Remote Attackers Can Now Reach Protected Network Devices via NAT Slipstreaming
2021-01-27T20:32:55
ID THREATPOST:BF1159DF375D02A6EF9E13A4B1086F02 Type threatpost Reporter Tara Seals Modified 2021-01-27T20:32:55
Description
Disconnecting devices from the internet is no longer a solid plan for protecting them from remote attackers. A new version of a known network-address translation (NAT) slipstreaming attack has been uncovered, which would allow remote attackers to reach multiple internal network devices, even if those devices don’t have access to the internet.
According to researchers from Armis and Samy Kamkar, chief security officer and co-founder at Openpath Security, attackers can execute an attack by simply convincing one target with internet access on the network to click on a malicious link. From there, cybercriminals can gain access to other, non-exposed endpoints, including unmanaged devices like industrial controllers, with no further social engineering needed.
NAT is the process of connecting internal network devices to the outside internet; it essentially allows a router to securely allow multiple devices connected to it to share a single public IP address. In enterprise environments, NAT functions are combined with firewalls to provide better perimeter cybersecurity; products from Fortinet, Cisco and HPE all take this approach.
NAT Slipstreaming Overview
In the original NAT slipstreaming attack, revealed and mitigated in November, an attacker persuades a victim to visit a specially crafted website (via social engineering and other tactics); a victim within an internal network that clicks on it is then taken to an attacker’s website. The website in turn will fool the victim network’s NAT into opening an incoming path (of either a TCP or UDP port) from the internet to the victim device.
“Slipstreaming is easy to exploit as it’s essentially entirely automated and works cross-browser and cross-platform, and it doesn’t require any user interaction other than visiting the victim site,” Kamkar told Threatpost last fall.
In order to launch an attack, the victim’s device must also have an Application-Level Gateway (ALG) connection-tracking mechanism enabled, which is usually built into NATs. NAT slipstreaming exploits the user’s browser in conjunction with ALG.
“This attack takes advantage of arbitrary control of the data portion of some TCP and UDP packets without including HTTP or other headers; the attack performs this new packet-injection technique across all major modern (and older) browsers,” explained Kamkar.
In the attack, when a victim device visits an attacker-controlled website, JavaScript code running in the victim’s browser sends out additional traffic to the attacker’s server, which traverses through the network’s NAT/firewall.
“This second-phase traffic is crafted in such a way that the NAT is fooled to believe this traffic actually originated from an application that requires a second connection to take place, from the internet to the victim device, and to an internal port that the attacker can choose,” researchers explained. “This second connection can thus lead the attacker to access any service (TCP/UDP) on the victim’s device, directly from the internet.”
If, for example, the victim’s device is a Windows device vulnerable to EternalBlue, the attacker can access the SMB port on the victim device using this technique, from the internet, exploit the vulnerability, and take over the device.
“The only thing required for this attack to take place, is that the victim clicks on link, or visits a web page of which the attacker has implanted some JavaScript code,” researchers noted.
NAT Slipstreaming 2.0
The just-discovered approach variant simply extends the attack, researchers said.
Now, “attackers [can] fool the NAT in such a way that it will create incoming paths to any device on the internal network, and not only to the victim device that clicked on the link,” they explained, in a blog posting on Tuesday.
The issue lies in the H.323 ALG, where supported. Unlike most other ALGs, H.323 enables an attacker to create a pinhole in the NAT/firewall to any internal IP, rather than just the IP of the victim that clicks on the malicious link.
Meanwhile, WebRTC TURN connections can be established by browsers over TCP to any destination port. The browsers restricted-ports list was not consulted by this logic, and was therefore bypassed.
“This allows the attacker to reach additional ALGs, such as the FTP and IRC ALGs (ports 21, 6667) that were previously unreachable due to the restricted-ports list,” researchers said. “The FTP ALG is widely used in NATs/firewalls.”
A full proof-of-concept demonstration can be seen here:
The ability to reach devices without human interaction means that attackers can reach not only desktops but also other devices that don’t typically have human operators — unmanaged devices like printers, industrial controllers, Bluetooth accessories, IP cameras, sensors, smart lighting and more. The impact of attack on these can be severe, ranging from denial-of-service (DoS) to a full-blown ransomware attack, researchers noted.
Unmanaged Corporate Devices at Risk
“Unmanaged devices [often] don’t have inherent security capabilities, and often offer interfaces for controlling them and accessing their data with little-to-no authentication, within the internal network,” researchers explained. “Exposing these interfaces directly to the internet is a serious security risk.”
Researchers gave the example of an office printer that can be controlled through its default printing protocol, or through its internal web server. Using NAT slipstreaming, an attacker could knock it offline or cause it to print arbitrary documents. Depending on the printer’s features, cybercriminals could also access stored documents.
The researchers added that in order to carry those types of actions out, the newly exposed interface would itself need to be insecure, as is the case for other targets. Thus, once attackers form a web connection to the target, they would then need to access that target. Many unmanaged devices not connected to the internet don’t require passwords, researchers noted, or often remain unpatched.
“In addition to interfaces that are unauthenticated by design, many unmanaged devices may also be vulnerable to vulnerabilities that are publicly known, that can be exploited if an attacker is able to bypass the NAT/firewall, and initiate network traffic that can trigger them,” they wrote.
An example of this risk includes the 97 percent of industrial controllers recently found to remain vulnerable to the URGENT/11 group of security bugs. In many industrial scenarios, regular patching of unmanaged devices is a challenge since they often can’t be taken offline thanks to production requirements, researchers explained. Thus, “many organizations rely on perimeter security (firewalls and NATs) to keep their unpatched devices from being accessed by potential attackers on the internet.”
Once the perimeter is breached, attackers are free to exploit and take over vulnerable and open devices, and install remote access tools for further attacks.
Mitigations via Browser Patching
Like the original attack, the new version has been mitigated with browser patches, for Chrome, Safari, Firefox and Edge. Chromium is tracking the new variant via CVE-2020-16043, while Firefox is tracking it via CVE-2021-23961.
“While the underlying issue of this attack is the way NATs are implemented (in various ways in routers and firewalls, throughout numerous vendors and applications), the easiest and fastest way to mitigate was through a patch to browsers,” according to the advisory.
The updates are Chrome v87.0.4280.141, Firefox v85.0 and Safari v14.0.3, and Microsoft’s Edge browser is also now patched, since it relies on the Chromium source code.
Download our exclusive FREE Threatpost Insider eBookHealthcare Security Woes Balloon in a Covid-Era World, sponsored by ZeroNorth, to learn more about what these security risks mean for hospitals at the day-to-day level and how healthcare security teams can implement best practices to protect providers and patients. Get the whole story and DOWNLOAD the eBook now – on us!
{"id": "THREATPOST:BF1159DF375D02A6EF9E13A4B1086F02", "type": "threatpost", "bulletinFamily": "info", "title": "Remote Attackers Can Now Reach Protected Network Devices via NAT Slipstreaming", "description": "Disconnecting devices from the internet is no longer a solid plan for protecting them from remote attackers. A new version of a known network-address translation (NAT) slipstreaming attack has been uncovered, which would allow remote attackers to reach multiple internal network devices, even if those devices don\u2019t have access to the internet.\n\nAccording to researchers from Armis and Samy Kamkar, chief security officer and co-founder at Openpath Security, attackers can execute an attack by simply convincing one target with internet access on the network to click on a malicious link. From there, cybercriminals can gain access to other, non-exposed endpoints, including unmanaged devices like industrial controllers, with no further social engineering needed.\n\n[](<https://threatpost.com/newsletter-sign/>)\n\nNAT is the process of connecting internal network devices to the outside internet; it essentially allows a router to securely allow multiple devices connected to it to share a single public IP address. In enterprise environments, NAT functions are combined with firewalls to provide better perimeter cybersecurity; products from Fortinet, Cisco and HPE all take this approach.\n\n## **NAT Slipstreaming Overview**\n\nIn the [original NAT slipstreaming attack](<https://threatpost.com/google-chrome-87-nat-slipstreaming-flaw/161344/>), revealed and mitigated in November, an attacker persuades a victim to visit a specially crafted website (via social engineering and other tactics); a victim within an internal network that clicks on it is then taken to an attacker\u2019s website. The website in turn will fool the victim network\u2019s NAT into opening an incoming path (of either a TCP or UDP port) from the internet to the victim device.\n\n\u201cSlipstreaming is easy to exploit as it\u2019s essentially entirely automated and works cross-browser and cross-platform, and it doesn\u2019t require any user interaction other than visiting the victim site,\u201d Kamkar told Threatpost last fall.\n\nIn order to launch an attack, the victim\u2019s device must also have an Application-Level Gateway (ALG) connection-tracking mechanism enabled, which is usually built into NATs. NAT slipstreaming exploits the user\u2019s browser in conjunction with ALG.\n\n\u201cThis attack takes advantage of arbitrary control of the data portion of some TCP and UDP packets without including HTTP or other headers; the attack performs this new packet-injection technique across all major modern (and older) browsers,\u201d explained Kamkar.\n\nIn the attack, when a victim device visits an attacker-controlled website, JavaScript code running in the victim\u2019s browser sends out additional traffic to the attacker\u2019s server, which traverses through the network\u2019s NAT/firewall.\n\n\u201cThis second-phase traffic is crafted in such a way that the NAT is fooled to believe this traffic actually originated from an application that requires a second connection to take place, from the internet to the victim device, and to an internal port that the attacker can choose,\u201d researchers explained. \u201cThis second connection can thus lead the attacker to access any service (TCP/UDP) on the victim\u2019s device, directly from the internet.\u201d\n\nIf, for example, the victim\u2019s device is a Windows device vulnerable to [EternalBlue](<https://threatpost.com/scanner-shows-eternalblue-vulnerability-unpatched-on-thousands-of-machines/126818/>), the attacker can access the SMB port on the victim device using this technique, from the internet, exploit the vulnerability, and take over the device.\n\n\u201cThe only thing required for this attack to take place, is that the victim clicks on link, or visits a web page of which the attacker has implanted some JavaScript code,\u201d researchers noted.\n\n## **NAT Slipstreaming 2.0**\n\nThe just-discovered approach variant simply extends the attack, researchers said.\n\nNow, \u201cattackers [can] fool the NAT in such a way that it will create incoming paths to any device on the internal network, and not only to the victim device that clicked on the link,\u201d they explained, [in a blog posting](<https://www.armis.com/resources/iot-security-blog/nat-slipstreaming-v2-0-new-attack-variant-can-expose-all-internal-network-devices-to-the-internet/>) on Tuesday.\n\nThe issue lies in the H.323 ALG, where supported. Unlike most other ALGs, H.323 enables an attacker to create a pinhole in the NAT/firewall to any internal IP, rather than just the IP of the victim that clicks on the malicious link.\n\nMeanwhile, WebRTC TURN connections can be established by browsers over TCP to any destination port. The browsers restricted-ports list was not consulted by this logic, and was therefore bypassed.\n\n\u201cThis allows the attacker to reach additional ALGs, such as the FTP and IRC ALGs (ports 21, 6667) that were previously unreachable due to the restricted-ports list,\u201d researchers said. \u201cThe FTP ALG is widely used in NATs/firewalls.\u201d\n\nA full proof-of-concept demonstration can be seen here:\n\nThe ability to reach devices without human interaction means that attackers can reach not only desktops but also other devices that don\u2019t typically have human operators \u2014 unmanaged devices like printers, industrial controllers, Bluetooth accessories, IP cameras, sensors, smart lighting and more. The impact of attack on these can be severe, ranging from denial-of-service (DoS) to a full-blown ransomware attack, researchers noted.\n\n## **Unmanaged Corporate Devices at Risk**\n\n\u201cUnmanaged devices [often] don\u2019t have inherent security capabilities, and often offer interfaces for controlling them and accessing their data with little-to-no authentication, within the internal network,\u201d researchers explained. \u201cExposing these interfaces directly to the internet is a serious security risk.\u201d\n\nResearchers gave the example of an office printer that can be controlled through its default printing protocol, or through its internal web server. Using NAT slipstreaming, an attacker could knock it offline or cause it to print arbitrary documents. Depending on the printer\u2019s features, cybercriminals could also access stored documents.\n\nThe researchers added that in order to carry those types of actions out, the newly exposed interface would itself need to be insecure, as is the case for other targets. Thus, once attackers form a web connection to the target, they would then need to access that target. Many unmanaged devices not connected to the internet don\u2019t require passwords, researchers noted, or often remain unpatched.\n\n\u201cIn addition to interfaces that are unauthenticated by design, many unmanaged devices may also be vulnerable to vulnerabilities that are publicly known, that can be exploited if an attacker is able to bypass the NAT/firewall, and initiate network traffic that can trigger them,\u201d they wrote.\n\nAn example of this risk includes the 97 percent of industrial controllers [recently found to remain vulnerable](<https://threatpost.com/unpatched-iot-ot-devices-threaten-critical-infrastructure/162275/>) to the URGENT/11 group of security bugs. In many industrial scenarios, regular patching of unmanaged devices is a challenge since they often can\u2019t be taken offline thanks to production requirements, researchers explained. Thus, \u201cmany organizations rely on perimeter security (firewalls and NATs) to keep their unpatched devices from being accessed by potential attackers on the internet.\u201d\n\nOnce the perimeter is breached, attackers are free to exploit and take over vulnerable and open devices, and install remote access tools for further attacks.\n\n## **Mitigations via Browser Patching**\n\nLike the original attack, the new version has been mitigated with browser patches, for Chrome, Safari, Firefox and Edge. Chromium is tracking the new variant via CVE-2020-16043, while Firefox is tracking it via CVE-2021-23961.\n\n\u201cWhile the underlying issue of this attack is the way NATs are implemented (in various ways in routers and firewalls, throughout numerous vendors and applications), the easiest and fastest way to mitigate was through a patch to browsers,\u201d according to the advisory.\n\nThe updates are Chrome v87.0.4280.141, Firefox v85.0 and Safari v14.0.3, and Microsoft\u2019s Edge browser is also now patched, since it relies on the Chromium source code.\n\n**Download our exclusive **[**FREE Threatpost Insider eBook**](<https://threatpost.com/ebooks/healthcare-security-woes-balloon-in-a-covid-era-world/?utm_source=FEATURE&utm_medium=FEATURE&utm_campaign=Nov_eBook>) _**Healthcare Security Woes Balloon in a Covid-Era World**_**, sponsored by ZeroNorth, to learn more about what these security risks mean for hospitals at the day-to-day level and how healthcare security teams can implement best practices to protect providers and patients. Get the whole story and **[**DOWNLOAD the eBook now**](<https://threatpost.com/ebooks/healthcare-security-woes-balloon-in-a-covid-era-world/?utm_source=ART&utm_medium=ART&utm_campaign=Nov_eBook>)** \u2013 on us!**\n", "published": "2021-01-27T20:32:55", "modified": "2021-01-27T20:32:55", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "href": "https://threatpost.com/remote-attackers-internal-network-devices-nat-slipstreaming/163400/", "reporter": "Tara Seals", "references": ["https://threatpost.com/newsletter-sign/", "https://threatpost.com/google-chrome-87-nat-slipstreaming-flaw/161344/", "https://threatpost.com/scanner-shows-eternalblue-vulnerability-unpatched-on-thousands-of-machines/126818/", "https://www.armis.com/resources/iot-security-blog/nat-slipstreaming-v2-0-new-attack-variant-can-expose-all-internal-network-devices-to-the-internet/", "https://threatpost.com/unpatched-iot-ot-devices-threaten-critical-infrastructure/162275/", "https://threatpost.com/ebooks/healthcare-security-woes-balloon-in-a-covid-era-world/?utm_source=FEATURE&utm_medium=FEATURE&utm_campaign=Nov_eBook", "https://threatpost.com/ebooks/healthcare-security-woes-balloon-in-a-covid-era-world/?utm_source=ART&utm_medium=ART&utm_campaign=Nov_eBook"], "cvelist": ["CVE-2020-16043", "CVE-2021-23961"], "lastseen": "2021-01-27T20:45:12", "viewCount": 50, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2020-16043"]}, {"type": "thn", "idList": ["THN:297E4356728156DE21DF3C288E414E47"]}, {"type": "nessus", "idList": ["MACOS_FIREFOX_85_0.NASL", "GOOGLE_CHROME_87_0_4280_141.NASL", "GENTOO_GLSA-202102-01.NASL", "MOZILLA_FIREFOX_85_0.NASL", "OPENSUSE-2021-41.NASL", "FREEBSD_PKG_D153C4D250F811EB80463065EC8FD3EC.NASL", "DEBIAN_DSA-4832.NASL", "FEDORA_2021-D9FAEFF8EB.NASL", "MACOSX_GOOGLE_CHROME_87_0_4280_141.NASL", "UBUNTU_USN-4717-1.NASL"]}, {"type": "archlinux", "idList": ["ASA-202101-6", "ASA-202102-1", "ASA-202101-20"]}, {"type": "ubuntu", "idList": ["USN-4717-1"]}, {"type": "gentoo", "idList": ["GLSA-202102-01", "GLSA-202101-05"]}, {"type": "debian", "idList": ["DEBIAN:DSA-4832-1:C6798"]}, {"type": "fedora", "idList": ["FEDORA:8CF273097270", "FEDORA:C6EA430E630A"]}, {"type": "freebsd", "idList": ["D153C4D2-50F8-11EB-8046-3065EC8FD3EC"]}, {"type": "threatpost", "idList": ["THREATPOST:380C5F7068B8AEADFE218D6D038E9490", "THREATPOST:018A5896B52734EF63419DC7D2122C0A", "THREATPOST:EA2228FFF2BA7DAA40851692D1E4E5EB", "THREATPOST:D8CFE3B24D4FA3063D4C8449727F909F"]}, {"type": "mscve", "idList": ["MS:ADV200002"]}], "modified": "2021-01-27T20:45:12", "rev": 2}, "score": {"value": 5.4, "vector": "NONE", "modified": "2021-01-27T20:45:12", "rev": 2}, "vulnersScore": 5.4}}
