Lucene search

K
nessusThis script is Copyright (C) 2004-2018 Tenable Network Security, Inc.MOZILLA_MULTIPLE_FLAWS.NASL
HistorySep 15, 2004 - 12:00 a.m.

Mozilla Browsers Multiple Vulnerabilities

2004-09-1500:00:00
This script is Copyright (C) 2004-2018 Tenable Network Security, Inc.
www.tenable.com
15

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.117 Low

EPSS

Percentile

95.3%

The remote host is using Mozilla and/or Firefox, a web browser.

The remote version of this software is vulnerable to several flaws that could allow an attacker to execute arbitrary code on the remote host, get access to content of the user clipboard or, perform a cross-domain cross-site scripting attack.

A remote attacker could exploit these issues by tricking a user into viewing a malicious web page.

#
# (C) Tenable Network Security, Inc.
#


include("compat.inc");


if(description)
{
 script_id(14728);
 script_version("1.24");
 script_cve_id(
   "CVE-2004-0904", 
   "CVE-2004-0905", 
   "CVE-2004-0906", 
   "CVE-2004-0908"
 );
 script_bugtraq_id(
   11194, 
   11192, 
   11169, 
   11171, 
   11177, 
   11179 
 );

 script_name(english:"Mozilla Browsers Multiple Vulnerabilities");
 script_summary(english:"Determines the version of Mozilla");
 
 script_set_attribute( attribute:"synopsis", value:
"The remote Windows host contains a web browser that is affected by
multiple vulnerabilities." );
 script_set_attribute( attribute:"description",  value:
"The remote host is using Mozilla and/or Firefox, a web browser.

The remote version of this software is vulnerable to several flaws
that could allow an attacker to execute arbitrary code on the remote
host, get access to content of the user clipboard or, perform
a cross-domain cross-site scripting attack.

A remote attacker could exploit these issues by tricking a user
into viewing a malicious web page." );
 script_set_attribute(
   attribute:"solution", 
   value:"Upgrade to Mozilla 1.7.3 / Firefox 0.10.0 or later."
 );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
 script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"false");
 script_set_attribute(attribute:"plugin_publication_date", value: "2004/09/15");
 script_set_attribute(attribute:"vuln_publication_date", value: "2004/08/31");
 script_set_attribute(attribute:"patch_publication_date", value: "2004/09/14");
 script_cvs_date("Date: 2018/07/16 14:09:15");
 script_set_attribute(attribute:"plugin_type", value:"local");
 script_set_attribute(attribute:"cpe",value:"cpe:/a:mozilla:mozilla");
 script_set_attribute(attribute:"cpe",value:"cpe:/a:mozilla:firefox");
 script_set_attribute(attribute:"cpe",value:"cpe:/a:mozilla:thunderbird");
 script_set_attribute(attribute:"cpe",value:"cpe:/a:netscape:navigator");
 script_end_attributes();

 script_category(ACT_GATHER_INFO);
 script_family(english:"Windows");
 script_copyright(english:"This script is Copyright (C) 2004-2018 Tenable Network Security, Inc.");
 script_dependencies("mozilla_org_installed.nasl");
 if ( NASL_LEVEL >= 3206 ) script_require_ports("Mozilla/Version", "Mozilla/Firefox/Version");
 exit(0);
}

#

include("misc_func.inc");

ver = read_version_in_kb("Mozilla/Version");
if (!isnull(ver))
{
  if (
    ver[0] < 1 ||
    (
      ver[0] == 1 &&
      (
        ver[1] < 7 ||
        (ver[1] == 7 && ver[2] < 3)
      )
    )
  )  security_hole(get_kb_item("SMB/transport"));
}

ver = read_version_in_kb("Mozilla/Firefox/Version");
if (!isnull(ver))
{
  if (ver[0] == 0 && ver[1] < 10)
    security_hole(get_kb_item("SMB/transport"));
}
VendorProductVersionCPE
netscapenavigatorcpe:/a:netscape:navigator
mozillamozillacpe:/a:mozilla:mozilla
mozillafirefoxcpe:/a:mozilla:firefox
mozillathunderbirdcpe:/a:mozilla:thunderbird

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.117 Low

EPSS

Percentile

95.3%