n 2D and 3D content was mixed which was introduced during\n Firefox development and fixed before general release.\n\n MFSA 2013-04: Security researcher Masato Kinugawa found\n a flaw in which the displayed URL values within the\n addressbar can be spoofed by a page during loading. This\n allows for phishing attacks where a malicious page can\n spoof the identify of another site. (CVE-2013-0759)\n\n MFSA 2013-05: Using the Address Sanitizer tool, security\n researcher Atte Kettunen from OUSPG discovered that the\n combination of large numbers of columns and column\n groups in a table could cause the array containing the\n columns during rendering to overwrite itself. This can\n lead to a user-after-free causing a potentially\n exploitable crash. (CVE-2013-0744)\n\n MFSA 2013-06: Mozilla developer Wesley Johnston reported\n that when there are two or more iframes on the same HTML\n page, an iframe is able to see the touch events and\n their targets that occur within the other iframes on the\n page. If the iframes are from the same origin, they can\n also access the properties and methods of the targets of\n other iframes but same-origin policy (SOP) restricts\n access across domains. This allows for information\n leakage and possibilities for cross-site scripting (XSS)\n if another vulnerability can be used to get around SOP\n restrictions. (CVE-2013-0751)\n\n MFSA 2013-07: Mozilla community member Jerry Baker\n reported a crashing issue found through Thunderbird when\n downloading messages over a Secure Sockets Layer (SSL)\n connection. This was caused by a bug in the networking\n code assuming that secure connections were entirely\n handled on the socket transport thread when they can\n occur on a variety of threads. The resulting crash was\n potentially exploitable. (CVE-2013-0764)\n\n MFSA 2013-08: Mozilla developer Olli Pettay discovered\n that the AutoWrapperChanger class fails to keep some\n JavaScript objects alive during garbage collection. This\n can lead to an exploitable crash allowing for arbitrary\n code execution. (CVE-2013-0745)\n\n MFSA 2013-09: Mozilla developer Boris Zbarsky reported\n reported a problem where jsval-returning quickstubs fail\n to wrap their return values, causing a compartment\n mismatch. This mismatch can cause garbage collection to\n occur incorrectly and lead to a potentially exploitable\n crash. (CVE-2013-0746)\n\n MFSA 2013-10: Mozilla security researcher Jesse Ruderman\n reported that events in the plugin handler can be\n manipulated by web content to bypass same-origin policy\n (SOP) restrictions. This can allow for clickjacking on\n malicious web pages. (CVE-2013-0747)\n\n MFSA 2013-11: Mozilla security researcher Jesse Ruderman\n discovered that using the toString function of XBL\n objects can lead to inappropriate information leakage by\n revealing the address space layout instead of just the\n ID of the object. This layout information could\n potentially be used to bypass ASLR and other security\n protections. (CVE-2013-0748)\n\n MFSA 2013-12: Security researcher pa_kt reported a flaw\n via TippingPoint's Zero Day Initiative that an integer\n overflow is possible when calculating the length for a\n JavaScript string concatenation, which is then used for\n memory allocation. This results in a buffer overflow,\n leading to a potentially exploitable memory corruption.\n (CVE-2013-0750)\n\n MFSA 2013-13: Security researcher Sviatoslav Chagaev\n reported that when using an XBL file containing multiple\n XML bindings with SVG content, a memory corruption can\n occur. In concern with remote XUL, this can lead to an\n exploitable crash. (CVE-2013-0752)\n\n MFSA 2013-14: Security researcher Mariusz Mlynski\n reported that it is possible to change the prototype of\n an object and bypass Chrome Object Wrappers (COW) to\n gain access to chrome privileged functions. This could\n allow for arbitrary code execution. (CVE-2013-0757)\n\n MFSA 2013-15: Security researcher Mariusz Mlynski\n reported that it is possible to open a chrome privileged\n web page through plugin objects through interaction with\n SVG elements. This could allow for arbitrary code\n execution. (CVE-2013-0758)\n\n MFSA 2013-16: Security researcher regenrecht reported,\n via TippingPoint's Zero Day Initiative, a use-after-free\n in XMLSerializer by the exposing of serializeToStream to\n web content. This can lead to arbitrary code execution\n when exploited. (CVE-2013-0753)\n\n MFSA 2013-17: Security researcher regenrecht reported,\n via TippingPoint's Zero Day Initiative, a use-after-free\n within the ListenerManager when garbage collection is\n forced after data in listener objects have been\n allocated in some circumstances. This results in a\n use-after-free which can lead to arbitrary code\n execution. (CVE-2013-0754)\n\n MFSA 2013-18: Security researcher regenrecht reported,\n via TippingPoint's Zero Day Initiative, a use-after-free\n using the domDoc pointer within Vibrate library. This\n can lead to arbitrary code execution when exploited.\n (CVE-2013-0755)\n\n MFSA 2013-19: Security researcher regenrecht reported,\n via TippingPoint's Zero Day Initiative, a garbage\n collection flaw in JavaScript Proxy objects. This can\n lead to a use-after-free leading to arbitrary code\n execution. (CVE-2013-0756)\n\n MFSA 2013-20: Google reported to Mozilla that TURKTRUST,\n a certificate authority in Mozilla's root program, had\n mis-issued two intermediate certificates to customers.\n The issue was not specific to Firefox but there was\n evidence that one of the certificates was used for\n man-in-the-middle (MITM) traffic management of domain\n names that the customer did not legitimately own or\n control. This issue was resolved by revoking the trust\n for these specific mis-issued certificates.\n (CVE-2013-0743)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 18, "published": "2015-05-20T00:00:00", "title": "SUSE SLES10 Security Update : Mozilla Firefox (SUSE-SU-2013:0306-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-0743", "CVE-2013-0763", "CVE-2013-0746", "CVE-2012-5829", "CVE-2013-0766", "CVE-2013-0747", "CVE-2013-0751", "CVE-2013-0744", "CVE-2013-0748", "CVE-2013-0768", "CVE-2013-0755", "CVE-2013-0752", "CVE-2013-0754", "CVE-2013-0769", "CVE-2013-0771", "CVE-2013-0757", "CVE-2013-0749", "CVE-2013-0745", "CVE-2013-0756", "CVE-2013-0760", "CVE-2013-0762", "CVE-2013-0753", "CVE-2013-0750", "CVE-2013-0759", "CVE-2013-0770", "CVE-2013-0758", "CVE-2013-0764"], "modified": "2015-05-20T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:firefox3-pango", "p-cpe:/a:novell:suse_linux:mozilla-nspr", "p-cpe:/a:novell:suse_linux:MozillaFirefox-branding-SLED", "p-cpe:/a:novell:suse_linux:mozilla-nss-devel", "p-cpe:/a:novell:suse_linux:mozilla-nspr-devel", "p-cpe:/a:novell:suse_linux:firefox3-cairo", "p-cpe:/a:novell:suse_linux:MozillaFirefox", "p-cpe:/a:novell:suse_linux:firefox3-gtk2", "p-cpe:/a:novell:suse_linux:mozilla-nss-tools", "p-cpe:/a:novell:suse_linux:mozilla-nss", "p-cpe:/a:novell:suse_linux:MozillaFirefox-translations", "cpe:/o:novell:suse_linux:10"], "id": "SUSE_SU-2013-0306-1.NASL", "href": "https://www.tenable.com/plugins/nessus/83574", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2013:0306-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(83574);\n script_version(\"2.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2012-5829\", \"CVE-2013-0743\", \"CVE-2013-0744\", \"CVE-2013-0745\", \"CVE-2013-0746\", \"CVE-2013-0747\", \"CVE-2013-0748\", \"CVE-2013-0749\", \"CVE-2013-0750\", \"CVE-2013-0751\", \"CVE-2013-0752\", \"CVE-2013-0753\", \"CVE-2013-0754\", \"CVE-2013-0755\", \"CVE-2013-0756\", \"CVE-2013-0757\", \"CVE-2013-0758\", \"CVE-2013-0759\", \"CVE-2013-0760\", \"CVE-2013-0762\", \"CVE-2013-0763\", \"CVE-2013-0764\", \"CVE-2013-0766\", \"CVE-2013-0768\", \"CVE-2013-0769\", \"CVE-2013-0770\", \"CVE-2013-0771\");\n script_bugtraq_id(56607, 56636, 57185, 57193, 57194, 57197, 57198, 57199, 57203, 57204, 57205, 57207, 57209, 57211, 57213, 57215, 57217, 57218, 57228, 57232, 57234, 57235, 57236, 57238, 57240, 57241, 57244, 57258, 57260);\n\n script_name(english:\"SUSE SLES10 Security Update : Mozilla Firefox (SUSE-SU-2013:0306-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Mozilla Firefox is updated to the 10.0.12ESR version.\n\nThis is a roll-up update for LTSS.\n\nIt fixes a lot of security issues and bugs. 10.0.12ESR fixes\nspecifically :\n\nMFSA 2013-01: Mozilla developers identified and fixed several memory\nsafety bugs in the browser engine used in Firefox and other\nMozilla-based products. Some of these bugs showed evidence of memory\ncorruption under certain circumstances, and we presume that with\nenough effort at least some of these could be exploited to run\narbitrary code.\n\nChristoph Diehl, Christian Holler, Mats Palmgren, and Chiaki\nIshikawa reported memory safety problems and crashes that\naffect Firefox ESR 10, Firefox ESR 17, and Firefox 17.\n(CVE-2013-0769)\n\nBill Gianopoulos, Benoit Jacob, Christoph Diehl, Christian\nHoller, Gary Kwong, Robert O'Callahan, and Scoobidiver\nreported memory safety problems and crashes that affect\nFirefox ESR 17 and Firefox 17. (CVE-2013-0749)\n\nJesse Ruderman, Christian Holler, Julian Seward, and\nScoobidiver reported memory safety problems and crashes that\naffect Firefox 17. (CVE-2013-0770)\n\nMFSA 2013-02: Security researcher Abhishek Arya (Inferno) of\nthe Google Chrome Security Team discovered a series\ncritically rated of use-after-free, out of bounds read, and\nbuffer overflow issues using the Address Sanitizer tool in\nshipped software. These issues are potentially exploitable,\nallowing for remote code execution. We would also like to\nthank Abhishek for reporting three additional\nuser-after-free and out of bounds read flaws introduced\nduring Firefox development that were fixed before general\nrelease.\n\nThe following issue has been fixed in Firefox 18 :\n\n - Global-buffer-overflow in\n CharDistributionAnalysis::HandleOneChar (CVE-2013-0760)\n\n The following issues has been fixed in Firefox 18, ESR\n 17.0.1, and ESR 10.0.12 :\n\n - Heap-use-after-free in imgRequest::OnStopFrame\n (CVE-2013-0762)\n - Heap-use-after-free in ~nsHTMLEditRules (CVE-2013-0766)\n - Out of bounds read in\n nsSVGPathElement::GetPathLengthScale (CVE-2013-0763)\n - Heap-buffer-overflow in\n gfxTextRun::ShrinkToLigatureBoundaries (CVE-2013-0771)\n\n The following issue has been fixed in Firefox 18 and in\n the earlier ESR 10.0.11 release :\n\n - Heap-buffer-overflow in nsWindow::OnExposeEvent\n (CVE-2012-5829) MFSA 2013-03: Security researcher\n miaubiz used the Address Sanitizer tool to discover a\n buffer overflow in Canvas when specific bad height and\n width values were given through HTML. This could lead to\n a potentially exploitable crash. (CVE-2013-0768)\n\n Miaubiz also found a potentially exploitable crash when\n 2D and 3D content was mixed which was introduced during\n Firefox development and fixed before general release.\n\n MFSA 2013-04: Security researcher Masato Kinugawa found\n a flaw in which the displayed URL values within the\n addressbar can be spoofed by a page during loading. This\n allows for phishing attacks where a malicious page can\n spoof the identify of another site. (CVE-2013-0759)\n\n MFSA 2013-05: Using the Address Sanitizer tool, security\n researcher Atte Kettunen from OUSPG discovered that the\n combination of large numbers of columns and column\n groups in a table could cause the array containing the\n columns during rendering to overwrite itself. This can\n lead to a user-after-free causing a potentially\n exploitable crash. (CVE-2013-0744)\n\n MFSA 2013-06: Mozilla developer Wesley Johnston reported\n that when there are two or more iframes on the same HTML\n page, an iframe is able to see the touch events and\n their targets that occur within the other iframes on the\n page. If the iframes are from the same origin, they can\n also access the properties and methods of the targets of\n other iframes but same-origin policy (SOP) restricts\n access across domains. This allows for information\n leakage and possibilities for cross-site scripting (XSS)\n if another vulnerability can be used to get around SOP\n restrictions. (CVE-2013-0751)\n\n MFSA 2013-07: Mozilla community member Jerry Baker\n reported a crashing issue found through Thunderbird when\n downloading messages over a Secure Sockets Layer (SSL)\n connection. This was caused by a bug in the networking\n code assuming that secure connections were entirely\n handled on the socket transport thread when they can\n occur on a variety of threads. The resulting crash was\n potentially exploitable. (CVE-2013-0764)\n\n MFSA 2013-08: Mozilla developer Olli Pettay discovered\n that the AutoWrapperChanger class fails to keep some\n JavaScript objects alive during garbage collection. This\n can lead to an exploitable crash allowing for arbitrary\n code execution. (CVE-2013-0745)\n\n MFSA 2013-09: Mozilla developer Boris Zbarsky reported\n reported a problem where jsval-returning quickstubs fail\n to wrap their return values, causing a compartment\n mismatch. This mismatch can cause garbage collection to\n occur incorrectly and lead to a potentially exploitable\n crash. (CVE-2013-0746)\n\n MFSA 2013-10: Mozilla security researcher Jesse Ruderman\n reported that events in the plugin handler can be\n manipulated by web content to bypass same-origin policy\n (SOP) restrictions. This can allow for clickjacking on\n malicious web pages. (CVE-2013-0747)\n\n MFSA 2013-11: Mozilla security researcher Jesse Ruderman\n discovered that using the toString function of XBL\n objects can lead to inappropriate information leakage by\n revealing the address space layout instead of just the\n ID of the object. This layout information could\n potentially be used to bypass ASLR and other security\n protections. (CVE-2013-0748)\n\n MFSA 2013-12: Security researcher pa_kt reported a flaw\n via TippingPoint's Zero Day Initiative that an integer\n overflow is possible when calculating the length for a\n JavaScript string concatenation, which is then used for\n memory allocation. This results in a buffer overflow,\n leading to a potentially exploitable memory corruption.\n (CVE-2013-0750)\n\n MFSA 2013-13: Security researcher Sviatoslav Chagaev\n reported that when using an XBL file containing multiple\n XML bindings with SVG content, a memory corruption can\n occur. In concern with remote XUL, this can lead to an\n exploitable crash. (CVE-2013-0752)\n\n MFSA 2013-14: Security researcher Mariusz Mlynski\n reported that it is possible to change the prototype of\n an object and bypass Chrome Object Wrappers (COW) to\n gain access to chrome privileged functions. This could\n allow for arbitrary code execution. (CVE-2013-0757)\n\n MFSA 2013-15: Security researcher Mariusz Mlynski\n reported that it is possible to open a chrome privileged\n web page through plugin objects through interaction with\n SVG elements. This could allow for arbitrary code\n execution. (CVE-2013-0758)\n\n MFSA 2013-16: Security researcher regenrecht reported,\n via TippingPoint's Zero Day Initiative, a use-after-free\n in XMLSerializer by the exposing of serializeToStream to\n web content. This can lead to arbitrary code execution\n when exploited. (CVE-2013-0753)\n\n MFSA 2013-17: Security researcher regenrecht reported,\n via TippingPoint's Zero Day Initiative, a use-after-free\n within the ListenerManager when garbage collection is\n forced after data in listener objects have been\n allocated in some circumstances. This results in a\n use-after-free which can lead to arbitrary code\n execution. (CVE-2013-0754)\n\n MFSA 2013-18: Security researcher regenrecht reported,\n via TippingPoint's Zero Day Initiative, a use-after-free\n using the domDoc pointer within Vibrate library. This\n can lead to arbitrary code execution when exploited.\n (CVE-2013-0755)\n\n MFSA 2013-19: Security researcher regenrecht reported,\n via TippingPoint's Zero Day Initiative, a garbage\n collection flaw in JavaScript Proxy objects. This can\n lead to a use-after-free leading to arbitrary code\n execution. (CVE-2013-0756)\n\n MFSA 2013-20: Google reported to Mozilla that TURKTRUST,\n a certificate authority in Mozilla's root program, had\n mis-issued two intermediate certificates to customers.\n The issue was not specific to Firefox but there was\n evidence that one of the certificates was used for\n man-in-the-middle (MITM) traffic management of domain\n names that the customer did not legitimately own or\n control. This issue was resolved by revoking the trust\n for these specific mis-issued certificates.\n (CVE-2013-0743)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n # http://download.suse.com/patch/finder/?keywords=8d645904d43fff2d5195e42ae81f6d59\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?5e596b06\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/666101\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/681836\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/684069\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/712248\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/769762\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/796895\"\n );\n # https://www.suse.com/support/update/announcement/2013/suse-su-20130306-1.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?5acd6ef0\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected Mozilla Firefox packages\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Firefox 17.0.1 Flash Privileged Code Injection');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:MozillaFirefox\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:MozillaFirefox-branding-SLED\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:MozillaFirefox-translations\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:firefox3-cairo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:firefox3-gtk2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:firefox3-pango\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:mozilla-nspr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:mozilla-nspr-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:mozilla-nss\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:mozilla-nss-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:mozilla-nss-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:10\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/02/18\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/05/20\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = eregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^(SLES10)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLES10\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES10\" && (! ereg(pattern:\"^3$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES10 SP3\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES10\", sp:\"3\", cpu:\"x86_64\", reference:\"firefox3-cairo-32bit-1.2.4-0.8.5\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:\"3\", cpu:\"x86_64\", reference:\"firefox3-gtk2-32bit-2.10.6-0.12.21\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:\"3\", cpu:\"x86_64\", reference:\"firefox3-pango-32bit-1.14.5-0.12.178\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:\"3\", cpu:\"x86_64\", reference:\"mozilla-nspr-32bit-4.9.4-0.6.1\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:\"3\", cpu:\"x86_64\", reference:\"mozilla-nss-32bit-3.14.1-0.6.1\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:\"3\", cpu:\"s390x\", reference:\"firefox3-cairo-32bit-1.2.4-0.8.5\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:\"3\", cpu:\"s390x\", reference:\"firefox3-gtk2-32bit-2.10.6-0.12.21\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:\"3\", cpu:\"s390x\", reference:\"firefox3-pango-32bit-1.14.5-0.12.178\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:\"3\", cpu:\"s390x\", reference:\"mozilla-nspr-32bit-4.9.4-0.6.1\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:\"3\", cpu:\"s390x\", reference:\"mozilla-nss-32bit-3.14.1-0.6.1\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:\"3\", reference:\"firefox3-cairo-1.2.4-0.8.5\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:\"3\", reference:\"firefox3-gtk2-2.10.6-0.12.21\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:\"3\", reference:\"firefox3-pango-1.14.5-0.12.178\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:\"3\", reference:\"mozilla-nspr-4.9.4-0.6.1\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:\"3\", reference:\"mozilla-nspr-devel-4.9.4-0.6.1\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:\"3\", reference:\"mozilla-nss-3.14.1-0.6.1\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:\"3\", reference:\"mozilla-nss-devel-3.14.1-0.6.1\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:\"3\", reference:\"mozilla-nss-tools-3.14.1-0.6.1\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:\"3\", reference:\"MozillaFirefox-10.0.12-0.6.3\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:\"3\", reference:\"MozillaFirefox-branding-SLED-7-0.8.46\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:\"3\", reference:\"MozillaFirefox-translations-10.0.12-0.6.3\")) flag++;\n\n\nif (flag)\n{\n set_kb_item(name:'www/0/XSS', value:TRUE);\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"Mozilla Firefox\");\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-01T03:28:01", "description": "The installed version of Firefox is earlier than 18.0 and thus, is\npotentially affected by the following security issues :\n\n - Multiple unspecified use-after-free, out-of-bounds read\n and buffer overflow errors exist. (CVE-2012-5829,\n CVE-2013-0760, CVE-2013-0761, CVE-2013-0762,\n CVE-2013-0763, CVE-2013-0766, CVE-2013-0767,\n CVE-2013-0771)\n\n - Two intermediate certificates were improperly issued by\n TURKTRUST certificate authority. (CVE-2013-0743)\n\n - A use-after-free error exists related to displaying\n HTML tables with many columns and column groups.\n (CVE-2013-0744)\n\n - An error exists related to the 'AutoWrapperChanger'\n class that does not properly manage objects during\n garbage collection. (CVE-2012-0745)\n\n - An error exists related to 'jsval', 'quickstubs', and\n compartmental mismatches that can lead to potentially\n exploitable crashes. (CVE-2013-0746)\n\n - Errors exist related to events in the plugin handler\n that can allow same-origin policy bypass.\n (CVE-2013-0747)\n\n - An error related to the 'toString' method of XBL\n objects can lead to address information leakage.\n (CVE-2013-0748)\n\n - An unspecified memory corruption issue exists.\n (CVE-2013-0749, CVE-2013-0769, CVE-2013-0770)\n\n - A buffer overflow exists related to JavaScript string\n concatenation. (CVE-2013-0750)\n\n - An error exists related to multiple XML bindings with\n SVG content, contained in XBL files. (CVE-2013-0752)\n\n - A use-after-free error exists related to\n 'XMLSerializer' and 'serializeToStream'.\n (CVE-2013-0753)\n\n - A use-after-free error exists related to garbage\n collection and 'ListenManager'. (CVE-2013-0754)\n\n - A use-after-free error exists related to the 'Vibrate'\n library and 'domDoc'. (CVE-2013-0755)\n\n - A use-after-free error exists related to JavaScript\n 'Proxy' objects. (CVE-2013-0756)\n \n - 'Chrome Object Wrappers' (COW) can be bypassed by\n changing object prototypes and can allow arbitrary\n code execution. (CVE-2013-0757)\n\n - An error related to SVG elements and plugins can allow\n privilege escalation. (CVE-2013-0758)\n\n - An error exists related to the address bar that can\n allow URL spoofing attacks. (CVE-2013-0759)\n\n - An error exists related to SSL and threading that\n can result in potentially exploitable crashes.\n (CVE-2013-0764)\n\n - An error exists related to 'Canvas' and bad height or\n width values passed to it from HTML. (CVE-2013-0768)", "edition": 26, "published": "2013-01-15T00:00:00", "title": "Firefox < 18.0 Multiple Vulnerabilities (Mac OS X)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-0743", "CVE-2013-0763", "CVE-2013-0746", "CVE-2012-5829", "CVE-2013-0766", "CVE-2013-0747", "CVE-2013-0744", "CVE-2013-0748", "CVE-2013-0768", "CVE-2013-0755", "CVE-2013-0752", "CVE-2013-0754", "CVE-2012-0745", "CVE-2013-0769", "CVE-2013-0771", "CVE-2013-0757", "CVE-2013-0749", "CVE-2013-0761", "CVE-2013-0745", "CVE-2013-0756", "CVE-2013-0760", "CVE-2013-0767", "CVE-2013-0762", "CVE-2013-0753", "CVE-2013-0750", "CVE-2013-0759", "CVE-2013-0770", "CVE-2013-0758", "CVE-2013-0764"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/a:mozilla:firefox"], "id": "MACOSX_FIREFOX_18_0.NASL", "href": "https://www.tenable.com/plugins/nessus/63545", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(63545);\n script_version(\"1.23\");\n script_cvs_date(\"Date: 2019/12/04\");\n\n script_cve_id(\n \"CVE-2012-5829\",\n \"CVE-2013-0744\",\n \"CVE-2013-0745\",\n \"CVE-2013-0746\",\n \"CVE-2013-0747\",\n \"CVE-2013-0748\",\n \"CVE-2013-0749\",\n \"CVE-2013-0750\",\n \"CVE-2013-0752\",\n \"CVE-2013-0753\",\n \"CVE-2013-0754\",\n \"CVE-2013-0755\",\n \"CVE-2013-0756\",\n \"CVE-2013-0757\",\n \"CVE-2013-0758\",\n \"CVE-2013-0759\",\n \"CVE-2013-0760\",\n \"CVE-2013-0761\",\n \"CVE-2013-0762\",\n \"CVE-2013-0763\",\n \"CVE-2013-0764\",\n \"CVE-2013-0766\",\n \"CVE-2013-0767\",\n \"CVE-2013-0768\",\n \"CVE-2013-0769\",\n \"CVE-2013-0770\",\n \"CVE-2013-0771\"\n );\n script_bugtraq_id(\n 56636,\n 57193,\n 57194,\n 57195,\n 57196,\n 57197,\n 57198,\n 57199,\n 57203,\n 57204,\n 57205,\n 57207,\n 57209,\n 57211,\n 57213,\n 57215,\n 57217,\n 57218,\n 57228,\n 57232,\n 57234,\n 57235,\n 57236,\n 57238,\n 57240,\n 57241,\n 57244,\n 57258\n );\n\n script_name(english:\"Firefox < 18.0 Multiple Vulnerabilities (Mac OS X)\");\n script_summary(english:\"Checks version of Firefox\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Mac OS X host contains a web browser that is affected by\nmultiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The installed version of Firefox is earlier than 18.0 and thus, is\npotentially affected by the following security issues :\n\n - Multiple unspecified use-after-free, out-of-bounds read\n and buffer overflow errors exist. (CVE-2012-5829,\n CVE-2013-0760, CVE-2013-0761, CVE-2013-0762,\n CVE-2013-0763, CVE-2013-0766, CVE-2013-0767,\n CVE-2013-0771)\n\n - Two intermediate certificates were improperly issued by\n TURKTRUST certificate authority. (CVE-2013-0743)\n\n - A use-after-free error exists related to displaying\n HTML tables with many columns and column groups.\n (CVE-2013-0744)\n\n - An error exists related to the 'AutoWrapperChanger'\n class that does not properly manage objects during\n garbage collection. (CVE-2012-0745)\n\n - An error exists related to 'jsval', 'quickstubs', and\n compartmental mismatches that can lead to potentially\n exploitable crashes. (CVE-2013-0746)\n\n - Errors exist related to events in the plugin handler\n that can allow same-origin policy bypass.\n (CVE-2013-0747)\n\n - An error related to the 'toString' method of XBL\n objects can lead to address information leakage.\n (CVE-2013-0748)\n\n - An unspecified memory corruption issue exists.