{"cve": [{"lastseen": "2021-02-02T07:37:00", "description": "Insufficient data validation in networking in Google Chrome prior to 87.0.4280.141 allowed a remote attacker to bypass discretionary access control via malicious network traffic.", "edition": 6, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 8.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.1"}, "impactScore": 5.9}, "published": "2021-01-08T19:15:00", "title": "CVE-2020-16043", "type": "cve", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-16043"], "modified": "2021-01-26T18:15:00", "cpe": [], "id": "CVE-2020-16043", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-16043", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": []}], "thn": [{"lastseen": "2021-01-27T14:26:27", "bulletinFamily": "info", "cvelist": ["CVE-2020-16043", "CVE-2020-26978", "CVE-2021-23961"], "description": "[](<https://thehackernews.com/images/-h7OZDO0gbkI/YBFhcYCDyAI/AAAAAAAABmc/4jAHmFC3fxkcYU5tkhP2zqLYk4NOjg2agCLcBGAsYHQ/s0/NAT-slipstreaming-hacking.jpg>)\n\nA newly devised variant of the [NAT Slipstreaming attack](<https://thehackernews.com/2020/11/new-natfirewall-bypass-attack-lets.html>) can be leveraged to compromise and expose any device in an internal network, according to the latest research.\n\nDetailed by enterprise IoT security firm Armis, the [new attack](<https://www.armis.com/resources/iot-security-blog/nat-slipstreaming-v2-0-new-attack-variant-can-expose-all-internal-network-devices-to-the-internet/>) (CVE-2020-16043 and CVE-2021-23961) builds on the previously disclosed technique to bypass routers and firewalls and reach any unmanaged device within the internal network from the Internet.\n\nFirst [disclosed](<https://thehackernews.com/2020/11/new-natfirewall-bypass-attack-lets.html>) by security researcher Samy Kamkar in late October 2020, the JavaScript-based attack relied on luring a user into visiting a malicious website to circumvent browser-based port restrictions and allow the attacker to remotely access TCP/UDP services on the victim's device, even those that were protected by a firewall or NAT.\n\n[](<https://go.thn.li/password-auditor> \"password auditor\" )\n\nAlthough partial mitigations were released on November 11 to thwart the attack in [Chrome 87](<https://www.chromestatus.com/feature/5064283639513088>), [Firefox 84](<https://www.mozilla.org/en-US/security/advisories/mfsa2020-54/#CVE-2020-26978>), and [Safari](<https://bugs.webkit.org/show_bug.cgi?id=218557>) by preventing connections on port 5060 or 5061, Armis researchers Ben Seri and Gregory Vishnipolsky revealed that \"NAT Slipstreaming 2.0\" puts \"embedded, unmanaged, devices at greater risk, by allowing attackers to expose devices located on internal networks, directly to the Internet.\"\n\nVulnerable devices that could be potentially exposed as a consequence of this attack include office printers, industrial controllers, IP cameras, and other unauthenticated interfaces that could be exploited once the NAT/firewall is tricked into opening network traffic to the victim device.\n\n\"Using the new variant of the NAT Slipstreaming attack to access these types of interfaces from the Internet, can result in attacks that range from a nuisance to a sophisticated ransomware threat,\" the researchers said.\n\nGoogle, Apple, Mozilla, and Microsoft have all released patches to Chrome ([v87.0.4280.141](<https://chromereleases.googleblog.com/2021/01/stable-channel-update-for-desktop.html>)), Safari ([v14.0.3](<https://support.apple.com/en-us/HT201222>)), Firefox ([v85.0](<https://www.mozilla.org/en-US/firefox/85.0/releasenotes/>)), and Edge ([v87.0.664.75](<https://msrc.microsoft.com/update-guide/en-us/vulnerability/ADV200002>)) browsers to address the new attack.\n\n### Using H.323 Packets to facilitate NAT Slipstreaming\n\nPut simply, [NAT Slipstreaming](<https://samy.pl/slipstream/>) allows a bad actor to bypass NAT/firewall and remotely access any TCP/UDP service bound to a victim machine as a result of the target visiting a malware-infected website specially crafted for this purpose.\n\nParticularly, the malicious JavaScript code running on the victim's browser extracts the internal IP address and takes advantage of TCP/IP packet segmentation to create large TCP/UDP beacons and subsequently smuggle a Session Initiation Protocol ([SIP](<https://en.wikipedia.org/wiki/Session_Initiation_Protocol>)) packet containing the internal IP address inside an outbound HTTP POST request via TCP port 5060.\n\n\"This is achieved by carefully setting the [Maximum Segment Size] value of an attacker controlled TCP connection from the victim browser to an attacker's server, so that a TCP segment in the 'middle' of the HTTP request will be entirely controlled by the attacker,\" the researchers explained.\n\nAs a consequence, this causes the NAT application-level gateway (ALG) to open arbitrary ports for inbound connections to the client's device via the internal IP address.\n\nNAT Slipstreaming 2.0 is similar to the aforementioned attack in that it uses the same approach but relies on [H.323](<https://en.wikipedia.org/wiki/H.323>) VoIP protocol instead of SIP to send multiple fetch requests to the attacker's server on H.323 port (1720), thereby allowing the attacker to iterate through a range of IP addresses and ports, and opening each one of them to the Internet.\n\n\"A long lasting solution, unfortunately, would require some [overhaul] of the Internet infrastructure we're accustomed to,\" the researchers concluded.\n\n\"It is important to understand that security was not the principal agenda for the creation of NATs, rather it was mainly a by-product of the potential exhaustion of IPv4 addresses. Legacy requirements such as ALGs are still a dominant theme in the design of NATs today, and are the primary reason bypassing attacks are found again and again.\"\n\n \n\n\nFound this article interesting? Follow THN on [Facebook](<https://www.facebook.com/thehackernews>), [Twitter _\uf099_](<https://twitter.com/thehackersnews>) and [LinkedIn](<https://www.linkedin.com/company/thehackernews/>) to read more exclusive content we post.\n", "modified": "2021-01-27T12:58:55", "published": "2021-01-27T12:58:00", "id": "THN:297E4356728156DE21DF3C288E414E47", "href": "https://thehackernews.com/2021/01/new-attack-could-let-remote-hackers.html", "type": "thn", "title": "New Attack Could Let Remote Hackers Target Devices On Internal Networks", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "nessus": [{"lastseen": "2021-02-06T15:57:14", "description": "The remote Ubuntu 16.04 LTS / 18.04 LTS / 20.04 LTS / 20.10 host has packages installed that are affected by multiple\nvulnerabilities as referenced in the USN-4717-1 advisory. Note that Nessus has not tested for this issue but has instead\nrelied only on the application's self-reported version number.", "edition": 2, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2021-02-03T00:00:00", "title": "Ubuntu 16.04 LTS / 18.04 LTS / 20.04 LTS / 20.10 : Firefox vulnerabilities (USN-4717-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2021-23956", "CVE-2021-23955", "CVE-2021-23958", "CVE-2021-23961", "CVE-2021-23965", "CVE-2021-23960", "CVE-2021-23953", "CVE-2021-23964", "CVE-2021-23954", "CVE-2021-23962", "CVE-2021-23963"], "modified": "2021-02-03T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:firefox-locale-uz", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-sk", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-nb", "p-cpe:/a:canonical:ubuntu_linux:firefox-mozsymbols", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-si", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-en", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-sq", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-eu", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-ca", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-cak", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-pt", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-uk", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-et", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-da", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-az", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-hi", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-csb", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-tr", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-hy", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-my", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-lv", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-bg", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-es", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-el", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-mk", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-mr", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-lg", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-th", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-ka", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-te", "p-cpe:/a:canonical:ubuntu_linux:firefox-dev", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-ja", "p-cpe:/a:canonical:ubuntu_linux:firefox", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-ms", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-kk", "cpe:/o:canonical:ubuntu_linux:16.04:-:lts", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-cs", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-ml", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-xh", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-ro", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-zh-hans", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-gd", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-or", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-kab", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-mn", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-ar", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-lt", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-oc", "cpe:/o:canonical:ubuntu_linux:18.04:-:lts", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-sr", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-hu", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-sw", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-ru", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-gn", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-nl", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-bs", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-pa", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-fr", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-hsb", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-km", "cpe:/o:canonical:ubuntu_linux:20.04:-:lts", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-zh-hant", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-kn", "p-cpe:/a:canonical:ubuntu_linux:firefox-geckodriver", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-nn", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-sv", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-ast", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-fa", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-af", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-ur", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-de", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-gu", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-be", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-he", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-br", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-is", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-as", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-nso", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-ko", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-ne", "cpe:/o:canonical:ubuntu_linux:20.10", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-id", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-ku", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-an", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-bn", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-eo", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-ga", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-mai", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-zu", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-cy", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-fi", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-sl", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-ia", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-hr", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-fy", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-pl", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-gl", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-vi", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-it", "p-cpe:/a:canonical:ubuntu_linux:firefox-locale-ta"], "id": "UBUNTU_USN-4717-1.NASL", "href": "https://www.tenable.com/plugins/nessus/146069", "sourceData": "##\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-4717-1. The text\n# itself is copyright (C) Canonical, Inc. See\n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered\n# trademark of Canonical, Inc.\n##\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(146069);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/02/05\");\n\n script_cve_id(\n \"CVE-2021-23953\",\n \"CVE-2021-23954\",\n \"CVE-2021-23955\",\n \"CVE-2021-23956\",\n \"CVE-2021-23958\",\n \"CVE-2021-23960\",\n \"CVE-2021-23961\",\n \"CVE-2021-23962\",\n \"CVE-2021-23963\",\n \"CVE-2021-23964\",\n \"CVE-2021-23965\"\n );\n script_xref(name:\"USN\", value:\"4717-1\");\n\n script_name(english:\"Ubuntu 16.04 LTS / 18.04 LTS / 20.04 LTS / 20.10 : Firefox vulnerabilities (USN-4717-1)\");\n script_summary(english:\"Checks the dpkg output for the updated packages\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Ubuntu host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Ubuntu 16.04 LTS / 18.04 LTS / 20.04 LTS / 20.10 host has packages installed that are affected by multiple\nvulnerabilities as referenced in the USN-4717-1 advisory. Note that Nessus has not tested for this issue but has instead\nrelied only on the application's self-reported version number.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://ubuntu.com/security/notices/USN-4717-1\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-23964\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/01/26\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/02/01\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/02/03\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:16.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:18.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:20.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:20.10\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-geckodriver\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-af\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-an\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-ar\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-as\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-ast\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-az\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-be\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-bg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-bn\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-br\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-bs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-ca\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-cak\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-cs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-csb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-cy\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-da\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-de\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-el\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-en\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-eo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-es\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-et\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-eu\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-fa\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-fi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-fr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-fy\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-ga\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-gd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-gl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-gn\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-gu\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-he\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-hi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-hr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-hsb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-hu\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-hy\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-ia\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-id\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-is\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-it\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-ja\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-ka\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-kab\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-kk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-km\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-kn\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-ko\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-ku\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-lg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-lt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-lv\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-mai\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-mk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-ml\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-mn\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-mr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-ms\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-my\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-nb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-ne\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-nl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-nn\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-nso\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-oc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-or\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-pa\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-pl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-pt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-ro\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-ru\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-si\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-sk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-sl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-sq\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-sr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-sv\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-sw\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-ta\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-te\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-th\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-tr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-uk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-ur\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-uz\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-vi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-xh\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-zh-hans\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-zh-hant\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-locale-zu\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:firefox-mozsymbols\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_copyright(english:\"Ubuntu Security Notice (C) 2021 Canonical, Inc. / NASL script (C) 2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\ninclude('audit.inc');\ninclude('ubuntu.inc');\ninclude('misc_func.inc');\n\nif ( ! get_kb_item('Host/local_checks_enabled') ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item('Host/Ubuntu/release');\nif ( isnull(release) ) audit(AUDIT_OS_NOT, 'Ubuntu');\nrelease = chomp(release);\nif (! preg(pattern:\"^(16\\.04|18\\.04|20\\.04|20\\.10)$\", string:release)) audit(AUDIT_OS_NOT, 'Ubuntu 16.04 / 18.04 / 20.04 / 20.10', 'Ubuntu ' + release);\nif ( ! get_kb_item('Host/Debian/dpkg-l') ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Ubuntu', cpu);\n\n\npkgs = [\n {'osver': '16.04', 'pkgname': 'firefox', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-dev', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-geckodriver', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-af', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-an', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-ar', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-as', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-ast', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-az', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-be', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-bg', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-bn', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-br', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-bs', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-ca', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-cak', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-cs', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-csb', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-cy', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-da', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-de', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-el', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-en', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-eo', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-es', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-et', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-eu', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-fa', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-fi', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-fr', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-fy', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-ga', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-gd', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-gl', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-gn', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-gu', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-he', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-hi', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-hr', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-hsb', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-hu', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-hy', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-ia', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-id', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-is', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-it', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-ja', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-ka', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-kab', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-kk', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-km', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-kn', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-ko', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-ku', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-lg', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-lt', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-lv', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-mai', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-mk', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-ml', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-mn', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-mr', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-ms', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-my', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-nb', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-ne', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-nl', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-nn', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-nso', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-oc', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-or', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-pa', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-pl', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-pt', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-ro', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-ru', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-si', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-sk', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-sl', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-sq', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-sr', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-sv', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-sw', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-ta', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-te', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-th', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-tr', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-uk', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-ur', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-uz', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-vi', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-xh', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-zh-hans', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-zh-hant', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-locale-zu', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '16.04', 'pkgname': 'firefox-mozsymbols', 'pkgver': '85.0+build1-0ubuntu0.16.