CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
EPSS
Percentile
99.8%
A number of security vulnerabilities have been discovered and corrected in the latest Mozilla Firefox program, version 1.5.0.10.
This update provides the latest Firefox to correct these issues.
Update :
A regression was found in the latest Firefox packages provided where changes to library paths caused applications that depended on the NSS libraries (such as Thunderbird and Evolution) to fail to start or fail to load certain SSL-related security components. These new packages correct that problem and we apologize for any inconvenience the previous update may have caused.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Mandrake Linux Security Advisory MDKSA-2007:050.
# The text itself is copyright (C) Mandriva S.A.
#
if (NASL_LEVEL < 3000) exit(0);
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(24753);
script_version("1.22");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/06");
script_cve_id(
"CVE-2006-6077",
"CVE-2007-0008",
"CVE-2007-0009",
"CVE-2007-0775",
"CVE-2007-0776",
"CVE-2007-0777",
"CVE-2007-0778",
"CVE-2007-0779",
"CVE-2007-0780",
"CVE-2007-0800",
"CVE-2007-0801",
"CVE-2007-0981",
"CVE-2007-0995",
"CVE-2007-0996",
"CVE-2007-1092"
);
script_bugtraq_id(
21240,
22396,
22566,
22679,
22694
);
script_xref(name:"MDKSA", value:"2007:050-1");
script_name(english:"Mandrake Linux Security Advisory : mozilla-firefox (MDKSA-2007:050-1)");
script_summary(english:"Checks rpm output for the updated packages");
script_set_attribute(
attribute:"synopsis",
value:
"The remote Mandrake Linux host is missing one or more security
updates."
);
script_set_attribute(
attribute:"description",
value:
"A number of security vulnerabilities have been discovered and
corrected in the latest Mozilla Firefox program, version 1.5.0.10.
This update provides the latest Firefox to correct these issues.
Update :
A regression was found in the latest Firefox packages provided where
changes to library paths caused applications that depended on the NSS
libraries (such as Thunderbird and Evolution) to fail to start or fail
to load certain SSL-related security components. These new packages
correct that problem and we apologize for any inconvenience the
previous update may have caused."
);
script_set_attribute(
attribute:"see_also",
value:"http://www.mozilla.org/security/announce/2007/mfsa2007-01.html"
);
script_set_attribute(
attribute:"see_also",
value:"http://www.mozilla.org/security/announce/2007/mfsa2007-02.html"
);
script_set_attribute(
attribute:"see_also",
value:"http://www.mozilla.org/security/announce/2007/mfsa2007-03.html"
);
script_set_attribute(
attribute:"see_also",
value:"http://www.mozilla.org/security/announce/2007/mfsa2007-04.html"
);
script_set_attribute(
attribute:"see_also",
value:"http://www.mozilla.org/security/announce/2007/mfsa2007-05.html"
);
script_set_attribute(
attribute:"see_also",
value:"http://www.mozilla.org/security/announce/2007/mfsa2007-06.html"
);
script_set_attribute(
attribute:"see_also",
value:"http://www.mozilla.org/security/announce/2007/mfsa2007-07.html"
);
script_set_attribute(
attribute:"see_also",
value:"http://www.mozilla.org/security/announce/2007/mfsa2007-08.html"
);
script_set_attribute(attribute:"solution", value:"Update the affected packages.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_cwe_id(79, 119, 189);
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64mozilla-firefox1.5.0.10");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64mozilla-firefox1.5.0.10-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64nspr4");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64nspr4-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64nspr4-static-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64nss3");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64nss3-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libmozilla-firefox1.5.0.10");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libmozilla-firefox1.5.0.10-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libnspr4");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libnspr4-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libnspr4-static-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libnss3");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libnss3-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:mozilla-firefox");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mandriva:linux:2007");
script_set_attribute(attribute:"patch_publication_date", value:"2007/03/02");
script_set_attribute(attribute:"plugin_publication_date", value:"2007/03/02");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2007-2021 Tenable Network Security, Inc.");
script_family(english:"Mandriva Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/Mandrake/release", "Host/Mandrake/rpm-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/Mandrake/release")) audit(AUDIT_OS_NOT, "Mandriva / Mandake Linux");
if (!get_kb_item("Host/Mandrake/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if (cpu !~ "^(amd64|i[3-6]86|x86_64)$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Mandriva / Mandrake Linux", cpu);
flag = 0;
if (rpm_check(release:"MDK2007.0", cpu:"x86_64", reference:"lib64mozilla-firefox1.5.0.10-1.5.0.10-2mdv2007.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2007.0", cpu:"x86_64", reference:"lib64mozilla-firefox1.5.0.10-devel-1.5.0.10-2mdv2007.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2007.0", cpu:"x86_64", reference:"lib64nspr4-1.5.0.10-2mdv2007.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2007.0", cpu:"x86_64", reference:"lib64nspr4-devel-1.5.0.10-2mdv2007.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2007.0", cpu:"x86_64", reference:"lib64nspr4-static-devel-1.5.0.10-2mdv2007.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2007.0", cpu:"x86_64", reference:"lib64nss3-1.5.0.10-2mdv2007.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2007.0", cpu:"x86_64", reference:"lib64nss3-devel-1.5.0.10-2mdv2007.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2007.0", cpu:"i386", reference:"libmozilla-firefox1.5.0.10-1.5.0.10-2mdv2007.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2007.0", cpu:"i386", reference:"libmozilla-firefox1.5.0.10-devel-1.5.0.10-2mdv2007.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2007.0", cpu:"i386", reference:"libnspr4-1.5.0.10-2mdv2007.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2007.0", cpu:"i386", reference:"libnspr4-devel-1.5.0.10-2mdv2007.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2007.0", cpu:"i386", reference:"libnspr4-static-devel-1.5.0.10-2mdv2007.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2007.0", cpu:"i386", reference:"libnss3-1.5.0.10-2mdv2007.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2007.0", cpu:"i386", reference:"libnss3-devel-1.5.0.10-2mdv2007.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2007.0", reference:"mozilla-firefox-1.5.0.10-2mdv2007.0", yank:"mdv")) flag++;
if (flag)
{
if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
else security_hole(0);
exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6077
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0008
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0009
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0775
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0776
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0777
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0778
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0779
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0780
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0800
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0801
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0981
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0995
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0996
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1092
www.mozilla.org/security/announce/2007/mfsa2007-01.html
www.mozilla.org/security/announce/2007/mfsa2007-02.html
www.mozilla.org/security/announce/2007/mfsa2007-03.html
www.mozilla.org/security/announce/2007/mfsa2007-04.html
www.mozilla.org/security/announce/2007/mfsa2007-05.html
www.mozilla.org/security/announce/2007/mfsa2007-06.html
www.mozilla.org/security/announce/2007/mfsa2007-07.html
www.mozilla.org/security/announce/2007/mfsa2007-08.html