\n (CVE-2013-0749, CVE-2013-0769, CVE-2013-0770)\n\n - A buffer overflow exists related to JavaScript string\n concatenation. (CVE-2013-0750)\n\n - An error exists related to multiple XML bindings with\n SVG content, contained in XBL files. (CVE-2013-0752)\n\n - A use-after-free error exists related to\n 'XMLSerializer' and 'serializeToStream'.\n (CVE-2013-0753)\n\n - A use-after-free error exists related to garbage\n collection and 'ListenManager'. (CVE-2013-0754)\n\n - A use-after-free error exists related to the 'Vibrate'\n library and 'domDoc'. (CVE-2013-0755)\n\n - A use-after-free error exists related to JavaScript\n 'Proxy' objects. (CVE-2013-0756)\n \n - 'Chrome Object Wrappers' (COW) can be bypassed by\n changing object prototypes and can allow arbitrary\n code execution. (CVE-2013-0757)\n\n - An error related to SVG elements and plugins can allow\n privilege escalation. (CVE-2013-0758)\n\n - An error exists related to the address bar that can\n allow URL spoofing attacks. (CVE-2013-0759)\n\n - An error exists related to SSL and threading that\n can result in potentially exploitable crashes.\n (CVE-2013-0764)\n\n - An error exists related to 'Canvas' and bad height or\n width values passed to it from HTML. (CVE-2013-0768)\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.zerodayinitiative.com/advisories/ZDI-13-003/\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.zerodayinitiative.com/advisories/ZDI-13-006/\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.zerodayinitiative.com/advisories/ZDI-13-037/\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.zerodayinitiative.com/advisories/ZDI-13-038/\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.zerodayinitiative.com/advisories/ZDI-13-039/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-01/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-02/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-03/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-04/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-05/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-07/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-08/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-09/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-10/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-11/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-12/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-13/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-14/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-15/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-16/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-17/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-18/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-19/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-20/\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Firefox 18.0 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2013-0770\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Firefox 17.0.1 Flash Privileged Code Injection');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2013/01/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/01/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/01/15\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:mozilla:firefox\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"MacOS X Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"macosx_firefox_installed.nasl\");\n script_require_keys(\"MacOSX/Firefox/Installed\");\n\n exit(0);\n}\n\ninclude(\"mozilla_version.inc\");\nkb_base = \"MacOSX/Firefox\";\nget_kb_item_or_exit(kb_base+\"/Installed\");\n\nversion = get_kb_item_or_exit(kb_base+\"/Version\", exit_code:1);\npath = get_kb_item_or_exit(kb_base+\"/Path\", exit_code:1);\n\nif (get_kb_item(kb_base + '/is_esr')) exit(0, 'The Mozilla Firefox installation is in the ESR branch.');\n\nmozilla_check_version(product:'firefox', version:version, path:path, esr:FALSE, fix:'18.0', skippat:'^10\\\\.0\\\\.', severity:SECURITY_HOLE, xss:TRUE);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-01T05:32:14", "description": "The installed version of SeaMonkey is earlier than 2.15 and thus,\nis potentially affected by the following security issues :\n\n - Multiple, unspecified use-after-free, out-of-bounds read\n and buffer overflow errors exist. (CVE-2012-5829,\n CVE-2013-0760, CVE-2013-0761, CVE-2013-0762,\n CVE-2013-0763, CVE-2013-0766, CVE-2013-0767,\n CVE-2013-0771)\n\n - Two intermediate certificates were improperly issued by\n TURKTRUST certificate authority. (CVE-2013-0743)\n\n - A use-after-free error exists related to displaying\n HTML tables with many columns and column groups.\n (CVE-2013-0744)\n\n - An error exists related to the 'AutoWrapperChanger'\n class that does not properly manage objects during\n garbage collection. (CVE-2012-0745)\n\n - An error exists related to 'jsval', 'quickstubs', and\n compartmental mismatches that can lead potentially\n exploitable crashes. (CVE-2013-0746)\n\n - Errors exist related to events in the plugin handler\n that can allow same-origin policy bypass.\n (CVE-2013-0747)\n\n - An error related to the 'toString' method of XBL\n objects can lead to address information leakage.\n (CVE-2013-0748)\n\n - An unspecified memory corruption issue exists.\n (CVE-2013-0749, CVE-2013-0769, CVE-2013-0770)\n\n - A buffer overflow exists related to JavaScript string\n concatenation. (CVE-2013-0750)\n\n - An error exists related to multiple XML bindings with\n SVG content, contained in XBL files. (CVE-2013-0752)\n\n - A use-after-free error exists related to\n 'XMLSerializer' and 'serializeToStream'.\n (CVE-2013-0753)\n\n - A use-after-free error exists related to garbage\n collection and 'ListenManager'. (CVE-2013-0754)\n\n - A use-after-free error exists related to the 'Vibrate'\n library and 'domDoc'. (CVE-2013-0755)\n\n - A use-after-free error exists related to JavaScript\n 'Proxy' objects. (CVE-2013-0756)\n \n - 'Chrome Object Wrappers' (COW) can be bypassed by\n changing object prototypes and can allow arbitrary\n code execution. (CVE-2013-0757)\n\n - An error related to SVG elements and plugins can allow\n privilege escalation. (CVE-2013-0758)\n\n - An error exists related to the address bar that can\n allow URL spoofing attacks. (CVE-2013-0759)\n\n - An error exists related to SSL and threading that\n can result in potentially exploitable crashes.\n (CVE-2013-0764)\n\n - An error exists related to 'Canvas' and bad height or\n width values passed to it from HTML. (CVE-2013-0768)", "edition": 26, "published": "2013-01-15T00:00:00", "title": "SeaMonkey < 2.15 Multiple Vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-0743", "CVE-2013-0763", "CVE-2013-0746", "CVE-2012-5829", "CVE-2013-0766", "CVE-2013-0747", "CVE-2013-0744", "CVE-2013-0748", "CVE-2013-0768", "CVE-2013-0755", "CVE-2013-0752", "CVE-2013-0754", "CVE-2012-0745", "CVE-2013-0769", "CVE-2013-0771", "CVE-2013-0757", "CVE-2013-0749", "CVE-2013-0761", "CVE-2013-0745", "CVE-2013-0756", "CVE-2013-0760", "CVE-2013-0767", "CVE-2013-0762", "CVE-2013-0753", "CVE-2013-0750", "CVE-2013-0759", "CVE-2013-0770", "CVE-2013-0758", "CVE-2013-0764"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/a:mozilla:seamonkey"], "id": "SEAMONKEY_215.NASL", "href": "https://www.tenable.com/plugins/nessus/63554", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(63554);\n script_version(\"1.20\");\n script_cvs_date(\"Date: 2019/12/04\");\n\n script_cve_id(\n \"CVE-2013-0744\",\n \"CVE-2013-0745\",\n \"CVE-2013-0746\",\n \"CVE-2013-0747\",\n \"CVE-2013-0748\",\n \"CVE-2013-0749\",\n \"CVE-2013-0750\",\n \"CVE-2013-0752\",\n \"CVE-2013-0753\",\n \"CVE-2013-0754\",\n \"CVE-2013-0755\",\n \"CVE-2013-0756\",\n \"CVE-2013-0757\",\n \"CVE-2013-0758\",\n \"CVE-2013-0759\",\n \"CVE-2013-0760\",\n \"CVE-2013-0761\",\n \"CVE-2013-0763\",\n \"CVE-2013-0764\",\n \"CVE-2013-0766\",\n \"CVE-2013-0767\",\n \"CVE-2013-0768\",\n \"CVE-2013-0769\",\n \"CVE-2013-0770\",\n \"CVE-2013-0771\"\n );\n script_bugtraq_id(\n 57193,\n 57194,\n 57195,\n 57196,\n 57197,\n 57198,\n 57199,\n 57203,\n 57204,\n 57205,\n 57207,\n 57209,\n 57211,\n 57213,\n 57215,\n 57217,\n 57218,\n 57228,\n 57232,\n 57234,\n 57235,\n 57236,\n 57238,\n 57240,\n 57241,\n 57244,\n 57258\n );\n\n script_name(english:\"SeaMonkey < 2.15 Multiple Vulnerabilities\");\n script_summary(english:\"Checks version of SeaMonkey\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host contains a web browser that is affected by\nmultiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The installed version of SeaMonkey is earlier than 2.15 and thus,\nis potentially affected by the following security issues :\n\n - Multiple, unspecified use-after-free, out-of-bounds read\n and buffer overflow errors exist. (CVE-2012-5829,\n CVE-2013-0760, CVE-2013-0761, CVE-2013-0762,\n CVE-2013-0763, CVE-2013-0766, CVE-2013-0767,\n CVE-2013-0771)\n\n - Two intermediate certificates were improperly issued by\n TURKTRUST certificate authority. (CVE-2013-0743)\n\n - A use-after-free error exists related to displaying\n HTML tables with many columns and column groups.\n (CVE-2013-0744)\n\n - An error exists related to the 'AutoWrapperChanger'\n class that does not properly manage objects during\n garbage collection. (CVE-2012-0745)\n\n - An error exists related to 'jsval', 'quickstubs', and\n compartmental mismatches that can lead potentially\n exploitable crashes. (CVE-2013-0746)\n\n - Errors exist related to events in the plugin handler\n that can allow same-origin policy bypass.\n (CVE-2013-0747)\n\n - An error related to the 'toString' method of XBL\n objects can lead to address information leakage.\n (CVE-2013-0748)\n\n - An unspecified memory corruption issue exists.\n (CVE-2013-0749, CVE-2013-0769, CVE-2013-0770)\n\n - A buffer overflow exists related to JavaScript string\n concatenation. (CVE-2013-0750)\n\n - An error exists related to multiple XML bindings with\n SVG content, contained in XBL files. (CVE-2013-0752)\n\n - A use-after-free error exists related to\n 'XMLSerializer' and 'serializeToStream'.\n (CVE-2013-0753)\n\n - A use-after-free error exists related to garbage\n collection and 'ListenManager'. (CVE-2013-0754)\n\n - A use-after-free error exists related to the 'Vibrate'\n library and 'domDoc'. (CVE-2013-0755)\n\n - A use-after-free error exists related to JavaScript\n 'Proxy' objects. (CVE-2013-0756)\n \n - 'Chrome Object Wrappers' (COW) can be bypassed by\n changing object prototypes and can allow arbitrary\n code execution. (CVE-2013-0757)\n\n - An error related to SVG elements and plugins can allow\n privilege escalation. (CVE-2013-0758)\n\n - An error exists related to the address bar that can\n allow URL spoofing attacks. (CVE-2013-0759)\n\n - An error exists related to SSL and threading that\n can result in potentially exploitable crashes.\n (CVE-2013-0764)\n\n - An error exists related to 'Canvas' and bad height or\n width values passed to it from HTML. (CVE-2013-0768)\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.zerodayinitiative.com/advisories/ZDI-13-003/\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.zerodayinitiative.com/advisories/ZDI-13-006/\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.zerodayinitiative.com/advisories/ZDI-13-037/\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.zerodayinitiative.com/advisories/ZDI-13-038/\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.zerodayinitiative.com/advisories/ZDI-13-039/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-01/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-02/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-03/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-04/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-05/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-07/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-08/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-09/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-10/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-11/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-12/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-13/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-14/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-15/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-16/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-17/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-18/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-19/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-20/\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to SeaMonkey 2.15 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2013-0770\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Firefox 17.0.1 Flash Privileged Code Injection');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2013/01/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/01/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/01/15\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:mozilla:seamonkey\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"mozilla_org_installed.nasl\");\n script_require_keys(\"SeaMonkey/Version\");\n\n exit(0);\n}\n\ninclude(\"mozilla_version.inc\");\nport = get_kb_item(\"SMB/transport\");\nif (!port) port = 445;\n\ninstalls = get_kb_list(\"SMB/SeaMonkey/*\");\nif (isnull(installs)) audit(AUDIT_NOT_INST, \"SeaMonkey\");\n\nmozilla_check_version(installs:installs, product:'seamonkey', fix:'2.15', severity:SECURITY_HOLE, xss:TRUE);", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-01T06:38:54", "description": "USN-1681-1 fixed vulnerabilities in Firefox. This update provides the\ncorresponding updates for Thunderbird.\n\nChristoph Diehl, Christian Holler, Mats Palmgren, Chiaki Ishikawa,\nBill Gianopoulos, Benoit Jacob, Gary Kwong, Robert O'Callahan, Jesse\nRuderman, and Julian Seward discovered multiple memory safety issues\naffecting Firefox. If the user were tricked into opening a specially\ncrafted page, an attacker could possibly exploit these to cause a\ndenial of service via application crash, or potentially execute code\nwith the privileges of the user invoking Firefox. (CVE-2013-0769,\nCVE-2013-0749, CVE-2013-0770)\n\nAbhishek Arya discovered several user-after-free and buffer\noverflows in Firefox. An attacker could exploit these to\ncause a denial of service via application crash, or\npotentially execute code with the privileges of the user\ninvoking Firefox. (CVE-2013-0760, CVE-2013-0761,\nCVE-2013-0762, CVE-2013-0763, CVE-2013-0766, CVE-2013-0767,\nCVE-2013-0771, CVE-2012-5829)\n\nA stack buffer was discovered in Firefox. If the user were\ntricked into opening a specially crafted page, an attacker\ncould possibly exploit this to cause a denial of service via\napplication crash, or potentially execute code with the\nprivileges of the user invoking Firefox. (CVE-2013-0768)\n\nMasato Kinugawa discovered that Firefox did not always\nproperly display URL values in the address bar. A remote\nattacker could exploit this to conduct URL spoofing and\nphishing attacks. (CVE-2013-0759)\n\nAtte Kettunen discovered that Firefox did not properly\nhandle HTML tables with a large number of columns and column\ngroups. If the user were tricked into opening a specially\ncrafted page, an attacker could exploit this to cause a\ndenial of service via application crash, or potentially\nexecute code with the privileges of the user invoking\nFirefox. (CVE-2013-0744)\n\nJerry Baker discovered that Firefox did not always properly\nhandle threading when performing downloads over SSL\nconnections. An attacker could exploit this to cause a\ndenial of service via application crash. (CVE-2013-0764)\n\nOlli Pettay and Boris Zbarsky discovered flaws in the\nJavacript engine of Firefox. An attacker could cause a\ndenial of service via application crash, or potentially\nexecute code with the privileges of the user invoking\nFirefox. (CVE-2013-0745, CVE-2013-0746)\n\nJesse Ruderman discovered a flaw in the way Firefox handled\nplugins. If a user were tricked into opening a specially\ncrafted page, a remote attacker could exploit this to bypass\nsecurity protections to conduct clickjacking attacks.\n(CVE-2013-0747)\n\nJesse Ruderman discovered an information leak in Firefox. An\nattacker could exploit this to reveal memory address layout\nwhich could help in bypassing ASLR protections.\n(CVE-2013-0748)\n\nAn integer overflow was discovered in the JavaScript engine,\nleading to a heap-based buffer overflow. If the user were\ntricked into opening a specially crafted page, an attacker\ncould possibly exploit this to execute code with the\nprivileges of the user invoking Firefox. (CVE-2013-0750)\n\nSviatoslav Chagaev discovered that Firefox did not properly\nhandle XBL files with multiple XML bindings with SVG\ncontent. An attacker could cause a denial of service via\napplication crash, or potentially execute code with the\nprivileges of the user invoking Firefox. (CVE-2013-0752)\n\nMariusz Mlynski discovered two flaws to gain access to\nprivileged chrome functions. An attacker could possibly\nexploit this to execute code with the privileges of the user\ninvoking Firefox. (CVE-2013-0757, CVE-2013-0758)\n\nSeveral use-after-free issues were discovered in Firefox. If\nthe user were tricked into opening a specially crafted page,\nan attacker could possibly exploit this to execute code with\nthe privileges of the user invoking Firefox. (CVE-2013-0753,\nCVE-2013-0754, CVE-2013-0755, CVE-2013-0756)\n\nTwo intermediate CA certificates were mis-issued by the\nTURKTRUST certificate authority. If a remote attacker were\nable to perform a man-in-the-middle attack, this flaw could\nbe exploited to view sensitive information. (CVE-2013-0743).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 25, "published": "2013-01-09T00:00:00", "title": "Ubuntu 10.04 LTS / 11.10 / 12.04 LTS / 12.10 : thunderbird vulnerabilities (USN-1681-2)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-0743", "CVE-2013-0763", "CVE-2013-0746", "CVE-2012-5829", "CVE-2013-0766", "CVE-2013-0747", "CVE-2013-0744", "CVE-2013-0748", "CVE-2013-0768", "CVE-2013-0755", "CVE-2013-0752", "CVE-2013-0754", "CVE-2013-0769", "CVE-2013-0771", "CVE-2013-0757", "CVE-2013-0749", "CVE-2013-0761", "CVE-2013-0745", "CVE-2013-0756", "CVE-2013-0760", "CVE-2013-0767", "CVE-2013-0762", "CVE-2013-0753", "CVE-2013-0750", "CVE-2013-0759", "CVE-2013-0770", "CVE-2013-0758", "CVE-2013-0764"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/o:canonical:ubuntu_linux:11.10", "cpe:/o:canonical:ubuntu_linux:10.04:-:lts", "cpe:/o:canonical:ubuntu_linux:12.10", "p-cpe:/a:canonical:ubuntu_linux:thunderbird", "cpe:/o:canonical:ubuntu_linux:12.04:-:lts"], "id": "UBUNTU_USN-1681-2.NASL", "href": "https://www.tenable.com/plugins/nessus/63448", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-1681-2. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(63448);\n script_version(\"1.20\");\n script_cvs_date(\"Date: 2019/09/19 12:54:28\");\n\n script_cve_id(\"CVE-2012-5829\", \"CVE-2013-0744\", \"CVE-2013-0745\", \"CVE-2013-0746\", \"CVE-2013-0747\", \"CVE-2013-0748\", \"CVE-2013-0749\", \"CVE-2013-0750\", \"CVE-2013-0752\", \"CVE-2013-0753\", \"CVE-2013-0754\", \"CVE-2013-0755\", \"CVE-2013-0756\", \"CVE-2013-0757\", \"CVE-2013-0758\", \"CVE-2013-0759\", \"CVE-2013-0760\", \"CVE-2013-0761\", \"CVE-2013-0762\", \"CVE-2013-0763\", \"CVE-2013-0764\", \"CVE-2013-0766\", \"CVE-2013-0767\", \"CVE-2013-0768\", \"CVE-2013-0769\", \"CVE-2013-0770\", \"CVE-2013-0771\");\n script_xref(name:\"USN\", value:\"1681-2\");\n\n script_name(english:\"Ubuntu 10.04 LTS / 11.10 / 12.04 LTS / 12.10 : thunderbird vulnerabilities (USN-1681-2)\");\n script_summary(english:\"Checks dpkg output for updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Ubuntu host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"USN-1681-1 fixed vulnerabilities in Firefox. This update provides the\ncorresponding updates for Thunderbird.\n\nChristoph Diehl, Christian Holler, Mats Palmgren, Chiaki Ishikawa,\nBill Gianopoulos, Benoit Jacob, Gary Kwong, Robert O'Callahan, Jesse\nRuderman, and Julian Seward discovered multiple memory safety issues\naffecting Firefox. If the user were tricked into opening a specially\ncrafted page, an attacker could possibly exploit these to cause a\ndenial of service via application crash, or potentially execute code\nwith the privileges of the user invoking Firefox. (CVE-2013-0769,\nCVE-2013-0749, CVE-2013-0770)\n\nAbhishek Arya discovered several user-after-free and buffer\noverflows in Firefox. An attacker could exploit these to\ncause a denial of service via application crash, or\npotentially execute code with the privileges of the user\ninvoking Firefox. (CVE-2013-0760, CVE-2013-0761,\nCVE-2013-0762, CVE-2013-0763, CVE-2013-0766, CVE-2013-0767,\nCVE-2013-0771, CVE-2012-5829)\n\nA stack buffer was discovered in Firefox. If the user were\ntricked into opening a specially crafted page, an attacker\ncould possibly exploit this to cause a denial of service via\napplication crash, or potentially execute code with the\nprivileges of the user invoking Firefox. (CVE-2013-0768)\n\nMasato Kinugawa discovered that Firefox did not always\nproperly display URL values in the address bar. A remote\nattacker could exploit this to conduct URL spoofing and\nphishing attacks. (CVE-2013-0759)\n\nAtte Kettunen discovered that Firefox did not properly\nhandle HTML tables with a large number of columns and column\ngroups. If the user were tricked into opening a specially\ncrafted page, an attacker could exploit this to cause a\ndenial of service via application crash, or potentially\nexecute code with the privileges of the user invoking\nFirefox. (CVE-2013-0744)\n\nJerry Baker discovered that Firefox did not always properly\nhandle threading when performing downloads over SSL\nconnections. An attacker could exploit this to cause a\ndenial of service via application crash. (CVE-2013-0764)\n\nOlli Pettay and Boris Zbarsky discovered flaws in the\nJavacript engine of Firefox. An attacker could cause a\ndenial of service via application crash, or potentially\nexecute code with the privileges of the user invoking\nFirefox. (CVE-2013-0745, CVE-2013-0746)\n\nJesse Ruderman discovered a flaw in the way Firefox handled\nplugins. If a user were tricked into opening a specially\ncrafted page, a remote attacker could exploit this to bypass\nsecurity protections to conduct clickjacking attacks.\n(CVE-2013-0747)\n\nJesse Ruderman discovered an information leak in Firefox. An\nattacker could exploit this to reveal memory address layout\nwhich could help in bypassing ASLR protections.\n(CVE-2013-0748)\n\nAn integer overflow was discovered in the JavaScript engine,\nleading to a heap-based buffer overflow. If the user were\ntricked into opening a specially crafted page, an attacker\ncould possibly exploit this to execute code with the\nprivileges of the user invoking Firefox. (CVE-2013-0750)\n\nSviatoslav Chagaev discovered that Firefox did not properly\nhandle XBL files with multiple XML bindings with SVG\ncontent. An attacker could cause a denial of service via\napplication crash, or potentially execute code with the\nprivileges of the user invoking Firefox. (CVE-2013-0752)\n\nMariusz Mlynski discovered two flaws to gain access to\nprivileged chrome functions. An attacker could possibly\nexploit this to execute code with the privileges of the user\ninvoking Firefox. (CVE-2013-0757, CVE-2013-0758)\n\nSeveral use-after-free issues were discovered in Firefox. If\nthe user were tricked into opening a specially crafted page,\nan attacker could possibly exploit this to execute code with\nthe privileges of the user invoking Firefox. (CVE-2013-0753,\nCVE-2013-0754, CVE-2013-0755, CVE-2013-0756)\n\nTwo intermediate CA certificates were mis-issued by the\nTURKTRUST certificate authority. If a remote attacker were\nable to perform a man-in-the-middle attack, this flaw could\nbe exploited to view sensitive information. (CVE-2013-0743).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/1681-2/\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected thunderbird package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Firefox 17.0.1 Flash Privileged Code Injection');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:thunderbird\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:10.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:11.10\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:12.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:12.10\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2012/11/21\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/01/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/01/09\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2013-2019 Canonical, Inc. / NASL script (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(10\\.04|11\\.10|12\\.04|12\\.10)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 10.04 / 11.10 / 12.04 / 12.10\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"10.04\", pkgname:\"thunderbird\", pkgver:\"17.0.2+build1-0ubuntu0.10.04.1\")) flag++;\nif (ubuntu_check(osver:\"11.10\", pkgname:\"thunderbird\", pkgver:\"17.0.2+build1-0ubuntu0.11.10.1\")) flag++;\nif (ubuntu_check(osver:\"12.04\", pkgname:\"thunderbird\", pkgver:\"17.0.2+build1-0ubuntu0.12.04.1\")) flag++;\nif (ubuntu_check(osver:\"12.10\", pkgname:\"thunderbird\", pkgver:\"17.0.2+build1-0ubuntu0.12.10.1\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"thunderbird\");\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-01T06:38:54", "description": "USN-1681-1 fixed vulnerabilities in Firefox. Due to an upstream\nregression, some translations became unusable after upgrading. This\nupdate fixes the problem.\n\nWe apologize for the inconvenience.\n\nChristoph Diehl, Christian Holler, Mats Palmgren, Chiaki Ishikawa,\nBill Gianopoulos, Benoit Jacob, Gary Kwong, Robert O'Callahan, Jesse\nRuderman, and Julian Seward discovered multiple memory safety issues\naffecting Firefox. If the user were tricked into opening a specially\ncrafted page, an attacker could possibly exploit these to cause a\ndenial of service via application crash, or potentially execute code\nwith the privileges of the user invoking Firefox. (CVE-2013-0769,\nCVE-2013-0749, CVE-2013-0770)\n\nAbhishek Arya discovered several user-after-free and buffer\noverflows in Firefox. An attacker could exploit these to\ncause a denial of service via application crash, or\npotentially execute code with the privileges of the user\ninvoking Firefox. (CVE-2013-0760, CVE-2013-0761,\nCVE-2013-0762, CVE-2013-0763, CVE-2013-0766, CVE-2013-0767,\nCVE-2013-0771, CVE-2012-5829)\n\nA stack buffer was discovered in Firefox. If the user were\ntricked into opening a specially crafted page, an attacker\ncould possibly exploit this to cause a denial of service via\napplication crash, or potentially execute code with the\nprivileges of the user invoking Firefox. (CVE-2013-0768)\n\nMasato Kinugawa discovered that Firefox did not always\nproperly display URL values in the address bar. A remote\nattacker could exploit this to conduct URL spoofing and\nphishing attacks. (CVE-2013-0759)\n\nAtte Kettunen discovered that Firefox did not properly\nhandle HTML tables with a large number of columns and column\ngroups. If the user were tricked into opening a specially\ncrafted page, an attacker could exploit this to cause a\ndenial of service via application crash, or potentially\nexecute code with the privileges of the user invoking\nFirefox. (CVE-2013-0744)\n\nJerry Baker discovered that Firefox did not always properly\nhandle threading when performing downloads over SSL\nconnections. An attacker could exploit this to cause a\ndenial of service via application crash. (CVE-2013-0764)\n\nOlli Pettay and Boris Zbarsky discovered flaws in the\nJavacript engine of Firefox. An attacker could cause a\ndenial of service via application crash, or potentially\nexecute code with the privileges of the user invoking\nFirefox. (CVE-2013-0745, CVE-2013-0746)\n\nJesse Ruderman discovered a flaw in the way Firefox handled\nplugins. If a user were tricked into opening a specially\ncrafted page, a remote attacker could exploit this to bypass\nsecurity protections to conduct clickjacking attacks.