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-dev', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-geckodriver', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-af', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-an', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-ar', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-as', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-ast', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-az', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-be', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-bg', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-bn', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-br', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-bs', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-ca', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-cak', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-cs', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-csb', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-cy', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-da', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-de', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-el', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-en', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-eo', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-es', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-et', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-eu', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-fa', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-fi', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-fr', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-fy', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-ga', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-gd', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-gl', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-gn', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-gu', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-he', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-hi', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-hr', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-hsb', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-hu', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-hy', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-ia', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-id', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-is', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-it', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-ja', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-ka', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-kab', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-kk', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-km', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-kn', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-ko', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-ku', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-lg', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-lt', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-lv', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-mai', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-mk', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-ml', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-mn', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-mr', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-ms', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-my', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-nb', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-ne', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-nl', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-nn', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-nso', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-oc', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-or', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-pa', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-pl', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-pt', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-ro', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-ru', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-si', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-sk', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-sl', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-sq', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-sr', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-sv', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-sw', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-ta', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-te', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-th', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-tr', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-uk', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-ur', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-uz', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-vi', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-xh', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-zh-hans', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-zh-hant', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-locale-zu', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'firefox-mozsymbols', 'pkgver': '85.0+build1-0ubuntu0.18.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-dev', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-geckodriver', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-af', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-an', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-ar', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-as', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-ast', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-az', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-be', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-bg', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-bn', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-br', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-bs', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-ca', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-cak', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-cs', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-csb', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-cy', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-da', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-de', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-el', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-en', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-eo', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-es', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-et', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-eu', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-fa', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-fi', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-fr', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-fy', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-ga', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-gd', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-gl', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-gn', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-gu', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-he', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-hi', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-hr', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-hsb', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-hu', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-hy', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-ia', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-id', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-is', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-it', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-ja', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-ka', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-kab', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-kk', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-km', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-kn', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-ko', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-ku', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-lg', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-lt', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-lv', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-mai', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-mk', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-ml', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-mn', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-mr', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-ms', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-my', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-nb', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-ne', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-nl', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-nn', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-nso', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-oc', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-or', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-pa', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-pl', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-pt', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-ro', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-ru', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-si', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-sk', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-sl', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-sq', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-sr', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-sv', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-sw', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-ta', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-te', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-th', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-tr', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-uk', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-ur', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-uz', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-vi', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-xh', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-zh-hans', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-zh-hant', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-locale-zu', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.04', 'pkgname': 'firefox-mozsymbols', 'pkgver': '85.0+build1-0ubuntu0.20.04.1'},\n {'osver': '20.10', 'pkgname': 'firefox', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-dev', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-geckodriver', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-af', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-an', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-ar', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-as', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-ast', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-az', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-be', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-bg', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-bn', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-br', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-bs', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-ca', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-cak', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-cs', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-csb', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-cy', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-da', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-de', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-el', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-en', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-eo', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-es', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-et', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-eu', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-fa', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-fi', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-fr', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-fy', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-ga', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-gd', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-gl', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-gn', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-gu', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-he', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-hi', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-hr', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-hsb', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-hu', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-hy', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-ia', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-id', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-is', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-it', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-ja', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-ka', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-kab', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-kk', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-km', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-kn', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-ko', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-ku', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-lg', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-lt', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-lv', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-mai', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-mk', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-ml', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-mn', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-mr', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-ms', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-my', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-nb', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-ne', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-nl', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-nn', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-nso', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-oc', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-or', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-pa', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-pl', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-pt', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-ro', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-ru', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-si', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-sk', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-sl', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-sq', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-sr', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-sv', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-sw', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-ta', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-te', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-th', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-tr', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-uk', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-ur', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-uz', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-vi', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-xh', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-zh-hans', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-zh-hant', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-locale-zu', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'},\n {'osver': '20.10', 'pkgname': 'firefox-mozsymbols', 'pkgver': '85.0+build1-0ubuntu0.20.10.1'}\n];\n\nflag = 0;\nforeach package_array ( pkgs ) {\n osver = NULL;\n pkgname = NULL;\n pkgver = NULL;\n if (!empty_or_null(package_array['osver'])) osver = package_array['osver'];\n if (!empty_or_null(package_array['pkgname'])) pkgname = package_array['pkgname'];\n if (!empty_or_null(package_array['pkgver'])) pkgver = package_array['pkgver'];\n if (osver && pkgname && pkgver) {\n if (ubuntu_check(osver:osver, pkgname:pkgname, pkgver:pkgver)) flag++;\n }\n}\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'firefox / firefox-dev / firefox-geckodriver / firefox-locale-af / etc');\n}", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-02-05T19:22:30", "description": "The remote host is affected by the vulnerability described in GLSA-202102-01\n(Mozilla Firefox: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in Mozilla Firefox. Please\n review the CVE identifiers referenced below for details.\n \nImpact :\n\n Please review the referenced CVE identifiers for details.\n \nWorkaround :\n\n There is no known workaround at this time.", "edition": 2, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2021-02-01T00:00:00", "title": "GLSA-202102-01 : Mozilla Firefox: Multiple vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2021-23956", "CVE-2021-23955", "CVE-2021-23958", "CVE-2021-26976", "CVE-2021-23961", "CVE-2021-23965", "CVE-2021-23960", "CVE-2021-23953", "CVE-2021-23964", "CVE-2021-23954", "CVE-2021-23962", "CVE-2021-23963"], "modified": "2021-02-01T00:00:00", "cpe": ["p-cpe:/a:gentoo:linux:firefox", "cpe:/o:gentoo:linux", "p-cpe:/a:gentoo:linux:firefox-bin"], "id": "GENTOO_GLSA-202102-01.NASL", "href": "https://www.tenable.com/plugins/nessus/145711", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Gentoo Linux Security Advisory GLSA 202102-01.\n#\n# The advisory text is Copyright (C) 2001-2021 Gentoo Foundation, Inc.\n# and licensed under the Creative Commons - Attribution / Share Alike \n# license. See http://creativecommons.org/licenses/by-sa/3.0/\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(145711);\n script_version(\"1.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/02/04\");\n\n script_cve_id(\"CVE-2021-23953\", \"CVE-2021-23954\", \"CVE-2021-23955\", \"CVE-2021-23956\", \"CVE-2021-23958\", \"CVE-2021-23960\", \"CVE-2021-23961\", \"CVE-2021-23962\", \"CVE-2021-23963\", \"CVE-2021-23964\", \"CVE-2021-23965\", \"CVE-2021-26976\");\n script_xref(name:\"GLSA\", value:\"202102-01\");\n\n script_name(english:\"GLSA-202102-01 : Mozilla Firefox: Multiple vulnerabilities\");\n script_summary(english:\"Checks for updated package(s) in /var/db/pkg\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\n\"The remote Gentoo host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"The remote host is affected by the vulnerability described in GLSA-202102-01\n(Mozilla Firefox: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in Mozilla Firefox. Please\n review the CVE identifiers referenced below for details.\n \nImpact :\n\n Please review the referenced CVE identifiers for details.\n \nWorkaround :\n\n There is no known workaround at this time.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2021-03/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2021-04/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.gentoo.org/glsa/202102-01\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"All Mozilla Firefox ESR users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=www-client/firefox-78.7.0'\n All Mozilla Firefox ESR binary users should upgrade to the latest\n version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=www-client/firefox-bin-78.7.0'\n All Mozilla Firefox users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=www-client/firefox-85.0'\n All Mozilla Firefox binary users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=www-client/firefox-bin-85.0'\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-23962\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:firefox\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:firefox-bin\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:gentoo:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/02/01\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/02/01\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Gentoo Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Gentoo/release\", \"Host/Gentoo/qpkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"qpkg.