CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
EPSS
Percentile
96.9%
Fri Feb 8 2008 Kai Engert <kengert at redhat.com> - 1.1.8-1
SeaMonkey 1.1.8
Sun Dec 2 2007 Kai Engert <kengert at redhat.com> - 1.1.7-1
SeaMonkey 1.1.7
Mon Nov 5 2007 Kai Engert <kengert at redhat.com> - 1.1.6-1
SeaMonkey 1.1.6
Fri Oct 19 2007 Kai Engert <kengert at redhat.com> - 1.1.5-2
SeaMonkey 1.1.5
Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Fedora Security Advisory 2008-1459.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(31061);
script_version("1.16");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/11");
script_cve_id("CVE-2008-0412", "CVE-2008-0413", "CVE-2008-0414", "CVE-2008-0415", "CVE-2008-0417", "CVE-2008-0418", "CVE-2008-0419", "CVE-2008-0591", "CVE-2008-0592", "CVE-2008-0593");
script_xref(name:"FEDORA", value:"2008-1459");
script_name(english:"Fedora 8 : seamonkey-1.1.8-1.fc8 (2008-1459)");
script_summary(english:"Checks rpm output for the updated package.");
script_set_attribute(
attribute:"synopsis",
value:"The remote Fedora host is missing a security update."
);
script_set_attribute(
attribute:"description",
value:
" - Fri Feb 8 2008 Kai Engert <kengert at redhat.com> -
1.1.8-1
- SeaMonkey 1.1.8
- Sun Dec 2 2007 Kai Engert <kengert at redhat.com> -
1.1.7-1
- SeaMonkey 1.1.7
- Mon Nov 5 2007 Kai Engert <kengert at redhat.com> -
1.1.6-1
- SeaMonkey 1.1.6
- Fri Oct 19 2007 Kai Engert <kengert at redhat.com> -
1.1.5-2
- SeaMonkey 1.1.5
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues."
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=431732"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=431733"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=431739"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=431742"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=431748"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=431749"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=431751"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=431752"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=431756"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=432040"
);
# https://lists.fedoraproject.org/pipermail/package-announce/2008-February/007690.html
script_set_attribute(
attribute:"see_also",
value:"http://www.nessus.org/u?822faf54"
);
script_set_attribute(
attribute:"solution",
value:"Update the affected seamonkey package."
);
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
script_cwe_id(20, 22, 79, 94, 200, 399);
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:seamonkey");
script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:8");
script_set_attribute(attribute:"vuln_publication_date", value:"2008/02/08");
script_set_attribute(attribute:"patch_publication_date", value:"2008/02/13");
script_set_attribute(attribute:"plugin_publication_date", value:"2008/02/14");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2008-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"Fedora Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/RedHat/release");
if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
os_ver = os_ver[1];
if (! ereg(pattern:"^8([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 8.x", "Fedora " + os_ver);
if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
flag = 0;
if (rpm_check(release:"FC8", reference:"seamonkey-1.1.8-1.fc8")) flag++;
if (flag)
{
if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
else security_hole(0);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "seamonkey");
}
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0412
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0413
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0414
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0415
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0417
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0418
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0419
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0591
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0592
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0593
www.nessus.org/u?822faf54
bugzilla.redhat.com/show_bug.cgi?id=431732
bugzilla.redhat.com/show_bug.cgi?id=431733
bugzilla.redhat.com/show_bug.cgi?id=431739
bugzilla.redhat.com/show_bug.cgi?id=431742
bugzilla.redhat.com/show_bug.cgi?id=431748
bugzilla.redhat.com/show_bug.cgi?id=431749
bugzilla.redhat.com/show_bug.cgi?id=431751
bugzilla.redhat.com/show_bug.cgi?id=431752
bugzilla.redhat.com/show_bug.cgi?id=431756
bugzilla.redhat.com/show_bug.cgi?id=432040