\n(CVE-2013-0747)\n\nJesse Ruderman discovered an information leak in Firefox. An\nattacker could exploit this to reveal memory address layout\nwhich could help in bypassing ASLR protections.\n(CVE-2013-0748)\n\nAn integer overflow was discovered in the JavaScript engine,\nleading to a heap-based buffer overflow. If the user were\ntricked into opening a specially crafted page, an attacker\ncould possibly exploit this to execute code with the\nprivileges of the user invoking Firefox. (CVE-2013-0750)\n\nSviatoslav Chagaev discovered that Firefox did not properly\nhandle XBL files with multiple XML bindings with SVG\ncontent. An attacker could cause a denial of service via\napplication crash, or potentially execute code with the\nprivileges of the user invoking Firefox. (CVE-2013-0752)\n\nMariusz Mlynski discovered two flaws to gain access to\nprivileged chrome functions. An attacker could possibly\nexploit this to execute code with the privileges of the user\ninvoking Firefox. (CVE-2013-0757, CVE-2013-0758)\n\nSeveral use-after-free issues were discovered in Firefox. If\nthe user were tricked into opening a specially crafted page,\nan attacker could possibly exploit this to execute code with\nthe privileges of the user invoking Firefox. (CVE-2013-0753,\nCVE-2013-0754, CVE-2013-0755, CVE-2013-0756)\n\nTwo intermediate CA certificates were mis-issued by the\nTURKTRUST certificate authority. If a remote attacker were\nable to perform a man-in-the-middle attack, this flaw could\nbe exploited to view sensitive information. (CVE-2013-0743).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 24, "published": "2013-01-23T00:00:00", "title": "Ubuntu 10.04 LTS / 11.10 / 12.04 LTS / 12.10 : firefox regression (USN-1681-3)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-0743", "CVE-2013-0763", "CVE-2013-0746", "CVE-2012-5829", "CVE-2013-0766", "CVE-2013-0747", "CVE-2013-0744", "CVE-2013-0748", "CVE-2013-0768", "CVE-2013-0755", "CVE-2013-0752", "CVE-2013-0754", "CVE-2013-0769", "CVE-2013-0771", "CVE-2013-0757", "CVE-2013-0749", "CVE-2013-0761", "CVE-2013-0745", "CVE-2013-0756", "CVE-2013-0760", "CVE-2013-0767", "CVE-2013-0762", "CVE-2013-0753", "CVE-2013-0750", "CVE-2013-0759", "CVE-2013-0770", "CVE-2013-0758", "CVE-2013-0764"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/o:canonical:ubuntu_linux:11.10", "p-cpe:/a:canonical:ubuntu_linux:firefox", "cpe:/o:canonical:ubuntu_linux:10.04:-:lts", "cpe:/o:canonical:ubuntu_linux:12.10", "cpe:/o:canonical:ubuntu_linux:12.04:-:lts"], "id": "UBUNTU_USN-1681-3.NASL", "href": "https://www.tenable.com/plugins/nessus/63665", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-1681-3. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(63665);\n script_version(\"1.16\");\n script_cvs_date(\"Date: 2019/09/19 12:54:28\");\n\n script_cve_id(\"CVE-2012-5829\", \"CVE-2013-0744\", \"CVE-2013-0745\", \"CVE-2013-0746\", \"CVE-2013-0747\", \"CVE-2013-0748\", \"CVE-2013-0749\", \"CVE-2013-0750\", \"CVE-2013-0752\", \"CVE-2013-0753\", \"CVE-2013-0754\", \"CVE-2013-0755\", \"CVE-2013-0756\", \"CVE-2013-0757\", \"CVE-2013-0758\", \"CVE-2013-0759\", \"CVE-2013-0760\", \"CVE-2013-0761\", \"CVE-2013-0762\", \"CVE-2013-0763\", \"CVE-2013-0764\", \"CVE-2013-0766\", \"CVE-2013-0767\", \"CVE-2013-0768\", \"CVE-2013-0769\", \"CVE-2013-0770\", \"CVE-2013-0771\");\n script_xref(name:\"USN\", value:\"1681-3\");\n\n script_name(english:\"Ubuntu 10.04 LTS / 11.10 / 12.04 LTS / 12.10 : firefox regression (USN-1681-3)\");\n script_summary(english:\"Checks dpkg output for updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Ubuntu host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"USN-1681-1 fixed vulnerabilities in Firefox. Due to an upstream\nregression, some translations became unusable after upgrading. This\nupdate fixes the problem.\n\nWe apologize for the inconvenience.\n\nChristoph Diehl, Christian Holler, Mats Palmgren, Chiaki Ishikawa,\nBill Gianopoulos, Benoit Jacob, Gary Kwong, Robert O'Callahan, Jesse\nRuderman, and Julian Seward discovered multiple memory safety issues\naffecting Firefox. If the user were tricked into opening a specially\ncrafted page, an attacker could possibly exploit these to cause a\ndenial of service via application crash, or potentially execute code\nwith the privileges of the user invoking Firefox. (CVE-2013-0769,\nCVE-2013-0749, CVE-2013-0770)\n\nAbhishek Arya discovered several user-after-free and buffer\noverflows in Firefox. An attacker could exploit these to\ncause a denial of service via application crash, or\npotentially execute code with the privileges of the user\ninvoking Firefox. (CVE-2013-0760, CVE-2013-0761,\nCVE-2013-0762, CVE-2013-0763, CVE-2013-0766, CVE-2013-0767,\nCVE-2013-0771, CVE-2012-5829)\n\nA stack buffer was discovered in Firefox. If the user were\ntricked into opening a specially crafted page, an attacker\ncould possibly exploit this to cause a denial of service via\napplication crash, or potentially execute code with the\nprivileges of the user invoking Firefox. (CVE-2013-0768)\n\nMasato Kinugawa discovered that Firefox did not always\nproperly display URL values in the address bar. A remote\nattacker could exploit this to conduct URL spoofing and\nphishing attacks. (CVE-2013-0759)\n\nAtte Kettunen discovered that Firefox did not properly\nhandle HTML tables with a large number of columns and column\ngroups. If the user were tricked into opening a specially\ncrafted page, an attacker could exploit this to cause a\ndenial of service via application crash, or potentially\nexecute code with the privileges of the user invoking\nFirefox. (CVE-2013-0744)\n\nJerry Baker discovered that Firefox did not always properly\nhandle threading when performing downloads over SSL\nconnections. An attacker could exploit this to cause a\ndenial of service via application crash. (CVE-2013-0764)\n\nOlli Pettay and Boris Zbarsky discovered flaws in the\nJavacript engine of Firefox. An attacker could cause a\ndenial of service via application crash, or potentially\nexecute code with the privileges of the user invoking\nFirefox. (CVE-2013-0745, CVE-2013-0746)\n\nJesse Ruderman discovered a flaw in the way Firefox handled\nplugins. If a user were tricked into opening a specially\ncrafted page, a remote attacker could exploit this to bypass\nsecurity protections to conduct clickjacking attacks.\n(CVE-2013-0747)\n\nJesse Ruderman discovered an information leak in Firefox. An\nattacker could exploit this to reveal memory address layout\nwhich could help in bypassing ASLR protections.\n(CVE-2013-0748)\n\nAn integer overflow was discovered in the JavaScript engine,\nleading to a heap-based buffer overflow. If the user were\ntricked into opening a specially crafted page, an attacker\ncould possibly exploit this to execute code with the\nprivileges of the user invoking Firefox. (CVE-2013-0750)\n\nSviatoslav Chagaev discovered that Firefox did not properly\nhandle XBL files with multiple XML bindings with SVG\ncontent. An attacker could cause a denial of service via\napplication crash, or potentially execute code with the\nprivileges of the user invoking Firefox. (CVE-2013-0752)\n\nMariusz Mlynski discovered two flaws to gain access to\nprivileged chrome functions. An attacker could possibly\nexploit this to execute code with the privileges of the user\ninvoking Firefox. (CVE-2013-0757, CVE-2013-0758)\n\nSeveral use-after-free issues were discovered in Firefox. If\nthe user were tricked into opening a specially crafted page,\nan attacker could possibly exploit this to execute code with\nthe privileges of the user invoking Firefox. (CVE-2013-0753,\nCVE-2013-0754, CVE-2013-0755, CVE-2013-0756)\n\nTwo intermediate CA certificates were mis-issued by the\nTURKTRUST certificate authority. If a remote attacker were\nable to perform a man-in-the-middle attack, this flaw could\nbe exploited to view sensitive information. (CVE-2013-0743).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/1681-3/\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected firefox package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Firefox 17.0.1 Flash Privileged Code Injection');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:10.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:11.10\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:12.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:12.10\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2012/11/21\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/01/22\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/01/23\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2013-2019 Canonical, Inc. / NASL script (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(10\\.04|11\\.10|12\\.04|12\\.10)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 10.04 / 11.10 / 12.04 / 12.10\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"10.04\", pkgname:\"firefox\", pkgver:\"18.0.1+build1-0ubuntu0.10.04.1\")) flag++;\nif (ubuntu_check(osver:\"11.10\", pkgname:\"firefox\", pkgver:\"18.0.1+build1-0ubuntu0.11.10.1\")) flag++;\nif (ubuntu_check(osver:\"12.04\", pkgname:\"firefox\", pkgver:\"18.0.1+build1-0ubuntu0.12.04.1\")) flag++;\nif (ubuntu_check(osver:\"12.10\", pkgname:\"firefox\", pkgver:\"18.0.1+build1-0ubuntu0.12.10.1\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"firefox\");\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-01T06:38:54", "description": "Christoph Diehl, Christian Holler, Mats Palmgren, Chiaki Ishikawa,\nBill Gianopoulos, Benoit Jacob, Gary Kwong, Robert O'Callahan, Jesse\nRuderman, and Julian Seward discovered multiple memory safety issues\naffecting Firefox. If the user were tricked into opening a specially\ncrafted page, an attacker could possibly exploit these to cause a\ndenial of service via application crash, or potentially execute code\nwith the privileges of the user invoking Firefox. (CVE-2013-0769,\nCVE-2013-0749, CVE-2013-0770)\n\nAbhishek Arya discovered several user-after-free and buffer overflows\nin Firefox. An attacker could exploit these to cause a denial of\nservice via application crash, or potentially execute code with the\nprivileges of the user invoking Firefox. (CVE-2013-0760,\nCVE-2013-0761, CVE-2013-0762, CVE-2013-0763, CVE-2013-0766,\nCVE-2013-0767, CVE-2013-0771, CVE-2012-5829)\n\nA stack buffer was discovered in Firefox. If the user were tricked\ninto opening a specially crafted page, an attacker could possibly\nexploit this to cause a denial of service via application crash, or\npotentially execute code with the privileges of the user invoking\nFirefox. (CVE-2013-0768)\n\nMasato Kinugawa discovered that Firefox did not always properly\ndisplay URL values in the address bar. A remote attacker could exploit\nthis to conduct URL spoofing and phishing attacks. (CVE-2013-0759)\n\nAtte Kettunen discovered that Firefox did not properly handle HTML\ntables with a large number of columns and column groups. If the user\nwere tricked into opening a specially crafted page, an attacker could\nexploit this to cause a denial of service via application crash, or\npotentially execute code with the privileges of the user invoking\nFirefox. (CVE-2013-0744)\n\nJerry Baker discovered that Firefox did not always properly handle\nthreading when performing downloads over SSL connections. An attacker\ncould exploit this to cause a denial of service via application crash.\n(CVE-2013-0764)\n\nOlli Pettay and Boris Zbarsky discovered flaws in the Javacript engine\nof Firefox. An attacker could cause a denial of service via\napplication crash, or potentially execute code with the privileges of\nthe user invoking Firefox. (CVE-2013-0745, CVE-2013-0746)\n\nJesse Ruderman discovered a flaw in the way Firefox handled plugins.\nIf a user were tricked into opening a specially crafted page, a remote\nattacker could exploit this to bypass security protections to conduct\nclickjacking attacks. (CVE-2013-0747)\n\nJesse Ruderman discovered an information leak in Firefox. An attacker\ncould exploit this to reveal memory address layout which could help in\nbypassing ASLR protections. (CVE-2013-0748)\n\nAn integer overflow was discovered in the JavaScript engine, leading\nto a heap-based buffer overflow. If the user were tricked into opening\na specially crafted page, an attacker could possibly exploit this to\nexecute code with the privileges of the user invoking Firefox.\n(CVE-2013-0750)\n\nSviatoslav Chagaev discovered that Firefox did not properly handle XBL\nfiles with multiple XML bindings with SVG content. An attacker could\ncause a denial of service via application crash, or potentially\nexecute code with the privileges of the user invoking Firefox.\n(CVE-2013-0752)\n\nMariusz Mlynski discovered two flaws to gain access to privileged\nchrome functions. An attacker could possibly exploit this to execute\ncode with the privileges of the user invoking Firefox. (CVE-2013-0757,\nCVE-2013-0758)\n\nSeveral use-after-free issues were discovered in Firefox. If the user\nwere tricked into opening a specially crafted page, an attacker could\npossibly exploit this to execute code with the privileges of the user\ninvoking Firefox. (CVE-2013-0753, CVE-2013-0754, CVE-2013-0755,\nCVE-2013-0756)\n\nTwo intermediate CA certificates were mis-issued by the TURKTRUST\ncertificate authority. If a remote attacker were able to perform a\nman-in-the-middle attack, this flaw could be exploited to view\nsensitive information. (CVE-2013-0743).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 25, "published": "2013-01-09T00:00:00", "title": "Ubuntu 10.04 LTS / 11.10 / 12.04 LTS / 12.10 : firefox vulnerabilities (USN-1681-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-0743", "CVE-2013-0763", "CVE-2013-0746", "CVE-2012-5829", "CVE-2013-0766", "CVE-2013-0747", "CVE-2013-0744", "CVE-2013-0748", "CVE-2013-0768", "CVE-2013-0755", "CVE-2013-0752", "CVE-2013-0754", "CVE-2013-0769", "CVE-2013-0771", "CVE-2013-0757", "CVE-2013-0749", "CVE-2013-0761", "CVE-2013-0745", "CVE-2013-0756", "CVE-2013-0760", "CVE-2013-0767", "CVE-2013-0762", "CVE-2013-0753", "CVE-2013-0750", "CVE-2013-0759", "CVE-2013-0770", "CVE-2013-0758", "CVE-2013-0764"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/o:canonical:ubuntu_linux:11.10", "p-cpe:/a:canonical:ubuntu_linux:firefox", "cpe:/o:canonical:ubuntu_linux:10.04:-:lts", "cpe:/o:canonical:ubuntu_linux:12.10", "cpe:/o:canonical:ubuntu_linux:12.04:-:lts"], "id": "UBUNTU_USN-1681-1.NASL", "href": "https://www.tenable.com/plugins/nessus/63447", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-1681-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(63447);\n script_version(\"1.20\");\n script_cvs_date(\"Date: 2019/09/19 12:54:28\");\n\n script_cve_id(\"CVE-2012-5829\", \"CVE-2013-0744\", \"CVE-2013-0745\", \"CVE-2013-0746\", \"CVE-2013-0747\", \"CVE-2013-0748\", \"CVE-2013-0749\", \"CVE-2013-0750\", \"CVE-2013-0752\", \"CVE-2013-0753\", \"CVE-2013-0754\", \"CVE-2013-0755\", \"CVE-2013-0756\", \"CVE-2013-0757\", \"CVE-2013-0758\", \"CVE-2013-0759\", \"CVE-2013-0760\", \"CVE-2013-0761\", \"CVE-2013-0762\", \"CVE-2013-0763\", \"CVE-2013-0764\", \"CVE-2013-0766\", \"CVE-2013-0767\", \"CVE-2013-0768\", \"CVE-2013-0769\", \"CVE-2013-0770\", \"CVE-2013-0771\");\n script_xref(name:\"USN\", value:\"1681-1\");\n\n script_name(english:\"Ubuntu 10.04 LTS / 11.10 / 12.04 LTS / 12.10 : firefox vulnerabilities (USN-1681-1)\");\n script_summary(english:\"Checks dpkg output for updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Ubuntu host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Christoph Diehl, Christian Holler, Mats Palmgren, Chiaki Ishikawa,\nBill Gianopoulos, Benoit Jacob, Gary Kwong, Robert O'Callahan, Jesse\nRuderman, and Julian Seward discovered multiple memory safety issues\naffecting Firefox. If the user were tricked into opening a specially\ncrafted page, an attacker could possibly exploit these to cause a\ndenial of service via application crash, or potentially execute code\nwith the privileges of the user invoking Firefox. (CVE-2013-0769,\nCVE-2013-0749, CVE-2013-0770)\n\nAbhishek Arya discovered several user-after-free and buffer overflows\nin Firefox. An attacker could exploit these to cause a denial of\nservice via application crash, or potentially execute code with the\nprivileges of the user invoking Firefox. (CVE-2013-0760,\nCVE-2013-0761, CVE-2013-0762, CVE-2013-0763, CVE-2013-0766,\nCVE-2013-0767, CVE-2013-0771, CVE-2012-5829)\n\nA stack buffer was discovered in Firefox. If the user were tricked\ninto opening a specially crafted page, an attacker could possibly\nexploit this to cause a denial of service via application crash, or\npotentially execute code with the privileges of the user invoking\nFirefox. (CVE-2013-0768)\n\nMasato Kinugawa discovered that Firefox did not always properly\ndisplay URL values in the address bar. A remote attacker could exploit\nthis to conduct URL spoofing and phishing attacks. (CVE-2013-0759)\n\nAtte Kettunen discovered that Firefox did not properly handle HTML\ntables with a large number of columns and column groups. If the user\nwere tricked into opening a specially crafted page, an attacker could\nexploit this to cause a denial of service via application crash, or\npotentially execute code with the privileges of the user invoking\nFirefox. (CVE-2013-0744)\n\nJerry Baker discovered that Firefox did not always properly handle\nthreading when performing downloads over SSL connections. An attacker\ncould exploit this to cause a denial of service via application crash.\n(CVE-2013-0764)\n\nOlli Pettay and Boris Zbarsky discovered flaws in the Javacript engine\nof Firefox. An attacker could cause a denial of service via\napplication crash, or potentially execute code with the privileges of\nthe user invoking Firefox. (CVE-2013-0745, CVE-2013-0746)\n\nJesse Ruderman discovered a flaw in the way Firefox handled plugins.\nIf a user were tricked into opening a specially crafted page, a remote\nattacker could exploit this to bypass security protections to conduct\nclickjacking attacks. (CVE-2013-0747)\n\nJesse Ruderman discovered an information leak in Firefox. An attacker\ncould exploit this to reveal memory address layout which could help in\nbypassing ASLR protections. (CVE-2013-0748)\n\nAn integer overflow was discovered in the JavaScript engine, leading\nto a heap-based buffer overflow. If the user were tricked into opening\na specially crafted page, an attacker could possibly exploit this to\nexecute code with the privileges of the user invoking Firefox.\n(CVE-2013-0750)\n\nSviatoslav Chagaev discovered that Firefox did not properly handle XBL\nfiles with multiple XML bindings with SVG content. An attacker could\ncause a denial of service via application crash, or potentially\nexecute code with the privileges of the user invoking Firefox.\n(CVE-2013-0752)\n\nMariusz Mlynski discovered two flaws to gain access to privileged\nchrome functions. An attacker could possibly exploit this to execute\ncode with the privileges of the user invoking Firefox. (CVE-2013-0757,\nCVE-2013-0758)\n\nSeveral use-after-free issues were discovered in Firefox. If the user\nwere tricked into opening a specially crafted page, an attacker could\npossibly exploit this to execute code with the privileges of the user\ninvoking Firefox. (CVE-2013-0753, CVE-2013-0754, CVE-2013-0755,\nCVE-2013-0756)\n\nTwo intermediate CA certificates were mis-issued by the TURKTRUST\ncertificate authority. If a remote attacker were able to perform a\nman-in-the-middle attack, this flaw could be exploited to view\nsensitive information. (CVE-2013-0743).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/1681-1/\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected firefox package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Firefox 17.0.1 Flash Privileged Code Injection');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:10.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:11.10\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:12.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:12.10\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2012/11/21\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/01/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/01/09\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2013-2019 Canonical, Inc. / NASL script (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(10\\.04|11\\.10|12\\.04|12\\.10)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 10.04 / 11.10 / 12.04 / 12.10\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"10.04\", pkgname:\"firefox\", pkgver:\"18.0+build1-0ubuntu0.10.04.3\")) flag++;\nif (ubuntu_check(osver:\"11.10\", pkgname:\"firefox\", pkgver:\"18.0+build1-0ubuntu0.11.10.3\")) flag++;\nif (ubuntu_check(osver:\"12.04\", pkgname:\"firefox\", pkgver:\"18.0+build1-0ubuntu0.12.04.3\")) flag++;\nif (ubuntu_check(osver:\"12.10\", pkgname:\"firefox\", pkgver:\"18.0+build1-0ubuntu0.12.10.3\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"firefox\");\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-01T03:48:46", "description": "The installed version of Firefox is earlier than 18.0 and thus, is\npotentially affected by the following security issues :\n\n - Multiple, unspecified use-after-free, out-of-bounds read\n and buffer overflow errors exist. (CVE-2012-5829,\n CVE-2013-0760, CVE-2013-0761, CVE-2013-0762,\n CVE-2013-0763, CVE-2013-0766, CVE-2013-0767,\n CVE-2013-0771)\n\n - Two intermediate certificates were improperly issued by\n TURKTRUST certificate authority. (CVE-2013-0743)\n\n - A use-after-free error exists related to displaying\n HTML tables with many columns and column groups.\n (CVE-2013-0744)\n\n - An error exists related to the 'AutoWrapperChanger'\n class that does not properly manage objects during\n garbage collection. (CVE-2012-0745)\n\n - An error exists related to 'jsval', 'quickstubs', and\n compartmental mismatches that can lead potentially\n exploitable crashes. (CVE-2013-0746)\n\n - Errors exist related to events in the plugin handler\n that can allow same-origin policy bypass.\n (CVE-2013-0747)\n\n - An error related to the 'toString' method of XBL\n objects can lead to address information leakage.\n (CVE-2013-0748)\n\n - An unspecified memory corruption issue exists.\n (CVE-2013-0749, CVE-2013-0769, CVE-2013-0770)\n\n - A buffer overflow exists related to JavaScript string\n concatenation. (CVE-2013-0750)\n\n - An error exists related to multiple XML bindings with\n SVG content, contained in XBL files. (CVE-2013-0752)\n\n - A use-after-free error exists related to\n 'XMLSerializer' and 'serializeToStream'.\n (CVE-2013-0753)\n\n - A use-after-free error exists related to garbage\n collection and 'ListenManager'. (CVE-2013-0754)\n\n - A use-after-free error exists related to the 'Vibrate'\n library and 'domDoc'. (CVE-2013-0755)\n\n - A use-after-free error exists related to JavaScript\n 'Proxy' objects. (CVE-2013-0756)\n \n - 'Chrome Object Wrappers' (COW) can be bypassed by\n changing object prototypes and can allow arbitrary\n code execution. (CVE-2013-0757)\n\n - An error related to SVG elements and plugins can allow\n privilege escalation. (CVE-2013-0758)\n\n - An error exists related to the address bar that can\n allow URL spoofing attacks. (CVE-2013-0759)\n\n - An error exists related to SSL and threading that\n can result in potentially exploitable crashes.\n (CVE-2013-0764)\n\n - An error exists related to 'Canvas' and bad height or\n width values passed to it from HTML. (CVE-2013-0768)", "edition": 26, "published": "2013-01-15T00:00:00", "title": "Firefox < 18.0 Multiple Vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-0743", "CVE-2013-0763", "CVE-2013-0746", "CVE-2012-5829", "CVE-2013-0766", "CVE-2013-0747", "CVE-2013-0744", "CVE-2013-0748", "CVE-2013-0768", "CVE-2013-0755", "CVE-2013-0752", "CVE-2013-0754", "CVE-2012-0745", "CVE-2013-0769", "CVE-2013-0771", "CVE-2013-0757", "CVE-2013-0749", "CVE-2013-0761", "CVE-2013-0745", "CVE-2013-0756", "CVE-2013-0760", "CVE-2013-0767", "CVE-2013-0762", "CVE-2013-0753", "CVE-2013-0750", "CVE-2013-0759", "CVE-2013-0770", "CVE-2013-0758", "CVE-2013-0764"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/a:mozilla:firefox"], "id": "MOZILLA_FIREFOX_180.NASL", "href": "https://www.tenable.com/plugins/nessus/63551", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(63551);\n script_version(\"1.20\");\n script_cvs_date(\"Date: 2019/12/04\");\n\n script_cve_id(\n \"CVE-2013-0744\",\n \"CVE-2013-0745\",\n \"CVE-2013-0746\",\n \"CVE-2013-0747\",\n \"CVE-2013-0748\",\n \"CVE-2013-0749\",\n \"CVE-2013-0750\",\n \"CVE-2013-0752\",\n \"CVE-2013-0753\",\n \"CVE-2013-0754\",\n \"CVE-2013-0755\",\n \"CVE-2013-0756\",\n \"CVE-2013-0757\",\n \"CVE-2013-0758\",\n \"CVE-2013-0759\",\n \"CVE-2013-0760\",\n \"CVE-2013-0761\",\n \"CVE-2013-0763\",\n \"CVE-2013-0764\",\n \"CVE-2013-0766\",\n \"CVE-2013-0767\",\n \"CVE-2013-0768\",\n \"CVE-2013-0769\",\n \"CVE-2013-0770\",\n \"CVE-2013-0771\"\n );\n script_bugtraq_id(\n 57193,\n 57194,\n 57195,\n 57196,\n 57197,\n 57198,\n 57199,\n 57203,\n 57204,\n 57205,\n 57207,\n 57209,\n 57211,\n 57213,\n 57215,\n 57217,\n 57218,\n 57228,\n 57232,\n 57234,\n 57235,\n 57236,\n 57238,\n 57240,\n 57241,\n 57244,\n 57258\n );\n\n script_name(english:\"Firefox < 18.0 Multiple Vulnerabilities\");\n script_summary(english:\"Checks version of Firefox\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host contains a web browser that is affected by\nmultiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The installed version of Firefox is earlier than 18.0 and thus, is\npotentially affected by the following security issues :\n\n - Multiple, unspecified use-after-free, out-of-bounds read\n and buffer overflow errors exist. (CVE-2012-5829,\n CVE-2013-0760, CVE-2013-0761, CVE-2013-0762,\n CVE-2013-0763, CVE-2013-0766, CVE-2013-0767,\n CVE-2013-0771)\n\n - Two intermediate certificates were improperly issued by\n TURKTRUST certificate authority. (CVE-2013-0743)\n\n - A use-after-free error exists related to displaying\n HTML tables with many columns and column groups.\n (CVE-2013-0744)\n\n - An error exists related to the 'AutoWrapperChanger'\n class that does not properly manage objects during\n garbage collection. (CVE-2012-0745)\n\n - An error exists related to 'jsval', 'quickstubs', and\n compartmental mismatches that can lead potentially\n exploitable crashes. (CVE-2013-0746)\n\n - Errors exist related to events in the plugin handler\n that can allow same-origin policy bypass.