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Gentoo/release\")) audit(AUDIT_OS_NOT, \"Gentoo\");\nif (!get_kb_item(\"Host/Gentoo/qpkg-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (qpkg_check(package:\"www-client/firefox\", unaffected:make_list(\"ge 78.7.0\", \"ge 85.0\"), vulnerable:make_list(\"lt 85.0\"))) flag++;\nif (qpkg_check(package:\"www-client/firefox-bin\", unaffected:make_list(\"ge 78.7.0\", \"ge 85.0\"), vulnerable:make_list(\"lt 85.0\"))) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = qpkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"Mozilla Firefox\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-30T11:48:23", "description": "The version of Firefox installed on the remote Windows host is prior to 85.0. It is, therefore, affected by multiple\nvulnerabilities as referenced in the mfsa2021-03 advisory.\n\n - If a user clicked into a specifically crafted PDF, the PDF reader could be confused into leaking cross-\n origin information, when said information is served as chunked data. (CVE-2021-23953)\n\n - Using the new logical assignment operators in a JavaScript switch statement could have caused a type\n confusion, leading to a memory corruption and a potentially exploitable crash. (CVE-2021-23954)\n\n - The browser could have been confused into transferring a pointer lock state into another tab, which could\n have lead to clickjacking attacks. (CVE-2021-23955)\n\n - An ambiguous file picker design could have confused users who intended to select and upload a single file\n into uploading a whole directory. This was addressed by adding a new prompt. (CVE-2021-23956)\n\n - Navigations through the Android-specific `intent` URL scheme could have been misused to escape iframe\n sandbox.Note: This issue only affected Firefox for Android. Other operating systems are unaffected.\n (CVE-2021-23957)\n\n - The browser could have been confused into transferring a screen sharing state into another tab, which\n would leak unintended information. (CVE-2021-23958)\n\n - An XSS bug in internal error pages could have led to various spoofing attacks, including other error pages\n and the address bar.Note: This issue only affected Firefox for Android. Other operating systems are\n unaffected. (CVE-2021-23959)\n\n - Performing garbage collection on re-declared JavaScript variables resulted in a user-after-poison, and a\n potentially exploitable crash. (CVE-2021-23960)\n\n - Further techniques that built on the slipstream research combined with a malicious webpage could have\n exposed both an internal network's hosts as well as services running on the user's local machine.\n (CVE-2021-23961)\n\n - Incorrect use of the RowCountChanged method could have led to a user-after-poison and a\n potentially exploitable crash. (CVE-2021-23962)\n\n - When sharing geolocation during an active WebRTC share, Firefox could have reset the webRTC sharing state\n in the user interface, leading to loss of control over the currently granted permission (CVE-2021-23963)\n\n - Mozilla developers Andrew McCreight, Tyson Smith, Jesse Schwartzentruber, Jon Coppeard, Byron Campen,\n Andr Bargull, Steve Fink, Jason Kratzer, Christian Holler, Alexis Beingessner reported memory safety bugs\n present in Firefox 84 and Firefox ESR 78.6. Some of these bugs showed evidence of memory corruption and we\n presume that with enough effort some of these could have been exploited to run arbitrary code.\n (CVE-2021-23964)\n\n - Mozilla developers Sebastian Hengst, Christian Holler, Tyson Smith reported memory safety bugs present in\n Firefox 84. Some of these bugs showed evidence of memory corruption and we presume that with enough effort\n some of these could have been exploited to run arbitrary code. (CVE-2021-23965)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.", "edition": 3, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2021-01-27T00:00:00", "title": "Mozilla Firefox < 85.0", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2021-23956", "CVE-2021-23955", "CVE-2021-23958", "CVE-2021-23961", "CVE-2021-23959", "CVE-2021-23965", "CVE-2021-23960", "CVE-2021-23953", "CVE-2021-23957", "CVE-2021-23964", "CVE-2021-23954", "CVE-2021-23962", "CVE-2021-23963"], "modified": "2021-01-27T00:00:00", "cpe": ["cpe:/a:mozilla:firefox"], "id": "MOZILLA_FIREFOX_85_0.NASL", "href": "https://www.tenable.com/plugins/nessus/145465", "sourceData": "## \n# (C) Tenable Network Security, Inc.\n# \n# The descriptive text and package checks in this plugin were\n# extracted from Mozilla Foundation Security Advisory mfsa2021-03.\n# The text itself is copyright (C) Mozilla Foundation.\n##\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(145465);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/29\");\n\n script_cve_id(\n \"CVE-2021-23953\",\n \"CVE-2021-23954\",\n \"CVE-2021-23955\",\n \"CVE-2021-23956\",\n \"CVE-2021-23957\",\n \"CVE-2021-23958\",\n \"CVE-2021-23959\",\n \"CVE-2021-23960\",\n \"CVE-2021-23961\",\n \"CVE-2021-23962\",\n \"CVE-2021-23963\",\n \"CVE-2021-23964\",\n \"CVE-2021-23965\"\n );\n script_xref(name:\"IAVA\", value:\"2021-A-0051\");\n\n script_name(english:\"Mozilla Firefox < 85.0\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"A web browser installed on the remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Firefox installed on the remote Windows host is prior to 85.0. It is, therefore, affected by multiple\nvulnerabilities as referenced in the mfsa2021-03 advisory.\n\n - If a user clicked into a specifically crafted PDF, the PDF reader could be confused into leaking cross-\n origin information, when said information is served as chunked data. (CVE-2021-23953)\n\n - Using the new logical assignment operators in a JavaScript switch statement could have caused a type\n confusion, leading to a memory corruption and a potentially exploitable crash. (CVE-2021-23954)\n\n - The browser could have been confused into transferring a pointer lock state into another tab, which could\n have lead to clickjacking attacks. (CVE-2021-23955)\n\n - An ambiguous file picker design could have confused users who intended to select and upload a single file\n into uploading a whole directory. This was addressed by adding a new prompt. (CVE-2021-23956)\n\n - Navigations through the Android-specific `intent` URL scheme could have been misused to escape iframe\n sandbox.Note: This issue only affected Firefox for Android. Other operating systems are unaffected.\n (CVE-2021-23957)\n\n - The browser could have been confused into transferring a screen sharing state into another tab, which\n would leak unintended information. (CVE-2021-23958)\n\n - An XSS bug in internal error pages could have led to various spoofing attacks, including other error pages\n and the address bar.Note: This issue only affected Firefox for Android. Other operating systems are\n unaffected. (CVE-2021-23959)\n\n - Performing garbage collection on re-declared JavaScript variables resulted in a user-after-poison, and a\n potentially exploitable crash. (CVE-2021-23960)\n\n - Further techniques that built on the slipstream research combined with a malicious webpage could have\n exposed both an internal network's hosts as well as services running on the user's local machine.\n (CVE-2021-23961)\n\n - Incorrect use of the RowCountChanged method could have led to a user-after-poison and a\n potentially exploitable crash. (CVE-2021-23962)\n\n - When sharing geolocation during an active WebRTC share, Firefox could have reset the webRTC sharing state\n in the user interface, leading to loss of control over the currently granted permission (CVE-2021-23963)\n\n - Mozilla developers Andrew McCreight, Tyson Smith, Jesse Schwartzentruber, Jon Coppeard, Byron Campen,\n Andr Bargull, Steve Fink, Jason Kratzer, Christian Holler, Alexis Beingessner reported memory safety bugs\n present in Firefox 84 and Firefox ESR 78.6. Some of these bugs showed evidence of memory corruption and we\n presume that with enough effort some of these could have been exploited to run arbitrary code.\n (CVE-2021-23964)\n\n - Mozilla developers Sebastian Hengst, Christian Holler, Tyson Smith reported memory safety bugs present in\n Firefox 84. Some of these bugs showed evidence of memory corruption and we presume that with enough effort\n some of these could have been exploited to run arbitrary code. (CVE-2021-23965)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2021-03/\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Mozilla Firefox version 85.0 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-23962\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/01/26\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/01/26\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/01/27\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:mozilla:firefox\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"mozilla_org_installed.nasl\");\n script_require_keys(\"Mozilla/Firefox/Version\");\n\n exit(0);\n}\n\ninclude('mozilla_version.inc');\n\nport = get_kb_item('SMB/transport');\nif (!port) port = 445;\n\ninstalls = get_kb_list('SMB/Mozilla/Firefox/*');\nif (isnull(installs)) audit(AUDIT_NOT_INST, 'Firefox');\n\nmozilla_check_version(installs:installs, product:'firefox', esr:FALSE, fix:'85.0', xss:TRUE, severity:SECURITY_HOLE);\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-30T11:19:39", "description": "The version of Firefox installed on the remote macOS or Mac OS X host is prior to 85.0. It is, therefore, affected by\nmultiple vulnerabilities as referenced in the mfsa2021-03 advisory.\n\n - If a user clicked into a specifically crafted PDF, the PDF reader could be confused into leaking cross-\n origin information, when said information is served as chunked data. (CVE-2021-23953)\n\n - Using the new logical assignment operators in a JavaScript switch statement could have caused a type\n confusion, leading to a memory corruption and a potentially exploitable crash. (CVE-2021-23954)\n\n - The browser could have been confused into transferring a pointer lock state into another tab, which could\n have lead to clickjacking attacks. (CVE-2021-23955)\n\n - An ambiguous file picker design could have confused users who intended to select and upload a single file\n into uploading a whole directory. This was addressed by adding a new prompt. (CVE-2021-23956)\n\n - Navigations through the Android-specific `intent` URL scheme could have been misused to escape iframe\n sandbox.Note: This issue only affected Firefox for Android. Other operating systems are unaffected.\n (CVE-2021-23957)\n\n - The browser could have been confused into transferring a screen sharing state into another tab, which\n would leak unintended information. (CVE-2021-23958)\n\n - An XSS bug in internal error pages could have led to various spoofing attacks, including other error pages\n and the address bar.Note: This issue only affected Firefox for Android. Other operating systems are\n unaffected. (CVE-2021-23959)\n\n - Performing garbage collection on re-declared JavaScript variables resulted in a user-after-poison, and a\n potentially exploitable crash. (CVE-2021-23960)\n\n - Further techniques that built on the slipstream research combined with a malicious webpage could have\n exposed both an internal network's hosts as well as services running on the user's local machine.\n (CVE-2021-23961)\n\n - Incorrect use of the RowCountChanged method could have led to a user-after-poison and a\n potentially exploitable crash. (CVE-2021-23962)\n\n - When sharing geolocation during an active WebRTC share, Firefox could have reset the webRTC sharing state\n in the user interface, leading to loss of control over the currently granted permission (CVE-2021-23963)\n\n - Mozilla developers Andrew McCreight, Tyson Smith, Jesse Schwartzentruber, Jon Coppeard, Byron Campen,\n Andr Bargull, Steve Fink, Jason Kratzer, Christian Holler, Alexis Beingessner reported memory safety bugs\n present in Firefox 84 and Firefox ESR 78.6. Some of these bugs showed evidence of memory corruption and we\n presume that with enough effort some of these could have been exploited to run arbitrary code.\n (CVE-2021-23964)\n\n - Mozilla developers Sebastian Hengst, Christian Holler, Tyson Smith reported memory safety bugs present in\n Firefox 84. Some of these bugs showed evidence of memory corruption and we presume that with enough effort\n some of these could have been exploited to run arbitrary code. (CVE-2021-23965)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.", "edition": 3, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2021-01-27T00:00:00", "title": "Mozilla Firefox < 85.0", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2021-23956", "CVE-2021-23955", "CVE-2021-23958", "CVE-2021-23961", "CVE-2021-23959", "CVE-2021-23965", "CVE-2021-23960", "CVE-2021-23953", "CVE-2021-23957", "CVE-2021-23964", "CVE-2021-23954", "CVE-2021-23962", "CVE-2021-23963"], "modified": "2021-01-27T00:00:00", "cpe": ["cpe:/a:mozilla:firefox"], "id": "MACOS_FIREFOX_85_0.NASL", "href": "https://www.tenable.com/plugins/nessus/145466", "sourceData": "## \n# (C) Tenable Network Security, Inc.\n# \n# The descriptive text and package checks in this plugin were\n# extracted from Mozilla Foundation Security Advisory mfsa2021-03.\n# The text itself is copyright (C) Mozilla Foundation.\n##\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(145466);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/29\");\n\n script_cve_id(\n \"CVE-2021-23953\",\n \"CVE-2021-23954\",\n \"CVE-2021-23955\",\n \"CVE-2021-23956\",\n \"CVE-2021-23957\",\n \"CVE-2021-23958\",\n \"CVE-2021-23959\",\n \"CVE-2021-23960\",\n \"CVE-2021-23961\",\n \"CVE-2021-23962\",\n \"CVE-2021-23963\",\n \"CVE-2021-23964\",\n \"CVE-2021-23965\"\n );\n script_xref(name:\"IAVA\", value:\"2021-A-0051\");\n\n script_name(english:\"Mozilla Firefox < 85.0\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"A web browser installed on the remote macOS or Mac OS X host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Firefox installed on the remote macOS or Mac OS X host is prior to 85.0. It is, therefore, affected by\nmultiple vulnerabilities as referenced in the mfsa2021-03 advisory.\n\n - If a user clicked into a specifically crafted PDF, the PDF reader could be confused into leaking cross-\n origin information, when said information is served as chunked data. (CVE-2021-23953)\n\n - Using the new logical assignment operators in a JavaScript switch statement could have caused a type\n confusion, leading to a memory corruption and a potentially exploitable crash. (CVE-2021-23954)\n\n - The browser could have been confused into transferring a pointer lock state into another tab, which could\n have lead to clickjacking attacks. (CVE-2021-23955)\n\n - An ambiguous file picker design could have confused users who intended to select and upload a single file\n into uploading a whole directory. This was addressed by adding a new prompt. (CVE-2021-23956)\n\n - Navigations through the Android-specific `intent` URL scheme could have been misused to escape iframe\n sandbox.Note: This issue only affected Firefox for Android. Other operating systems are unaffected.\n (CVE-2021-23957)\n\n - The browser could have been confused into transferring a screen sharing state into another tab, which\n would leak unintended information. (CVE-2021-23958)\n\n - An XSS bug in internal error pages could have led to various spoofing attacks, including other error pages\n and the address bar.Note: This issue only affected Firefox for Android. Other operating systems are\n unaffected. (CVE-2021-23959)\n\n - Performing garbage collection on re-declared JavaScript variables resulted in a user-after-poison, and a\n potentially exploitable crash. (CVE-2021-23960)\n\n - Further techniques that built on the slipstream research combined with a malicious webpage could have\n exposed both an internal network's hosts as well as services running on the user's local machine.\n (CVE-2021-23961)\n\n - Incorrect use of the RowCountChanged method could have led to a user-after-poison and a\n potentially exploitable crash. (CVE-2021-23962)\n\n - When sharing geolocation during an active WebRTC share, Firefox could have reset the webRTC sharing state\n in the user interface, leading to loss of control over the currently granted permission (CVE-2021-23963)\n\n - Mozilla developers Andrew McCreight, Tyson Smith, Jesse Schwartzentruber, Jon Coppeard, Byron Campen,\n Andr Bargull, Steve Fink, Jason Kratzer, Christian Holler, Alexis Beingessner reported memory safety bugs\n present in Firefox 84 and Firefox ESR 78.6. Some of these bugs showed evidence of memory corruption and we\n presume that with enough effort some of these could have been exploited to run arbitrary code.\n (CVE-2021-23964)\n\n - Mozilla developers Sebastian Hengst, Christian Holler, Tyson Smith reported memory safety bugs present in\n Firefox 84. Some of these bugs showed evidence of memory corruption and we presume that with enough effort\n some of these could have been exploited to run arbitrary code. (CVE-2021-23965)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2021-03/\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Mozilla Firefox version 85.0 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-23962\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/01/26\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/01/26\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/01/27\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:mozilla:firefox\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"MacOS X Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"macosx_firefox_installed.nasl\");\n script_require_keys(\"MacOSX/Firefox/Installed\");\n\n exit(0);\n}\n\ninclude('mozilla_version.inc');\n\nkb_base = 'MacOSX/Firefox';\nget_kb_item_or_exit(kb_base+'/Installed');\n\nversion = get_kb_item_or_exit(kb_base+'/Version', exit_code:1);\npath = get_kb_item_or_exit(kb_base+'/Path', exit_code:1);\n\nis_esr = get_kb_item(kb_base+'/is_esr');\nif (is_esr) exit(0, 'The Mozilla Firefox installation is in the ESR branch.');\n\nmozilla_check_version(version:version, path:path, product:'firefox', esr:FALSE, fix:'85.0', xss:TRUE, severity:SECURITY_HOLE);\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-15T02:48:59", "description": "Chrome Releases reports :\n\nThis release includes 16 security fixes, including :\n\n- [1148749] High CVE-2021-21106: Use after free in autofill. Reported\nby Weipeng Jiang (@Krace) from Codesafe Team of Legendsec at Qi'anxin\nGroup on 2020-11-13\n\n- [1153595] High CVE-2021-21107: Use after free in drag and drop.\nReported by Leecraso and Guang Gong of 360 Alpha Lab on 2020-11-30\n\n- [1155426] High CVE-2021-21108: Use after free in media. Reported by\nLeecraso and Guang Gong of 360 Alpha Lab on 2020-12-04\n\n- [1152334] High CVE-2021-21109: Use after free in payments. Reported\nby Rong Jian and Guang Gong of 360 Alpha Lab on 2020-11-24\n\n- [1152451] High CVE-2021-21110: Use after free in safe browsing.\nReported by Anonymous on 2020-11-24\n\n- [1149125] High CVE-2021-21111: Insufficient policy enforcement in\nWebUI. Reported by Alesandro Ortiz on 2020-11-15\n\n- [1151298] High CVE-2021-21112: Use after free in Blink. Reported by\nYoungJoo Lee(@ashuu_lee) of Raon Whitehat on 2020-11-20\n\n- [1155178] High CVE-2021-21113: Heap buffer overflow in Skia.\nReported by tsubmunu on 2020-12-03\n\n- [1148309] High CVE-2020-16043: Insufficient data validation in\nnetworking. Reported by Samy Kamkar, Ben Seri at Armis, Gregory\nVishnepolsky at Armis on 2020-11-12\n\n- [1150065] High CVE-2021-21114: Use after free in audio. Reported by\nMan Yue Mo of GitHub Security Lab on 2020-11-17\n\n- [1157790] High CVE-2020-15995: Out of bounds write in V8. Reported\nby Bohan Liu (@P4nda20371774) of Tencent Security Xuanwu Lab on\n2020-12-11\n\n- [1157814] High CVE-2021-21115: Use after free in safe browsing.\nReported by Leecraso and Guang Gong of 360 Alpha Lab on 2020-12-11\n\n- [1151069] Medium CVE-2021-21116: Heap buffer overflow in audio.\nReported by Alison Huffman, Microsoft Browser Vulnerability Research\non 2020-11-19", "edition": 3, "cvss3": {"score": 9.6, "vector": "AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"}, "published": "2021-01-11T00:00:00", "title": "FreeBSD : chromium -- multiple vulnerabilities (d153c4d2-50f8-11eb-8046-3065ec8fd3ec)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2021-21108", "CVE-2021-21114", "CVE-2020-16043", "CVE-2021-21116", "CVE-2021-21107", "CVE-2021-21109", "CVE-2021-21106", "CVE-2021-21112", "CVE-2020-15995", "CVE-2021-21115", "CVE-2021-21111", "CVE-2021-21113", "CVE-2021-21110"], "modified": "2021-01-11T00:00:00", "cpe": ["cpe:/o:freebsd:freebsd", "p-cpe:/a:freebsd:freebsd:chromium"], "id": "FREEBSD_PKG_D153C4D250F811EB80463065EC8FD3EC.NASL", "href": "https://www.tenable.com/plugins/nessus/144823", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2021 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(144823);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2020-15995\", \"CVE-2020-16043\", \"CVE-2021-21106\", \"CVE-2021-21107\", \"CVE-2021-21108\", \"CVE-2021-21109\", \"CVE-2021-21110\", \"CVE-2021-21111\", \"CVE-2021-21112\", \"CVE-2021-21113\", \"CVE-2021-21114\", \"CVE-2021-21115\", \"CVE-2021-21116\");\n\n script_name(english:\"FreeBSD : chromium -- multiple vulnerabilities (d153c4d2-50f8-11eb-8046-3065ec8fd3ec)\");\n script_summary(english:\"Checks for updated package in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote FreeBSD host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"Chrome Releases reports :\n\nThis release includes 16 security fixes, including :\n\n- [1148749] High CVE-2021-21106: Use after free in autofill. Reported\nby Weipeng Jiang (@Krace) from Codesafe Team of Legendsec at Qi'anxin\nGroup on 2020-11-13\n\n- [1153595] High CVE-2021-21107: Use after free in drag and drop.\nReported by Leecraso and Guang Gong of 360 Alpha Lab on 2020-11-30\n\n- [1155426] High CVE-2021-21108: Use after free in media. Reported by\nLeecraso and Guang Gong of 360 Alpha Lab on 2020-12-04\n\n- [1152334] High CVE-2021-21109: Use after free in payments. Reported\nby Rong Jian and Guang Gong of 360 Alpha Lab on 2020-11-24\n\n- [1152451] High CVE-2021-21110: Use after free in safe browsing.