CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
EPSS
Percentile
94.8%
MozillaFirefox has been updated to the 17.0.4ESR release. Besides the major version update from the 10ESR stable release line to the 17ESR stable release line, this update brings critical security and bugfixes :
The Firefox 17.0.3ESR release also contains lots of security fixes :
The following issues have been fixed in Firefox 19 and ESR 17.0.3 :
Heap-use-after-free in nsOverflowContinuationTracker::Finish, with
-moz-columns. (CVE-2013-0780)
Heap-buffer-overflow WRITE in nsSaveAsCharset::DoCharsetConversion. (CVE-2013-0782)
Google security researcher Michal Zalewski reported an issue where the browser displayed the content of a proxy’s 407 response if a user canceled the proxy’s authentication prompt. In this circumstance, the addressbar will continue to show the requested site’s address, including HTTPS addresses that appear to be secure. This spoofing of addresses can be used for phishing attacks by fooling users into entering credentials, for example. (MFSA 2013-27 / CVE-2013-0776)
Security researcher Nils reported a use-after-free in nsImageLoadingContent when content script is executed.
This could allow for arbitrary code execution. (MFSA 2013-26 / CVE-2013-0775)
Mozilla security researcher Frederik Braun discovered that since Firefox 15 the file system location of the active browser profile was available to JavaScript workers. While not dangerous by itself, this could potentially be combined with other vulnerabilities to target the profile in an attack. (MFSA 2013-25 / CVE-2013-0774)
Mozilla developer Bobby Holley discovered that it was possible to bypass some protections in Chrome Object Wrappers (COW) and System Only Wrappers (SOW), making their prototypes mutable by web content. This could be used leak information from chrome objects and possibly allow for arbitrary code execution. (MFSA 2013-24 / CVE-2013-0773)
Mozilla developer Boris Zbarsky reported that in some circumstances a wrapped WebIDL object can be wrapped multiple times, overwriting the existing wrapped state.
This could lead to an exploitable condition in rare cases. (MFSA 2013-23 / CVE-2013-0765)
Using the Address Sanitizer tool, security researcher Atte Kettunen from OUSPG found an out-of-bounds read while rendering GIF format images. This could cause a non-exploitable crash and could also attempt to render normally inaccesible data as part of the image. (MFSA 2013-22 / CVE-2013-0772)
Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code. (MFSA 2013-21)
Olli Pettay, Christoph Diehl, Gary Kwong, Jesse Ruderman, Andrew McCreight, Joe Drew, and Wayne Mery reported memory safety problems and crashes that affect Firefox ESR 17, and Firefox 18.
Memory safety bugs fixed in Firefox ESR 17.0.3, and Firefox 19. (CVE-2013-0783)
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The text description of this plugin is (C) Novell, Inc.
#
if (NASL_LEVEL < 3000) exit(0);
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(65598);
script_version("1.7");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/19");
script_cve_id("CVE-2013-0765", "CVE-2013-0772", "CVE-2013-0773", "CVE-2013-0774", "CVE-2013-0775", "CVE-2013-0776", "CVE-2013-0780", "CVE-2013-0782", "CVE-2013-0783", "CVE-2013-0787");
script_name(english:"SuSE 10 Security Update : Mozilla Firefox (ZYPP Patch Number 8506)");
script_summary(english:"Checks rpm output for the updated packages");
script_set_attribute(
attribute:"synopsis",
value:"The remote SuSE 10 host is missing a security-related patch."
);
script_set_attribute(
attribute:"description",
value:
"MozillaFirefox has been updated to the 17.0.4ESR release. Besides the
major version update from the 10ESR stable release line to the 17ESR
stable release line, this update brings critical security and
bugfixes :
- VUPEN Security, via TippingPoint's Zero Day Initiative,
reported a use-after-free within the HTML editor when
content script is run by the document.execCommand()
function while internal editor operations are occurring.
This could allow for arbitrary code execution. (MFSA
2013-29 / CVE-2013-0787)
The Firefox 17.0.3ESR release also contains lots of security fixes :
- Security researcher Abhishek Arya (Inferno) of the
Google Chrome Security Team used the Address Sanitizer
tool to discover a series of use-after-free, out of
bounds read, and buffer overflow problems rated as low
to critical security issues in shipped software. Some of
these issues are potentially exploitable, allowing for
remote code execution. We would also like to thank
Abhishek for reporting four additional use-after-free
and out of bounds write flaws introduced during Firefox
development that were fixed before general release.
(MFSA 2013-28)
The following issues have been fixed in Firefox 19 and ESR 17.0.3 :
- Heap-use-after-free in
nsOverflowContinuationTracker::Finish, with
-moz-columns. (CVE-2013-0780)
- Heap-buffer-overflow WRITE in
nsSaveAsCharset::DoCharsetConversion. (CVE-2013-0782)
- Google security researcher Michal Zalewski reported an
issue where the browser displayed the content of a
proxy's 407 response if a user canceled the proxy's
authentication prompt. In this circumstance, the
addressbar will continue to show the requested site's
address, including HTTPS addresses that appear to be
secure. This spoofing of addresses can be used for
phishing attacks by fooling users into entering
credentials, for example. (MFSA 2013-27 / CVE-2013-0776)
- Security researcher Nils reported a use-after-free in
nsImageLoadingContent when content script is executed.