\n (CVE-2013-0747)\n\n - An error related to the 'toString' method of XBL\n objects can lead to address information leakage.\n (CVE-2013-0748)\n\n - An unspecified memory corruption issue exists.\n (CVE-2013-0749, CVE-2013-0769, CVE-2013-0770)\n\n - A buffer overflow exists related to JavaScript string\n concatenation. (CVE-2013-0750)\n\n - An error exists related to multiple XML bindings with\n SVG content, contained in XBL files. (CVE-2013-0752)\n\n - A use-after-free error exists related to\n 'XMLSerializer' and 'serializeToStream'.\n (CVE-2013-0753)\n\n - A use-after-free error exists related to garbage\n collection and 'ListenManager'. (CVE-2013-0754)\n\n - A use-after-free error exists related to the 'Vibrate'\n library and 'domDoc'. (CVE-2013-0755)\n\n - A use-after-free error exists related to JavaScript\n 'Proxy' objects. (CVE-2013-0756)\n \n - 'Chrome Object Wrappers' (COW) can be bypassed by\n changing object prototypes and can allow arbitrary\n code execution. (CVE-2013-0757)\n\n - An error related to SVG elements and plugins can allow\n privilege escalation. (CVE-2013-0758)\n\n - An error exists related to the address bar that can\n allow URL spoofing attacks. (CVE-2013-0759)\n\n - An error exists related to SSL and threading that\n can result in potentially exploitable crashes.\n (CVE-2013-0764)\n\n - An error exists related to 'Canvas' and bad height or\n width values passed to it from HTML. (CVE-2013-0768)\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.zerodayinitiative.com/advisories/ZDI-13-003/\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.zerodayinitiative.com/advisories/ZDI-13-006/\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.zerodayinitiative.com/advisories/ZDI-13-037/\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.zerodayinitiative.com/advisories/ZDI-13-038/\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.zerodayinitiative.com/advisories/ZDI-13-039/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-01/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-02/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-03/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-04/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-05/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-07/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-08/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-09/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-10/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-11/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-12/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-13/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-14/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-15/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-16/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-17/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-18/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-19/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-20/\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Firefox 18.0 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2013-0770\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Firefox 17.0.1 Flash Privileged Code Injection');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2013/01/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/01/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/01/15\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:mozilla:firefox\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"mozilla_org_installed.nasl\");\n script_require_keys(\"Mozilla/Firefox/Version\");\n\n exit(0);\n}\n\ninclude(\"mozilla_version.inc\");\nport = get_kb_item_or_exit(\"SMB/transport\"); \n\ninstalls = get_kb_list(\"SMB/Mozilla/Firefox/*\");\nif (isnull(installs)) audit(AUDIT_NOT_INST, \"Firefox\");\n\nmozilla_check_version(installs:installs, product:'firefox', esr:FALSE, fix:'18.0', severity:SECURITY_HOLE, xss:TRUE);\n\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-01T06:38:56", "description": "USN-1681-1 fixed vulnerabilities in Firefox. Due to an upstream\nregression, Firefox suffered from instabilities when accessing some\nwebsites. This update fixes the problem.\n\nWe apologize for the inconvenience.\n\nChristoph Diehl, Christian Holler, Mats Palmgren, Chiaki Ishikawa,\nBill Gianopoulos, Benoit Jacob, Gary Kwong, Robert O'Callahan, Jesse\nRuderman, and Julian Seward discovered multiple memory safety issues\naffecting Firefox. If the user were tricked into opening a specially\ncrafted page, an attacker could possibly exploit these to cause a\ndenial of service via application crash, or potentially execute code\nwith the privileges of the user invoking Firefox. (CVE-2013-0769,\nCVE-2013-0749, CVE-2013-0770)\n\nAbhishek Arya discovered several user-after-free and buffer\noverflows in Firefox. An attacker could exploit these to\ncause a denial of service via application crash, or\npotentially execute code with the privileges of the user\ninvoking Firefox. (CVE-2013-0760, CVE-2013-0761,\nCVE-2013-0762, CVE-2013-0763, CVE-2013-0766, CVE-2013-0767,\nCVE-2013-0771, CVE-2012-5829)\n\nA stack buffer was discovered in Firefox. If the user were\ntricked into opening a specially crafted page, an attacker\ncould possibly exploit this to cause a denial of service via\napplication crash, or potentially execute code with the\nprivileges of the user invoking Firefox. (CVE-2013-0768)\n\nMasato Kinugawa discovered that Firefox did not always\nproperly display URL values in the address bar. A remote\nattacker could exploit this to conduct URL spoofing and\nphishing attacks. (CVE-2013-0759)\n\nAtte Kettunen discovered that Firefox did not properly\nhandle HTML tables with a large number of columns and column\ngroups. If the user were tricked into opening a specially\ncrafted page, an attacker could exploit this to cause a\ndenial of service via application crash, or potentially\nexecute code with the privileges of the user invoking\nFirefox. (CVE-2013-0744)\n\nJerry Baker discovered that Firefox did not always properly\nhandle threading when performing downloads over SSL\nconnections. An attacker could exploit this to cause a\ndenial of service via application crash. (CVE-2013-0764)\n\nOlli Pettay and Boris Zbarsky discovered flaws in the\nJavacript engine of Firefox. An attacker could cause a\ndenial of service via application crash, or potentially\nexecute code with the privileges of the user invoking\nFirefox. (CVE-2013-0745, CVE-2013-0746)\n\nJesse Ruderman discovered a flaw in the way Firefox handled\nplugins. If a user were tricked into opening a specially\ncrafted page, a remote attacker could exploit this to bypass\nsecurity protections to conduct clickjacking attacks.\n(CVE-2013-0747)\n\nJesse Ruderman discovered an information leak in Firefox. An\nattacker could exploit this to reveal memory address layout\nwhich could help in bypassing ASLR protections.\n(CVE-2013-0748)\n\nAn integer overflow was discovered in the JavaScript engine,\nleading to a heap-based buffer overflow. If the user were\ntricked into opening a specially crafted page, an attacker\ncould possibly exploit this to execute code with the\nprivileges of the user invoking Firefox. (CVE-2013-0750)\n\nSviatoslav Chagaev discovered that Firefox did not properly\nhandle XBL files with multiple XML bindings with SVG\ncontent. An attacker could cause a denial of service via\napplication crash, or potentially execute code with the\nprivileges of the user invoking Firefox. (CVE-2013-0752)\n\nMariusz Mlynski discovered two flaws to gain access to\nprivileged chrome functions. An attacker could possibly\nexploit this to execute code with the privileges of the user\ninvoking Firefox. (CVE-2013-0757, CVE-2013-0758)\n\nSeveral use-after-free issues were discovered in Firefox. If\nthe user were tricked into opening a specially crafted page,\nan attacker could possibly exploit this to execute code with\nthe privileges of the user invoking Firefox. (CVE-2013-0753,\nCVE-2013-0754, CVE-2013-0755, CVE-2013-0756)\n\nTwo intermediate CA certificates were mis-issued by the\nTURKTRUST certificate authority. If a remote attacker were\nable to perform a man-in-the-middle attack, this flaw could\nbe exploited to view sensitive information. (CVE-2013-0743).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 24, "published": "2013-02-06T00:00:00", "title": "Ubuntu 10.04 LTS / 11.10 / 12.04 LTS / 12.10 : firefox regression (USN-1681-4)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-0743", "CVE-2013-0763", "CVE-2013-0746", "CVE-2012-5829", "CVE-2013-0766", "CVE-2013-0747", "CVE-2013-0744", "CVE-2013-0748", "CVE-2013-0768", "CVE-2013-0755", "CVE-2013-0752", "CVE-2013-0754", "CVE-2013-0769", "CVE-2013-0771", "CVE-2013-0757", "CVE-2013-0749", "CVE-2013-0761", "CVE-2013-0745", "CVE-2013-0756", "CVE-2013-0760", "CVE-2013-0767", "CVE-2013-0762", "CVE-2013-0753", "CVE-2013-0750", "CVE-2013-0759", "CVE-2013-0770", "CVE-2013-0758", "CVE-2013-0764"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/o:canonical:ubuntu_linux:11.10", "p-cpe:/a:canonical:ubuntu_linux:firefox", "cpe:/o:canonical:ubuntu_linux:10.04:-:lts", "cpe:/o:canonical:ubuntu_linux:12.10", "cpe:/o:canonical:ubuntu_linux:12.04:-:lts"], "id": "UBUNTU_USN-1681-4.NASL", "href": "https://www.tenable.com/plugins/nessus/64480", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-1681-4. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(64480);\n script_version(\"1.15\");\n script_cvs_date(\"Date: 2019/09/19 12:54:28\");\n\n script_cve_id(\"CVE-2012-5829\", \"CVE-2013-0744\", \"CVE-2013-0745\", \"CVE-2013-0746\", \"CVE-2013-0747\", \"CVE-2013-0748\", \"CVE-2013-0749\", \"CVE-2013-0750\", \"CVE-2013-0752\", \"CVE-2013-0753\", \"CVE-2013-0754\", \"CVE-2013-0755\", \"CVE-2013-0756\", \"CVE-2013-0757\", \"CVE-2013-0758\", \"CVE-2013-0759\", \"CVE-2013-0760\", \"CVE-2013-0761\", \"CVE-2013-0762\", \"CVE-2013-0763\", \"CVE-2013-0764\", \"CVE-2013-0766\", \"CVE-2013-0767\", \"CVE-2013-0768\", \"CVE-2013-0769\", \"CVE-2013-0770\", \"CVE-2013-0771\");\n script_xref(name:\"USN\", value:\"1681-4\");\n\n script_name(english:\"Ubuntu 10.04 LTS / 11.10 / 12.04 LTS / 12.10 : firefox regression (USN-1681-4)\");\n script_summary(english:\"Checks dpkg output for updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Ubuntu host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"USN-1681-1 fixed vulnerabilities in Firefox. Due to an upstream\nregression, Firefox suffered from instabilities when accessing some\nwebsites. This update fixes the problem.\n\nWe apologize for the inconvenience.\n\nChristoph Diehl, Christian Holler, Mats Palmgren, Chiaki Ishikawa,\nBill Gianopoulos, Benoit Jacob, Gary Kwong, Robert O'Callahan, Jesse\nRuderman, and Julian Seward discovered multiple memory safety issues\naffecting Firefox. If the user were tricked into opening a specially\ncrafted page, an attacker could possibly exploit these to cause a\ndenial of service via application crash, or potentially execute code\nwith the privileges of the user invoking Firefox. (CVE-2013-0769,\nCVE-2013-0749, CVE-2013-0770)\n\nAbhishek Arya discovered several user-after-free and buffer\noverflows in Firefox. An attacker could exploit these to\ncause a denial of service via application crash, or\npotentially execute code with the privileges of the user\ninvoking Firefox. (CVE-2013-0760, CVE-2013-0761,\nCVE-2013-0762, CVE-2013-0763, CVE-2013-0766, CVE-2013-0767,\nCVE-2013-0771, CVE-2012-5829)\n\nA stack buffer was discovered in Firefox. If the user were\ntricked into opening a specially crafted page, an attacker\ncould possibly exploit this to cause a denial of service via\napplication crash, or potentially execute code with the\nprivileges of the user invoking Firefox. (CVE-2013-0768)\n\nMasato Kinugawa discovered that Firefox did not always\nproperly display URL values in the address bar. A remote\nattacker could exploit this to conduct URL spoofing and\nphishing attacks. (CVE-2013-0759)\n\nAtte Kettunen discovered that Firefox did not properly\nhandle HTML tables with a large number of columns and column\ngroups. If the user were tricked into opening a specially\ncrafted page, an attacker could exploit this to cause a\ndenial of service via application crash, or potentially\nexecute code with the privileges of the user invoking\nFirefox. (CVE-2013-0744)\n\nJerry Baker discovered that Firefox did not always properly\nhandle threading when performing downloads over SSL\nconnections. An attacker could exploit this to cause a\ndenial of service via application crash. (CVE-2013-0764)\n\nOlli Pettay and Boris Zbarsky discovered flaws in the\nJavacript engine of Firefox. An attacker could cause a\ndenial of service via application crash, or potentially\nexecute code with the privileges of the user invoking\nFirefox. (CVE-2013-0745, CVE-2013-0746)\n\nJesse Ruderman discovered a flaw in the way Firefox handled\nplugins. If a user were tricked into opening a specially\ncrafted page, a remote attacker could exploit this to bypass\nsecurity protections to conduct clickjacking attacks.\n(CVE-2013-0747)\n\nJesse Ruderman discovered an information leak in Firefox. An\nattacker could exploit this to reveal memory address layout\nwhich could help in bypassing ASLR protections.\n(CVE-2013-0748)\n\nAn integer overflow was discovered in the JavaScript engine,\nleading to a heap-based buffer overflow. If the user were\ntricked into opening a specially crafted page, an attacker\ncould possibly exploit this to execute code with the\nprivileges of the user invoking Firefox. (CVE-2013-0750)\n\nSviatoslav Chagaev discovered that Firefox did not properly\nhandle XBL files with multiple XML bindings with SVG\ncontent. An attacker could cause a denial of service via\napplication crash, or potentially execute code with the\nprivileges of the user invoking Firefox. (CVE-2013-0752)\n\nMariusz Mlynski discovered two flaws to gain access to\nprivileged chrome functions. An attacker could possibly\nexploit this to execute code with the privileges of the user\ninvoking Firefox. (CVE-2013-0757, CVE-2013-0758)\n\nSeveral use-after-free issues were discovered in Firefox. If\nthe user were tricked into opening a specially crafted page,\nan attacker could possibly exploit this to execute code with\nthe privileges of the user invoking Firefox. (CVE-2013-0753,\nCVE-2013-0754, CVE-2013-0755, CVE-2013-0756)\n\nTwo intermediate CA certificates were mis-issued by the\nTURKTRUST certificate authority. If a remote attacker were\nable to perform a man-in-the-middle attack, this flaw could\nbe exploited to view sensitive information. (CVE-2013-0743).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/1681-4/\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected firefox package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Firefox 17.0.1 Flash Privileged Code Injection');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:10.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:11.10\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:12.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:12.10\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2012/11/21\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/02/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/02/06\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2013-2019 Canonical, Inc. / NASL script (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(10\\.04|11\\.10|12\\.04|12\\.10)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 10.04 / 11.10 / 12.04 / 12.10\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"10.04\", pkgname:\"firefox\", pkgver:\"18.0.2+build1-0ubuntu0.10.04.1\")) flag++;\nif (ubuntu_check(osver:\"11.10\", pkgname:\"firefox\", pkgver:\"18.0.2+build1-0ubuntu0.11.10.1\")) flag++;\nif (ubuntu_check(osver:\"12.04\", pkgname:\"firefox\", pkgver:\"18.0.2+build1-0ubuntu0.12.04.1\")) flag++;\nif (ubuntu_check(osver:\"12.10\", pkgname:\"firefox\", pkgver:\"18.0.2+build1-0ubuntu0.12.10.1\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"firefox\");\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "openvas": [{"lastseen": "2018-01-26T11:09:53", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-0763", "CVE-2013-0746", "CVE-2012-5829", "CVE-2013-0766", "CVE-2013-0747", "CVE-2013-0744", "CVE-2013-0748", "CVE-2013-0768", "CVE-2013-0755", "CVE-2013-0752", "CVE-2013-0754", "CVE-2013-0769", "CVE-2013-0771", "CVE-2013-0757", "CVE-2013-0749", "CVE-2013-0761", "CVE-2013-0745", "CVE-2013-0756", "CVE-2013-0760", "CVE-2013-0767", "CVE-2013-0762", "CVE-2013-0753", "CVE-2013-0750", "CVE-2013-0759", "CVE-2013-0770", "CVE-2013-0758", "CVE-2013-0764"], "description": "Check for the Version of firefox", "modified": "2018-01-25T00:00:00", "published": "2013-01-11T00:00:00", "id": "OPENVAS:841273", "href": "http://plugins.openvas.org/nasl.php?oid=841273", "type": "openvas", "title": "Ubuntu Update for firefox USN-1681-1", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_1681_1.nasl 8526 2018-01-25 06:57:37Z teissa $\n#\n# Ubuntu Update for firefox USN-1681-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Christoph Diehl, Christian Holler, Mats Palmgren, Chiaki Ishikawa, Bill\n Gianopoulos, Benoit Jacob, Gary Kwong, Robert O'Callahan, Jesse Ruderman,\n and Julian Seward discovered multiple memory safety issues affecting\n Firefox. If the user were tricked into opening a specially crafted page, an\n attacker could possibly exploit these to cause a denial of service via\n application crash, or potentially execute code with the privileges of the\n user invoking Firefox. (CVE-2013-0769, CVE-2013-0749, CVE-2013-0770)\n\n Abhishek Arya discovered several user-after-free and buffer overflows in\n Firefox. An attacker could exploit these to cause a denial of service via\n application crash, or potentially execute code with the privileges of the\n user invoking Firefox. (CVE-2013-0760, CVE-2013-0761, CVE-2013-0762,\n CVE-2013-0763, CVE-2013-0766, CVE-2013-0767, CVE-2013-0771, CVE-2012-5829)\n \n A stack buffer was discovered in Firefox. If the user were tricked into\n opening a specially crafted page, an attacker could possibly exploit this\n to cause a denial of service via application crash, or potentially execute\n code with the privileges of the user invoking Firefox. (CVE-2013-0768)\n \n Masato Kinugawa discovered that Firefox did not always properly display URL\n values in the address bar. A remote attacker could exploit this to conduct\n URL spoofing and phishing attacks. (CVE-2013-0759)\n \n Atte Kettunen discovered that Firefox did not properly handle HTML tables\n with a large number of columns and column groups. If the user were tricked\n into opening a specially crafted page, an attacker could exploit this to\n cause a denial of service via application crash, or potentially execute\n code with the privileges of the user invoking Firefox. (CVE-2013-0744)\n \n Jerry Baker discovered that Firefox did not always properly handle\n threading when performing downloads over SSL connections. An attacker could\n exploit this to cause a denial of service via application crash.\n (CVE-2013-0764)\n \n Olli Pettay and Boris Zbarsky discovered flaws in the Javacript engine of\n Firefox. An attacker could cause a denial of service via application crash,\n or potentially execute code with the privileges of the user invoking\n Firefox. (CVE-2013-0745, CVE-2013-0746)\n \n Jesse Ruderman discovered a flaw in the way Firefox handled plugins. If a\n user were tricked into opening a specially crafted page, a remote attacker\n could exploit this to bypass security protections to conduct clickjacking\n attacks. (CVE-2013-0747)\n \n Jesse Ruderman discover ... \n\n Description truncated, for more information please check the Reference URL\";\n\n\ntag_affected = \"firefox on Ubuntu 12.10 ,\n Ubuntu 12.04 LTS ,\n Ubuntu 11.10 ,\n Ubuntu 10.04 LTS\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name: \"URL\" , value: \"http://www.ubuntu.com/usn/usn-1681-1/\");\n script_id(841273);\n script_version(\"$Revision: 8526 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-25 07:57:37 +0100 (Thu, 25 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2013-01-11 16:50:06 +0530 (Fri, 11 Jan 2013)\");\n script_cve_id(\"CVE-2013-0769\", \"CVE-2013-0749\", \"CVE-2013-0770\", \"CVE-2013-0760\",\n \"CVE-2013-0761\", \"CVE-2013-0762\", \"CVE-2013-0763\", \"CVE-2013-0766\",\n \"CVE-2013-0767\", \"CVE-2013-0771\", \"CVE-2012-5829\", \"CVE-2013-0768\",\n \"CVE-2013-0759\", \"CVE-2013-0744\", \"CVE-2013-0764\", \"CVE-2013-0745\",\n \"CVE-2013-0746\", \"CVE-2013-0747\", \"CVE-2013-0748\", \"CVE-2013-0750\",\n \"CVE-2013-0752\", \"CVE-2013-0757\", \"CVE-2013-0758\", \"CVE-2013-0753\",\n \"CVE-2013-0754\", \"CVE-2013-0755\", \"CVE-2013-0756\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"USN\", value: \"1681-1\");\n script_name(\"Ubuntu Update for firefox USN-1681-1\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of firefox\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2013 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"UBUNTU12.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"firefox\", ver:\"18.0+build1-0ubuntu0.12.04.3\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU11.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"firefox\", ver:\"18.0+build1-0ubuntu0.11.10.3\", rls:\"UBUNTU11.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU10.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"firefox\", ver:\"18.0+build1-0ubuntu0.10.04.3\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU12.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"firefox\", ver:\"18.0+build1-0ubuntu0.12.10.3\", rls:\"UBUNTU12.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-01-18T11:09:37", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-0763", "CVE-2013-0746", "CVE-2012-5829", "CVE-2013-0766", "CVE-2013-0747", "CVE-2013-0744", "CVE-2013-0748", "CVE-2013-0768", "CVE-2013-0755", "CVE-2013-0752", "CVE-2013-0754", "CVE-2013-0769", "CVE-2013-0771", "CVE-2013-0757", "CVE-2013-0749", "CVE-2013-0761", "CVE-2013-0745", "CVE-2013-0756", "CVE-2013-0760", "CVE-2013-0767", "CVE-2013-0762", "CVE-2013-0753", "CVE-2013-0750", "CVE-2013-0759", "CVE-2013-0770", "CVE-2013-0758", "CVE-2013-0764"], "description": "Check for the Version of thunderbird", "modified": "2018-01-18T00:00:00", "published": "2013-01-11T00:00:00", "id": "OPENVAS:841272", "href": "http://plugins.openvas.org/nasl.php?oid=841272", "type": "openvas", "title": "Ubuntu Update for thunderbird USN-1681-2", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_1681_2.nasl 8456 2018-01-18 06:58:40Z teissa $\n#\n# Ubuntu Update for thunderbird USN-1681-2\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"USN-1681-1 fixed vulnerabilities in Firefox. This update provides the\n corresponding updates for Thunderbird.\n\n Original advisory details:\n \n Christoph Diehl, Christian Holler, Mats Palmgren, Chiaki Ishikawa, Bill\n Gianopoulos, Benoit Jacob, Gary Kwong, Robert O'Callahan, Jesse Ruderman,\n and Julian Seward discovered multiple memory safety issues affecting\n Firefox. If the user were tricked into opening a specially crafted page, an\n attacker could possibly exploit these to cause a denial of service via\n application crash, or potentially execute code with the privileges of the\n user invoking Firefox. (CVE-2013-0769, CVE-2013-0749, CVE-2013-0770)\n \n Abhishek Arya discovered several user-after-free and buffer overflows in\n Firefox. An attacker could exploit these to cause a denial of service via\n application crash, or potentially execute code with the privileges of the\n user invoking Firefox. (CVE-2013-0760, CVE-2013-0761, CVE-2013-0762,\n CVE-2013-0763, CVE-2013-0766, CVE-2013-0767, CVE-2013-0771, CVE-2012-5829)\n \n A stack buffer was discovered in Firefox. If the user were tricked into\n opening a specially crafted page, an attacker could possibly exploit this\n to cause a denial of service via application crash, or potentially execute\n code with the privileges of the user invoking Firefox. (CVE-2013-0768)\n \n Masato Kinugawa discovered that Firefox did not always properly display URL\n values in the address bar. A remote attacker could exploit this to conduct\n URL spoofing and phishing attacks. (CVE-2013-0759)\n \n Atte Kettunen discovered that Firefox did not properly handle HTML tables\n with a large number of columns and column groups. If the user were tricked\n into opening a specially crafted page, an attacker could exploit this to\n cause a denial of service via application crash, or potentially execute\n code with the privileges of the user invoking Firefox. (CVE-2013-0744)\n \n Jerry Baker discovered that Firefox did not always properly handle\n threading when performing downloads over SSL connections. An attacker could\n exploit this to cause a denial of service via application crash.\n (CVE-2013-0764)\n \n Olli Pettay and Boris Zbarsky discovered flaws in the Javacript engine of\n Firefox. An attacker could cause a denial of service via application crash,\n or potentially execute code with the privileges of the user invoking\n Firefox. (CVE-2013-0745, CVE-2013-0746)\n \n Jesse Ruderman discovered a flaw in the way Firefox handled plugins. If a\n user were tricked into opening a specially crafted pag ... \n\n Description truncated, for more information please check the Reference URL\";\n\n\ntag_affected = \"thunderbird on Ubuntu 12.10 ,\n Ubuntu 12.04 LTS ,\n Ubuntu 11.10 ,\n Ubuntu 10.04 LTS\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name: \"URL\" , value: \"http://www.ubuntu.com/usn/usn-1681-2/\");\n script_id(841272);\n script_version(\"$Revision: 8456 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-18 07:58:40 +0100 (Thu, 18 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2013-01-11 16:49:34 +0530 (Fri, 11 Jan 2013)\");\n script_cve_id(\"CVE-2013-0769\", \"CVE-2013-0749\", \"CVE-2013-0770\", \"CVE-2013-0760\",\n \"CVE-2013-0761\", \"CVE-2013-0762\", \"CVE-2013-0763\", \"CVE-2013-0766\",\n \"CVE-2013-0767\", \"CVE-2013-0771\", \"CVE-2012-5829\", \"CVE-2013-0768\",\n \"CVE-2013-0759\", \"CVE-2013-0744\", \"CVE-2013-0764\", \"CVE-2013-0745\",\n \"CVE-2013-0746\", \"CVE-2013-0747\", \"CVE-2013-0748\", \"CVE-2013-0750\",\n \"CVE-2013-0752\", \"CVE-2013-0757\", \"CVE-2013-0758\", \"CVE-2013-0753\",\n \"CVE-2013-0754\", \"CVE-2013-0755\", \"CVE-2013-0756\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"USN\", value: \"1681-2\");\n script_name(\"Ubuntu Update for thunderbird USN-1681-2\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of thunderbird\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2013 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"UBUNTU12.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"thunderbird\", ver:\"17.0.2+build1-0ubuntu0.12.04.1\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU11.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"thunderbird\", ver:\"17.0.2+build1-0ubuntu0.11.10.1\", rls:\"UBUNTU11.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU10.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"thunderbird\", ver:\"17.0.2+build1-0ubuntu0.10.04.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU12.