\nReported by Anonymous on 2020-11-24\n\n- [1149125] High CVE-2021-21111: Insufficient policy enforcement in\nWebUI. Reported by Alesandro Ortiz on 2020-11-15\n\n- [1151298] High CVE-2021-21112: Use after free in Blink. Reported by\nYoungJoo Lee(@ashuu_lee) of Raon Whitehat on 2020-11-20\n\n- [1155178] High CVE-2021-21113: Heap buffer overflow in Skia.\nReported by tsubmunu on 2020-12-03\n\n- [1148309] High CVE-2020-16043: Insufficient data validation in\nnetworking. Reported by Samy Kamkar, Ben Seri at Armis, Gregory\nVishnepolsky at Armis on 2020-11-12\n\n- [1150065] High CVE-2021-21114: Use after free in audio. Reported by\nMan Yue Mo of GitHub Security Lab on 2020-11-17\n\n- [1157790] High CVE-2020-15995: Out of bounds write in V8. Reported\nby Bohan Liu (@P4nda20371774) of Tencent Security Xuanwu Lab on\n2020-12-11\n\n- [1157814] High CVE-2021-21115: Use after free in safe browsing.\nReported by Leecraso and Guang Gong of 360 Alpha Lab on 2020-12-11\n\n- [1151069] Medium CVE-2021-21116: Heap buffer overflow in audio.\nReported by Alison Huffman, Microsoft Browser Vulnerability Research\non 2020-11-19\"\n );\n # https://chromereleases.googleblog.com/2021/01/stable-channel-update-for-desktop.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?c62eaf91\"\n );\n # https://vuxml.freebsd.org/freebsd/d153c4d2-50f8-11eb-8046-3065ec8fd3ec.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?c29eed5f\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-21106\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:chromium\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/01/06\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/01/07\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/01/11\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"chromium<87.0.4280.141\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:pkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-02-03T05:00:48", "description": "This update for opera fixes the following issues :\n\n - Update to version 73.0.3856.344\n\n - CHR-8265 Update chromium on desktop-stable-87-3856 to\n 87.0.4280.141\n\n - DNA-90625 [Mac] Crash at opera::TabView::\n GetPaintData(opera::TabState) const\n\n - DNA-90735 Crash at\n opera::BrowserSidebarModel::GetItemVisible\n (opera::BrowserSidebarItem const*) const\n\n - DNA-90780 Crash at\n extensions::CommandService::GetExtension\n ActionCommand(std::__1::basic_string const&,\n extensions:: ActionInfo::Type,\n extensions::CommandService::QueryType,\n extensions::Command*, bool*)\n\n - DNA-90821 Crash at opera::BrowserSidebarController::\n Action(opera::BrowserSidebarItem const*,\n opera::BrowserSidebarItemContentView*)\n\n - The update to chromium 87.0.4280.141 fixes following\n issues: CVE-2021-21106, CVE-2021-21107, CVE-2021-21108,\n CVE-2021-21109, CVE-2021-21110, CVE-2021-21111,\n CVE-2021-21112, CVE-2021-21113, CVE-2020-16043,\n CVE-2021-21114, CVE-2020-15995, CVE-2021-21115,\n CVE-2021-21116\n\n - Update to version 73.0.3856.329\n\n - DNA-89156 Crash at\n content::RenderViewHostImpl::OnFocus()\n\n - DNA-89731 [Mac] Bookmarks bar overlaps Babe section when\n hovering the OMenu\n\n - DNA-90189 Music service portal logotypes are blurred on\n Win\n\n - DNA-90336 add session data schema\n\n - DNA-90399 Address bar dropdown suggestions overlap each\n other\n\n - DNA-90520 Crash at\n absl::raw_logging_internal::RawLog(absl:: LogSeverity,\n char const*, int, char const*, …)\n\n - DNA-90538 Crash at extensions::CommandService::\n GetExtensionActionCommand(std::__1::basic_string const&,\n extensions::ActionInfo::Type,\n extensions::CommandService:: QueryType,\n extensions::Command*, bool*)\n\n - DNA-90600 Don’t report workspace visibility, when\n functionality is disabled.\n\n - DNA-90665 Collect music service statistics WP2\n\n - DNA-90773 Bad translation from english to spanish in UI\n\n - DNA-90789 Crash at\n opera::ThumbnailHelper::RunNextRequest()", "edition": 2, "cvss3": {"score": 9.6, "vector": "AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"}, "published": "2021-01-25T00:00:00", "title": "openSUSE Security Update : opera (openSUSE-2021-139)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2021-21108", "CVE-2021-21114", "CVE-2020-16043", "CVE-2021-21116", "CVE-2021-21107", "CVE-2021-21109", "CVE-2021-21106", "CVE-2021-21112", "CVE-2020-15995", "CVE-2021-21115", "CVE-2021-21111", "CVE-2021-21113", "CVE-2021-21110"], "modified": "2021-01-25T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:opera", "cpe:/o:novell:opensuse:15.2"], "id": "OPENSUSE-2021-139.NASL", "href": "https://www.tenable.com/plugins/nessus/145306", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2021-139.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(145306);\n script_version(\"1.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/02/02\");\n\n script_cve_id(\"CVE-2020-15995\", \"CVE-2020-16043\", \"CVE-2021-21106\", \"CVE-2021-21107\", \"CVE-2021-21108\", \"CVE-2021-21109\", \"CVE-2021-21110\", \"CVE-2021-21111\", \"CVE-2021-21112\", \"CVE-2021-21113\", \"CVE-2021-21114\", \"CVE-2021-21115\", \"CVE-2021-21116\");\n\n script_name(english:\"openSUSE Security Update : opera (openSUSE-2021-139)\");\n script_summary(english:\"Check for the openSUSE-2021-139 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"This update for opera fixes the following issues :\n\n - Update to version 73.0.3856.344\n\n - CHR-8265 Update chromium on desktop-stable-87-3856 to\n 87.0.4280.141\n\n - DNA-90625 [Mac] Crash at opera::TabView::\n GetPaintData(opera::TabState) const\n\n - DNA-90735 Crash at\n opera::BrowserSidebarModel::GetItemVisible\n (opera::BrowserSidebarItem const*) const\n\n - DNA-90780 Crash at\n extensions::CommandService::GetExtension\n ActionCommand(std::__1::basic_string const&,\n extensions:: ActionInfo::Type,\n extensions::CommandService::QueryType,\n extensions::Command*, bool*)\n\n - DNA-90821 Crash at opera::BrowserSidebarController::\n Action(opera::BrowserSidebarItem const*,\n opera::BrowserSidebarItemContentView*)\n\n - The update to chromium 87.0.4280.141 fixes following\n issues: CVE-2021-21106, CVE-2021-21107, CVE-2021-21108,\n CVE-2021-21109, CVE-2021-21110, CVE-2021-21111,\n CVE-2021-21112, CVE-2021-21113, CVE-2020-16043,\n CVE-2021-21114, CVE-2020-15995, CVE-2021-21115,\n CVE-2021-21116\n\n - Update to version 73.0.3856.329\n\n - DNA-89156 Crash at\n content::RenderViewHostImpl::OnFocus()\n\n - DNA-89731 [Mac] Bookmarks bar overlaps Babe section when\n hovering the OMenu\n\n - DNA-90189 Music service portal logotypes are blurred on\n Win\n\n - DNA-90336 add session data schema\n\n - DNA-90399 Address bar dropdown suggestions overlap each\n other\n\n - DNA-90520 Crash at\n absl::raw_logging_internal::RawLog(absl:: LogSeverity,\n char const*, int, char const*, …)\n\n - DNA-90538 Crash at extensions::CommandService::\n GetExtensionActionCommand(std::__1::basic_string const&,\n extensions::ActionInfo::Type,\n extensions::CommandService:: QueryType,\n extensions::Command*, bool*)\n\n - DNA-90600 Don’t report workspace visibility, when\n functionality is disabled.\n\n - DNA-90665 Collect music service statistics WP2\n\n - DNA-90773 Bad translation from english to spanish in UI\n\n - DNA-90789 Crash at\n opera::ThumbnailHelper::RunNextRequest()\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected opera package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:opera\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:15.2\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/11/03\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/01/22\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/01/25\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE15\\.2)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"15.2\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(x86_64)$\") audit(AUDIT_ARCH_NOT, \"x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE15.2\", reference:\"opera-73.0.3856.344-lp152.2.30.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"opera\");\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-23T10:36:31", "description": "Update to 87.0.4280.141. Fixes :\n\nCVE-2021-21106 CVE-2021-21107 CVE-2021-21108 CVE-2021-21109\nCVE-2021-21110 CVE-2021-21111 CVE-2021-21112 CVE-2021-21113\nCVE-2020-16043 CVE-2021-21114 CVE-2020-15995 CVE-2021-21115\nCVE-2021-21116\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.", "edition": 2, "cvss3": {"score": 9.6, "vector": "AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"}, "published": "2021-01-20T00:00:00", "title": "Fedora 33 : chromium (2021-79926272ce)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2021-21108", "CVE-2021-21114", "CVE-2020-16043", "CVE-2021-21116", "CVE-2021-21107", "CVE-2021-21109", "CVE-2021-21106", "CVE-2021-21112", "CVE-2020-15995", "CVE-2021-21115", "CVE-2021-21111", "CVE-2021-21113", "CVE-2021-21110"], "modified": "2021-01-20T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:chromium", "cpe:/o:fedoraproject:fedora:33"], "id": "FEDORA_2021-79926272CE.NASL", "href": "https://www.tenable.com/plugins/nessus/145131", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory FEDORA-2021-79926272ce.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(145131);\n script_version(\"1.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/22\");\n\n script_cve_id(\"CVE-2020-15995\", \"CVE-2020-16043\", \"CVE-2021-21106\", \"CVE-2021-21107\", \"CVE-2021-21108\", \"CVE-2021-21109\", \"CVE-2021-21110\", \"CVE-2021-21111\", \"CVE-2021-21112\", \"CVE-2021-21113\", \"CVE-2021-21114\", \"CVE-2021-21115\", \"CVE-2021-21116\");\n script_xref(name:\"FEDORA\", value:\"2021-79926272ce\");\n\n script_name(english:\"Fedora 33 : chromium (2021-79926272ce)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"Update to 87.0.4280.141. Fixes :\n\nCVE-2021-21106 CVE-2021-21107 CVE-2021-21108 CVE-2021-21109\nCVE-2021-21110 CVE-2021-21111 CVE-2021-21112 CVE-2021-21113\nCVE-2020-16043 CVE-2021-21114 CVE-2020-15995 CVE-2021-21115\nCVE-2021-21116\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bodhi.fedoraproject.org/updates/FEDORA-2021-79926272ce\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\"Update the affected chromium package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:chromium\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:33\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/11/03\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/01/17\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/01/20\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = pregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^33([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 33\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"FC33\", reference:\"chromium-87.0.4280.141-1.fc33\", allowmaj:TRUE)) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"chromium\");\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-02-20T03:53:26", "description": "The version of Google Chrome installed on the remote macOS host is prior to 87.0.4280.141. It is, therefore, affected by\nmultiple vulnerabilities as referenced in the 2021_01_stable-channel-update-for-desktop advisory. Note that Nessus has\nnot tested for this issue but has instead relied only on the application's self-reported version number.", "edition": 5, "cvss3": {"score": 9.6, "vector": "AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"}, "published": "2021-01-06T00:00:00", "title": "Google Chrome < 87.0.4280.141 Multiple Vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2021-21108", "CVE-2021-21114", "CVE-2020-16043", "CVE-2021-21116", "CVE-2021-21107", "CVE-2021-21109", "CVE-2021-21106", "CVE-2021-21112", "CVE-2020-15995", "CVE-2021-21115", "CVE-2021-21111", "CVE-2021-21113", "CVE-2021-21110"], "modified": "2021-01-06T00:00:00", "cpe": ["cpe:/a:google:chrome"], "id": "MACOSX_GOOGLE_CHROME_87_0_4280_141.NASL", "href": "https://www.tenable.com/plugins/nessus/144782", "sourceData": "##\n# (C) Tenable Network Security, Inc.\n##\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(144782);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/02/19\");\n\n script_cve_id(\n \"CVE-2020-15995\",\n \"CVE-2020-16043\",\n \"CVE-2021-21106\",\n \"CVE-2021-21107\",\n \"CVE-2021-21108\",\n \"CVE-2021-21109\",\n \"CVE-2021-21110\",\n \"CVE-2021-21111\",\n \"CVE-2021-21112\",\n \"CVE-2021-21113\",\n \"CVE-2021-21114\",\n \"CVE-2021-21115\",\n \"CVE-2021-21116\"\n );\n script_xref(name:\"IAVA\", value:\"2021-A-0006-S\");\n\n script_name(english:\"Google Chrome < 87.0.4280.141 Multiple Vulnerabilities\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"A web browser installed on the remote macOS host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Google Chrome installed on the remote macOS host is prior to 87.0.4280.141. It is, therefore, affected by\nmultiple vulnerabilities as referenced in the 2021_01_stable-channel-update-for-desktop advisory. Note that Nessus has\nnot tested for this issue but has instead relied only on the application's self-reported version number.\");\n # https://chromereleases.googleblog.com/2021/01/stable-channel-update-for-desktop.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?c62eaf91\");\n script_set_attribute(attribute:\"see_also\", value:\"https://crbug.com/1148749\");\n script_set_attribute(attribute:\"see_also\", value:\"https://crbug.com/1153595\");\n script_set_attribute(attribute:\"see_also\", value:\"https://crbug.com/1155426\");\n script_set_attribute(attribute:\"see_also\", value:\"https://crbug.com/1152334\");\n script_set_attribute(attribute:\"see_also\", value:\"https://crbug.com/1152451\");\n script_set_attribute(attribute:\"see_also\", value:\"https://crbug.com/1149125\");\n script_set_attribute(attribute:\"see_also\", value:\"https://crbug.com/1151298\");\n script_set_attribute(attribute:\"see_also\", value:\"https://crbug.com/1155178\");\n script_set_attribute(attribute:\"see_also\", value:\"https://crbug.com/1148309\");\n script_set_attribute(attribute:\"see_also\", value:\"https://crbug.com/1150065\");\n script_set_attribute(attribute:\"see_also\", value:\"https://crbug.com/1157790\");\n script_set_attribute(attribute:\"see_also\", value:\"https://crbug.com/1157814\");\n script_set_attribute(attribute:\"see_also\", value:\"https://crbug.com/1151069\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Google Chrome version 87.0.4280.141 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-21106\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/11/03\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/01/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/01/06\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:google:chrome\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"MacOS X Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"macosx_google_chrome_installed.nbin\");\n script_require_keys(\"MacOSX/Google Chrome/Installed\");\n\n exit(0);\n}\ninclude('google_chrome_version.inc');\n\nget_kb_item_or_exit('MacOSX/Google Chrome/Installed');\n\ngoogle_chrome_check_version(fix:'87.0.4280.141', severity:SECURITY_HOLE, xss:FALSE, xsrf:FALSE);\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-29T04:39:32", "description": "This update for opera fixes the following issues :\n\n - Update to version 73.0.3856.344\n\n - CHR-8265 Update chromium on desktop-stable-87-3856 to\n 87.0.4280.141\n\n - DNA-90625 [Mac] Crash at opera::TabView::\n GetPaintData(opera::TabState) const\n\n - DNA-90735 Crash at\n opera::BrowserSidebarModel::GetItemVisible\n (opera::BrowserSidebarItem const*) const\n\n - DNA-90780 Crash at\n extensions::CommandService::GetExtension\n ActionCommand(std::__1::basic_string const&,\n extensions:: ActionInfo::Type,\n extensions::CommandService::QueryType,\n extensions::Command*, bool*)\n\n - DNA-90821 Crash at opera::BrowserSidebarController::\n Action(opera::BrowserSidebarItem const*,\n opera::BrowserSidebarItemContentView*)\n\n - The update to chromium 87.0.4280.141 fixes following\n issues: CVE-2021-21106, CVE-2021-21107, CVE-2021-21108,\n CVE-2021-21109, CVE-2021-21110, CVE-2021-21111,\n CVE-2021-21112, CVE-2021-21113, CVE-2020-16043,\n CVE-2021-21114, CVE-2020-15995, CVE-2021-21115,\n CVE-2021-21116\n\n - Update to version 73.0.3856.329\n\n - DNA-89156 Crash at\n content::RenderViewHostImpl::OnFocus()\n\n - DNA-89731 [Mac] Bookmarks bar overlaps Babe section when\n hovering the OMenu\n\n - DNA-90189 Music service portal logotypes are blurred on\n Win\n\n - DNA-90336 add session data schema\n\n - DNA-90399 Address bar dropdown suggestions overlap each\n other\n\n - DNA-90520 Crash at\n absl::raw_logging_internal::RawLog(absl:: LogSeverity,\n char const*, int, char const*, …)\n\n - DNA-90538 Crash at extensions::CommandService::\n GetExtensionActionCommand(std::__1::basic_string const&,\n extensions::ActionInfo::Type,\n extensions::CommandService:: QueryType,\n extensions::Command*, bool*)\n\n - DNA-90600 Don’t report workspace visibility, when\n functionality is disabled.\n\n - DNA-90665 Collect music service statistics WP2\n\n - DNA-90773 Bad translation from english to spanish in UI\n\n - DNA-90789 Crash at\n opera::ThumbnailHelper::RunNextRequest()", "edition": 2, "cvss3": {"score": 9.6, "vector": "AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"}, "published": "2021-01-25T00:00:00", "title": "openSUSE Security Update : opera (openSUSE-2021-138)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2021-21108", "CVE-2021-21114", "CVE-2020-16043", "CVE-2021-21116", "CVE-2021-21107", "CVE-2021-21109", "CVE-2021-21106", "CVE-2021-21112", "CVE-2020-15995", "CVE-2021-21115", "CVE-2021-21111", "CVE-2021-21113", "CVE-2021-21110"], "modified": "2021-01-25T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:opera", "cpe:/o:novell:opensuse:15.1"], "id": "OPENSUSE-2021-138.NASL", "href": "https://www.tenable.com/plugins/nessus/145383", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2021-138.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(145383);\n script_version(\"1.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/27\");\n\n script_cve_id(\"CVE-2020-15995\", \"CVE-2020-16043\", \"CVE-2021-21106\", \"CVE-2021-21107\", \"CVE-2021-21108\", \"CVE-2021-21109\", \"CVE-2021-21110\", \"CVE-2021-21111\", \"CVE-2021-21112\", \"CVE-2021-21113\", \"CVE-2021-21114\", \"CVE-2021-21115\", \"CVE-2021-21116\");\n\n script_name(english:\"openSUSE Security Update : opera (openSUSE-2021-138)\");\n script_summary(english:\"Check for the openSUSE-2021-138 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"This update for opera fixes the following issues :\n\n - Update to version 73.0.3856.344\n\n - CHR-8265 Update chromium on desktop-stable-87-3856 to\n 87.0.4280.141\n\n - DNA-90625 [Mac] Crash at opera::TabView::\n GetPaintData(opera::TabState) const\n\n - DNA-90735 Crash at\n opera::BrowserSidebarModel::GetItemVisible\n (opera::BrowserSidebarItem const*) const\n\n - DNA-90780 Crash at\n extensions::CommandService::GetExtension\n ActionCommand(std::__1::basic_string const&,\n extensions:: ActionInfo::Type,\n extensions::CommandService::QueryType,\n extensions::Command*, bool*)\n\n - DNA-90821 Crash at opera::BrowserSidebarController::\n Action(opera::BrowserSidebarItem const*,\n opera::BrowserSidebarItemContentView*)\n\n - The update to chromium 87.0.4280.141 fixes following\n issues: CVE-2021-21106, CVE-2021-21107, CVE-2021-21108,\n CVE-2021-21109, CVE-2021-21110, CVE-2021-21111,\n CVE-2021-21112, CVE-2021-21113, CVE-2020-16043,\n CVE-2021-21114, CVE-2020-15995, CVE-2021-21115,\n CVE-2021-21116\n\n - Update to version 73.0.3856.329\n\n - DNA-89156 Crash at\n content::RenderViewHostImpl::OnFocus()\n\n - DNA-89731 [Mac] Bookmarks bar overlaps Babe section when\n hovering the OMenu\n\n - DNA-90189 Music service portal logotypes are blurred on\n Win\n\n - DNA-90336 add session data schema\n\n - DNA-90399 Address bar dropdown suggestions overlap each\n other\n\n - DNA-90520 Crash at\n absl::raw_logging_internal::RawLog(absl:: LogSeverity,\n char const*, int, char const*, …)\n\n - DNA-90538 Crash at extensions::CommandService::\n GetExtensionActionCommand(std::__1::basic_string const&,\n extensions::ActionInfo::Type,\n extensions::CommandService:: QueryType,\n extensions::Command*, bool*)\n\n - DNA-90600 Don’t report workspace visibility, when\n functionality is disabled.\n\n - DNA-90665 Collect music service statistics WP2\n\n - DNA-90773 Bad translation from english to spanish in UI\n\n - DNA-90789 Crash at\n opera::ThumbnailHelper::RunNextRequest()\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected opera package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:opera\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:15.1\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/11/03\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/01/22\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/01/25\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE15\\.1)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"15.1\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(x86_64)$\") audit(AUDIT_ARCH_NOT, \"x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE15.1\", reference:\"opera-73.0.3856.344-lp151.2.42.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"opera\");\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-02-03T05:00:51", "description": "This update for chromium fixes the following issues :\n\n - Update to 87.0.4280.141 (boo#1180645)\n\n - CVE-2021-21106: Use after free in autofill\n\n - CVE-2021-21107: Use after free in drag and drop\n\n - CVE-2021-21108: Use after free in media\n\n - CVE-2021-21109: Use after free in payments\n\n - CVE-2021-21110: Use after free in safe browsing\n\n - CVE-2021-21111: Insufficient policy enforcement in WebUI\n\n - CVE-2021-21112: Use after free in Blink\n\n - CVE-2021-21113: Heap buffer overflow in Skia\n\n - CVE-2020-16043: Insufficient data validation in\n networking\n\n - CVE-2021-21114: Use after free in audio\n\n - CVE-2020-15995: Out of bounds write in V8\n\n - CVE-2021-21115: Use after free in safe browsing\n\n - CVE-2021-21116: Heap buffer overflow in audio \n\n - Use main URLs instead of redirects in master preferences", "edition": 2, "cvss3": {"score": 9.6, "vector": "AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"}, "published": "2021-01-25T00:00:00", "title": "openSUSE Security Update : chromium (openSUSE-2021-40)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2021-21108", "CVE-2021-21114", "CVE-2020-16043", "CVE-2021-21116", "CVE-2021-21107", "CVE-2021-21109", "CVE-2021-21106", "CVE-2021-21112", "CVE-2020-15995", "CVE-2021-21115", "CVE-2021-21111", "CVE-2021-21113", "CVE-2021-21110"], "modified": "2021-01-25T00:00:00", "cpe": ["cpe:/o:novell:opensuse:15.2", "p-cpe:/a:novell:opensuse:chromedriver-debuginfo", "p-cpe:/a:novell:opensuse:chromium", "p-cpe:/a:novell:opensuse:chromedriver", "p-cpe:/a:novell:opensuse:chromium-debuginfo"], "id": "OPENSUSE-2021-40.NASL", "href": "https://www.tenable.com/plugins/nessus/145304", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2021-40.