This could allow for arbitrary code execution. (MFSA
2013-26 / CVE-2013-0775)
- Mozilla security researcher Frederik Braun discovered
that since Firefox 15 the file system location of the
active browser profile was available to JavaScript
workers. While not dangerous by itself, this could
potentially be combined with other vulnerabilities to
target the profile in an attack. (MFSA 2013-25 /
CVE-2013-0774)
- Mozilla developer Bobby Holley discovered that it was
possible to bypass some protections in Chrome Object
Wrappers (COW) and System Only Wrappers (SOW), making
their prototypes mutable by web content. This could be
used leak information from chrome objects and possibly
allow for arbitrary code execution. (MFSA 2013-24 /
CVE-2013-0773)
- Mozilla developer Boris Zbarsky reported that in some
circumstances a wrapped WebIDL object can be wrapped
multiple times, overwriting the existing wrapped state.
This could lead to an exploitable condition in rare
cases. (MFSA 2013-23 / CVE-2013-0765)
- Using the Address Sanitizer tool, security researcher
Atte Kettunen from OUSPG found an out-of-bounds read
while rendering GIF format images. This could cause a
non-exploitable crash and could also attempt to render
normally inaccesible data as part of the image. (MFSA
2013-22 / CVE-2013-0772)
- Mozilla developers identified and fixed several memory
safety bugs in the browser engine used in Firefox and
other Mozilla-based products. Some of these bugs showed
evidence of memory corruption under certain
circumstances, and we presume that with enough effort at
least some of these could be exploited to run arbitrary
code. (MFSA 2013-21)
Olli Pettay, Christoph Diehl, Gary Kwong, Jesse
Ruderman, Andrew McCreight, Joe Drew, and Wayne Mery
reported memory safety problems and crashes that affect
Firefox ESR 17, and Firefox 18.
- Memory safety bugs fixed in Firefox ESR 17.0.3, and
Firefox 19. (CVE-2013-0783)"
);
# http://www.mozilla.org/security/announce/2013/mfsa2013-21.html
script_set_attribute(
attribute:"see_also",
value:"https://www.mozilla.org/en-US/security/advisories/mfsa2013-21/"
);
# http://www.mozilla.org/security/announce/2013/mfsa2013-22.html
script_set_attribute(
attribute:"see_also",
value:"https://www.mozilla.org/en-US/security/advisories/mfsa2013-22/"
);
# http://www.mozilla.org/security/announce/2013/mfsa2013-23.html
script_set_attribute(
attribute:"see_also",
value:"https://www.mozilla.org/en-US/security/advisories/mfsa2013-23/"
);
# http://www.mozilla.org/security/announce/2013/mfsa2013-24.html
script_set_attribute(
attribute:"see_also",
value:"https://www.mozilla.org/en-US/security/advisories/mfsa2013-24/"
);
# http://www.mozilla.org/security/announce/2013/mfsa2013-25.html
script_set_attribute(
attribute:"see_also",
value:"https://www.mozilla.org/en-US/security/advisories/mfsa2013-25/"
);
# http://www.mozilla.org/security/announce/2013/mfsa2013-26.html
script_set_attribute(
attribute:"see_also",
value:"https://www.mozilla.org/en-US/security/advisories/mfsa2013-26/"
);
# http://www.mozilla.org/security/announce/2013/mfsa2013-27.html
script_set_attribute(
attribute:"see_also",
value:"https://www.mozilla.org/en-US/security/advisories/mfsa2013-27/"
);
# http://www.mozilla.org/security/announce/2013/mfsa2013-28.html
script_set_attribute(
attribute:"see_also",
value:"https://www.mozilla.org/en-US/security/advisories/mfsa2013-28/"
);
# http://www.mozilla.org/security/announce/2013/mfsa2013-29.html
script_set_attribute(
attribute:"see_also",
value:"https://www.mozilla.org/en-US/security/advisories/mfsa2013-29/"
);
script_set_attribute(
attribute:"see_also",
value:"http://support.novell.com/security/cve/CVE-2013-0765.html"
);
script_set_attribute(
attribute:"see_also",
value:"http://support.novell.com/security/cve/CVE-2013-0772.html"
);
script_set_attribute(
attribute:"see_also",
value:"http://support.novell.com/security/cve/CVE-2013-0773.html"
);
script_set_attribute(
attribute:"see_also",
value:"http://support.novell.com/security/cve/CVE-2013-0774.html"
);
script_set_attribute(
attribute:"see_also",
value:"http://support.novell.com/security/cve/CVE-2013-0775.html"
);
script_set_attribute(
attribute:"see_also",
value:"http://support.novell.com/security/cve/CVE-2013-0776.html"
);
script_set_attribute(
attribute:"see_also",
value:"http://support.novell.com/security/cve/CVE-2013-0780.html"
);
script_set_attribute(
attribute:"see_also",
value:"http://support.novell.com/security/cve/CVE-2013-0782.html"