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"thunderbird\", ver:\"17.0.2+build1-0ubuntu0.12.10.1\", rls:\"UBUNTU12.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-05-29T18:37:51", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-0763", "CVE-2013-0746", "CVE-2012-5829", "CVE-2013-0766", "CVE-2013-0747", "CVE-2013-0744", "CVE-2013-0748", "CVE-2013-0768", "CVE-2013-0755", "CVE-2013-0752", "CVE-2013-0754", "CVE-2013-0769", "CVE-2013-0771", "CVE-2013-0757", "CVE-2013-0749", "CVE-2013-0761", "CVE-2013-0745", "CVE-2013-0756", "CVE-2013-0760", "CVE-2013-0767", "CVE-2013-0762", "CVE-2013-0753", "CVE-2013-0750", "CVE-2013-0759", "CVE-2013-0770", "CVE-2013-0758", "CVE-2013-0764"], "description": "The remote host is missing an update for the ", "modified": "2019-05-24T00:00:00", "published": "2013-02-08T00:00:00", "id": "OPENVAS:1361412562310841307", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310841307", "type": "openvas", "title": "Ubuntu Update for firefox USN-1681-4", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Ubuntu Update for firefox USN-1681-4\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-1681-4/\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.841307\");\n script_version(\"2019-05-24T11:20:30+0000\");\n script_tag(name:\"last_modification\", value:\"2019-05-24 11:20:30 +0000 (Fri, 24 May 2019)\");\n script_tag(name:\"creation_date\", value:\"2013-02-08 10:16:31 +0530 (Fri, 08 Feb 2013)\");\n script_cve_id(\"CVE-2013-0769\", \"CVE-2013-0749\", \"CVE-2013-0770\", \"CVE-2013-0760\",\n \"CVE-2013-0761\", \"CVE-2013-0762\", \"CVE-2013-0763\", \"CVE-2013-0766\",\n \"CVE-2013-0767\", \"CVE-2013-0771\", \"CVE-2012-5829\", \"CVE-2013-0768\",\n \"CVE-2013-0759\", \"CVE-2013-0744\", \"CVE-2013-0764\", \"CVE-2013-0745\",\n \"CVE-2013-0746\", \"CVE-2013-0747\", \"CVE-2013-0748\", \"CVE-2013-0750\",\n \"CVE-2013-0752\", \"CVE-2013-0757\", \"CVE-2013-0758\", \"CVE-2013-0753\",\n \"CVE-2013-0754\", \"CVE-2013-0755\", \"CVE-2013-0756\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name:\"USN\", value:\"1681-4\");\n script_name(\"Ubuntu Update for firefox USN-1681-4\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'firefox'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2013 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU(12\\.04 LTS|11\\.10|10\\.04 LTS|12\\.10)\");\n script_tag(name:\"affected\", value:\"firefox on Ubuntu 12.10,\n Ubuntu 12.04 LTS,\n Ubuntu 11.10,\n Ubuntu 10.04 LTS\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"insight\", value:\"USN-1681-1 fixed vulnerabilities in Firefox. Due to an upstream regression,\n Firefox suffered from instabilities when accessing some websites. This\n update fixes the problem.\n\n We apologize for the inconvenience.\n\n Original advisory details:\n\n Christoph Diehl, Christian Holler, Mats Palmgren, Chiaki Ishikawa, Bill\n Gianopoulos, Benoit Jacob, Gary Kwong, Robert O'Callahan, Jesse Ruderman,\n and Julian Seward discovered multiple memory safety issues affecting\n Firefox. If the user were tricked into opening a specially crafted page, an\n attacker could possibly exploit these to cause a denial of service via\n application crash, or potentially execute code with the privileges of the\n user invoking Firefox. (CVE-2013-0769, CVE-2013-0749, CVE-2013-0770)\n\n Abhishek Arya discovered several user-after-free and buffer overflows in\n Firefox. An attacker could exploit these to cause a denial of service via\n application crash, or potentially execute code with the privileges of the\n user invoking Firefox. (CVE-2013-0760, CVE-2013-0761, CVE-2013-0762,\n CVE-2013-0763, CVE-2013-0766, CVE-2013-0767, CVE-2013-0771, CVE-2012-5829)\n\n A stack buffer was discovered in Firefox. If the user were tricked into\n opening a specially crafted page, an attacker could possibly exploit this\n to cause a denial of service via application crash, or potentially execute\n code with the privileges of the user invoking Firefox. (CVE-2013-0768)\n\n Masato Kinugawa discovered that Firefox did not always properly display URL\n values in the address bar. A remote attacker could exploit this to conduct\n URL spoofing and phishing attacks. (CVE-2013-0759)\n\n Atte Kettunen discovered that Firefox did not properly handle HTML tables\n with a large number of columns and column groups. If the user were tricked\n into opening a specially crafted page, an attacker could exploit this to\n cause a denial of service via application crash, or potentially execute\n code with the privileges of the user invoking Firefox. (CVE-2013-0744)\n\n Jerry Baker discovered that Firefox did not always properly handle\n threading when performing downloads over SSL connections. An attacker could\n exploit this to cause a denial of service via application crash.\n (CVE-2013-0764)\n\n Olli Pettay and Boris Zbarsky discovered flaws in the JavaScript engine of\n Firefox. An attacker could cause a denial of service via application crash,\n or potentially execute code with the privileges of the user invoking\n Firefox. (CVE-2013-0745, CVE-2013-0746)\n\n Jesse Ruderman discovered a ...\n\n Description truncated, please see the referenced URL(s) for more information.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU12.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"firefox\", ver:\"18.0.2+build1-0ubuntu0.12.04.1\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU11.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"firefox\", ver:\"18.0.2+build1-0ubuntu0.11.10.1\", rls:\"UBUNTU11.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU10.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"firefox\", ver:\"18.0.2+build1-0ubuntu0.10.04.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU12.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"firefox\", ver:\"18.0.2+build1-0ubuntu0.12.10.1\", rls:\"UBUNTU12.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:38:12", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-0763", "CVE-2013-0746", "CVE-2012-5829", "CVE-2013-0766", "CVE-2013-0747", "CVE-2013-0744", "CVE-2013-0748", "CVE-2013-0768", "CVE-2013-0755", "CVE-2013-0752", "CVE-2013-0754", "CVE-2013-0769", "CVE-2013-0771", "CVE-2013-0757", "CVE-2013-0749", "CVE-2013-0761", "CVE-2013-0745", "CVE-2013-0756", "CVE-2013-0760", "CVE-2013-0767", "CVE-2013-0762", "CVE-2013-0753", "CVE-2013-0750", "CVE-2013-0759", "CVE-2013-0770", "CVE-2013-0758", "CVE-2013-0764"], "description": "The remote host is missing an update for the ", "modified": "2019-05-24T00:00:00", "published": "2013-01-11T00:00:00", "id": "OPENVAS:1361412562310841273", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310841273", "type": "openvas", "title": "Ubuntu Update for firefox USN-1681-1", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Ubuntu Update for firefox USN-1681-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-1681-1/\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.841273\");\n script_version(\"2019-05-24T11:20:30+0000\");\n script_tag(name:\"last_modification\", value:\"2019-05-24 11:20:30 +0000 (Fri, 24 May 2019)\");\n script_tag(name:\"creation_date\", value:\"2013-01-11 16:50:06 +0530 (Fri, 11 Jan 2013)\");\n script_cve_id(\"CVE-2013-0769\", \"CVE-2013-0749\", \"CVE-2013-0770\", \"CVE-2013-0760\",\n \"CVE-2013-0761\", \"CVE-2013-0762\", \"CVE-2013-0763\", \"CVE-2013-0766\",\n \"CVE-2013-0767\", \"CVE-2013-0771\", \"CVE-2012-5829\", \"CVE-2013-0768\",\n \"CVE-2013-0759\", \"CVE-2013-0744\", \"CVE-2013-0764\", \"CVE-2013-0745\",\n \"CVE-2013-0746\", \"CVE-2013-0747\", \"CVE-2013-0748\", \"CVE-2013-0750\",\n \"CVE-2013-0752\", \"CVE-2013-0757\", \"CVE-2013-0758\", \"CVE-2013-0753\",\n \"CVE-2013-0754\", \"CVE-2013-0755\", \"CVE-2013-0756\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name:\"USN\", value:\"1681-1\");\n script_name(\"Ubuntu Update for firefox USN-1681-1\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'firefox'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2013 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU(12\\.04 LTS|11\\.10|10\\.04 LTS|12\\.10)\");\n script_tag(name:\"affected\", value:\"firefox on Ubuntu 12.10,\n Ubuntu 12.04 LTS,\n Ubuntu 11.10,\n Ubuntu 10.04 LTS\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"insight\", value:\"Christoph Diehl, Christian Holler, Mats Palmgren, Chiaki Ishikawa, Bill\n Gianopoulos, Benoit Jacob, Gary Kwong, Robert O'Callahan, Jesse Ruderman,\n and Julian Seward discovered multiple memory safety issues affecting\n Firefox. If the user were tricked into opening a specially crafted page, an\n attacker could possibly exploit these to cause a denial of service via\n application crash, or potentially execute code with the privileges of the\n user invoking Firefox. (CVE-2013-0769, CVE-2013-0749, CVE-2013-0770)\n\n Abhishek Arya discovered several user-after-free and buffer overflows in\n Firefox. An attacker could exploit these to cause a denial of service via\n application crash, or potentially execute code with the privileges of the\n user invoking Firefox. (CVE-2013-0760, CVE-2013-0761, CVE-2013-0762,\n CVE-2013-0763, CVE-2013-0766, CVE-2013-0767, CVE-2013-0771, CVE-2012-5829)\n\n A stack buffer was discovered in Firefox. If the user were tricked into\n opening a specially crafted page, an attacker could possibly exploit this\n to cause a denial of service via application crash, or potentially execute\n code with the privileges of the user invoking Firefox. (CVE-2013-0768)\n\n Masato Kinugawa discovered that Firefox did not always properly display URL\n values in the address bar. A remote attacker could exploit this to conduct\n URL spoofing and phishing attacks. (CVE-2013-0759)\n\n Atte Kettunen discovered that Firefox did not properly handle HTML tables\n with a large number of columns and column groups. If the user were tricked\n into opening a specially crafted page, an attacker could exploit this to\n cause a denial of service via application crash, or potentially execute\n code with the privileges of the user invoking Firefox. (CVE-2013-0744)\n\n Jerry Baker discovered that Firefox did not always properly handle\n threading when performing downloads over SSL connections. An attacker could\n exploit this to cause a denial of service via application crash.\n (CVE-2013-0764)\n\n Olli Pettay and Boris Zbarsky discovered flaws in the JavaScript engine of\n Firefox. An attacker could cause a denial of service via application crash,\n or potentially execute code with the privileges of the user invoking\n Firefox. (CVE-2013-0745, CVE-2013-0746)\n\n Jesse Ruderman discovered a flaw in the way Firefox handled plugins. If a\n user were tricked into opening a specially crafted page, a remote attacker\n could exploit this to bypass security protections to conduct clickjacking\n attacks. (CVE-2013-0747)\n\n Jesse Ruderman discover ...\n\n Description truncated, please see the referenced URL(s) for more information.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU12.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"firefox\", ver:\"18.0+build1-0ubuntu0.12.04.3\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU11.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"firefox\", ver:\"18.0+build1-0ubuntu0.11.10.3\", rls:\"UBUNTU11.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU10.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"firefox\", ver:\"18.0+build1-0ubuntu0.10.04.3\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU12.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"firefox\", ver:\"18.0+build1-0ubuntu0.12.10.3\", rls:\"UBUNTU12.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2017-12-04T11:21:36", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-0763", "CVE-2013-0746", "CVE-2012-5829", "CVE-2013-0766", "CVE-2013-0747", "CVE-2013-0744", "CVE-2013-0748", "CVE-2013-0768", "CVE-2013-0755", "CVE-2013-0752", "CVE-2013-0754", "CVE-2013-0769", "CVE-2013-0771", "CVE-2013-0757", "CVE-2013-0749", "CVE-2013-0761", "CVE-2013-0745", "CVE-2013-0756", "CVE-2013-0760", "CVE-2013-0767", "CVE-2013-0762", "CVE-2013-0753", "CVE-2013-0750", "CVE-2013-0759", "CVE-2013-0770", "CVE-2013-0758", "CVE-2013-0764"], "description": "Check for the Version of firefox", "modified": "2017-12-01T00:00:00", "published": "2013-02-08T00:00:00", "id": "OPENVAS:841307", "href": "http://plugins.openvas.org/nasl.php?oid=841307", "type": "openvas", "title": "Ubuntu Update for firefox USN-1681-4", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_1681_4.nasl 7958 2017-12-01 06:47:47Z santu $\n#\n# Ubuntu Update for firefox USN-1681-4\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"USN-1681-1 fixed vulnerabilities in Firefox. Due to an upstream regression,\n Firefox suffered from instabilities when accessing some websites. This\n update fixes the problem.\n\n We apologize for the inconvenience.\n \n Original advisory details:\n \n Christoph Diehl, Christian Holler, Mats Palmgren, Chiaki Ishikawa, Bill\n Gianopoulos, Benoit Jacob, Gary Kwong, Robert O'Callahan, Jesse Ruderman,\n and Julian Seward discovered multiple memory safety issues affecting\n Firefox. If the user were tricked into opening a specially crafted page, an\n attacker could possibly exploit these to cause a denial of service via\n application crash, or potentially execute code with the privileges of the\n user invoking Firefox. (CVE-2013-0769, CVE-2013-0749, CVE-2013-0770)\n \n Abhishek Arya discovered several user-after-free and buffer overflows in\n Firefox. An attacker could exploit these to cause a denial of service via\n application crash, or potentially execute code with the privileges of the\n user invoking Firefox. (CVE-2013-0760, CVE-2013-0761, CVE-2013-0762,\n CVE-2013-0763, CVE-2013-0766, CVE-2013-0767, CVE-2013-0771, CVE-2012-5829)\n \n A stack buffer was discovered in Firefox. If the user were tricked into\n opening a specially crafted page, an attacker could possibly exploit this\n to cause a denial of service via application crash, or potentially execute\n code with the privileges of the user invoking Firefox. (CVE-2013-0768)\n \n Masato Kinugawa discovered that Firefox did not always properly display URL\n values in the address bar. A remote attacker could exploit this to conduct\n URL spoofing and phishing attacks. (CVE-2013-0759)\n \n Atte Kettunen discovered that Firefox did not properly handle HTML tables\n with a large number of columns and column groups. If the user were tricked\n into opening a specially crafted page, an attacker could exploit this to\n cause a denial of service via application crash, or potentially execute\n code with the privileges of the user invoking Firefox. (CVE-2013-0744)\n \n Jerry Baker discovered that Firefox did not always properly handle\n threading when performing downloads over SSL connections. An attacker could\n exploit this to cause a denial of service via application crash.\n (CVE-2013-0764)\n \n Olli Pettay and Boris Zbarsky discovered flaws in the Javacript engine of\n Firefox. An attacker could cause a denial of service via application crash,\n or potentially execute code with the privileges of the user invoking\n Firefox. (CVE-2013-0745, CVE-2013-0746)\n \n Jesse Ruderman discovered a ... \n\n Description truncated, for more information please check the Reference URL\";\n\n\ntag_affected = \"firefox on Ubuntu 12.10 ,\n Ubuntu 12.04 LTS ,\n Ubuntu 11.10 ,\n Ubuntu 10.04 LTS\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name: \"URL\" , value: \"http://www.ubuntu.com/usn/usn-1681-4/\");\n script_id(841307);\n script_version(\"$Revision: 7958 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-01 07:47:47 +0100 (Fri, 01 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2013-02-08 10:16:31 +0530 (Fri, 08 Feb 2013)\");\n script_cve_id(\"CVE-2013-0769\", \"CVE-2013-0749\", \"CVE-2013-0770\", \"CVE-2013-0760\",\n \"CVE-2013-0761\", \"CVE-2013-0762\", \"CVE-2013-0763\", \"CVE-2013-0766\",\n \"CVE-2013-0767\", \"CVE-2013-0771\", \"CVE-2012-5829\", \"CVE-2013-0768\",\n \"CVE-2013-0759\", \"CVE-2013-0744\", \"CVE-2013-0764\", \"CVE-2013-0745\",\n \"CVE-2013-0746\", \"CVE-2013-0747\", \"CVE-2013-0748\", \"CVE-2013-0750\",\n \"CVE-2013-0752\", \"CVE-2013-0757\", \"CVE-2013-0758\", \"CVE-2013-0753\",\n \"CVE-2013-0754\", \"CVE-2013-0755\", \"CVE-2013-0756\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"USN\", value: \"1681-4\");\n script_name(\"Ubuntu Update for firefox USN-1681-4\");\n\n script_summary(\"Check for the Version of firefox\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2013 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"UBUNTU12.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"firefox\", ver:\"18.0.2+build1-0ubuntu0.12.04.1\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU11.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"firefox\", ver:\"18.0.2+build1-0ubuntu0.11.10.1\", rls:\"UBUNTU11.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU10.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"firefox\", ver:\"18.0.2+build1-0ubuntu0.10.04.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU12.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"firefox\", ver:\"18.0.2+build1-0ubuntu0.12.10.1\", rls:\"UBUNTU12.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-05-29T18:38:24", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-0763", "CVE-2013-0746", "CVE-2012-5829", "CVE-2013-0766", "CVE-2013-0747", "CVE-2013-0744", "CVE-2013-0748", "CVE-2013-0768", "CVE-2013-0755", "CVE-2013-0752", "CVE-2013-0754", "CVE-2013-0769", "CVE-2013-0771", "CVE-2013-0757", "CVE-2013-0749", "CVE-2013-0761", "CVE-2013-0745", "CVE-2013-0756", "CVE-2013-0760", "CVE-2013-0767", "CVE-2013-0762", "CVE-2013-0753", "CVE-2013-0750", "CVE-2013-0759", "CVE-2013-0770", "CVE-2013-0758", "CVE-2013-0764"], "description": "The remote host is missing an update for the ", "modified": "2019-05-24T00:00:00", "published": "2013-01-11T00:00:00", "id": "OPENVAS:1361412562310841272", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310841272", "type": "openvas", "title": "Ubuntu Update for thunderbird USN-1681-2", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Ubuntu Update for thunderbird USN-1681-2\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-1681-2/\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.841272\");\n script_version(\"2019-05-24T11:20:30+0000\");\n script_tag(name:\"last_modification\", value:\"2019-05-24 11:20:30 +0000 (Fri, 24 May 2019)\");\n script_tag(name:\"creation_date\", value:\"2013-01-11 16:49:34 +0530 (Fri, 11 Jan 2013)\");\n script_cve_id(\"CVE-2013-0769\", \"CVE-2013-0749\", \"CVE-2013-0770\", \"CVE-2013-0760\",\n \"CVE-2013-0761\", \"CVE-2013-0762\", \"CVE-2013-0763\", \"CVE-2013-0766\",\n \"CVE-2013-0767\", \"CVE-2013-0771\", \"CVE-2012-5829\", \"CVE-2013-0768\",\n \"CVE-2013-0759\", \"CVE-2013-0744\", \"CVE-2013-0764\", \"CVE-2013-0745\",\n \"CVE-2013-0746\", \"CVE-2013-0747\", \"CVE-2013-0748\", \"CVE-2013-0750\",\n \"CVE-2013-0752\", \"CVE-2013-0757\", \"CVE-2013-0758\", \"CVE-2013-0753\",\n \"CVE-2013-0754\", \"CVE-2013-0755\", \"CVE-2013-0756\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name:\"USN\", value:\"1681-2\");\n script_name(\"Ubuntu Update for thunderbird USN-1681-2\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'thunderbird'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2013 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU(12\\.04 LTS|11\\.10|10\\.04 LTS|12\\.10)\");\n script_tag(name:\"affected\", value:\"thunderbird on Ubuntu 12.10,\n Ubuntu 12.04 LTS,\n Ubuntu 11.10,\n Ubuntu 10.04 LTS\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"insight\", value:\"USN-1681-1 fixed vulnerabilities in Firefox. This update provides the\n corresponding updates for Thunderbird.\n\n Original advisory details:\n\n Christoph Diehl, Christian Holler, Mats Palmgren, Chiaki Ishikawa, Bill\n Gianopoulos, Benoit Jacob, Gary Kwong, Robert O'Callahan, Jesse Ruderman,\n and Julian Seward discovered multiple memory safety issues affecting\n Firefox. If the user were tricked into opening a specially crafted page, an\n attacker could possibly exploit these to cause a denial of service via\n application crash, or potentially execute code with the privileges of the\n user invoking Firefox. (CVE-2013-0769, CVE-2013-0749, CVE-2013-0770)\n\n Abhishek Arya discovered several user-after-free and buffer overflows in\n Firefox. An attacker could exploit these to cause a denial of service via\n application crash, or potentially execute code with the privileges of the\n user invoking Firefox. (CVE-2013-0760, CVE-2013-0761, CVE-2013-0762,\n CVE-2013-0763, CVE-2013-0766, CVE-2013-0767, CVE-2013-0771, CVE-2012-5829)\n\n A stack buffer was discovered in Firefox. If the user were tricked into\n opening a specially crafted page, an attacker could possibly exploit this\n to cause a denial of service via application crash, or potentially execute\n code with the privileges of the user invoking Firefox. (CVE-2013-0768)\n\n Masato Kinugawa discovered that Firefox did not always properly display URL\n values in the address bar. A remote attacker could exploit this to conduct\n URL spoofing and phishing attacks. (CVE-2013-0759)\n\n Atte Kettunen discovered that Firefox did not properly handle HTML tables\n with a large number of columns and column groups. If the user were tricked\n into opening a specially crafted page, an attacker could exploit this to\n cause a denial of service via application crash, or potentially execute\n code with the privileges of the user invoking Firefox. (CVE-2013-0744)\n\n Jerry Baker discovered that Firefox did not always properly handle\n threading when performing downloads over SSL connections. An attacker could\n exploit this to cause a denial of service via application crash.\n (CVE-2013-0764)\n\n Olli Pettay and Boris Zbarsky discovered flaws in the JavaScript engine of\n Firefox. An attacker could cause a denial of service via application crash,\n or potentially execute code with the privileges of the user invoking\n Firefox. (CVE-2013-0745, CVE-2013-0746)\n\n Jesse Ruderman discovered a flaw in the way Firefox handled plugins. If a\n user were tricked into opening a specially crafted pag ...\n\n Description truncated, please see the referenced URL(s) for more information.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU12.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"thunderbird\", ver:\"17.0.2+build1-0ubuntu0.12.04.1\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU11.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"thunderbird\", ver:\"17.0.2+build1-0ubuntu0.11.10.1\", rls:\"UBUNTU11.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU10.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"thunderbird\", ver:\"17.0.2+build1-0ubuntu0.10.04.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU12.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"thunderbird\", ver:\"17.0.2+build1-0ubuntu0.12.10.1\", rls:\"UBUNTU12.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:38:08", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-0763", "CVE-2013-0746", "CVE-2012-5829", "CVE-2013-0766", "CVE-2013-0747", "CVE-2013-0744", "CVE-2013-0748", "CVE-2013-0768", "CVE-2013-0755", "CVE-2013-0752", "CVE-2013-0754", "CVE-2013-0769", "CVE-2013-0771", "CVE-2013-0757", "CVE-2013-0749", "CVE-2013-0761", "CVE-2013-0745", "CVE-2013-0756", "CVE-2013-0760", "CVE-2013-0767", "CVE-2013-0762", "CVE-2013-0753", "CVE-2013-0750", "CVE-2013-0759", "CVE-2013-0770", "CVE-2013-0758", "CVE-2013-0764"], "description": "The remote host is missing an update for the ", "modified": "2019-05-24T00:00:00", "published": "2013-01-24T00:00:00", "id": "OPENVAS:1361412562310841289", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310841289", "type": "openvas", "title": "Ubuntu Update for firefox USN-1681-3", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Ubuntu Update for firefox USN-1681-3\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_tag(name:\"affected\", value:\"firefox on Ubuntu 12.10,\n Ubuntu 12.04 LTS,\n Ubuntu 11.10,\n Ubuntu 10.04 LTS\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"insight\", value:\"USN-1681-1 fixed vulnerabilities in Firefox. Due to an upstream regression,\n some translations became unusable after upgrading. This update fixes the\n problem.\n\n We apologize for the inconvenience.\n\n Original advisory details:\n\n Christoph Diehl, Christian Holler, Mats Palmgren, Chiaki Ishikawa, Bill\n Gianopoulos, Benoit Jacob, Gary Kwong, Robert O'Callahan, Jesse Ruderman,\n and Julian Seward discovered multiple memory safety issues affecting\n Firefox. If the user were tricked into opening a specially crafted page, an\n attacker could possibly exploit these to cause a denial of service via\n application crash, or potentially execute code with the privileges of the\n user invoking Firefox. (CVE-2013-0769, CVE-2013-0749, CVE-2013-0770)\n\n Abhishek Arya discovered several user-after-free and buffer overflows in\n Firefox. An attacker could exploit these to cause a denial of service via\n application crash, or potentially execute code with the privileges of the\n user invoking Firefox. (CVE-2013-0760, CVE-2013-0761, CVE-2013-0762,\n CVE-2013-0763, CVE-2013-0766, CVE-2013-0767, CVE-2013-0771, CVE-2012-5829)\n\n A stack buffer was discovered in Firefox. If the user were tricked into\n opening a specially crafted page, an attacker could possibly exploit this\n to cause a denial of service via application crash, or potentially execute\n code with the privileges of the user invoking Firefox. (CVE-2013-0768)\n\n Masato Kinugawa discovered that Firefox did not always properly display URL\n values in the address bar. A remote attacker could exploit this to conduct\n URL spoofing and phishing attacks. (CVE-2013-0759)\n\n Atte Kettunen discovered that Firefox did not properly handle HTML tables\n with a large number of columns and column groups. If the user were tricked\n into opening a specially crafted page, an attacker could exploit this to\n cause a denial of service via application crash, or potentially execute\n code with the privileges of the user invoking Firefox. (CVE-2013-0744)\n\n Jerry Baker discovered that Firefox did not always properly handle\n threading when performing downloads over SSL connections. An attacker could\n exploit this to cause a denial of service via application crash.\n (CVE-2013-0764)\n\n Olli Pettay and Boris Zbarsky discovered flaws in the JavaScript engine of\n Firefox. An attacker could cause a denial of service via application crash,\n or potentially execute code with the privileges of the user invoking\n Firefox. (CVE-2013-0745, CVE-2013-0746)\n\n Jesse Ruderman discovered a flaw in the way ...\n\n Description truncated, please see the referenced URL(s) for more information.