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(145304);\n script_version(\"1.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/02/02\");\n\n script_cve_id(\"CVE-2020-15995\", \"CVE-2020-16043\", \"CVE-2021-21106\", \"CVE-2021-21107\", \"CVE-2021-21108\", \"CVE-2021-21109\", \"CVE-2021-21110\", \"CVE-2021-21111\", \"CVE-2021-21112\", \"CVE-2021-21113\", \"CVE-2021-21114\", \"CVE-2021-21115\", \"CVE-2021-21116\");\n\n script_name(english:\"openSUSE Security Update : chromium (openSUSE-2021-40)\");\n script_summary(english:\"Check for the openSUSE-2021-40 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"This update for chromium fixes the following issues :\n\n - Update to 87.0.4280.141 (boo#1180645)\n\n - CVE-2021-21106: Use after free in autofill\n\n - CVE-2021-21107: Use after free in drag and drop\n\n - CVE-2021-21108: Use after free in media\n\n - CVE-2021-21109: Use after free in payments\n\n - CVE-2021-21110: Use after free in safe browsing\n\n - CVE-2021-21111: Insufficient policy enforcement in WebUI\n\n - CVE-2021-21112: Use after free in Blink\n\n - CVE-2021-21113: Heap buffer overflow in Skia\n\n - CVE-2020-16043: Insufficient data validation in\n networking\n\n - CVE-2021-21114: Use after free in audio\n\n - CVE-2020-15995: Out of bounds write in V8\n\n - CVE-2021-21115: Use after free in safe browsing\n\n - CVE-2021-21116: Heap buffer overflow in audio \n\n - Use main URLs instead of redirects in master preferences\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1180645\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\"Update the affected chromium packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromedriver\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromedriver-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:15.2\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/11/03\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/01/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/01/25\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE15\\.2)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"15.2\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(x86_64)$\") audit(AUDIT_ARCH_NOT, \"x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE15.2\", reference:\"chromedriver-87.0.4280.141-lp152.2.60.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"chromedriver-debuginfo-87.0.4280.141-lp152.2.60.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"chromium-87.0.4280.141-lp152.2.60.1\", allowmaj:TRUE) ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"chromium-debuginfo-87.0.4280.141-lp152.2.60.1\", allowmaj:TRUE) ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"chromedriver / chromedriver-debuginfo / chromium / etc\");\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "ubuntu": [{"lastseen": "2021-02-02T03:47:19", "bulletinFamily": "unix", "cvelist": ["CVE-2021-23956", "CVE-2021-23955", "CVE-2021-23958", "CVE-2021-23961", "CVE-2021-23965", "CVE-2021-23960", "CVE-2021-23953", "CVE-2021-23964", "CVE-2021-23954", "CVE-2021-23962", "CVE-2021-23963"], "description": "Multiple security issues were discovered in Firefox. If a user were \ntricked in to opening a specially crafted website, an attacker could \npotentially exploit these to cause a denial of service, obtain sensitive \ninformation, conduct clickjacking attacks, or execute arbitrary code.", "edition": 1, "modified": "2021-02-01T00:00:00", "published": "2021-02-01T00:00:00", "id": "USN-4717-1", "href": "https://ubuntu.com/security/notices/USN-4717-1", "title": "Firefox vulnerabilities", "type": "ubuntu", "cvss": {"score": 0.0, "vector": "NONE"}}], "archlinux": [{"lastseen": "2021-02-12T08:31:54", "bulletinFamily": "unix", "cvelist": ["CVE-2021-23953", "CVE-2021-23954", "CVE-2021-23955", "CVE-2021-23956", "CVE-2021-23958", "CVE-2021-23960", "CVE-2021-23961", "CVE-2021-23962", "CVE-2021-23963", "CVE-2021-23964", "CVE-2021-23965"], "description": "Arch Linux Security Advisory ASA-202102-1\n=========================================\n\nSeverity: High\nDate : 2021-02-01\nCVE-ID : CVE-2021-23953 CVE-2021-23954 CVE-2021-23955 CVE-2021-23956\nCVE-2021-23958 CVE-2021-23960 CVE-2021-23961 CVE-2021-23962\nCVE-2021-23963 CVE-2021-23964 CVE-2021-23965\nPackage : firefox\nType : multiple issues\nRemote : Yes\nLink : https://security.archlinux.org/AVG-1492\n\nSummary\n=======\n\nThe package firefox before version 85.0-1 is vulnerable to multiple\nissues including arbitrary code execution, incorrect calculation and\ninformation disclosure.\n\nResolution\n==========\n\nUpgrade to 85.0-1.\n\n# pacman -Syu \"firefox>=85.0-1\"\n\nThe problems have been fixed upstream in version 85.0.\n\nWorkaround\n==========\n\nNone.\n\nDescription\n===========\n\n- CVE-2021-23953 (information disclosure)\n\nA security issue was found in Firefox before version 85.0 and\nThunderbird before version 78.7. If a user clicked into a specifically\ncrafted PDF, the PDF reader could be confused into leaking cross-origin\ninformation, when said information is served as chunked data.\n\n- CVE-2021-23954 (arbitrary code execution)\n\nA security issue was found in Firefox before version 85.0 and\nThunderbird before version 78.7. Using the new logical assignment\noperators in a JavaScript switch statement could have caused a type\nconfusion, leading to a memory corruption and a potentially exploitable\ncrash.\n\n- CVE-2021-23955 (incorrect calculation)\n\nA security issue was found in Firefox before version 85.0. The browser\ncould have been confused into transferring a pointer lock state into\nanother tab, which could have lead to clickjacking attacks.\n\n- CVE-2021-23956 (information disclosure)\n\nA security issue was found in Firefox before version 85.0. An ambiguous\nfile picker design could have confused users who intended to select and\nupload a single file into uploading a whole directory. This was\naddressed by adding a new prompt.\n\n- CVE-2021-23958 (information disclosure)\n\nA security issue was found in Firefox before version 85.0. The browser\ncould have been confused into transferring a screen sharing state into\nanother tab, which would leak unintended information.\n\n- CVE-2021-23960 (arbitrary code execution)\n\nA security issue was found in Firefox before version 85.0 and\nThunderbird before version 78.7. Performing garbage collection on re-\ndeclared JavaScript variables resulted in a use-after-poison, and a\npotentially exploitable crash.\n\n- CVE-2021-23961 (information disclosure)\n\nA security issue was found in Firefox before version 85.0. Further\ntechniques that built on the slipstream research combined with a\nmalicious webpage could have exposed both an internal network's hosts\nas well as services running on the user's local machine.\n\n- CVE-2021-23962 (arbitrary code execution)\n\nA security issue was found in Firefox before version 85.0. Incorrect\nuse of the RowCountChanged method could have led to a use-after-poison\nand a potentially exploitable crash.\n\n- CVE-2021-23963 (incorrect calculation)\n\nA security issue was found in Firefox before version 85.0. When sharing\ngeolocation during an active WebRTC share, Firefox could have reset the\nwebRTC sharing state in the user interface, leading to loss of control\nover the currently granted permission.\n\n- CVE-2021-23964 (arbitrary code execution)\n\nA security issue was found in Firefox before version 85.0 and\nThunderbird before version 78.7. Mozilla developers reported memory\nsafety bugs present in Firefox 84 and Firefox ESR 78.6. Some of these\nbugs showed evidence of memory corruption and Mozilla presumes that\nwith enough effort some of these could have been exploited to run\narbitrary code.\n\n- CVE-2021-23965 (arbitrary code execution)\n\nA security issue was found in Firefox before version 85.0. Mozilla\ndevelopers reported memory safety bugs present in Firefox 84. Some of\nthese bugs showed evidence of memory corruption and Mozilla presumes\nthat with enough effort some of these could have been exploited to run\narbitrary code.\n\nImpact\n======\n\nA remote attacker might be able to perform click-jacking attacks,\naccess sensitive information or execute arbitrary code.\n\nReferences\n==========\n\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2021-03/#CVE-2021-23953\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2021-05/#CVE-2021-23953\nhttps://bugzilla.mozilla.org/show_bug.cgi?id=1683940\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2021-03/#CVE-2021-23954\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2021-05/#CVE-2021-23954\nhttps://bugzilla.mozilla.org/show_bug.cgi?id=1684020\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2021-03/#CVE-2021-23955\nhttps://bugzilla.mozilla.org/show_bug.cgi?id=1684837\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2021-03/#CVE-2021-23956\nhttps://bugzilla.mozilla.org/show_bug.cgi?id=1338637\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2021-03/#CVE-2021-23958\nhttps://bugzilla.mozilla.org/show_bug.cgi?id=1642747\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2021-03/#CVE-2021-23960\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2021-05/#CVE-2021-23960\nhttps://bugzilla.mozilla.org/show_bug.cgi?id=1675755\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2021-03/#CVE-2021-23961\nhttps://bugzilla.mozilla.org/show_bug.cgi?id=1677940\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2021-03/#CVE-2021-23962\nhttps://bugzilla.mozilla.org/show_bug.cgi?id=1677194\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2021-03/#CVE-2021-23963\nhttps://bugzilla.mozilla.org/show_bug.cgi?id=1680793\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2021-03/#CVE-2021-23964\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2021-05/#CVE-2021-23964\nhttps://bugzilla.mozilla.org/buglist.cgi?bug_id=1662507%2C1666285%2C1673526%2C1674278%2C1674835%2C1675097%2C1675844%2C1675868%2C1677590%2C1677888%2C1680410%2C1681268%2C1682068%2C1682938%2C1683736%2C1685260%2C1685925\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2021-03/#CVE-2021-23965\nhttps://bugzilla.mozilla.org/buglist.cgi?bug_id=1670378%2C1673555%2C1676812%2C1678582%2C1684497\nhttps://security.archlinux.org/CVE-2021-23953\nhttps://security.archlinux.org/CVE-2021-23954\nhttps://security.archlinux.org/CVE-2021-23955\nhttps://security.archlinux.org/CVE-2021-23956\nhttps://security.archlinux.org/CVE-2021-23958\nhttps://security.archlinux.org/CVE-2021-23960\nhttps://security.archlinux.org/CVE-2021-23961\nhttps://security.archlinux.org/CVE-2021-23962\nhttps://security.archlinux.org/CVE-2021-23963\nhttps://security.archlinux.org/CVE-2021-23964\nhttps://security.archlinux.org/CVE-2021-23965", "modified": "2021-02-01T00:00:00", "published": "2021-02-01T00:00:00", "id": "ASA-202102-1", "href": "https://security.archlinux.org/ASA-202102-1", "type": "archlinux", "title": "[ASA-202102-1] firefox: multiple issues", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2021-01-12T10:26:50", "bulletinFamily": "unix", "cvelist": ["CVE-2020-15995", "CVE-2020-16043", "CVE-2021-21106", "CVE-2021-21107", "CVE-2021-21108", "CVE-2021-21109", "CVE-2021-21110", "CVE-2021-21111", "CVE-2021-21112", "CVE-2021-21113", "CVE-2021-21114", "CVE-2021-21115", "CVE-2021-21116"], "description": "Arch Linux Security Advisory ASA-202101-6\n=========================================\n\nSeverity: High\nDate : 2021-01-08\nCVE-ID : CVE-2020-15995 CVE-2020-16043 CVE-2021-21106 CVE-2021-21107\nCVE-2021-21108 CVE-2021-21109 CVE-2021-21110 CVE-2021-21111\nCVE-2021-21112 CVE-2021-21113 CVE-2021-21114 CVE-2021-21115\nCVE-2021-21116\nPackage : chromium\nType : multiple issues\nRemote : Yes\nLink : https://security.archlinux.org/AVG-1414\n\nSummary\n=======\n\nThe package chromium before version 87.0.4280.141-1 is vulnerable to\nmultiple issues including access restriction bypass, arbitrary code\nexecution and insufficient validation.\n\nResolution\n==========\n\nUpgrade to 87.0.4280.141-1.\n\n# pacman -Syu \"chromium>=87.0.4280.141-1\"\n\nThe problems have been fixed upstream in version 87.0.4280.141.\n\nWorkaround\n==========\n\nNone.\n\nDescription\n===========\n\n- CVE-2020-15995 (arbitrary code execution)\n\nAn out of bounds write security issue has been found in the V8\ncomponent of the Chromium browser before version 87.0.4280.141.\n\n- CVE-2020-16043 (insufficient validation)\n\nAn insufficient data validation security issue has been found in the\nnetworking component of the Chromium browser before version\n87.0.4280.141.\n\n- CVE-2021-21106 (arbitrary code execution)\n\nA use after free security issue has been found in the autofill\ncomponent of the Chromium browser before version 87.0.4280.141.\n\n- CVE-2021-21107 (arbitrary code execution)\n\nA use after free security issue has been found in the drag and drop\ncomponent of the Chromium browser before version 87.0.4280.141.\n\n- CVE-2021-21108 (arbitrary code execution)\n\nA use after free security issue has been found in the media component\nof the Chromium browser before version 87.0.4280.141.\n\n- CVE-2021-21109 (arbitrary code execution)\n\nA use after free security issue has been found in the payments\ncomponent of the Chromium browser before version 87.0.4280.141.\n\n- CVE-2021-21110 (arbitrary code execution)\n\nA use after free security issue has been found in the safe browsing\ncomponent of the Chromium browser before version 87.0.4280.141.\n\n- CVE-2021-21111 (access restriction bypass)\n\nAn insufficient policy enforcement security issue has been found in the\nWebUI component of the Chromium browser before version 87.0.4280.141.\n\n- CVE-2021-21112 (arbitrary code execution)\n\nA use after free security issue has been found in the Blink component\nof the Chromium browser before version 87.0.4280.141.\n\n- CVE-2021-21113 (arbitrary code execution)\n\nA heap buffer overflow security issue has been found in the Skia\ncomponent of the Chromium browser before version 87.0.4280.141.\n\n- CVE-2021-21114 (arbitrary code execution)\n\nA use after free security issue has been found in the audio component\nof the Chromium browser before version 87.0.4280.141.\n\n- CVE-2021-21115 (arbitrary code execution)\n\nA use after free security issue has been found in the safe browsing\ncomponent of the Chromium browser before version 87.0.4280.141.\n\n- CVE-2021-21116 (arbitrary code execution)\n\nA heap buffer overflow security issue has been found in the audio\ncomponent of the Chromium browser before version 87.0.4280.141.\n\nImpact\n======\n\nA remote attacker might be able to bypass security restrictions and\nexecute arbitrary code.\n\nReferences\n==========\n\nhttps://chromereleases.googleblog.com/2021/01/stable-channel-update-for-desktop.html\nhttps://crbug.com/1157790\nhttps://crbug.com/1148309\nhttps://crbug.com/1148749\nhttps://crbug.com/1153595\nhttps://crbug.com/1155426\nhttps://crbug.com/1152334\nhttps://crbug.com/1152451\nhttps://crbug.com/1149125\nhttps://crbug.com/1151298\nhttps://crbug.com/1155178\nhttps://crbug.com/1150065\nhttps://crbug.com/1157814\nhttps://crbug.com/1151069\nhttps://security.archlinux.org/CVE-2020-15995\nhttps://security.archlinux.org/CVE-2020-16043\nhttps://security.archlinux.org/CVE-2021-21106\nhttps://security.archlinux.org/CVE-2021-21107\nhttps://security.archlinux.org/CVE-2021-21108\nhttps://security.archlinux.org/CVE-2021-21109\nhttps://security.archlinux.org/CVE-2021-21110\nhttps://security.archlinux.org/CVE-2021-21111\nhttps://security.archlinux.org/CVE-2021-21112\nhttps://security.archlinux.org/CVE-2021-21113\nhttps://security.archlinux.org/CVE-2021-21114\nhttps://security.archlinux.org/CVE-2021-21115\nhttps://security.archlinux.org/CVE-2021-21116", "modified": "2021-01-08T00:00:00", "published": "2021-01-08T00:00:00", "id": "ASA-202101-6", "href": "https://security.archlinux.org/ASA-202101-6", "type": "archlinux", "title": "[ASA-202101-6] chromium: multiple issues", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-16T00:26:35", "bulletinFamily": "unix", "cvelist": ["CVE-2020-15995", "CVE-2020-16043", "CVE-2021-21106", "CVE-2021-21107", "CVE-2021-21108", "CVE-2021-21109", "CVE-2021-21110", "CVE-2021-21111", "CVE-2021-21112", "CVE-2021-21113", "CVE-2021-21114", "CVE-2021-21115", "CVE-2021-21116"], "description": "Arch Linux Security Advisory ASA-202101-20\n==========================================\n\nSeverity: High\nDate : 2021-01-12\nCVE-ID : CVE-2020-15995 CVE-2020-16043 CVE-2021-21106 CVE-2021-21107\nCVE-2021-21108 CVE-2021-21109 CVE-2021-21110 CVE-2021-21111\nCVE-2021-21112 CVE-2021-21113 CVE-2021-21114 CVE-2021-21115\nCVE-2021-21116\nPackage : vivaldi\nType : multiple issues\nRemote : Yes\nLink : https://security.archlinux.org/AVG-1424\n\nSummary\n=======\n\nThe package vivaldi before version 3.5.2115.87-1 is vulnerable to\nmultiple issues including access restriction bypass, arbitrary code\nexecution and insufficient validation.\n\nResolution\n==========\n\nUpgrade to 3.5.2115.87-1.\n\n# pacman -Syu \"vivaldi>=3.5.2115.87-1\"\n\nThe problems have been fixed upstream in version 3.5.2115.87.\n\nWorkaround\n==========\n\nNone.\n\nDescription\n===========\n\n- CVE-2020-15995 (arbitrary code execution)\n\nAn out of bounds write security issue has been found in the V8\ncomponent of the Chromium browser before version 87.0.4280.141.\n\n- CVE-2020-16043 (insufficient validation)\n\nAn insufficient data validation security issue has been found in the\nnetworking component of the Chromium browser before version\n87.0.4280.141.\n\n- CVE-2021-21106 (arbitrary code execution)\n\nA use after free security issue has been found in the autofill\ncomponent of the Chromium browser before version 87.0.4280.141.\n\n- CVE-2021-21107 (arbitrary code execution)\n\nA use after free security issue has been found in the drag and drop\ncomponent of the Chromium browser before version 87.0.4280.141.\n\n- CVE-2021-21108 (arbitrary code execution)\n\nA use after free security issue has been found in the media component\nof the Chromium browser before version 87.0.4280.141.\n\n- CVE-2021-21109 (arbitrary code execution)\n\nA use after free security issue has been found in the payments\ncomponent of the Chromium browser before version 87.0.4280.141.\n\n- CVE-2021-21110 (arbitrary code execution)\n\nA use after free security issue has been found in the safe browsing\ncomponent of the Chromium browser before version 87.0.4280.141.\n\n- CVE-2021-21111 (access restriction bypass)\n\nAn insufficient policy enforcement security issue has been found in the\nWebUI component of the Chromium browser before version 87.0.4280.141.\n\n- CVE-2021-21112 (arbitrary code execution)\n\nA use after free security issue has been found in the Blink component\nof the Chromium browser before version 87.0.4280.141.\n\n- CVE-2021-21113 (arbitrary code execution)\n\nA heap buffer overflow security issue has been found in the Skia\ncomponent of the Chromium browser before version 87.0.4280.141.\n\n- CVE-2021-21114 (arbitrary code execution)\n\nA use after free security issue has been found in the audio component\nof the Chromium browser before version 87.0.4280.141.\n\n- CVE-2021-21115 (arbitrary code execution)\n\nA use after free security issue has been found in the safe browsing\ncomponent of the Chromium browser before version 87.0.4280.141.\n\n- CVE-2021-21116 (arbitrary code execution)\n\nA heap buffer overflow security issue has been found in the audio\ncomponent of the Chromium browser before version 87.0.4280.141.\n\nImpact\n======\n\nA remote attacker might be able to bypass security restrictions and\nexecute arbitrary code.\n\nReferences\n==========\n\nhttps://vivaldi.com/blog/desktop/minor-update-for-vivaldi-desktop-browser-3-5/\nhttps://chromereleases.googleblog.com/2021/01/stable-channel-update-for-desktop.html\nhttps://crbug.com/1157790\nhttps://crbug.com/1148309\nhttps://crbug.com/1148749\nhttps://crbug.com/1153595\nhttps://crbug.com/1155426\nhttps://crbug.com/1152334\nhttps://crbug.com/1152451\nhttps://crbug.com/1149125\nhttps://crbug.com/1151298\nhttps://crbug.com/1155178\nhttps://crbug.com/1150065\nhttps://crbug.com/1157814\nhttps://crbug.com/1151069\nhttps://security.archlinux.org/CVE-2020-15995\nhttps://security.archlinux.org/CVE-2020-16043\nhttps://security.archlinux.org/CVE-2021-21106\nhttps://security.archlinux.org/CVE-2021-21107\nhttps://security.archlinux.org/CVE-2021-21108\nhttps://security.archlinux.org/CVE-2021-21109\nhttps://security.archlinux.org/CVE-2021-21110\nhttps://security.archlinux.org/CVE-2021-21111\nhttps://security.archlinux.org/CVE-2021-21112\nhttps://security.archlinux.org/CVE-2021-21113\nhttps://security.archlinux.org/CVE-2021-21114\nhttps://security.archlinux.org/CVE-2021-21115\nhttps://security.archlinux.org/CVE-2021-21116", "modified": "2021-01-12T00:00:00", "published": "2021-01-12T00:00:00", "id": "ASA-202101-20", "href": "https://security.archlinux.org/ASA-202101-20", "type": "archlinux", "title": "[ASA-202101-20] vivaldi: multiple issues", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "gentoo": [{"lastseen": "2021-02-01T05:38:53", "bulletinFamily": "unix", "cvelist": ["CVE-2021-23956", "CVE-2021-23955", "CVE-2021-23958", "CVE-2021-26976", "CVE-2021-23961", "CVE-2021-23965", "CVE-2021-23960", "CVE-2021-23953", "CVE-2021-23964", "CVE-2021-23954", "CVE-2021-23962", "CVE-2021-23963"], "description": "### Background\n\nMozilla Firefox is a popular open-source web browser from the Mozilla project. \n\n### Description\n\nMultiple vulnerabilities have been discovered in Mozilla Firefox. Please review the CVE identifiers referenced below for details. \n\n### Impact\n\nPlease review the referenced CVE identifiers for details.\n\n### Workaround\n\nThere is no known workaround at this time.