\");\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-1681-3/\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.841289\");\n script_version(\"2019-05-24T11:20:30+0000\");\n script_tag(name:\"last_modification\", value:\"2019-05-24 11:20:30 +0000 (Fri, 24 May 2019)\");\n script_tag(name:\"creation_date\", value:\"2013-01-24 09:34:37 +0530 (Thu, 24 Jan 2013)\");\n script_cve_id(\"CVE-2013-0769\", \"CVE-2013-0749\", \"CVE-2013-0770\", \"CVE-2013-0760\",\n \"CVE-2013-0761\", \"CVE-2013-0762\", \"CVE-2013-0763\", \"CVE-2013-0766\",\n \"CVE-2013-0767\", \"CVE-2013-0771\", \"CVE-2012-5829\", \"CVE-2013-0768\",\n \"CVE-2013-0759\", \"CVE-2013-0744\", \"CVE-2013-0764\", \"CVE-2013-0745\",\n \"CVE-2013-0746\", \"CVE-2013-0747\", \"CVE-2013-0748\", \"CVE-2013-0750\",\n \"CVE-2013-0752\", \"CVE-2013-0757\", \"CVE-2013-0758\", \"CVE-2013-0753\",\n \"CVE-2013-0754\", \"CVE-2013-0755\", \"CVE-2013-0756\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"USN\", value:\"1681-3\");\n script_name(\"Ubuntu Update for firefox USN-1681-3\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'firefox'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2013 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU(12\\.04 LTS|11\\.10|10\\.04 LTS|12\\.10)\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU12.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"firefox\", ver:\"18.0.1+build1-0ubuntu0.12.04.1\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU11.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"firefox\", ver:\"18.0.1+build1-0ubuntu0.11.10.1\", rls:\"UBUNTU11.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU10.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"firefox\", ver:\"18.0.1+build1-0ubuntu0.10.04.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU12.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"firefox\", ver:\"18.0.1+build1-0ubuntu0.12.10.1\", rls:\"UBUNTU12.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2018-01-26T11:09:46", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-0763", "CVE-2013-0746", "CVE-2012-5829", "CVE-2013-0766", "CVE-2013-0747", "CVE-2013-0744", "CVE-2013-0748", "CVE-2013-0768", "CVE-2013-0755", "CVE-2013-0752", "CVE-2013-0754", "CVE-2013-0769", "CVE-2013-0771", "CVE-2013-0757", "CVE-2013-0749", "CVE-2013-0761", "CVE-2013-0745", "CVE-2013-0756", "CVE-2013-0760", "CVE-2013-0767", "CVE-2013-0762", "CVE-2013-0753", "CVE-2013-0750", "CVE-2013-0759", "CVE-2013-0770", "CVE-2013-0758", "CVE-2013-0764"], "description": "Check for the Version of firefox", "modified": "2018-01-26T00:00:00", "published": "2013-01-24T00:00:00", "id": "OPENVAS:841289", "href": "http://plugins.openvas.org/nasl.php?oid=841289", "type": "openvas", "title": "Ubuntu Update for firefox USN-1681-3", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_1681_3.nasl 8542 2018-01-26 06:57:28Z teissa $\n#\n# Ubuntu Update for firefox USN-1681-3\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"USN-1681-1 fixed vulnerabilities in Firefox. Due to an upstream regression,\n some translations became unusable after upgrading. This update fixes the\n problem.\n\n We apologize for the inconvenience.\n \n Original advisory details:\n \n Christoph Diehl, Christian Holler, Mats Palmgren, Chiaki Ishikawa, Bill\n Gianopoulos, Benoit Jacob, Gary Kwong, Robert O'Callahan, Jesse Ruderman,\n and Julian Seward discovered multiple memory safety issues affecting\n Firefox. If the user were tricked into opening a specially crafted page, an\n attacker could possibly exploit these to cause a denial of service via\n application crash, or potentially execute code with the privileges of the\n user invoking Firefox. (CVE-2013-0769, CVE-2013-0749, CVE-2013-0770)\n \n Abhishek Arya discovered several user-after-free and buffer overflows in\n Firefox. An attacker could exploit these to cause a denial of service via\n application crash, or potentially execute code with the privileges of the\n user invoking Firefox. (CVE-2013-0760, CVE-2013-0761, CVE-2013-0762,\n CVE-2013-0763, CVE-2013-0766, CVE-2013-0767, CVE-2013-0771, CVE-2012-5829)\n \n A stack buffer was discovered in Firefox. If the user were tricked into\n opening a specially crafted page, an attacker could possibly exploit this\n to cause a denial of service via application crash, or potentially execute\n code with the privileges of the user invoking Firefox. (CVE-2013-0768)\n \n Masato Kinugawa discovered that Firefox did not always properly display URL\n values in the address bar. A remote attacker could exploit this to conduct\n URL spoofing and phishing attacks. (CVE-2013-0759)\n \n Atte Kettunen discovered that Firefox did not properly handle HTML tables\n with a large number of columns and column groups. If the user were tricked\n into opening a specially crafted page, an attacker could exploit this to\n cause a denial of service via application crash, or potentially execute\n code with the privileges of the user invoking Firefox. (CVE-2013-0744)\n \n Jerry Baker discovered that Firefox did not always properly handle\n threading when performing downloads over SSL connections. An attacker could\n exploit this to cause a denial of service via application crash.\n (CVE-2013-0764)\n \n Olli Pettay and Boris Zbarsky discovered flaws in the Javacript engine of\n Firefox. An attacker could cause a denial of service via application crash,\n or potentially execute code with the privileges of the user invoking\n Firefox. (CVE-2013-0745, CVE-2013-0746)\n \n Jesse Ruderman discovered a flaw in the way ... \n\n Description truncated, for more information please check the Reference URL\";\n\n\ntag_solution = \"Please Install the Updated Packages.\";\ntag_affected = \"firefox on Ubuntu 12.10 ,\n Ubuntu 12.04 LTS ,\n Ubuntu 11.10 ,\n Ubuntu 10.04 LTS\";\n\n\n\n\nif(description)\n{\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_xref(name: \"URL\" , value: \"http://www.ubuntu.com/usn/usn-1681-3/\");\n script_id(841289);\n script_version(\"$Revision: 8542 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-26 07:57:28 +0100 (Fri, 26 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2013-01-24 09:34:37 +0530 (Thu, 24 Jan 2013)\");\n script_cve_id(\"CVE-2013-0769\", \"CVE-2013-0749\", \"CVE-2013-0770\", \"CVE-2013-0760\",\n \"CVE-2013-0761\", \"CVE-2013-0762\", \"CVE-2013-0763\", \"CVE-2013-0766\",\n \"CVE-2013-0767\", \"CVE-2013-0771\", \"CVE-2012-5829\", \"CVE-2013-0768\",\n \"CVE-2013-0759\", \"CVE-2013-0744\", \"CVE-2013-0764\", \"CVE-2013-0745\",\n \"CVE-2013-0746\", \"CVE-2013-0747\", \"CVE-2013-0748\", \"CVE-2013-0750\",\n \"CVE-2013-0752\", \"CVE-2013-0757\", \"CVE-2013-0758\", \"CVE-2013-0753\",\n \"CVE-2013-0754\", \"CVE-2013-0755\", \"CVE-2013-0756\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name: \"USN\", value: \"1681-3\");\n script_name(\"Ubuntu Update for firefox USN-1681-3\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of firefox\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2013 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"UBUNTU12.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"firefox\", ver:\"18.0.1+build1-0ubuntu0.12.04.1\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU11.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"firefox\", ver:\"18.0.1+build1-0ubuntu0.11.10.1\", rls:\"UBUNTU11.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU10.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"firefox\", ver:\"18.0.1+build1-0ubuntu0.10.04.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU12.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"firefox\", ver:\"18.0.1+build1-0ubuntu0.12.10.1\", rls:\"UBUNTU12.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-01-18T11:08:45", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-0743", "CVE-2013-0763", "CVE-2013-0746", "CVE-2012-5829", "CVE-2013-0766", "CVE-2013-0747", "CVE-2013-0751", "CVE-2013-0744", "CVE-2013-0748", "CVE-2013-0768", "CVE-2013-0755", "CVE-2013-0752", "CVE-2013-0754", "CVE-2013-0769", "CVE-2013-0771", "CVE-2013-0757", "CVE-2013-0749", "CVE-2013-0761", "CVE-2012-0759", "CVE-2013-0745", "CVE-2013-0756", "CVE-2013-0760", "CVE-2013-0767", "CVE-2013-0762", "CVE-2013-0753", "CVE-2013-0750", "CVE-2013-0759", "CVE-2013-0770", "CVE-2013-0758", "CVE-2013-0764"], "description": "Check for the Version of Mozilla", "modified": "2018-01-18T00:00:00", "published": "2013-03-11T00:00:00", "id": "OPENVAS:850391", "href": "http://plugins.openvas.org/nasl.php?oid=850391", "type": "openvas", "title": "SuSE Update for Mozilla openSUSE-SU-2013:0149-1 (Mozilla)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_suse_2013_0149_1.nasl 8456 2018-01-18 06:58:40Z teissa $\n#\n# SuSE Update for Mozilla openSUSE-SU-2013:0149-1 (Mozilla)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The Mozilla January 8th 2013 security release contains\n updates:\n\n Mozilla Firefox was updated to version 18.0. Mozilla\n Seamonkey was updated to version 2.15. Mozilla Thunderbird\n was updated to version 17.0.2. Mozilla XULRunner was\n updated to version 17.0.2.\n\n * MFSA 2013-01/CVE-2013-0749/CVE-2013-0769/CVE-2013-0770\n Miscellaneous memory safety hazards\n * MFSA\n 2013-02/CVE-2013-0760/CVE-2013-0762/CVE-2013-0766/CVE-2013-0\n 767\n CVE-2013-0761/CVE-2013-0763/CVE-2013-0771/CVE-2012-5829\n Use-after-free and buffer overflow issues found using\n Address Sanitizer\n * MFSA 2013-03/CVE-2013-0768 (bmo#815795) Buffer Overflow\n in Canvas\n * MFSA 2013-04/CVE-2012-0759 (bmo#802026) URL spoofing in\n addressbar during page loads\n * MFSA 2013-05/CVE-2013-0744 (bmo#814713) Use-after-free\n when displaying table with many columns and column groups\n * MFSA 2013-06/CVE-2013-0751 (bmo#790454) Touch events are\n shared across iframes\n * MFSA 2013-07/CVE-2013-0764 (bmo#804237) Crash due to\n handling of SSL on threads\n * MFSA 2013-08/CVE-2013-0745 (bmo#794158)\n AutoWrapperChanger fails to keep objects alive during\n garbage collection\n * MFSA 2013-09/CVE-2013-0746 (bmo#816842) Compartment\n mismatch with quickstubs returned values\n * MFSA 2013-10/CVE-2013-0747 (bmo#733305) Event\n manipulation in plugin handler to bypass same-origin\n policy\n * MFSA 2013-11/CVE-2013-0748 (bmo#806031) Address space\n layout leaked in XBL objects\n * MFSA 2013-12/CVE-2013-0750 (bmo#805121) Buffer overflow\n in Javascript string concatenation\n * MFSA 2013-13/CVE-2013-0752 (bmo#805024) Memory corruption\n in XBL with XML bindings containing SVG\n * MFSA 2013-14/CVE-2013-0757 (bmo#813901) Chrome Object\n Wrapper (COW) bypass through changing prototype\n * MFSA 2013-15/CVE-2013-0758 (bmo#813906) Privilege\n escalation through plugin objects\n * MFSA 2013-16/CVE-2013-0753 (bmo#814001) Use-after-free in\n serializeToStream\n * MFSA 2013-17/CVE-2013-0754 (bmo#814026) Use-after-free in\n ListenerManager\n * MFSA 2013-18/CVE-2013-0755 (bmo#814027) Use-after-free in\n Vibrate\n * MFSA 2013-19/CVE-2013-0756 (bmo#814029) Use-after-free in\n Javascript Proxy objects\n\n Mozilla NSPR was updated to 4.9.4, containing some small\n bugfixes and new features.\n\n Mozilla NSS was updated to 3.14.1 containing various new\n features, security fix and bugfixes\n\n * MFSA 2013-20/CVE-2013-0743 (bmo#825022, bnc#796628)\n revoke mis-issued intermediate certificates from TURKTRUST\n\n Cryptographic changes done:\n * Support for TLS 1.1 (RFC 4346)\n * Experimental support for DTLS 1.0 (RFC 4347) and\n DTLS-SRTP (RFC 5764)\n * Support ... \n\n Description truncated, for more information please check the Reference URL\";\n\n\ntag_affected = \"Mozilla on openSUSE 12.1\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html\");\n script_id(850391);\n script_version(\"$Revision: 8456 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-18 07:58:40 +0100 (Thu, 18 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2013-03-11 18:29:16 +0530 (Mon, 11 Mar 2013)\");\n script_cve_id(\"CVE-2012-5829\", \"CVE-2013-0744\", \"CVE-2013-0745\",\n \"CVE-2013-0746\", \"CVE-2013-0747\", \"CVE-2013-0748\", \"CVE-2013-0749\",\n \"CVE-2013-0750\", \"CVE-2013-0751\", \"CVE-2013-0752\", \"CVE-2013-0753\",\n \"CVE-2013-0754\", \"CVE-2013-0755\", \"CVE-2013-0756\", \"CVE-2013-0757\",\n \"CVE-2013-0758\", \"CVE-2013-0759\", \"CVE-2013-0760\", \"CVE-2013-0761\",\n \"CVE-2013-0762\", \"CVE-2013-0763\", \"CVE-2013-0764\", \"CVE-2013-0766\",\n \"CVE-2013-0767\", \"CVE-2013-0768\", \"CVE-2013-0769\", \"CVE-2013-0770\",\n \"CVE-2013-0771\", \"CVE-2012-0759\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"openSUSE-SU\", value: \"2013:0149_1\");\n script_name(\"SuSE Update for Mozilla openSUSE-SU-2013:0149-1 (Mozilla)\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of Mozilla\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2013 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"openSUSE12.1\")\n{\n\n if ((res = isrpmvuln(pkg:\"MozillaFirefox\", rpm:\"MozillaFirefox~18.0~2.58.2\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaFirefox-branding-upstream\", rpm:\"MozillaFirefox-branding-upstream~18.0~2.58.2\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaFirefox-buildsymbols\", rpm:\"MozillaFirefox-buildsymbols~18.0~2.58.2\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaFirefox-debuginfo\", rpm:\"MozillaFirefox-debuginfo~18.0~2.58.2\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaFirefox-debugsource\", rpm:\"MozillaFirefox-debugsource~18.0~2.58.2\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaFirefox-devel\", rpm:\"MozillaFirefox-devel~18.0~2.58.2\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaFirefox-translations-common\", rpm:\"MozillaFirefox-translations-common~18.0~2.58.2\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaFirefox-translations-other\", rpm:\"MozillaFirefox-translations-other~18.0~2.58.2\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaThunderbird\", rpm:\"MozillaThunderbird~17.0.2~33.47.2\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaThunderbird-buildsymbols\", rpm:\"MozillaThunderbird-buildsymbols~17.0.2~33.47.2\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaThunderbird-debuginfo\", rpm:\"MozillaThunderbird-debuginfo~17.0.2~33.47.2\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaThunderbird-debugsource\", rpm:\"MozillaThunderbird-debugsource~17.0.2~33.47.2\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaThunderbird-devel\", rpm:\"MozillaThunderbird-devel~17.0.2~33.47.2\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaThunderbird-devel-debuginfo\", rpm:\"MozillaThunderbird-devel-debuginfo~17.0.2~33.47.2\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaThunderbird-translations-common\", rpm:\"MozillaThunderbird-translations-common~17.0.2~33.47.2\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"MozillaThunderbird-translations-other\", rpm:\"MozillaThunderbird-translations-other~17.0.2~33.47.2\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"enigmail\", rpm:\"enigmail~1.5.0+17.0.2~33.47.2\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"enigmail-debuginfo\", rpm:\"enigmail-debuginfo~1.5.0+17.0.2~33.47.2\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libfreebl3\", rpm:\"libfreebl3~3.14.1~9.21.3\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libfreebl3-debuginfo\", rpm:\"libfreebl3-debuginfo~3.14.1~9.21.3\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libsoftokn3\", rpm:\"libsoftokn3~3.14.1~9.21.3\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libsoftokn3-debuginfo\", rpm:\"libsoftokn3-debuginfo~3.14.1~9.21.3\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-js\", rpm:\"mozilla-js~17.0.2~2.53.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-js-debuginfo\", rpm:\"mozilla-js-debuginfo~17.0.2~2.53.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nspr\", rpm:\"mozilla-nspr~4.9.4~3.11.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nspr-debuginfo\", rpm:\"mozilla-nspr-debuginfo~4.9.4~3.11.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nspr-debugsource\", rpm:\"mozilla-nspr-debugsource~4.9.4~3.11.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nspr-devel\", rpm:\"mozilla-nspr-devel~4.9.4~3.11.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss\", rpm:\"mozilla-nss~3.14.1~9.21.3\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-certs\", rpm:\"mozilla-nss-certs~3.14.1~9.21.3\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-certs-debuginfo\", rpm:\"mozilla-nss-certs-debuginfo~3.14.1~9.21.3\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-debuginfo\", rpm:\"mozilla-nss-debuginfo~3.14.1~9.21.3\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-debugsource\", rpm:\"mozilla-nss-debugsource~3.14.1~9.21.3\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-devel\", rpm:\"mozilla-nss-devel~3.14.1~9.21.3\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-sysinit\", rpm:\"mozilla-nss-sysinit~3.14.1~9.21.3\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-sysinit-debuginfo\", rpm:\"mozilla-nss-sysinit-debuginfo~3.14.1~9.21.3\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-tools\", rpm:\"mozilla-nss-tools~3.14.1~9.21.3\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-tools-debuginfo\", rpm:\"mozilla-nss-tools-debuginfo~3.14.1~9.21.3\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"seamonkey\", rpm:\"seamonkey~2.15~2.49.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"seamonkey-debuginfo\", rpm:\"seamonkey-debuginfo~2.15~2.49.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"seamonkey-debugsource\", rpm:\"seamonkey-debugsource~2.15~2.49.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"seamonkey-dom-inspector\", rpm:\"seamonkey-dom-inspector~2.15~2.49.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"seamonkey-irc\", rpm:\"seamonkey-irc~2.15~2.49.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"seamonkey-translations-common\", rpm:\"seamonkey-translations-common~2.15~2.49.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"seamonkey-translations-other\", rpm:\"seamonkey-translations-other~2.15~2.49.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"seamonkey-venkman\", rpm:\"seamonkey-venkman~2.15~2.49.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner\", rpm:\"xulrunner~17.0.2~2.53.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner-buildsymbols\", rpm:\"xulrunner-buildsymbols~17.0.2~2.53.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner-debuginfo\", rpm:\"xulrunner-debuginfo~17.0.2~2.53.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner-debugsource\", rpm:\"xulrunner-debugsource~17.0.2~2.53.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner-devel\", rpm:\"xulrunner-devel~17.0.2~2.53.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner-devel-debuginfo\", rpm:\"xulrunner-devel-debuginfo~17.0.2~2.53.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libfreebl3-32bit\", rpm:\"libfreebl3-32bit~3.14.1~9.21.3\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libfreebl3-debuginfo-32bit\", rpm:\"libfreebl3-debuginfo-32bit~3.14.1~9.21.3\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libsoftokn3-32bit\", rpm:\"libsoftokn3-32bit~3.14.1~9.21.3\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libsoftokn3-debuginfo-32bit\", rpm:\"libsoftokn3-debuginfo-32bit~3.14.1~9.21.3\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-js-32bit\", rpm:\"mozilla-js-32bit~17.0.2~2.53.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-js-debuginfo-32bit\", rpm:\"mozilla-js-debuginfo-32bit~17.0.2~2.53.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nspr-32bit\", rpm:\"mozilla-nspr-32bit~4.9.4~3.11.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nspr-debuginfo-32bit\", rpm:\"mozilla-nspr-debuginfo-32bit~4.9.4~3.11.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-32bit\", rpm:\"mozilla-nss-32bit~3.14.1~9.21.3\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-certs-32bit\", rpm:\"mozilla-nss-certs-32bit~3.14.1~9.21.3\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-certs-debuginfo-32bit\", rpm:\"mozilla-nss-certs-debuginfo-32bit~3.14.1~9.21.3\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-debuginfo-32bit\", rpm:\"mozilla-nss-debuginfo-32bit~3.14.1~9.21.3\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-sysinit-32bit\", rpm:\"mozilla-nss-sysinit-32bit~3.14.1~9.21.3\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-sysinit-debuginfo-32bit\", rpm:\"mozilla-nss-sysinit-debuginfo-32bit~3.14.1~9.21.3\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner-32bit\", rpm:\"xulrunner-32bit~17.0.2~2.53.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner-debuginfo-32bit\", rpm:\"xulrunner-debuginfo-32bit~17.0.2~2.53.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libfreebl3-debuginfo-x86\", rpm:\"libfreebl3-debuginfo-x86~3.14.1~9.21.3\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libfreebl3-x86\", rpm:\"libfreebl3-x86~3.14.1~9.21.3\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libsoftokn3-debuginfo-x86\", rpm:\"libsoftokn3-debuginfo-x86~3.14.1~9.21.3\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libsoftokn3-x86\", rpm:\"libsoftokn3-x86~3.14.1~9.21.3\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-js-debuginfo-x86\", rpm:\"mozilla-js-debuginfo-x86~17.0.2~2.53.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-js-x86\", rpm:\"mozilla-js-x86~17.0.2~2.53.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nspr-debuginfo-x86\", rpm:\"mozilla-nspr-debuginfo-x86~4.9.4~3.11.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nspr-x86\", rpm:\"mozilla-nspr-x86~4.9.4~3.11.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-certs-debuginfo-x86\", rpm:\"mozilla-nss-certs-debuginfo-x86~3.14.1~9.21.3\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-certs-x86\", rpm:\"mozilla-nss-certs-x86~3.14.1~9.21.3\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-debuginfo-x86\", rpm:\"mozilla-nss-debuginfo-x86~3.14.1~9.21.3\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-sysinit-debuginfo-x86\", rpm:\"mozilla-nss-sysinit-debuginfo-x86~3.14.1~9.21.3\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-sysinit-x86\", rpm:\"mozilla-nss-sysinit-x86~3.14.1~9.21.3\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mozilla-nss-x86\", rpm:\"mozilla-nss-x86~3.14.1~9.21.3\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner-debuginfo-x86\", rpm:\"xulrunner-debuginfo-x86~17.0.2~2.53.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xulrunner-x86\", rpm:\"xulrunner-x86~17.0.2~2.53.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2020-01-31T18:40:56", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-0743", "CVE-2013-0763", "CVE-2013-0746", "CVE-2012-5829", "CVE-2013-0766", "CVE-2013-0747", "CVE-2013-0751", "CVE-2013-0744", "CVE-2013-0748", "CVE-2013-0768", "CVE-2013-0755", "CVE-2013-0752", "CVE-2013-0754", "CVE-2013-0769", "CVE-2013-0771", "CVE-2013-0757", "CVE-2013-0749", "CVE-2013-0761", "CVE-2012-0759", "CVE-2013-0745", "CVE-2013-0756", "CVE-2013-0760", "CVE-2013-0767", "CVE-2013-0762", "CVE-2013-0753", "CVE-2013-0750", "CVE-2013-0759", "CVE-2013-0770", "CVE-2013-0758", "CVE-2013-0764"], "description": "The remote host is missing an update for the ", "modified": "2020-01-31T00:00:00", "published": "2013-03-11T00:00:00", "id": "OPENVAS:1361412562310850391", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310850391", "type": "openvas", "title": "openSUSE: Security Advisory for Mozilla (openSUSE-SU-2013:0149-1)", "sourceData": "# Copyright (C) 2013 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) of their respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.850391\");\n script_version(\"2020-01-31T08:23:39+0000\");\n script_tag(name:\"last_modification\", value:\"2020-01-31 08:23:39 +0000 (Fri, 31 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2013-03-11 18:29:16 +0530 (Mon, 11 Mar 2013)\");\n script_cve_id(\"CVE-2012-5829\", \"CVE-2013-0744\", \"CVE-2013-0745\",\n \"CVE-2013-0746\", \"CVE-2013-0747\", \"CVE-2013-0748\", \"CVE-2013-0749\",\n \"CVE-2013-0750\", \"CVE-2013-0751\", \"CVE-2013-0752\", \"CVE-2013-0753\",\n \"CVE-2013-0754\", \"CVE-2013-0755\", \"CVE-2013-0756\", \"CVE-2013-0757\",\n \"CVE-2013-0758\", \"CVE-2013-0759\", \"CVE-2013-0760\", \"CVE-2013-0761\",\n \"CVE-2013-0762\", \"CVE-2013-0763\", \"CVE-2013-0764\", \"CVE-2013-0766\",\n \"CVE-2013-0767\", \"CVE-2013-0768\", \"CVE-2013-0769\", \"CVE-2013-0770\",\n \"CVE-2013-0771\", \"CVE-2012-0759\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name:\"openSUSE-SU\", value:\"2013:0149-1\");\n script_name(\"openSUSE: Security Advisory for Mozilla (openSUSE-SU-2013:0149-1)\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'Mozilla'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2013 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse\", \"ssh/login/rpms\", re:\"ssh/login/release=openSUSE12\\.1\");\n\n script_tag(name:\"affected\", value:\"Mozilla on openSUSE 12.1\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"insight\", value:\"The Mozilla January 8th 2013 security release contains\n updates:\n\n Mozilla Firefox was updated to version 18.0. Mozilla\n Seamonkey was updated to version 2.15. Mozilla Thunderbird\n was updated to version 17.0.2. Mozilla XULRunner was\n updated to version 17.0.2.\n\n * MFSA 2013-01/CVE-2013-0749/CVE-2013-0769/CVE-2013-0770\n Miscellaneous memory safety hazards\n\n * MFSA\n 2013-02/CVE-2013-0760/CVE-2013-0762/CVE-2013-0766/CVE-2013-0\n 767\n CVE-2013-0761/CVE-2013-0763/CVE-2013-0771/CVE-2012-5829\n Use-after-free and buffer overflow issues found using\n Address Sanitizer\n\n * MFSA 2013-03/CVE-2013-0768 (bmo#815795) Buffer Overflow\n in Canvas\n\n * MFSA 2013-04/CVE-2012-0759 (bmo#802026) URL spoofing in\n addressbar during page loads\n\n * MFSA 2013-05/CVE-2013-0744 (bmo#814713) Use-after-free\n when displaying table with many columns and column groups\n\n * MFSA 2013-06/CVE-2013-0751 (bmo#790454) Touch events are\n shared across iframes\n\n * MFSA 2013-07/CVE-2013-0764 (bmo#804237) Crash due to\n handling of SSL on threads\n\n * MFSA 2013-08/CVE-2013-0745 (bmo#794158)\n AutoWrapperChanger fails to keep objects alive during\n garbage collection\n\n * MFSA 2013-09/CVE-2013-0746 (bmo#816842) Compartment\n mismatch with quickstubs returned values\n\n * MFSA 2013-10/CVE-2013-0747 (bmo#733305) Event\n manipulation in plugin handler to bypass same-origin\n policy\n\n * MFSA 2013-11/CVE-2013-0748 (bmo#806031) Address space\n layout leaked in XBL objects\n\n * MFSA 2013-12/CVE-2013-0750 (bmo#805121) Buffer overflow\n in Javascript string concatenation\n\n * MFSA 2013-13/CVE-2013-0752 (bmo#805024) Memory corruption\n in XBL with XML bindings containing SVG\n\n * MFSA 2013-14/CVE-2013-0757 (bmo#813901) Chrome Object\n Wrapper (COW) bypass through changing prototype\n\n * MFSA 2013-15/CVE-2013-0758 (bmo#813906) Privilege\n escalation through plugin objects\n\n * MFSA 2013-16/CVE-2013-0753 (bmo#814001) Use-after-free in\n serializeToStream\n\n * MFSA 2013-17/CVE-2013-0754 (bmo#814026) Use-after-free in\n ListenerManager\n\n * MFSA 2013-18/CVE-2013-0755 (bmo#814027) Use-after-free in\n Vibrate\n\n * MFSA 2013-19/CVE-2013-0756 (bmo#814029) Use-after-free in\n Javascript Proxy objects\n\n Mozilla NSPR was updated to 4.9.4, containing some small\n bugfixes and new features.\n\n Mozilla NSS was updated to 3.14.1 containing various new\n features, security fix and bugfixes\n\n * MFSA 2013-20/CVE-2013-0743 (bmo#825022, bnc#796628)\n revoke mis-issued intermediate certificates from TURKTRUST\n\n Cryptographic changes done:\n\n * Support for TLS 1.1 (RFC 4346)\n\n * Experimental support for DTLS 1.0 (RFC 4347) and\n DTLS-SRTP (RFC 5764)\n\n * Support ...\n\n Description truncated, please see the referenced URL(s) for more information.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"openSUSE12.1\") {\n if(!isnull(res = isrpmvuln(pkg:\"MozillaFirefox\", rpm:\"MozillaFirefox~18.0~2.58.2\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"MozillaFirefox-branding-upstream\", rpm:\"MozillaFirefox-branding-upstream~18.0~2.58.2\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"MozillaFirefox-buildsymbols\", rpm:\"MozillaFirefox-buildsymbols~18.0~2.58.2\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"MozillaFirefox-debuginfo\", rpm:\"MozillaFirefox-debuginfo~18.0~2.58.2\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"MozillaFirefox-debugsource\", rpm:\"MozillaFirefox-debugsource~18.0~2.58.2\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"MozillaFirefox-devel\", rpm:\"MozillaFirefox-devel~18.0~2.58.2\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"MozillaFirefox-translations-common\", rpm:\"MozillaFirefox-translations-common~18.0~2.58.2\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"MozillaFirefox-translations-other\", rpm:\"MozillaFirefox-translations-other~18.0~2.58.2\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"MozillaThunderbird\", rpm:\"MozillaThunderbird~17.0.2~33.47.2\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"MozillaThunderbird-buildsymbols\", rpm:\"MozillaThunderbird-buildsymbols~17.0.2~33.47.2\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"MozillaThunderbird-debuginfo\", rpm:\"MozillaThunderbird-debuginfo~17.0.2~33.47.2\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"MozillaThunderbird-debugsource\", rpm:\"MozillaThunderbird-debugsource~17.0.2~33.47.2\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"MozillaThunderbird-devel\", rpm:\"MozillaThunderbird-devel~17.0.2~33.47.2\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"MozillaThunderbird-devel-debuginfo\", rpm:\"MozillaThunderbird-devel-debuginfo~17.0.2~33.47.2\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"MozillaThunderbird-translations-common\", rpm:\"MozillaThunderbird-translations-common~17.0.2~33.47.2\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"MozillaThunderbird-translations-other\", rpm:\"MozillaThunderbird-translations-other~17.0.2~33.47.2\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"enigmail\", rpm:\"enigmail~1.5.0+17.0.2~33.47.2\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"enigmail-debuginfo\", rpm:\"enigmail-debuginfo~1.5.0+17.0.2~33.47.2\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libfreebl3\", rpm:\"libfreebl3~3.14.1~9.21.3\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libfreebl3-debuginfo\", rpm:\"libfreebl3-debuginfo~3.14.1~9.21.3\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libsoftokn3\", rpm:\"libsoftokn3~3.14.1~9.21.3\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libsoftokn3-debuginfo\", rpm:\"libsoftokn3-debuginfo~3.14.1~9.21.3\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"mozilla-js\", rpm:\"mozilla-js~17.0.2~2.53.1\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"mozilla-js-debuginfo\", rpm:\"mozilla-js-debuginfo~17.0.2~2.53.1\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"mozilla-nspr\", rpm:\"mozilla-nspr~4.9.4~3.11.1\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"mozilla-nspr-debuginfo\", rpm:\"mozilla-nspr-debuginfo~4.9.4~3.11.1\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"mozilla-nspr-debugsource\", rpm:\"mozilla-nspr-debugsource~4.9.4~3.11.1\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"mozilla-nspr-devel\", rpm:\"mozilla-nspr-devel~4.9.4~3.11.1\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"mozilla-nss\", rpm:\"mozilla-nss~3.14.1~9.21.3\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"mozilla-nss-certs\", rpm:\"mozilla-nss-certs~3.14.1~9.21.3\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"mozilla-nss-certs-debuginfo\", rpm:\"mozilla-nss-certs-debuginfo~3.14.1~9.21.3\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"mozilla-nss-debuginfo\", rpm:\"mozilla-nss-debuginfo~3.14.1~9.21.3\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"mozilla-nss-debugsource\", rpm:\"mozilla-nss-debugsource~3.14.1~9.21.3\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"mozilla-nss-devel\", rpm:\"mozilla-nss-devel~3.14.1~9.21.3\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"mozilla-nss-sysinit\", rpm:\"mozilla-nss-sysinit~3.14.1~9.21.3\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"mozilla-nss-sysinit-debuginfo\", rpm:\"mozilla-nss-sysinit-debuginfo~3.14.1~9.21.3\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"mozilla-nss-tools\", rpm:\"mozilla-nss-tools~3.14.1~9.21.3\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"mozilla-nss-tools-debuginfo\", rpm:\"mozilla-nss-tools-debuginfo~3.14.1~9.21.3\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"seamonkey\", rpm:\"seamonkey~2.15~2.49.1\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"seamonkey-debuginfo\", rpm:\"seamonkey-debuginfo~2.15~2.49.1\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"seamonkey-debugsource\", rpm:\"seamonkey-debugsource~2.15~2.49.1\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"seamonkey-dom-inspector\", rpm:\"seamonkey-dom-inspector~2.15~2.49.1\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"seamonkey-irc\", rpm:\"seamonkey-irc~2.15~2.49.1\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"seamonkey-translations-common\", rpm:\"seamonkey-translations-common~2.15~2.49.1\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"seamonkey-translations-other\", rpm:\"seamonkey-translations-other~2.15~2.49.1\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"seamonkey-venkman\", rpm:\"seamonkey-venkman~2.15~2.49.1\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"xulrunner\", rpm:\"xulrunner~17.0.2~2.53.1\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"xulrunner-buildsymbols\", rpm:\"xulrunner-buildsymbols~17.0.2~2.53.1\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"xulrunner-debuginfo\", rpm:\"xulrunner-debuginfo~17.0.2~2.53.1\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"xulrunner-debugsource\", rpm:\"xulrunner-debugsource~17.0.2~2.53.1\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"xulrunner-devel\", rpm:\"xulrunner-devel~17.0.2~2.53.1\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"xulrunner-devel-debuginfo\", rpm:\"xulrunner-devel-debuginfo~17.0.2~2.53.1\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libfreebl3-32bit\", rpm:\"libfreebl3-32bit~3.14.1~9.21.3\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libfreebl3-debuginfo-32bit\", rpm:\"libfreebl3-debuginfo-32bit~3.14.1~9.21.3\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libsoftokn3-32bit\", rpm:\"libsoftokn3-32bit~3.14.1~9.21.3\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libsoftokn3-debuginfo-32bit\", rpm:\"libsoftokn3-debuginfo-32bit~3.14.1~9.21.3\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"mozilla-js-32bit\", rpm:\"mozilla-js-32bit~17.0.2~2.53.1\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"mozilla-js-debuginfo-32bit\", rpm:\"mozilla-js-debuginfo-32bit~17.0.2~2.53.1\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"mozilla-nspr-32bit\", rpm:\"mozilla-nspr-32bit~4.9.4~3.11.1\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"mozilla-nspr-debuginfo-32bit\", rpm:\"mozilla-nspr-debuginfo-32bit~4.9.4~3.11.1\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"mozilla-nss-32bit\", rpm:\"mozilla-nss-32bit~3.14.1~9.21.3\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"mozilla-nss-certs-32bit\", rpm:\"mozilla-nss-certs-32bit~3.14.1~9.21.3\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"mozilla-nss-certs-debuginfo-32bit\", rpm:\"mozilla-nss-certs-debuginfo-32bit~3.14.1~9.21.3\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"mozilla-nss-debuginfo-32bit\", rpm:\"mozilla-nss-debuginfo-32bit~3.14.1~9.21.3\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"mozilla-nss-sysinit-32bit\", rpm:\"mozilla-nss-sysinit-32bit~3.14.1~9.21.3\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"mozilla-nss-sysinit-debuginfo-32bit\", rpm:\"mozilla-nss-sysinit-debuginfo-32bit~3.14.1~9.21.3\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"xulrunner-32bit\", rpm:\"xulrunner-32bit~17.0.2~2.53.1\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"xulrunner-debuginfo-32bit\", rpm:\"xulrunner-debuginfo-32bit~17.0.2~2.53.1\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libfreebl3-debuginfo-x86\", rpm:\"libfreebl3-debuginfo-x86~3.14.1~9.21.3\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libfreebl3-x86\", rpm:\"libfreebl3-x86~3.14.1~9.21.3\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libsoftokn3-debuginfo-x86\", rpm:\"libsoftokn3-debuginfo-x86~3.14.1~9.21.3\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libsoftokn3-x86\", rpm:\"libsoftokn3-x86~3.14.1~9.21.3\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"mozilla-js-debuginfo-x86\", rpm:\"mozilla-js-debuginfo-x86~17.0.2~2.53.1\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"mozilla-js-x86\", rpm:\"mozilla-js-x86~17.0.2~2.53.1\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"mozilla-nspr-debuginfo-x86\", rpm:\"mozilla-nspr-debuginfo-x86~4.9.4~3.11.1\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"mozilla-nspr-x86\", rpm:\"mozilla-nspr-x86~4.9.4~3.11.1\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"mozilla-nss-certs-debuginfo-x86\", rpm:\"mozilla-nss-certs-debuginfo-x86~3.14.1~9.21.3\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"mozilla-nss-certs-x86\", rpm:\"mozilla-nss-certs-x86~3.14.1~9.21.3\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"mozilla-nss-debuginfo-x86\", rpm:\"mozilla-nss-debuginfo-x86~3.14.1~9.21.3\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"mozilla-nss-sysinit-debuginfo-x86\", rpm:\"mozilla-nss-sysinit-debuginfo-x86~3.14.1~9.21.3\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"mozilla-nss-sysinit-x86\", rpm:\"mozilla-nss-sysinit-x86~3.14.1~9.21.3\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"mozilla-nss-x86\", rpm:\"mozilla-nss-x86~3.14.1~9.21.3\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"xulrunner-debuginfo-x86\", rpm:\"xulrunner-debuginfo-x86~17.0.2~2.53.1\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"xulrunner-x86\", rpm:\"xulrunner-x86~17.0.2~2.53.1\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "ubuntu": [{"lastseen": "2020-07-02T11:39:33", "bulletinFamily": "unix", "cvelist": ["CVE-2013-0743", "CVE-2013-0763", "CVE-2013-0746", "CVE-2012-5829", "CVE-2013-0766", "CVE-2013-0747", "CVE-2013-0744", "CVE-2013-0748", "CVE-2013-0768", "CVE-2013-0755", "CVE-2013-0752", "CVE-2013-0754", "CVE-2013-0769", "CVE-2013-0771", "CVE-2013-0757", "CVE-2013-0749", "CVE-2013-0761", "CVE-2013-0745", "CVE-2013-0756", "CVE-2013-0760", "CVE-2013-0767", "CVE-2013-0762", "CVE-2013-0753", "CVE-2013-0750", "CVE-2013-0759", "CVE-2013-0770", "CVE-2013-0758", "CVE-2013-0764"], "description": "USN-1681-1 fixed vulnerabilities in Firefox. Due to an upstream regression, \nFirefox suffered from instabilities when accessing some websites. This \nupdate fixes the problem.\n\nWe apologize for the inconvenience.\n\nOriginal advisory details:\n\nChristoph Diehl, Christian Holler, Mats Palmgren, Chiaki Ishikawa, Bill \nGianopoulos, Benoit Jacob, Gary Kwong, Robert O'Callahan, Jesse Ruderman, \nand Julian Seward discovered multiple memory safety issues affecting \nFirefox. If the user were tricked into opening a specially crafted page, an \nattacker could possibly exploit these to cause a denial of service via \napplication crash, or potentially execute code with the privileges of the \nuser invoking Firefox. (CVE-2013-0769, CVE-2013-0749, CVE-2013-0770)\n\nAbhishek Arya discovered several user-after-free and buffer overflows in \nFirefox. An attacker could exploit these to cause a denial of service via \napplication crash, or potentially execute code with the privileges of the \nuser invoking Firefox. (CVE-2013-0760, CVE-2013-0761, CVE-2013-0762, \nCVE-2013-0763, CVE-2013-0766, CVE-2013-0767, CVE-2013-0771, CVE-2012-5829)\n\nA stack buffer was discovered in Firefox. If the user were tricked into \nopening a specially crafted page, an attacker could possibly exploit this \nto cause a denial of service via application crash, or potentially execute \ncode with the privileges of the user invoking Firefox. (CVE-2013-0768)\n\nMasato Kinugawa discovered that Firefox did not always properly display URL \nvalues in the address bar. A remote attacker could exploit this to conduct \nURL spoofing and phishing attacks. (CVE-2013-0759)\n\nAtte Kettunen discovered that Firefox did not properly handle HTML tables \nwith a large number of columns and column groups. If the user were tricked \ninto opening a specially crafted page, an attacker could exploit this to \ncause a denial of service via application crash, or potentially execute \ncode with the privileges of the user invoking Firefox. (CVE-2013-0744)\n\nJerry Baker discovered that Firefox did not always properly handle \nthreading when performing downloads over SSL connections. An attacker could \nexploit this to cause a denial of service via application crash. \n(CVE-2013-0764)\n\nOlli Pettay and Boris Zbarsky discovered flaws in the Javacript engine of \nFirefox. An attacker could cause a denial of service via application crash, \nor potentially execute code with the privileges of the user invoking \nFirefox. (CVE-2013-0745, CVE-2013-0746)\n\nJesse Ruderman discovered a flaw in the way Firefox handled plugins. If a \nuser were tricked into opening a specially crafted page, a remote attacker \ncould exploit this to bypass security protections to conduct clickjacking \nattacks. (CVE-2013-0747)\n\nJesse Ruderman discovered an information leak in Firefox. An attacker could \nexploit this to reveal memory address layout which could help in bypassing \nASLR protections. (CVE-2013-0748)\n\nAn integer overflow was discovered in the Javascript engine, leading to a \nheap-based buffer overflow. If the user were tricked into opening a \nspecially crafted page, an attacker could possibly exploit this to execute \ncode with the privileges of the user invoking Firefox. (CVE-2013-0750)\n\nSviatoslav Chagaev discovered that Firefox did not properly handle XBL \nfiles with multiple XML bindings with SVG content. An attacker could cause \na denial of service via application crash, or potentially execute code with \nthe privileges of the user invoking Firefox. (CVE-2013-0752)\n\nMariusz Mlynski discovered two flaws to gain access to privileged chrome \nfunctions. An attacker could possibly exploit this to execute code with the \nprivileges of the user invoking Firefox. (CVE-2013-0757, CVE-2013-0758)\n\nSeveral use-after-free issues were discovered in Firefox. If the user were \ntricked into opening a specially crafted page, an attacker could possibly \nexploit this to execute code with the privileges of the user invoking \nFirefox. (CVE-2013-0753, CVE-2013-0754, CVE-2013-0755, CVE-2013-0756)\n\nTwo intermediate CA certificates were mis-issued by the TURKTRUST \ncertificate authority. If a remote attacker were able to perform a \nman-in-the-middle attack, this flaw could be exploited to view sensitive \ninformation. (CVE-2013-0743)", "edition": 5, "modified": "2013-02-05T00:00:00", "published": "2013-02-05T00:00:00", "id": "USN-1681-4", "href": "https://ubuntu.com/security/notices/USN-1681-4", "title": "Firefox regression", "type": "ubuntu", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-07-15T01:36:54", "bulletinFamily": "unix", "cvelist": ["CVE-2013-0743", "CVE-2013-0763", "CVE-2013-0746", "CVE-2012-5829", "CVE-2013-0766", "CVE-2013-0747", "CVE-2013-0744", "CVE-2013-0748", "CVE-2013-0768", "CVE-2013-0755", "CVE-2013-0752", "CVE-2013-0754", "CVE-2013-0769", "CVE-2013-0771", "CVE-2013-0757", "CVE-2013-0749", "CVE-2013-0761", "CVE-2013-0745", "CVE-2013-0756", "CVE-2013-0760", "CVE-2013-0767", "CVE-2013-0762", "CVE-2013-0753", "CVE-2013-0750", "CVE-2013-0759", "CVE-2013-0770", "CVE-2013-0758", "CVE-2013-0764"], "description": "USN-1681-1 fixed vulnerabilities in Firefox. This update provides the \ncorresponding updates for Thunderbird.\n\nOriginal advisory details:\n\nChristoph Diehl, Christian Holler, Mats Palmgren, Chiaki Ishikawa, Bill \nGianopoulos, Benoit Jacob, Gary Kwong, Robert O'Callahan, Jesse Ruderman, \nand Julian Seward discovered multiple memory safety issues affecting \nFirefox. If the user were tricked into opening a specially crafted page, an \nattacker could possibly exploit these to cause a denial of service via \napplication crash, or potentially execute code with the privileges of the \nuser invoking Firefox. (CVE-2013-0769, CVE-2013-0749, CVE-2013-0770)\n\nAbhishek Arya discovered several user-after-free and buffer overflows in \nFirefox. An attacker could exploit these to cause a denial of service via \napplication crash, or potentially execute code with the privileges of the \nuser invoking Firefox. (CVE-2013-0760, CVE-2013-0761, CVE-2013-0762, \nCVE-2013-0763, CVE-2013-0766, CVE-2013-0767, CVE-2013-0771, CVE-2012-5829)\n\nA stack buffer was discovered in Firefox. If the user were tricked into \nopening a specially crafted page, an attacker could possibly exploit this \nto cause a denial of service via application crash, or potentially execute \ncode with the privileges of the user invoking Firefox. (CVE-2013-0768)\n\nMasato Kinugawa discovered that Firefox did not always properly display URL \nvalues in the address bar. A remote attacker could exploit this to conduct \nURL spoofing and phishing attacks. (CVE-2013-0759)\n\nAtte Kettunen discovered that Firefox did not properly handle HTML tables \nwith a large number of columns and column groups. If the user were tricked \ninto opening a specially crafted page, an attacker could exploit this to \ncause a denial of service via application crash, or potentially execute \ncode with the privileges of the user invoking Firefox. (CVE-2013-0744)\n\nJerry Baker discovered that Firefox did not always properly handle \nthreading when performing downloads over SSL connections. An attacker could \nexploit this to cause a denial of service via application crash. \n(CVE-2013-0764)\n\nOlli Pettay and Boris Zbarsky discovered flaws in the Javacript engine of \nFirefox. An attacker could cause a denial of service via application crash, \nor potentially execute code with the privileges of the user invoking \nFirefox. (CVE-2013-0745, CVE-2013-0746)\n\nJesse Ruderman discovered a flaw in the way Firefox handled plugins. If a \nuser were tricked into opening a specially crafted page, a remote attacker \ncould exploit this to bypass security protections to conduct clickjacking \nattacks. (CVE-2013-0747)\n\nJesse Ruderman discovered an information leak in Firefox. An attacker could \nexploit this to reveal memory address layout which could help in bypassing \nASLR protections. (CVE-2013-0748)\n\nAn integer overflow was discovered in the Javascript engine, leading to a \nheap-based buffer overflow. If the user were tricked into opening a \nspecially crafted page, an attacker could possibly exploit this to execute \ncode with the privileges of the user invoking Firefox. (CVE-2013-0750)\n\nSviatoslav Chagaev discovered that Firefox did not properly handle XBL \nfiles with multiple XML bindings with SVG content. An attacker could cause \na denial of service via application crash, or potentially execute code with \nthe privileges of the user invoking Firefox. (CVE-2013-0752)\n\nMariusz Mlynski discovered two flaws to gain access to privileged chrome \nfunctions. An attacker could possibly exploit this to execute code with the \nprivileges of the user invoking Firefox. (CVE-2013-0757, CVE-2013-0758)\n\nSeveral use-after-free issues were discovered in Firefox. If the user were \ntricked into opening a specially crafted page, an attacker could possibly \nexploit this to execute code with the privileges of the user invoking \nFirefox. (CVE-2013-0753, CVE-2013-0754, CVE-2013-0755, CVE-2013-0756)\n\nTwo intermediate CA certificates were mis-issued by the TURKTRUST \ncertificate authority. If a remote attacker were able to perform a \nman-in-the-middle attack, this flaw could be exploited to view sensitive \ninformation. (CVE-2013-0743)", "edition": 6, "modified": "2013-01-09T00:00:00", "published": "2013-01-09T00:00:00", "id": "USN-1681-2", "href": "https://ubuntu.com/security/notices/USN-1681-2", "title": "Thunderbird vulnerabilities", "type": "ubuntu", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-07-02T11:35:48", "bulletinFamily": "unix", "cvelist": ["CVE-2013-0743", "CVE-2013-0763", "CVE-2013-0746", "CVE-2012-5829", "CVE-2013-0766", "CVE-2013-0747", "CVE-2013-0744", "CVE-2013-0748", "CVE-2013-0768", "CVE-2013-0755", "CVE-2013-0752", "CVE-2013-0754", "CVE-2013-0769", "CVE-2013-0771", "CVE-2013-0757", "CVE-2013-0749", "CVE-2013-0761", "CVE-2013-0745", "CVE-2013-0756", "CVE-2013-0760", "CVE-2013-0767", "CVE-2013-0762", "CVE-2013-0753", "CVE-2013-0750", "CVE-2013-0759", "CVE-2013-0770", "CVE-2013-0758", "CVE-2013-0764"], "description": "USN-1681-1 fixed vulnerabilities in Firefox. Due to an upstream regression, \nsome translations became unusable after upgrading. This update fixes the \nproblem.\n\nWe apologize for the inconvenience.\n\nOriginal advisory details:\n\nChristoph Diehl, Christian Holler, Mats Palmgren, Chiaki Ishikawa, Bill \nGianopoulos, Benoit Jacob, Gary Kwong, Robert O'Callahan, Jesse Ruderman, \nand Julian Seward discovered multiple memory safety issues affecting \nFirefox. If the user were tricked into opening a specially crafted page, an \nattacker could possibly exploit these to cause a denial of service via \napplication crash, or potentially execute code with the privileges of the \nuser invoking Firefox. (CVE-2013-0769, CVE-2013-0749, CVE-2013-0770)\n\nAbhishek Arya discovered several user-after-free and buffer overflows in \nFirefox. An attacker could exploit these to cause a denial of service via \napplication crash, or potentially execute code with the privileges of the \nuser invoking Firefox. (CVE-2013-0760, CVE-2013-0761, CVE-2013-0762, \nCVE-2013-0763, CVE-2013-0766, CVE-2013-0767, CVE-2013-0771, CVE-2012-5829)\n\nA stack buffer was discovered in Firefox. If the user were tricked into \nopening a specially crafted page, an attacker could possibly exploit this \nto cause a denial of service via application crash, or potentially execute \ncode with the privileges of the user invoking Firefox. (CVE-2013-0768)\n\nMasato Kinugawa discovered that Firefox did not always properly display URL \nvalues in the address bar. A remote attacker could exploit this to conduct \nURL spoofing and phishing attacks. (CVE-2013-0759)\n\nAtte Kettunen discovered that Firefox did not properly handle HTML tables \nwith a large number of columns and column groups. If the user were tricked \ninto opening a specially crafted page, an attacker could exploit this to \ncause a denial of service via application crash, or potentially execute \ncode with the privileges of the user invoking Firefox. (CVE-2013-0744)\n\nJerry Baker discovered that Firefox did not always properly handle \nthreading when performing downloads over SSL connections. An attacker could \nexploit this to cause a denial of service via application crash. \n(CVE-2013-0764)\n\nOlli Pettay and Boris Zbarsky discovered flaws in the Javacript engine of \nFirefox. An attacker could cause a denial of service via application crash, \nor potentially execute code with the privileges of the user invoking \nFirefox. (CVE-2013-0745, CVE-2013-0746)\n\nJesse Ruderman discovered a flaw in the way Firefox handled plugins. If a \nuser were tricked into opening a specially crafted page, a remote attacker \ncould exploit this to bypass security protections to conduct clickjacking \nattacks. (CVE-2013-0747)\n\nJesse Ruderman discovered an information leak in Firefox. An attacker could \nexploit this to reveal memory address layout which could help in bypassing \nASLR protections. (CVE-2013-0748)\n\nAn integer overflow was discovered in the Javascript engine, leading to a \nheap-based buffer overflow. If the user were tricked into opening a \nspecially crafted page, an attacker could possibly exploit this to execute \ncode with the privileges of the user invoking Firefox. (CVE-2013-0750)\n\nSviatoslav Chagaev discovered that Firefox did not properly handle XBL \nfiles with multiple XML bindings with SVG content. An attacker could cause \na denial of service via application crash, or potentially execute code with \nthe privileges of the user invoking Firefox. (CVE-2013-0752)\n\nMariusz Mlynski discovered two flaws to gain access to privileged chrome \nfunctions. An attacker could possibly exploit this to execute code with the \nprivileges of the user invoking Firefox. (CVE-2013-0757, CVE-2013-0758)\n\nSeveral use-after-free issues were discovered in Firefox. If the user were \ntricked into opening a specially crafted page, an attacker could possibly \nexploit this to execute code with the privileges of the user invoking \nFirefox. (CVE-2013-0753, CVE-2013-0754, CVE-2013-0755, CVE-2013-0756)\n\nTwo intermediate CA certificates were mis-issued by the TURKTRUST \ncertificate authority. If a remote attacker were able to perform a \nman-in-the-middle attack, this flaw could be exploited to view sensitive \ninformation. (CVE-2013-0743)", "edition": 5, "modified": "2013-01-22T00:00:00", "published": "2013-01-22T00:00:00", "id": "USN-1681-3", "href": "https://ubuntu.com/security/notices/USN-1681-3", "title": "Firefox regression", "type": "ubuntu", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-07-15T01:44:04", "bulletinFamily": "unix", "cvelist": ["CVE-2013-0743", "CVE-2013-0763", "CVE-2013-0746", "CVE-2012-5829", "CVE-2013-0766", "CVE-2013-0747", "CVE-2013-0744", "CVE-2013-0748", "CVE-2013-0768", "CVE-2013-0755", "CVE-2013-0752", "CVE-2013-0754", "CVE-2013-0769", "CVE-2013-0771", "CVE-2013-0757", "CVE-2013-0749", "CVE-2013-0761", "CVE-2013-0745", "CVE-2013-0756", "CVE-2013-0760", "CVE-2013-0767", "CVE-2013-0762", "CVE-2013-0753", "CVE-2013-0750", "CVE-2013-0759", "CVE-2013-0770", "CVE-2013-0758", "CVE-2013-0764"], "description": "Christoph Diehl, Christian Holler, Mats Palmgren, Chiaki Ishikawa, Bill \nGianopoulos, Benoit Jacob, Gary Kwong, Robert O'Callahan, Jesse Ruderman, \nand Julian Seward discovered multiple memory safety issues affecting \nFirefox. If the user were tricked into opening a specially crafted page, an \nattacker could possibly exploit these to cause a denial of service via \napplication crash, or potentially execute code with the privileges of the \nuser invoking Firefox. (CVE-2013-0769, CVE-2013-0749, CVE-2013-0770)\n\nAbhishek Arya discovered several user-after-free and buffer overflows in \nFirefox. An attacker could exploit these to cause a denial of service via \napplication crash, or potentially execute code with the privileges of the \nuser invoking Firefox. (CVE-2013-0760, CVE-2013-0761, CVE-2013-0762, \nCVE-2013-0763, CVE-2013-0766, CVE-2013-0767, CVE-2013-0771, CVE-2012-5829)\n\nA stack buffer was discovered in Firefox. If the user were tricked into \nopening a specially crafted page, an attacker could possibly exploit this \nto cause a denial of service via application crash, or potentially execute \ncode with the privileges of the user invoking Firefox. (CVE-2013-0768)\n\nMasato Kinugawa discovered that Firefox did not always properly display URL \nvalues in the address bar. A remote attacker could exploit this to conduct \nURL spoofing and phishing attacks. (CVE-2013-0759)\n\nAtte Kettunen discovered that Firefox did not properly handle HTML tables \nwith a large number of columns and column groups. If the user were tricked \ninto opening a specially crafted page, an attacker could exploit this to \ncause a denial of service via application crash, or potentially execute \ncode with the privileges of the user invoking Firefox. (CVE-2013-0744)\n\nJerry Baker discovered that Firefox did not always properly handle \nthreading when performing downloads over SSL connections. An attacker could \nexploit this to cause a denial of service via application crash. \n(CVE-2013-0764)\n\nOlli Pettay and Boris Zbarsky discovered flaws in the Javacript engine of \nFirefox. An attacker could cause a denial of service via application crash, \nor potentially execute code with the privileges of the user invoking \nFirefox. (CVE-2013-0745, CVE-2013-0746)\n\nJesse Ruderman discovered a flaw in the way Firefox handled plugins. If a \nuser were tricked into opening a specially crafted page, a remote attacker \ncould exploit this to bypass security protections to conduct clickjacking \nattacks. (CVE-2013-0747)\n\nJesse Ruderman discovered an information leak in Firefox. An attacker could \nexploit this to reveal memory address layout which could help in bypassing \nASLR protections. (CVE-2013-0748)\n\nAn integer overflow was discovered in the Javascript engine, leading to a \nheap-based buffer overflow. If the user were tricked into opening a \nspecially crafted page, an attacker could possibly exploit this to execute \ncode with the privileges of the user invoking Firefox. (CVE-2013-0750)\n\nSviatoslav Chagaev discovered that Firefox did not properly handle XBL \nfiles with multiple XML bindings with SVG content. An attacker could cause \na denial of service via application crash, or potentially execute code with \nthe privileges of the user invoking Firefox. (CVE-2013-0752)\n\nMariusz Mlynski discovered two flaws to gain access to privileged chrome \nfunctions. An attacker could possibly exploit this to execute code with the \nprivileges of the user invoking Firefox. (CVE-2013-0757, CVE-2013-0758)\n\nSeveral use-after-free issues were discovered in Firefox. If the user were \ntricked into opening a specially crafted page, an attacker could possibly \nexploit this to execute code with the privileges of the user invoking \nFirefox. (CVE-2013-0753, CVE-2013-0754, CVE-2013-0755, CVE-2013-0756)\n\nTwo intermediate CA certificates were mis-issued by the TURKTRUST \ncertificate authority. If a remote attacker were able to perform a \nman-in-the-middle attack, this flaw could be exploited to view sensitive \ninformation. (CVE-2013-0743)", "edition": 6, "modified": "2013-01-09T00:00:00", "published": "2013-01-09T00:00:00", "id": "USN-1681-1", "href": "https://ubuntu.com/security/notices/USN-1681-1", "title": "Firefox vulnerabilities", "type": "ubuntu", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "redhat": [{"lastseen": "2019-08-13T18:45:01", "bulletinFamily": "unix", "cvelist": ["CVE-2013-0744", "CVE-2013-0746", "CVE-2013-0748", "CVE-2013-0750", "CVE-2013-0753", "CVE-2013-0754", "CVE-2013-0758", "CVE-2013-0759", "CVE-2013-0762", "CVE-2013-0766", "CVE-2013-0767", "CVE-2013-0769"], "description": "Mozilla Firefox is an open source web browser. XULRunner provides the XUL\nRuntime environment for Mozilla Firefox.