\n\n### Resolution\n\nAll Mozilla Firefox ESR users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=www-client/firefox-78.7.0\"\n \n\nAll Mozilla Firefox ESR binary users should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=www-client/firefox-bin-78.7.0\"\n \n\nAll Mozilla Firefox users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=www-client/firefox-85.0\"\n \n\nAll Mozilla Firefox binary users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=www-client/firefox-bin-85.0\"", "edition": 1, "modified": "2021-02-01T00:00:00", "published": "2021-02-01T00:00:00", "id": "GLSA-202102-01", "href": "https://security.gentoo.org/glsa/202102-01", "title": "Mozilla Firefox: Multiple vulnerabilities", "type": "gentoo", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2021-01-10T13:26:40", "bulletinFamily": "unix", "cvelist": ["CVE-2021-21108", "CVE-2021-21114", "CVE-2020-16043", "CVE-2021-21116", "CVE-2021-21107", "CVE-2021-21109", "CVE-2021-21106", "CVE-2021-21112", "CVE-2020-15995", "CVE-2021-21115", "CVE-2021-21111", "CVE-2021-21113", "CVE-2021-21110"], "description": "### Background\n\nChromium is an open-source browser project that aims to build a safer, faster, and more stable way for all users to experience the web. \n\nGoogle Chrome is one fast, simple, and secure browser for all your devices. \n\n### Description\n\nMultiple vulnerabilities have been discovered in Chromium and Google Chrome. Please review the CVE identifiers referenced below for details. \n\n### Impact\n\nPlease review the referenced CVE identifiers for details.\n\n### Workaround\n\nThere is no known workaround at this time.\n\n### Resolution\n\nAll Chromium users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose\n \">=www-client/chromium-87.0.4280.141\"\n \n\nAll Google Chrome users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose\n \">=www-client/google-chrome-87.0.4280.141\"", "edition": 1, "modified": "2021-01-10T00:00:00", "published": "2021-01-10T00:00:00", "id": "GLSA-202101-05", "href": "https://security.gentoo.org/glsa/202101-05", "title": "Chromium, Google Chrome: Multiple vulnerabilities", "type": "gentoo", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "freebsd": [{"lastseen": "2021-01-12T13:26:18", "bulletinFamily": "unix", "cvelist": ["CVE-2021-21108", "CVE-2021-21114", "CVE-2020-16043", "CVE-2021-21116", "CVE-2021-21107", "CVE-2021-21109", "CVE-2021-21106", "CVE-2021-21112", "CVE-2020-15995", "CVE-2021-21115", "CVE-2021-21111", "CVE-2021-21113", "CVE-2021-21110"], "description": "\nChrome Releases reports:\n\nThis release includes 16 security fixes, including:\n\n[1148749] High CVE-2021-21106: Use after free in autofill.\n\t Reported by Weipeng Jiang (@Krace) from Codesafe Team of\n\t Legendsec at Qi'anxin Group on 2020-11-13\n[1153595] High CVE-2021-21107: Use after free in drag and\n\t drop. Reported by Leecraso and Guang Gong of 360 Alpha Lab on\n\t 2020-11-30\n[1155426] High CVE-2021-21108: Use after free in media.\n\t Reported by Leecraso and Guang Gong of 360 Alpha Lab on\n\t 2020-12-04\n[1152334] High CVE-2021-21109: Use after free in payments.\n\t Reported by Rong Jian and Guang Gong of 360 Alpha Lab on\n\t 2020-11-24\n[1152451] High CVE-2021-21110: Use after free in safe\n\t browsing. Reported by Anonymous on 2020-11-24\n[1149125] High CVE-2021-21111: Insufficient policy enforcement\n\t in WebUI. Reported by Alesandro Ortiz on 2020-11-15\n[1151298] High CVE-2021-21112: Use after free in Blink.\n\t Reported by YoungJoo Lee(@ashuu_lee) of Raon Whitehat on\n\t 2020-11-20\n[1155178] High CVE-2021-21113: Heap buffer overflow in Skia.\n\t Reported by tsubmunu on 2020-12-03\n[1148309] High CVE-2020-16043: Insufficient data validation in\n\t networking. Reported by Samy Kamkar, Ben Seri at Armis, Gregory\n\t Vishnepolsky at Armis on 2020-11-12\n[1150065] High CVE-2021-21114: Use after free in audio.\n\t Reported by Man Yue Mo of GitHub Security Lab on 2020-11-17\n[1157790] High CVE-2020-15995: Out of bounds write in V8.\n\t Reported by Bohan Liu (@P4nda20371774) of Tencent Security Xuanwu\n\t Lab on 2020-12-11\n[1157814] High CVE-2021-21115: Use after free in safe browsing.\n\t Reported by Leecraso and Guang Gong of 360 Alpha Lab on\n\t 2020-12-11\n[1151069] Medium CVE-2021-21116: Heap buffer overflow in audio.\n\t Reported by Alison Huffman, Microsoft Browser Vulnerability\n\t Research on 2020-11-19\n\n\n", "edition": 2, "modified": "2021-01-06T00:00:00", "published": "2021-01-06T00:00:00", "id": "D153C4D2-50F8-11EB-8046-3065EC8FD3EC", "href": "https://vuxml.freebsd.org/freebsd/d153c4d2-50f8-11eb-8046-3065ec8fd3ec.html", "title": "chromium -- multiple vulnerabilities", "type": "freebsd", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "debian": [{"lastseen": "2021-01-17T01:19:40", "bulletinFamily": "unix", "cvelist": ["CVE-2021-21108", "CVE-2021-21114", "CVE-2020-16043", "CVE-2021-21116", "CVE-2021-21107", "CVE-2021-21109", "CVE-2021-21106", "CVE-2021-21112", "CVE-2020-15995", "CVE-2021-21115", "CVE-2021-21111", "CVE-2021-21113", "CVE-2021-21110"], "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-4832-1 security@debian.org\nhttps://www.debian.org/security/ Salvatore Bonaccorso\nJanuary 16, 2021 https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : chromium\nCVE ID : CVE-2020-15995 CVE-2020-16043 CVE-2021-21106 CVE-2021-21107\n CVE-2021-21108 CVE-2021-21109 CVE-2021-21110 CVE-2021-21111\n CVE-2021-21112 CVE-2021-21113 CVE-2021-21114 CVE-2021-21115\n CVE-2021-21116\nDebian Bug : 979533\n\nMultiple security issues were discovered in the Chromium web browser, which\ncould result in the execution of arbitrary code, denial of service\nor information disclosure.\n\nFor the stable distribution (buster), these problems have been fixed in\nversion 87.0.4280.141-0.1~deb10u1.\n\nWe recommend that you upgrade your chromium packages.\n\nFor the detailed security status of chromium please refer to its\nsecurity tracker page at:\nhttps://security-tracker.debian.org/tracker/chromium\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n", "edition": 1, "modified": "2021-01-16T14:06:51", "published": "2021-01-16T14:06:51", "id": "DEBIAN:DSA-4832-1:C6798", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2021/msg00011.html", "title": "[SECURITY] [DSA 4832-1] chromium security update", "type": "debian", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "fedora": [{"lastseen": "2021-01-17T02:44:13", "bulletinFamily": "unix", "cvelist": ["CVE-2020-15995", "CVE-2020-16043", "CVE-2021-21106", "CVE-2021-21107", "CVE-2021-21108", "CVE-2021-21109", "CVE-2021-21110", "CVE-2021-21111", "CVE-2021-21112", "CVE-2021-21113", "CVE-2021-21114", "CVE-2021-21115", "CVE-2021-21116"], "description": "Chromium is an open-source web browser, powered by WebKit (Blink). ", "modified": "2021-01-17T01:51:52", "published": "2021-01-17T01:51:52", "id": "FEDORA:8CF273097270", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 33 Update: chromium-87.0.4280.141-1.fc33", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-23T02:33:21", "bulletinFamily": "unix", "cvelist": ["CVE-2020-15995", "CVE-2020-16043", "CVE-2021-21106", "CVE-2021-21107", "CVE-2021-21108", "CVE-2021-21109", "CVE-2021-21110", "CVE-2021-21111", "CVE-2021-21112", "CVE-2021-21113", "CVE-2021-21114", "CVE-2021-21115", "CVE-2021-21116"], "description": "Chromium is an open-source web browser, powered by WebKit (Blink). ", "modified": "2021-01-23T01:30:25", "published": "2021-01-23T01:30:25", "id": "FEDORA:C6EA430E630A", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 32 Update: chromium-87.0.4280.141-1.fc32", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "threatpost": [{"lastseen": "2021-01-12T09:36:42", "bulletinFamily": "info", "cvelist": ["CVE-2020-15995", "CVE-2020-16043", "CVE-2020-16044", "CVE-2021-21106", "CVE-2021-21107", "CVE-2021-21108", "CVE-2021-21109", "CVE-2021-21110", "CVE-2021-21111", "CVE-2021-21112", "CVE-2021-21113", "CVE-2021-21114", "CVE-2021-21115", "CVE-2021-21116"], "description": "Makers of the Chrome, Firefox and Edge browsers are urging users to patch critical vulnerabilities that if exploited allow hackers to hijack systems running the software.\n\nThe Mozilla Firefox vulnerability ([CVE-2020-16044](<https://www.mozilla.org/en-US/security/advisories/mfsa2021-01/>)) is separate from a bug reported in Google\u2019s browser engine Chromium, which is used in the Google Chrome browser and Microsoft\u2019s latest version of its Edge browser.\n\n## **Critical Firefox Use-After-Free Bug **\n\nOn Thursday, the Cybersecurity and Infrastructure Security Agency (CISA) urged users of Mozilla Foundation\u2019s Firefox browser to patch a bug, tracked as [CVE-2020-16044](<https://www.mozilla.org/en-US/security/advisories/mfsa2021-01/>), and rated as critical. The vulnerability is classified as a use-after-free bug and tied to the way Firefox handles browser cookies and if exploited allows hackers to gain access to the computer, phone or tablet running the browser software.\n\nImpacted are Firefox browser versions released prior to the recently released Firefox desktop 84.0.2, Firefox Android 84.1.3 edition and also Mozilla\u2019s corporate ESR 78.6.1 version of Firefox.\n\n\u201cA malicious peer could have modified a COOKIE-ECHO chunk in a SCTP packet in a way that potentially resulted in a use-after-free. We presume that with enough effort it could have been exploited to run arbitrary code,\u201d according to [a Mozilla security bulletin posted Thursday](<https://www.mozilla.org/en-US/security/advisories/mfsa2021-01/>). \n[](<https://threatpost.com/2020-reader-survey/161168/>)The acronym SCTP stands for Stream Control Transmission Protocol, used in computer networking to communicate protocol data within the Transport Layer of the internet protocol suite, or TCP/IP. The bug is tied to the way cookie data is handled by SCTP.\n\nEach inbound SCTP packet contains a cookie chunk that facilitates a corresponding reply from the browser\u2019s cookie. A COOKIE ECHO chunk is a snippet of data sent during the initialization of the SCTP connection with the browser.\n\nAccording to Mozilla an adversary could craft a malicious COOKIE-ECHO chunk to impact the browser\u2019s memory. A use-after-free vulnerability relates to incorrect use of dynamic memory during program operation. If after freeing a memory location, a program does not clear the pointer to that memory, an attacker can use the error to hack the program,\u201d according to a description of the vulnerability.\n\nMozilla did not credit the bug discovery, nor did it state whether it was a vulnerability actively being exploited in the wild.\n\n## **Chromium Browser Bug Impacts Chrome and Edge **\n\nAlso on Thursday, CISA urged Windows, macOS and Linux users of Google\u2019s Chrome browser to patch an out-of-bounds write bug (CVE-2020-15995) impacting the current 87.0.4280.141 version of the software. The CISA-bug warning stated that the update to the latest version of the Chrome browser would \u201caddresses vulnerabilities that an attacker could exploit to take control of an affected system.\u201d\n\nBecause Microsoft\u2019s latest Edge browser is based on Google Chromium browser engine, Microsoft also urged its users to update to the [latest 87.0.664.75 version of its Edge browser](<https://msrc.microsoft.com/update-guide/vulnerability/ADV200002>).\n\n[](<https://media.threatpost.com/wp-content/uploads/sites/103/2021/01/08005108/web-browserss.jpg>)While researchers at Tenable classify the out-of-bounds [bug as critical](<https://www..com/plugins/nessus/144781>), both Google and Microsoft classified the vulnerability as [high severity](<https://chromereleases.googleblog.com/2021/01/stable-channel-update-for-desktop.html>). Tencent Security Xuanwu Lab researcher Bohan Liu is credited for finding and reporting the bug.\n\nInterestingly, the CVE-2020-15995 bug dates back to a Chrome for Android update security bulletin Google\u2019s published on October 2020. At the time, the bug was also classified as high-severity. The flaw is identified as an \u201cout of bounds write in V8\u201d, bug originally found in September 2020 by Liu.\n\nV8 is Google\u2019s open-source and high-performance JavaScript and WebAssembly engine, according to a [Google developer description](<https://v8.dev/>). While the technical specifics of the bug are not available, similar out of bounds write in V8 bugs have allowed remote attackers to exploit a heap corruption via a crafted HTML page.\n\nA heap corruption is a type of memory corruption that occurs in a computer program when the contents of a memory location are modified due to programmatic behavior \u2014 malicious or not \u2014 that exceeds the intention of the original programmer or program language parameters. A so-called heap-smashing attack can be used to exploit instances of heap corruption, according to an [academic paper (PDF) co-authored](<http://sites.nyuad.nyu.edu/moma/pdfs/pubs/J19AV.pdf>) by Nektarios Georgios Tsoutsos, student member of IEEE and Michail Maniatakos, senior member of IEEE.\n\n\u201cHeap Smashing Attacks exploit dynamic memory allocators (e.g. ,malloc) by corrupting the control structures defining the heap itself. By overflowing a heap block, attackers could overwrite adjacent heap headers that chain different heap blocks, and eventually cause the dynamic memory allocator to modify arbitrary memory locations as soon as a heap free operation is executed. The malicious payload can also be generated on-the-fly: for example, by exploiting Just-In-Time (JIT) compilation, assembled code can be written on the heap,\u201d they wrote.\n\nNeither Microsoft nor Google explain why the October 2020 CVE-2020-15995 is being featured again in both their Thursday security bulletins. Typically, that\u2019s an indication that the original fix was incomplete.\n\n## **More Chromium Bugs Impact Chrome and Edge **\n\nTwelve additional bugs were reported by Google, impacting its Chromium browser engine. Both Google and Microsoft featured the same list of vulnerabilities ([CVE-2021-21106](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21106>), [CVE-2021-21107](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21107>), [CVE-2021-21108](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21108>), [CVE-2021-21109](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21109>), [CVE-2021-21110](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21110>), [CVE-2021-21111](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21111>), [CVE-2021-21112](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21112>), [CVE-2021-21113](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21113>), [CVE-2021-21114](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21114>), [CVE-2021-21115](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21115>), [CVE-2021-21116](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21116>), [CVE-2020-16043](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16043>)).\n\nThe majority of the bugs were rated high-severity and tied to use-after-free bugs. Three of the vulnerabilities earned bug hunters $20,000 for their efforts. Weipeng Jiang from Codesafe Team of Legendsec at Qi\u2019anxin Group is credited for finding both $20,000 bugs (CVE-2021-21106 and CVE-2021-21107). The first, a use-after-free bug tied to Chromium\u2019s autofill function and the second a use-after-free bug in the Chromium media component.\n\nLeecraso and Guang Gong of 360 Alpha Lab earned $20,000 for a CVE-2021-21108, also a use-after-free bug in the browser\u2019s media component.\n\nNo technical details were disclosed and typically aren\u2019t until its determined that most Chrome browsers have been updated.\n\n**Supply-Chain Security: A 10-Point Audit Webinar: _Is your company\u2019s software supply-chain prepared for an attack? On Wed., Jan. 20 at 2p.m. ET, start identifying weaknesses in your supply-chain with actionable advice from experts \u2013 part of a [limited-engagement and LIVE Threatpost webinar](<https://threatpost.com/webinars/supply-chain-security-a-10-point-audit/?utm_source=ART&utm_medium=ART&utm_campaign=Jan_webinar>). CISOs, AppDev and SysAdmin are invited to ask a panel of A-list cybersecurity experts how they can avoid being caught exposed in a post-SolarWinds-hack world. Attendance is limited: [Register Now](<https://threatpost.com/webinars/supply-chain-security-a-10-point-audit/?utm_source=ART&utm_medium=ART&utm_campaign=Jan_webinar>) and reserve a spot for this exclusive Threatpost [Supply-Chain Security webinar](<https://threatpost.com/webinars/supply-chain-security-a-10-point-audit/?utm_source=ART&utm_medium=ART&utm_campaign=Jan_webinar>) \u2014 Jan. 20, 2 p.m. ET._**\n", "modified": "2021-01-08T06:00:28", "published": "2021-01-08T06:00:28", "id": "THREATPOST:EA2228FFF2BA7DAA40851692D1E4E5EB", "href": "https://threatpost.com/firefox-chrome-edge-bugs-system-hijacking/162873/", "type": "threatpost", "title": "Bugs in Firefox, Chrome, Edge Allow Remote System Hijacking", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "mscve": [{"lastseen": "2021-01-22T21:32:36", "bulletinFamily": "microsoft", "cvelist": ["CVE-2020-6408", "CVE-2021-21108", "CVE-2021-21114", "CVE-2020-16024", "CVE-2020-6409", "CVE-2020-16043", "CVE-2020-6548", "CVE-2020-6518", "CVE-2020-6464", "CVE-2020-16026", "CVE-2020-15965", "CVE-2020-16012", "CVE-2020-16000", "CVE-2020-6395", "CVE-2020-6569", "CVE-2020-6445", "CVE-2020-6454", "CVE-2020-6381", "CVE-2020-16011", "CVE-2020-15979", "CVE-2020-6428", "CVE-2020-6564", "CVE-2020-6424", "CVE-2020-6446", "CVE-2020-6458", "CVE-2020-6394", "CVE-2020-6397", "CVE-2020-15962", "CVE-2020-6506", "CVE-2020-6468", "CVE-2020-6831", "CVE-2020-15969", "CVE-2020-16007", "CVE-2020-6570", "CVE-2020-6533", "CVE-2020-6434", "CVE-2020-16032", "CVE-2020-6561", "CVE-2020-6432", "CVE-2020-6540", "CVE-2020-6559", "CVE-2020-6447", "CVE-2020-6545", "CVE-2020-6554", "CVE-2020-6566", "CVE-2020-1341", "CVE-2020-6399", "CVE-2020-6452", "CVE-2020-6483", "CVE-2020-6392", "CVE-2020-6387", "CVE-2020-6482", "CVE-2020-6528", "CVE-2020-6563", "CVE-2020-16031", "CVE-2020-15974", "CVE-2020-16030", "CVE-2020-16039", "CVE-2020-6486", "CVE-2020-6412", "CVE-2020-15960", "CVE-2020-6389", "CVE-2020-6390", "CVE-2020-6407", "CVE-2020-6494", "CVE-2020-6547", "CVE-2020-6529", "CVE-2020-6476", "CVE-2021-21116", "CVE-2020-15999", "CVE-2020-6507", "CVE-2020-6537", "CVE-2020-6416", "CVE-2020-6410", "CVE-2020-6460", "CVE-2020-6560", "CVE-2020-16027", "CVE-2020-16009", "CVE-2020-6461", "CVE-2021-21107", "CVE-2020-6574", "CVE-2020-6479", "CVE-2020-6511", "CVE-2020-6568", "CVE-2020-6386", "CVE-2020-6459", "CVE-2020-15982", "CVE-2020-6542", "CVE-2020-15968", "CVE-2020-6396", "CVE-2020-16002", "CVE-2020-6474", "CVE-2020-6467", "CVE-2020-6383", "CVE-2020-15975", "CVE-2020-6465", "CVE-2020-15985", "CVE-2020-6538", "CVE-2020-6493", "CVE-2020-6550", "CVE-2020-16001", "CVE-2020-6534", "CVE-2020-16023", "CVE-2020-16042", "CVE-2020-16029", "CVE-2020-6437", "CVE-2020-6444", "CVE-2020-15989", "CVE-2020-6451", "CVE-2020-6532", "CVE-2020-6521", "CVE-2021-21109", "CVE-2020-6429", "CVE-2020-6427", "CVE-2020-6536", "CVE-2020-6439", "CVE-2020-15972", "CVE-2020-6385", "CVE-2020-16005", "CVE-2020-6401", "CVE-2019-19926", "CVE-2020-15966", "CVE-2020-16004", "CVE-2020-6535", "CVE-2019-19925", "CVE-2020-16008", "CVE-2020-6455", "CVE-2020-6571", "CVE-2020-6519", "CVE-2020-6414", "CVE-2020-6391", "CVE-2020-6472", "CVE-2020-16016", "CVE-2020-6420", "CVE-2020-6417", "CVE-2020-16041", "CVE-2020-6530", "CVE-2020-6481", "CVE-2020-6431", "CVE-2020-6520", "CVE-2020-6411", "CVE-2021-21106", "CVE-2020-6522", "CVE-2019-19880", "CVE-2020-15963", "CVE-2020-6422", "CVE-2020-16040", "CVE-2020-16034", "CVE-2020-15964", "CVE-2020-6400", "CVE-2020-6398", "CVE-2020-6388", "CVE-2020-6413", "CVE-2020-6555", "CVE-2020-6448", "CVE-2020-6426", "CVE-2020-15973", "CVE-2020-16022", "CVE-2020-15987", "CVE-2021-21112", "CVE-2020-15995", "CVE-2020-15971", "CVE-2019-8075", "CVE-2020-6469", "CVE-2020-6512", "CVE-2020-6449", "CVE-2020-15991", "CVE-2020-6435", "CVE-2020-6489", "CVE-2019-18197", "CVE-2020-6456", "CVE-2020-6567", "CVE-2020-16033", "CVE-2020-6514", "CVE-2019-19923", "CVE-2020-6576", "CVE-2020-6473", "CVE-2020-6543", "CVE-2020-16014", "CVE-2020-6415", "CVE-2020-6539", "CVE-2020-6379", "CVE-2020-6466", "CVE-2020-6423", "CVE-2020-16003", "CVE-2020-16006", "CVE-2021-21115", "CVE-2020-16036", "CVE-2020-6515", "CVE-2021-21111", "CVE-2020-6551", "CVE-2020-6575", "CVE-2020-6488", "CVE-2020-6438", "CVE-2020-6552", "CVE-2020-6441", "CVE-2020-6443", "CVE-2020-6513", "CVE-2020-6380", "CVE-2020-6478", "CVE-2020-15977", "CVE-2021-21113", "CVE-2020-6480", "CVE-2020-6487", "CVE-2020-16013", "CVE-2020-6557", "CVE-2020-6556", "CVE-2020-6523", "CVE-2020-6558", "CVE-2020-16038", "CVE-2020-6505", "CVE-2020-16018", "CVE-2020-16025", "CVE-2020-6442", "CVE-2020-16037", "CVE-2021-21110", "CVE-2020-6404", "CVE-2020-6546", "CVE-2020-6526", "CVE-2020-15990", "CVE-2020-16015", "CVE-2020-6436", "CVE-2020-16028", "CVE-2020-6382", "CVE-2020-6490", "CVE-2020-6406", "CVE-2020-6553", "CVE-2020-6433", "CVE-2020-6402", "CVE-2020-6549", "CVE-2020-6418", "CVE-2020-6496", "CVE-2020-15981", "CVE-2020-6516", "CVE-2020-6450", "CVE-2020-6525", "CVE-2020-6562", "CVE-2020-15961", "CVE-2020-6430", "CVE-2020-6425", "CVE-2020-6527", "CVE-2020-0601", "CVE-2020-6541", "CVE-2020-6440", "CVE-2020-6405", "CVE-2020-6517", "CVE-2020-6384", "CVE-2020-6462", "CVE-2020-6378", "CVE-2020-6471", "CVE-2020-6393", "CVE-2020-6475", "CVE-2019-20503", "CVE-2020-16017", "CVE-2020-15988", "CVE-2020-6470", "CVE-2020-6524", "CVE-2020-6484", "CVE-2020-6531", "CVE-2020-6510", "CVE-2020-6544", "CVE-2020-6457", "CVE-2020-15992", "CVE-2020-15959", "CVE-2020-6495", "CVE-2020-6509"], "description": "**Please note:** Starting 1/21/2021, we will be releasing the Chrome CVEs that are included in the new releases of Microsoft Edge (Chromium-based) directly in the Security Update Guide. Please see [Security Update Guide Supports CVEs Assigned by Industry Partners](<https://msrc-blog.microsoft.com/2021/01/13/security-update-guide-supports-cves-assigned-by-industry-partners/>) for more information.\n\nThis advisory will be updated whenever Microsoft releases a version of Microsoft Edge (Chromium-based) which incorporates publicly disclosed security updates from the Chromium project. Microsoft will document separately any vulnerabilities in Microsoft Edge (Chromium-based), that are not in Chromium, under a Microsoft-assigned CVE number (see, for example: [CVE-2020-1341](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/cve-2020-1341>)).