\n\nSeveral flaws were found in the processing of malformed web content. A web\npage containing malicious content could cause Firefox to crash or,\npotentially, execute arbitrary code with the privileges of the user running\nFirefox. (CVE-2013-0744, CVE-2013-0746, CVE-2013-0750, CVE-2013-0753,\nCVE-2013-0754, CVE-2013-0762, CVE-2013-0766, CVE-2013-0767, CVE-2013-0769)\n\nA flaw was found in the way Chrome Object Wrappers were implemented.\nMalicious content could be used to cause Firefox to execute arbitrary code\nvia plug-ins installed in Firefox. (CVE-2013-0758)\n\nA flaw in the way Firefox displayed URL values in the address bar could\nallow a malicious site or user to perform a phishing attack.\n(CVE-2013-0759)\n\nAn information disclosure flaw was found in the way certain JavaScript\nfunctions were implemented in Firefox. An attacker could use this flaw to\nbypass Address Space Layout Randomization (ASLR) and other security\nrestrictions. (CVE-2013-0748)\n\nFor technical details regarding these flaws, refer to the Mozilla security\nadvisories for Firefox 10.0.12 ESR. You can find a link to the Mozilla\nadvisories in the References section of this erratum.\n\nRed Hat would like to thank the Mozilla project for reporting these issues.\nUpstream acknowledges Atte Kettunen, Boris Zbarsky, pa_kt, regenrecht,\nAbhishek Arya, Christoph Diehl, Christian Holler, Mats Palmgren, Chiaki\nIshikawa, Mariusz Mlynski, Masato Kinugawa, and Jesse Ruderman as the\noriginal reporters of these issues.\n\nAll Firefox users should upgrade to these updated packages, which contain\nFirefox version 10.0.12 ESR, which corrects these issues. After installing\nthe update, Firefox must be restarted for the changes to take effect.\n", "modified": "2018-06-06T20:24:21", "published": "2013-01-08T05:00:00", "id": "RHSA-2013:0144", "href": "https://access.redhat.com/errata/RHSA-2013:0144", "type": "redhat", "title": "(RHSA-2013:0144) Critical: firefox security update", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-08-13T18:46:36", "bulletinFamily": "unix", "cvelist": ["CVE-2013-0744", "CVE-2013-0746", "CVE-2013-0748", "CVE-2013-0750", "CVE-2013-0753", "CVE-2013-0754", "CVE-2013-0758", "CVE-2013-0759", "CVE-2013-0762", "CVE-2013-0766", "CVE-2013-0767", "CVE-2013-0769"], "description": "Mozilla Thunderbird is a standalone mail and newsgroup client.\n\nSeveral flaws were found in the processing of malformed content. Malicious\ncontent could cause Thunderbird to crash or, potentially, execute arbitrary\ncode with the privileges of the user running Thunderbird. (CVE-2013-0744,\nCVE-2013-0746, CVE-2013-0750, CVE-2013-0753, CVE-2013-0754, CVE-2013-0762,\nCVE-2013-0766, CVE-2013-0767, CVE-2013-0769)\n\nA flaw was found in the way Chrome Object Wrappers were implemented.\nMalicious content could be used to cause Thunderbird to execute arbitrary\ncode via plug-ins installed in Thunderbird. (CVE-2013-0758)\n\nA flaw in the way Thunderbird displayed URL values could allow malicious\ncontent or a user to perform a phishing attack. (CVE-2013-0759)\n\nAn information disclosure flaw was found in the way certain JavaScript\nfunctions were implemented in Thunderbird. An attacker could use this flaw\nto bypass Address Space Layout Randomization (ASLR) and other security\nrestrictions. (CVE-2013-0748)\n\nRed Hat would like to thank the Mozilla project for reporting these issues.\nUpstream acknowledges Atte Kettunen, Boris Zbarsky, pa_kt, regenrecht,\nAbhishek Arya, Christoph Diehl, Christian Holler, Mats Palmgren, Chiaki\nIshikawa, Mariusz Mlynski, Masato Kinugawa, and Jesse Ruderman as the\noriginal reporters of these issues.\n\nNote: All issues except CVE-2013-0744, CVE-2013-0753, and CVE-2013-0754\ncannot be exploited by a specially-crafted HTML mail message as JavaScript\nis disabled by default for mail messages. They could be exploited another\nway in Thunderbird, for example, when viewing the full remote content of an\nRSS feed.\n\nAll Thunderbird users should upgrade to this updated package, which\ncontains Thunderbird version 10.0.12 ESR, which corrects these issues.\nAfter installing the update, Thunderbird must be restarted for the changes\nto take effect.\n", "modified": "2018-06-06T20:24:18", "published": "2013-01-08T05:00:00", "id": "RHSA-2013:0145", "href": "https://access.redhat.com/errata/RHSA-2013:0145", "type": "redhat", "title": "(RHSA-2013:0145) Critical: thunderbird security update", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "oraclelinux": [{"lastseen": "2019-05-29T18:36:25", "bulletinFamily": "unix", "cvelist": ["CVE-2013-0746", "CVE-2013-0766", "CVE-2013-0744", "CVE-2013-0748", "CVE-2013-0754", "CVE-2013-0769", "CVE-2013-0767", "CVE-2013-0762", "CVE-2013-0753", "CVE-2013-0750", "CVE-2013-0759", "CVE-2013-0758"], "description": "firefox\n[10.0.12-1.0.1.el6_3]\n- Add firefox-oracle-default-prefs.js and remove the corresponding Red Hat ones\n[10.0.12-1]\n- Update to 10.0.12 ESR\nxulrunner\n[10.0.12-1.0.1.el6_3]\n- Replaced xulrunner-redhat-default-prefs.js with xulrunner-oracle-default-prefs.js\n[10.0.12-1]\n- Update to 10.0.12 ESR", "edition": 4, "modified": "2013-01-08T00:00:00", "published": "2013-01-08T00:00:00", "id": "ELSA-2013-0144", "href": "http://linux.oracle.com/errata/ELSA-2013-0144.html", "title": "firefox security update", "type": "oraclelinux", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-10-22T17:07:30", "bulletinFamily": "unix", "cvelist": ["CVE-2013-0746", "CVE-2013-0766", "CVE-2013-0744", "CVE-2013-0748", "CVE-2013-0754", "CVE-2013-0769", "CVE-2013-0767", "CVE-2013-0762", "CVE-2013-0753", "CVE-2013-0750", "CVE-2013-0759", "CVE-2013-0758"], "description": "[10.0.12-3.0.1.el6_3]\n- Replaced thunderbird-redhat-default-prefs.js with thunderbird-oracle-default-prefs.js\n[10.0.12-3]\n- Update to 10.0.12 ESR", "edition": 5, "modified": "2013-01-08T00:00:00", "published": "2013-01-08T00:00:00", "id": "ELSA-2013-0145", "href": "http://linux.oracle.com/errata/ELSA-2013-0145.html", "title": "thunderbird security update", "type": "oraclelinux", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "centos": [{"lastseen": "2020-10-30T13:21:32", "bulletinFamily": "unix", "cvelist": ["CVE-2013-0746", "CVE-2013-0766", "CVE-2013-0744", "CVE-2013-0748", "CVE-2013-0754", "CVE-2013-0769", "CVE-2013-0767", "CVE-2013-0762", "CVE-2013-0753", "CVE-2013-0750", "CVE-2013-0759", "CVE-2013-0758"], "description": "**CentOS Errata and Security Advisory** CESA-2013:0145\n\n\nMozilla Thunderbird is a standalone mail and newsgroup client.\n\nSeveral flaws were found in the processing of malformed content. Malicious\ncontent could cause Thunderbird to crash or, potentially, execute arbitrary\ncode with the privileges of the user running Thunderbird. (CVE-2013-0744,\nCVE-2013-0746, CVE-2013-0750, CVE-2013-0753, CVE-2013-0754, CVE-2013-0762,\nCVE-2013-0766, CVE-2013-0767, CVE-2013-0769)\n\nA flaw was found in the way Chrome Object Wrappers were implemented.\nMalicious content could be used to cause Thunderbird to execute arbitrary\ncode via plug-ins installed in Thunderbird. (CVE-2013-0758)\n\nA flaw in the way Thunderbird displayed URL values could allow malicious\ncontent or a user to perform a phishing attack. (CVE-2013-0759)\n\nAn information disclosure flaw was found in the way certain JavaScript\nfunctions were implemented in Thunderbird. An attacker could use this flaw\nto bypass Address Space Layout Randomization (ASLR) and other security\nrestrictions. (CVE-2013-0748)\n\nRed Hat would like to thank the Mozilla project for reporting these issues.\nUpstream acknowledges Atte Kettunen, Boris Zbarsky, pa_kt, regenrecht,\nAbhishek Arya, Christoph Diehl, Christian Holler, Mats Palmgren, Chiaki\nIshikawa, Mariusz Mlynski, Masato Kinugawa, and Jesse Ruderman as the\noriginal reporters of these issues.\n\nNote: All issues except CVE-2013-0744, CVE-2013-0753, and CVE-2013-0754\ncannot be exploited by a specially-crafted HTML mail message as JavaScript\nis disabled by default for mail messages. They could be exploited another\nway in Thunderbird, for example, when viewing the full remote content of an\nRSS feed.\n\nAll Thunderbird users should upgrade to this updated package, which\ncontains Thunderbird version 10.0.12 ESR, which corrects these issues.\nAfter installing the update, Thunderbird must be restarted for the changes\nto take effect.\n\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2013-January/031087.html\nhttp://lists.centos.org/pipermail/centos-announce/2013-January/031239.html\nhttp://lists.centos.org/pipermail/centos-cr-announce/2013-January/006665.html\n\n**Affected packages:**\nthunderbird\n\n**Upstream details at:**\n\nhttps://rhn.redhat.com/errata/RHSA-2013-0145.html", "edition": 7, "modified": "2013-01-11T13:30:03", "published": "2013-01-09T05:51:41", "href": "http://lists.centos.org/pipermail/centos-announce/2013-January/031087.html", "id": "CESA-2013:0145", "title": "thunderbird security update", "type": "centos", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-10-30T13:21:08", "bulletinFamily": "unix", "cvelist": ["CVE-2013-0746", "CVE-2013-0766", "CVE-2013-0744", "CVE-2013-0748", "CVE-2013-0754", "CVE-2013-0769", "CVE-2013-0767", "CVE-2013-0762", "CVE-2013-0753", "CVE-2013-0750", "CVE-2013-0759", "CVE-2013-0758"], "description": "**CentOS Errata and Security Advisory** CESA-2013:0144\n\n\nMozilla Firefox is an open source web browser. XULRunner provides the XUL\nRuntime environment for Mozilla Firefox.\n\nSeveral flaws were found in the processing of malformed web content. A web\npage containing malicious content could cause Firefox to crash or,\npotentially, execute arbitrary code with the privileges of the user running\nFirefox. (CVE-2013-0744, CVE-2013-0746, CVE-2013-0750, CVE-2013-0753,\nCVE-2013-0754, CVE-2013-0762, CVE-2013-0766, CVE-2013-0767, CVE-2013-0769)\n\nA flaw was found in the way Chrome Object Wrappers were implemented.\nMalicious content could be used to cause Firefox to execute arbitrary code\nvia plug-ins installed in Firefox. (CVE-2013-0758)\n\nA flaw in the way Firefox displayed URL values in the address bar could\nallow a malicious site or user to perform a phishing attack.\n(CVE-2013-0759)\n\nAn information disclosure flaw was found in the way certain JavaScript\nfunctions were implemented in Firefox. An attacker could use this flaw to\nbypass Address Space Layout Randomization (ASLR) and other security\nrestrictions. (CVE-2013-0748)\n\nFor technical details regarding these flaws, refer to the Mozilla security\nadvisories for Firefox 10.0.12 ESR. You can find a link to the Mozilla\nadvisories in the References section of this erratum.\n\nRed Hat would like to thank the Mozilla project for reporting these issues.\nUpstream acknowledges Atte Kettunen, Boris Zbarsky, pa_kt, regenrecht,\nAbhishek Arya, Christoph Diehl, Christian Holler, Mats Palmgren, Chiaki\nIshikawa, Mariusz Mlynski, Masato Kinugawa, and Jesse Ruderman as the\noriginal reporters of these issues.\n\nAll Firefox users should upgrade to these updated packages, which contain\nFirefox version 10.0.12 ESR, which corrects these issues. After installing\nthe update, Firefox must be restarted for the changes to take effect.\n\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2013-January/031086.html\nhttp://lists.centos.org/pipermail/centos-announce/2013-January/031088.html\nhttp://lists.centos.org/pipermail/centos-announce/2013-January/031237.html\nhttp://lists.centos.org/pipermail/centos-announce/2013-January/031238.html\nhttp://lists.centos.org/pipermail/centos-cr-announce/2013-January/006661.html\nhttp://lists.centos.org/pipermail/centos-cr-announce/2013-January/006664.html\n\n**Affected packages:**\nfirefox\nxulrunner\nxulrunner-devel\n\n**Upstream details at:**\n\nhttps://rhn.redhat.com/errata/RHSA-2013-0144.html", "edition": 9, "modified": "2013-01-11T13:28:50", "published": "2013-01-09T05:51:05", "href": "http://lists.centos.org/pipermail/centos-announce/2013-January/031086.html", "id": "CESA-2013:0144", "title": "firefox, xulrunner security update", "type": "centos", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "mozilla": [{"lastseen": "2016-09-05T13:37:39", "bulletinFamily": "software", "cvelist": ["CVE-2013-0763", "CVE-2012-5829", "CVE-2013-0766", "CVE-2013-0771", "CVE-2013-0761", "CVE-2013-0760", "CVE-2013-0767", "CVE-2013-0762"], "edition": 1, "description": "Security researcher Abhishek Arya (Inferno) of the Google Chrome Security Team discovered a series critically rated of use-after-free, out of bounds read, and buffer overflow issues using the Address Sanitizer tool in shipped software. These issues are potentially exploitable, allowing for remote code execution. We would also like to thank Abhishek for reporting three additional user-after-free and out of bounds read flaws introduced during Firefox development that were fixed before general release. \n\nIn general these flaws cannot be exploited through email in the\nThunderbird and SeaMonkey products because scripting is disabled, but are\npotentially a risk in browser or browser-like contexts in those products.", "modified": "2013-01-08T00:00:00", "published": "2013-01-08T00:00:00", "id": "MFSA2013-02", "href": "http://www.mozilla.org/en-US/security/advisories/mfsa2013-02/", "type": "mozilla", "title": "Use-after-free and buffer overflow issues found using Address Sanitizer", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "cve": [{"lastseen": "2020-12-09T19:52:37", "description": "Use-after-free vulnerability in the mozilla::TrackUnionStream::EndTrack implementation in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.1, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.", "edition": 7, "cvss3": {}, "published": "2013-01-13T20:55:00", "title": "CVE-2013-0761", "type": "cve", "cwe": ["CWE-416"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2013-0761"], "modified": "2020-08-07T17:52:00", "cpe": ["cpe:/o:suse:linux_enterprise_software_development_kit:10", "cpe:/o:opensuse:opensuse:12.1", "cpe:/o:canonical:ubuntu_linux:11.10", "cpe:/o:canonical:ubuntu_linux:12.04", "cpe:/o:suse:linux_enterprise_server:10", "cpe:/o:suse:linux_enterprise_software_development_kit:11", "cpe:/o:suse:linux_enterprise_desktop:10", "cpe:/o:canonical:ubuntu_linux:12.10", "cpe:/o:opensuse:opensuse:11.4", "cpe:/o:canonical:ubuntu_linux:10.04", "cpe:/o:opensuse:opensuse:12.2", "cpe:/o:suse:linux_enterprise_server:11", "cpe:/o:suse:linux_enterprise_desktop:11"], "id": "CVE-2013-0761", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-0761", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*", "cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*", "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*"]}, {"lastseen": "2020-12-09T19:52:37", "description": "The Chrome Object Wrapper (COW) implementation in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 does not prevent modifications to the prototype of an object, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges by referencing Object.prototype.__proto__ in a crafted HTML document.", "edition": 7, "cvss3": {}, "published": "2013-01-13T20:55:00", "title": "CVE-2013-0757", "type": "cve", "cwe": ["CWE-20"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2013-0757"], "modified": "2020-08-11T13:08:00", "cpe": ["cpe:/o:suse:linux_enterprise_software_development_kit:10", "cpe:/o:opensuse:opensuse:12.1", "cpe:/o:canonical:ubuntu_linux:11.10", "cpe:/o:canonical:ubuntu_linux:12.04", "cpe:/o:suse:linux_enterprise_server:10", "cpe:/o:suse:linux_enterprise_software_development_kit:11", "cpe:/o:suse:linux_enterprise_desktop:10", "cpe:/o:canonical:ubuntu_linux:12.10", "cpe:/o:opensuse:opensuse:11.4", "cpe:/o:canonical:ubuntu_linux:10.04", "cpe:/o:opensuse:opensuse:12.2", "cpe:/o:suse:linux_enterprise_server:11", "cpe:/o:suse:linux_enterprise_desktop:11"], "id": "CVE-2013-0757", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-0757", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*", "cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*", "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*"]}, {"lastseen": "2020-12-09T19:52:37", "description": "Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allow remote attackers to spoof the address bar via vectors involving authentication information in the userinfo field of a URL, in conjunction with a 204 (aka No Content) HTTP status code.", "edition": 7, "cvss3": {}, "published": "2013-01-13T20:55:00", "title": "CVE-2013-0759", "type": "cve", "cwe": ["CWE-287"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2013-0759"], "modified": "2020-08-04T15:31:00", "cpe": ["cpe:/o:suse:linux_enterprise_software_development_kit:10", "cpe:/o:redhat:enterprise_linux_desktop:5.0", "cpe:/o:redhat:enterprise_linux_workstation:5.0", "cpe:/o:opensuse:opensuse:12.1", "cpe:/o:canonical:ubuntu_linux:11.10", "cpe:/o:redhat:enterprise_linux_desktop:6.0", "cpe:/o:canonical:ubuntu_linux:12.04", "cpe:/o:suse:linux_enterprise_server:10", "cpe:/o:redhat:enterprise_linux_eus:5.9", "cpe:/o:suse:linux_enterprise_software_development_kit:11", "cpe:/o:suse:linux_enterprise_desktop:10", "cpe:/o:redhat:enterprise_linux_server_aus:5.9", "cpe:/o:canonical:ubuntu_linux:12.10", "cpe:/o:opensuse:opensuse:11.4", "cpe:/o:redhat:enterprise_linux_eus:6.3", "cpe:/o:redhat:enterprise_linux_server:5.0", "cpe:/o:canonical:ubuntu_linux:10.04", "cpe:/o:opensuse:opensuse:12.2", "cpe:/o:suse:linux_enterprise_server:11", "cpe:/o:redhat:enterprise_linux_workstation:6.0", "cpe:/o:suse:linux_enterprise_desktop:11", "cpe:/o:redhat:enterprise_linux_server:6.0"], "id": "CVE-2013-0759", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-0759", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*", "cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*", "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*"]}, {"lastseen": "2020-12-09T19:52:37", "description": "Use-after-free vulnerability in the obj_toSource function in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via a crafted web page referencing JavaScript Proxy objects that are not properly handled during garbage collection.", "edition": 7, "cvss3": {}, "published": "2013-01-13T20:55:00", "title": "CVE-2013-0756", "type": "cve", "cwe": ["CWE-416"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2013-0756"], "modified": "2020-08-10T21:08:00", "cpe": ["cpe:/o:suse:linux_enterprise_software_development_kit:10", "cpe:/o:opensuse:opensuse:12.1", "cpe:/o:canonical:ubuntu_linux:11.10", "cpe:/o:canonical:ubuntu_linux:12.04", "cpe:/o:suse:linux_enterprise_server:10", "cpe:/o:suse:linux_enterprise_software_development_kit:11", "cpe:/o:suse:linux_enterprise_desktop:10", "cpe:/o:canonical:ubuntu_linux:12.10", "cpe:/o:opensuse:opensuse:11.4", "cpe:/o:canonical:ubuntu_linux:10.04", "cpe:/o:opensuse:opensuse:12.2", "cpe:/o:suse:linux_enterprise_server:11", "cpe:/o:suse:linux_enterprise_desktop:11"], "id": "CVE-2013-0756", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-0756", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*", "cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*", "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*"]}, {"lastseen": "2020-12-09T19:52:37", "description": "Integer overflow in the JavaScript implementation in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via a crafted string concatenation, leading to improper memory allocation and a heap-based buffer overflow.", "edition": 7, "cvss3": {}, "published": "2013-01-13T20:55:00", "title": "CVE-2013-0750", "type": "cve", "cwe": ["CWE-190"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2013-0750"], "modified": "2020-08-04T18:59:00", "cpe": ["cpe:/o:suse:linux_enterprise_software_development_kit:10", "cpe:/o:redhat:enterprise_linux_desktop:5.0", "cpe:/o:redhat:enterprise_linux_workstation:5.0", "cpe:/o:opensuse:opensuse:12.1", "cpe:/o:canonical:ubuntu_linux:11.10", "cpe:/o:redhat:enterprise_linux_desktop:6.0", "cpe:/o:canonical:ubuntu_linux:12.04", "cpe:/o:suse:linux_enterprise_server:10", "cpe:/o:redhat:enterprise_linux_eus:5.9", "cpe:/o:suse:linux_enterprise_software_development_kit:11", "cpe:/o:suse:linux_enterprise_desktop:10", "cpe:/o:redhat:enterprise_linux_server_aus:5.9", "cpe:/o:canonical:ubuntu_linux:12.10", "cpe:/o:opensuse:opensuse:11.4", "cpe:/o:redhat:enterprise_linux_eus:6.3", "cpe:/o:redhat:enterprise_linux_server:5.0", "cpe:/o:canonical:ubuntu_linux:10.04", "cpe:/o:opensuse:opensuse:12.2", "cpe:/o:suse:linux_enterprise_server:11", "cpe:/o:redhat:enterprise_linux_workstation:6.0", "cpe:/o:suse:linux_enterprise_desktop:11", "cpe:/o:redhat:enterprise_linux_server:6.0"], "id": "CVE-2013-0750", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-0750", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*", "cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*", "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*"]}, {"lastseen": "2020-12-09T19:52:37", "description": "Use-after-free vulnerability in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.1, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors related to Mesa drivers and a resized WebGL canvas.", "edition": 7, "cvss3": {}, "published": "2013-01-13T20:55:00", "title": "CVE-2013-0763", "type": "cve", "cwe": ["CWE-416"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2013-0763"], "modified": "2020-08-04T15:29:00", "cpe": ["cpe:/o:suse:linux_enterprise_software_development_kit:10", "cpe:/o:redhat:enterprise_linux_desktop:5.0", "cpe:/o:redhat:enterprise_linux_workstation:5.0", "cpe:/o:opensuse:opensuse:12.1", "cpe:/o:canonical:ubuntu_linux:11.10", "cpe:/o:redhat:enterprise_linux_desktop:6.0", "cpe:/o:canonical:ubuntu_linux:12.04", "cpe:/o:suse:linux_enterprise_server:10", "cpe:/o:redhat:enterprise_linux_eus:5.9", "cpe:/o:suse:linux_enterprise_software_development_kit:11", "cpe:/o:suse:linux_enterprise_desktop:10", "cpe:/o:redhat:enterprise_linux_server_aus:5.9", "cpe:/o:canonical:ubuntu_linux:12.10", "cpe:/o:opensuse:opensuse:11.4", "cpe:/o:redhat:enterprise_linux_eus:6.3", "cpe:/o:redhat:enterprise_linux_server:5.0", "cpe:/o:canonical:ubuntu_linux:10.04", "cpe:/o:opensuse:opensuse:12.2", "cpe:/o:suse:linux_enterprise_server:11", "cpe:/o:redhat:enterprise_linux_workstation:6.0", "cpe:/o:suse:linux_enterprise_desktop:11", "cpe:/o:redhat:enterprise_linux_server:6.0"], "id": "CVE-2013-0763", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-0763", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*", "cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*", "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*"]}, {"lastseen": "2020-12-09T19:52:37", "description": "Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 18.0, Thunderbird before 17.0.2, and SeaMonkey before 2.15 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.", "edition": 7, "cvss3": {}, "published": "2013-01-13T20:55:00", "title": "CVE-2013-0770", "type": "cve", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2013-0770"], "modified": "2020-08-12T12:53:00", "cpe": ["cpe:/o:suse:linux_enterprise_software_development_kit:10", "cpe:/o:opensuse:opensuse:12.1", "cpe:/o:canonical:ubuntu_linux:11.10", "cpe:/o:canonical:ubuntu_linux:12.04", "cpe:/o:suse:linux_enterprise_server:10", "cpe:/o:suse:linux_enterprise_software_development_kit:11", "cpe:/o:suse:linux_enterprise_desktop:10", "cpe:/o:canonical:ubuntu_linux:12.10", "cpe:/o:opensuse:opensuse:11.4", "cpe:/o:canonical:ubuntu_linux:10.04", "cpe:/o:opensuse:opensuse:12.2", "cpe:/o:suse:linux_enterprise_server:11", "cpe:/o:suse:linux_enterprise_desktop:11"], "id": "CVE-2013-0770", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-0770", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*", "cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*", "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*"]}]}