\n\n**History of Microsoft Edge (Chromium-based) Security Updates**\n\nMicrosoft Edge Version | Date Released | Based on Chromium Version | Highest Severity Fix in Release | CVEs \n---|---|---|---|--- \n87.0.664.75 | 1/7/2021 | 87.0.4280.141 | High | [CVE-2021-21106](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21106>), [CVE-2021-21107](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21107>), [CVE-2021-21108](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21108>), [CVE-2021-21109](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21109>), [CVE-2021-21110](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21110>), [CVE-2021-21111](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21111>), [CVE-2021-21112](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21112>), [CVE-2021-21113](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21113>), [CVE-2021-21114](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21114>), [CVE-2021-21115](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21115>), [CVE-2021-21116](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21116>), [CVE-2020-16043](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16043>), [CVE-2020-15995](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15995>) \n87.0.664.57 | 12/7/2020 | 87.0.4280.88 | High | [CVE-2020-16037](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16037>), [CVE-2020-16038](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16038>), [CVE-2020-16039](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16039>), [CVE-2020-16040](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16040>), [CVE-2020-16041](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16041>), [CVE-2020-16042](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042>) \n87.0.664.41 | 11/19/2020 | 87.0.4280.66 for Windows and Linux, 87.0.4280.67 for Mac | High | [CVE-2019-8075](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8075>), [CVE-2020-16012](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16012>), [CVE-2020-16014](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16014>), [CVE-2020-16015](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16015>), [CVE-2020-16018](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16018>), [CVE-2020-16022](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16022>), [CVE-2020-16023](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16023>), [CVE-2020-16024](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16024>), [CVE-2020-16025](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16025>), [CVE-2020-16026](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16026>), [CVE-2020-16027](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16027>), [CVE-2020-16028](<https://cve.mitre.org/ci-bin/cvename.cgi?name=CVE-2020-16028>), [CVE-2020-16029](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16029>), [CVE-2020-16030](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16030>), [CVE-2020-16031](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16031>), [CVE-2020-16032](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16032>), [CVE-2020-16033](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16033>), [CVE-2020-16034](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16034>), [CVE-2020-16036](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16036>) \n86.0.622.69 | 11/13/2020 | 86.0.4240.198 | High | [**CVE-2020-16013**](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16013>) *, [**CVE-2020-16017**](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16017>) * \n86.0.622.68 | 11/11/2020 | 86.0.4240.193 | High | [CVE-2020-16016](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16016>) \n86.0.622.63 | 11/4/2020 | 86.0.4240.183 | High | [CVE-2020-16004](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16004>), [CVE-2020-16005](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16005>), [CVE-2020-16006](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16006>), [CVE-2020-16007](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16007>), [CVE-2020-16008](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16008>), [**CVE-2020-16009**](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16009>) *, [CVE-2020-16011](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16011>) \n86.0.622.51 | 10/22/2020 | 86.0.4240.111 | High | [**CVE-2020-15999**](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999>) *, [CVE-2020-16000](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16000>), [CVE-2020-16001](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16001>), [CVE-2020-16002](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16002>), [CVE-2020-16003](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16003>) \n86.0.622.38 | 10/8/2020 | 86.0.4240.75 | High | [CVE-2020-6557](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6557>), [CVE-2020-15968](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15968>), [CVE-2020-15969](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15969>), [CVE-2020-15971](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15971>), [CVE-2020-15972](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15972>), [CVE-2020-15973](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15973>), [CVE-2020-15974](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15974>), [CVE-2020-15975](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15975>), [CVE-2020-15977](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15977>), [CVE-2020-15979](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15979>), [CVE-2020-15981](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15981>), [CVE-2020-15982](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15982>), [CVE-2020-15985](<https://cve.mitre.org/cgi-bin/cvenamecgi?name=CVE-2020-15985>), [CVE-2020-15987](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15987>), [CVE-2020-15988](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15988>), [CVE-2020-15989](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15989>), [CVE-2020-15990](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15990>), [CVE-2020-15991](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15991>), [CVE-2020-15992](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15992>) \n85.0.564.63 | 9/23/2020 | 85.0.4183.121 | High | [CVE-2020-15960](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15960>), [CVE-2020-15961](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15961>), [CVE-2020-15962](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15962>), [CVE-2020-15963](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15963>), [CVE-2020-15964](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15964>), [CVE-2020-15965](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15965>), [CVE-2020-15966](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15966>) \n85.0.564.51 | 9/9/2020 | 85.0.4183.102 | High | [CVE-2020-6574](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6574>), [CVE-2020-6575](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6575>), [CVE-2020-6576](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6576>), [CVE-2020-15959](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15959>) \n85.0.564.41 | 8/27/2020 | 85.0.4183.83 | High | [CVE-2020-6558](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6558>), [CVE-2020-6559](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6559>), [CVE-2020-6560](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6560>), [CVE-2020-6561](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6561>), [CVE-2020-6562](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6562>), [CVE-2020-6563](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6563>), [CVE-2020-6564](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6564>), [CVE-2020-6566](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6566>), [CVE-2020-6567](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6567>), [CVE-2020-6568](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6568>), [CVE-2020-6569](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6569>), [CVE-2020-6570](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6570>), [CVE-2020-6571](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6571>) \n84.0.522.63 | 8/20/2020 | 84.0.4147.135 | High | [CVE-2020-6556](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6556>) \n84.0.522.59 | 8/11/2020 | 84.0.4147.125 | High | [CVE-2020-6542](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6542>), [CVE-2020-6543](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6543>), [CVE-2020-6544](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6544>), [CVE-2020-6545](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6545>), [CVE-2020-6546](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6546>), [CVE-2020-6547](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6547>), [CVE-2020-6548](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6548>), [CVE-2020-6549](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6549>), [CVE-2020-6550](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6550>), [CVE-2020-6551](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6551>), [CVE-2020-6552](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6552>), [CVE-2020-6553](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6553>), [CVE-2020-6554](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6554>), [CVE-2020-6555](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6555>) \n84.0.522.49 | 7/30/2020 | 84.0.4147.105 | High | [CVE-2020-6532](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6532>), [CVE-2020-6537](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6537>), [CVE-2020-6538](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6538>), [CVE-2020-6539](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6539>), [CVE-2020-6540](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6540>), [CVE-2020-6541](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6541>) \n84.0.522.40 | 7/16/2020 | 84.0.4147.89 | Critical | [CVE-2020-6510](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6510>), [CVE-2020-6511](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6511>), [CVE-2020-6512](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6512>), [CVE-2020-6513](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6513>), [CVE-2020-6514](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6514>), [CVE-2020-6515](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6515>), [CVE-2020-6516](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6516>), [CVE-2020-6517](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6517>), [CVE-2020-6518](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6518>), [CVE-2020-6519](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6519>), [CVE-2020-6520](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6520>), [CVE-2020-6521](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6521>), [CVE-2020-6522](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6522>), [CVE-2020-6523](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6523>), [CVE-2020-6524](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6524>), [CVE-2020-6525](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6525>), [CVE-2020-6526](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6526>), [CVE-2020-6527](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6527>), [CVE-2020-6528](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6528>), [CVE-2020-6529](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6529>), [CVE-2020-6530](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6530>), [CVE-2020-6531](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6531>), [CVE-2020-6533](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6533>), [CVE-2020-6534](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6534>), [CVE-2020-6535](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6535>), [CVE-2020-6536](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6536>) \n83.0.478.56 | 6/24/2020 | 83.0.4103.116 | High | [CVE-2020-6509](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6509>) \n83.0.478.53 | 6/17/2020 | 83.0.4103.106 | High | [CVE-2020-6505](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6505>), [CVE-2020-6506](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6506>), [CVE-2020-6507](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6507>) \n83.0.478.45 | 6/4/2020 | 83.0.4103.97 | High | [CVE-2020-6493](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6493>), [CVE-2020-6494](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6494>), [CVE-2020-6495](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6495>), [CVE-2020-6496](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6496>) \n83.0.478.37 | 5/21/2020 | 83.0.4103.61 | High | [CVE-2020-6465](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6465>), [CVE-2020-6466](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6466>), [CVE-2020-6467](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6467>), [CVE-2020-6468](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6468>), [CVE-2020-6469](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6469>), [CVE-2020-6470](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6470>), [CVE-2020-6471](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6471>), [CVE-2020-6472](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6472>), [CVE-2020-6473](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6473>), [CVE-2020-6474](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6474>), [CVE-2020-6475](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6475>), [CVE-2020-6476](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6476>), [CVE-2020-6478](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6478>), [CVE-2020-6479](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6479>), [CVE-2020-6480](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6480>), [CVE-2020-6481](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6481>), [CVE-2020-6482](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6482>), [CVE-2020-6483](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6483>), [CVE-2020-6484](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6484>), [CVE-2020-6486](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6486>), [CVE-2020-6487](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6487>), [CVE-2020-6488](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6488>), [CVE-2020-6489](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6489>), [CVE-2020-6490](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-640>) \n81.0.416.72 | 5/7/2020 | 81.0.4044.138 | High | [CVE-2020-6831](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6831>), [CVE-2020-6464](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6464>) \n81.0.416.68 | 4/29/2020 | 81.0.4044.129 | High | [CVE-2020-6461](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6461>), [CVE-2020-6462](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6462>) \n81.0.416.64 | 4/23/2020 | 81.0.4044.122 | High | [CVE-2020-6458](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6458>), [CVE-2020-6459](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6459>), [CVE-2020-6460](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6460>) \n81.0.416.58 | 4/17/2020 | 81.0.4044.113 | Critical | [CVE-2020-6457](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6457>) \n81.0.416.53 | 4/13/2020 | 81.0.4044.92 | High | [CVE-2020-6454](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6454>), [CVE-2020-6423](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6423>), [CVE-2020-6455](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6455>), [CVE-2020-6430](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6430>), [CVE-2020-6456](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6456>), [CVE-2020-6431](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6431>), [CVE-2020-6432](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6432>), [CVE-2020-6433](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6433>), [CVE-2020-6434](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6434>), [CVE-2020-6435](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6435>), [CVE-2020-6436](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6436>), [CVE-2020-6437](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6437>), [CVE-2020-6438](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6438>), [CVE-2020-6439](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6439>), [CVE-2020-6440](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6440>), [CVE-2020-6441](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6441>), [CVE-2020-6442](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6442>), [CVE-2020-6443](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6443>), [CVE-2020-6444](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6444>), [CVE-2020-6445](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6445>), [CVE-2020-6446](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6446>), [CVE-2020-6447](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6447>), [CVE-2020-6448](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6448>) \n80.0.361.109 | 4/1/2020 | 80.0.3987.162 | High | [CVE-2020-6450](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6450>), [CVE-2020-6451](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6451>), [CVE-2020-6452](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6452>) \n80.0.361.69 | 3/19/2020 | 80.0.3987.149 | High | [CVE-2020-6422](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6422>), [CVE-2020-6424](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6424>), [CVE-2020-6425](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6425>), [CVE-2020-6426](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6426>), [CVE-2020-6427](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6427>), [CVE-2020-6428](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6428>), [CVE-2020-6429](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6429>), [CVE-2019-20503](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20503>), [CVE-2020-6449](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6449>) \n80.0.361.66 | 3/4/2020 | 80.0.3987.132 | High | [CVE-2020-6420](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6420>) \n80.0.361.62 | 2/25/2020 | 80.0.3987.122 | High | [CVE-2020-6407](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6407>), [**CVE-2020-6418**](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6418>) * \n80.0.361.57 | 2/20/2020 | 80.0.3987.116 | High | [CVE-2020-6383](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6383>), [CVE-2020-6384](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6384>), [CVE-2020-6386](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6386>) \n80.0.361.48 | 2/7/2020 | 80.0.3987.87 | High | [CVE-2020-6381](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6381>), [CVE-2020-6382](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6382>), [CVE-2019-18197](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18197>), [CVE-2019-19926](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19926>), [CVE-2020-6385](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6385>), [CVE-2019-19880](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19880>), [CVE-2019-19925](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19925>), [CVE-2020-6387](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6387>), [CVE-2020-6388](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6388>), [CVE-2020-6389](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6389>), [CVE-2020-6390](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6390>), [CVE-2020-6391](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6391>), [CVE-2020-6392](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-202-6392>), [CVE-2020-6393](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6393>), [CVE-2020-6394](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6394>), [CVE-2020-6395](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6395>), [CVE-2020-6396](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6396>), [CVE-2020-6397](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6397>), [CVE-2020-6398](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6398>), [CVE-2020-6399](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6399>), [CVE-2020-6400](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6400>), [CVE-2020-6401](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6401>), [CVE-2020-6402](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6402>), [CVE-2020-6404](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6404>), [CVE-2020-6405](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-220-6405>), [CVE-2020-6406](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6406>), [CVE-2019-19923](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19923>), [CVE-2020-6408](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6408>), [CVE-2020-6409](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6409>), [CVE-2020-6410](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6410>), [CVE-2020-6411](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6411>), [CVE-2020-6412](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6412>), [CVE-2020-6413](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6413>), [CVE-2020-6414](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6414>), [CVE-2020-6415](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6415>), [CVE-2020-6416](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6416>), [CVE-2020-6417](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6417>) \n79.0.309.68 | 1/17/2020 | 79.0.3945.130 | Critical | [CVE-2020-6378](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6378>), [CVE-2020-6379](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6379>), [CVE-2020-6380](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6380>), [CVE-2020-0601](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0601>) \n \n* CVE\u2019s in **bold** have been reported to be exploited in the wild.\n\n**How can I see the version of the browser?**\n\n 1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window\n 2. Click on **Help and Feedback**\n 3. Click on **About Microsoft Edge**\n", "edition": 33, "modified": "2021-01-21T08:00:00", "id": "MS:ADV200002", "href": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV200002", "published": "2021-01-21T08:00:00", "title": "Chromium Security Updates for Microsoft Edge (Chromium-Based)", "type": "mscve", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}]}