);
script_set_attribute(
attribute:"see_also",
value:"http://support.novell.com/security/cve/CVE-2013-0783.html"
);
script_set_attribute(
attribute:"see_also",
value:"http://support.novell.com/security/cve/CVE-2013-0787.html"
);
script_set_attribute(attribute:"solution", value:"Apply ZYPP patch number 8506.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/o:suse:suse_linux");
script_set_attribute(attribute:"vuln_publication_date", value:"2013/02/19");
script_set_attribute(attribute:"patch_publication_date", value:"2013/03/14");
script_set_attribute(attribute:"plugin_publication_date", value:"2013/03/17");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2013-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"SuSE Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list");
exit(0);
}
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) exit(0, "Local checks are not enabled.");
if (!get_kb_item("Host/SuSE/release")) exit(0, "The host is not running SuSE.");
if (!get_kb_item("Host/SuSE/rpm-list")) exit(1, "Could not obtain the list of installed packages.");
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) exit(1, "Failed to determine the architecture type.");
if (cpu >!< "x86_64" && cpu !~ "^i[3-6]86$") exit(1, "Local checks for SuSE 10 on the '"+cpu+"' architecture have not been implemented.");
flag = 0;
if (rpm_check(release:"SLED10", sp:4, reference:"MozillaFirefox-17.0.4esr-0.7.1")) flag++;
if (rpm_check(release:"SLED10", sp:4, reference:"MozillaFirefox-branding-SLED-7-0.10.4")) flag++;
if (rpm_check(release:"SLED10", sp:4, reference:"MozillaFirefox-translations-17.0.4esr-0.7.1")) flag++;
if (rpm_check(release:"SLED10", sp:4, reference:"mhtml-firefox-0.5-1.13.4")) flag++;
if (rpm_check(release:"SLED10", sp:4, reference:"mozilla-nspr-4.9.4-0.6.3")) flag++;
if (rpm_check(release:"SLED10", sp:4, reference:"mozilla-nspr-devel-4.9.4-0.6.3")) flag++;
if (rpm_check(release:"SLED10", sp:4, reference:"mozilla-nss-3.14.1-0.6.3")) flag++;
if (rpm_check(release:"SLED10", sp:4, reference:"mozilla-nss-devel-3.14.1-0.6.3")) flag++;
if (rpm_check(release:"SLED10", sp:4, reference:"mozilla-nss-tools-3.14.1-0.6.3")) flag++;
if (rpm_check(release:"SLED10", sp:4, cpu:"x86_64", reference:"mozilla-nspr-32bit-4.9.4-0.6.3")) flag++;
if (rpm_check(release:"SLED10", sp:4, cpu:"x86_64", reference:"mozilla-nss-32bit-3.14.1-0.6.3")) flag++;
if (rpm_check(release:"SLES10", sp:4, reference:"MozillaFirefox-17.0.4esr-0.7.1")) flag++;
if (rpm_check(release:"SLES10", sp:4, reference:"MozillaFirefox-branding-SLED-7-0.10.4")) flag++;
if (rpm_check(release:"SLES10", sp:4, reference:"MozillaFirefox-translations-17.0.4esr-0.7.1")) flag++;
if (rpm_check(release:"SLES10", sp:4, reference:"mozilla-nspr-4.9.4-0.6.3")) flag++;
if (rpm_check(release:"SLES10", sp:4, reference:"mozilla-nspr-devel-4.9.4-0.6.3")) flag++;
if (rpm_check(release:"SLES10", sp:4, reference:"mozilla-nss-3.14.1-0.6.3")) flag++;
if (rpm_check(release:"SLES10", sp:4, reference:"mozilla-nss-devel-3.14.1-0.6.3")) flag++;
if (rpm_check(release:"SLES10", sp:4, reference:"mozilla-nss-tools-3.14.1-0.6.3")) flag++;
if (rpm_check(release:"SLES10", sp:4, cpu:"x86_64", reference:"mozilla-nspr-32bit-4.9.4-0.6.3")) flag++;
if (rpm_check(release:"SLES10", sp:4, cpu:"x86_64", reference:"mozilla-nss-32bit-3.14.1-0.6.3")) flag++;
if (flag)
{
if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
else security_hole(0);
exit(0);
}
else exit(0, "The host is not affected.");
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0765
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0772
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0773
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0774
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0775
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0776
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0780
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0782
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0783
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0787
support.novell.com/security/cve/CVE-2013-0765.html
support.novell.com/security/cve/CVE-2013-0772.html
support.novell.com/security/cve/CVE-2013-0773.html
support.novell.com/security/cve/CVE-2013-0774.html
support.novell.com/security/cve/CVE-2013-0775.html
support.novell.com/security/cve/CVE-2013-0776.html
support.novell.com/security/cve/CVE-2013-0780.html
support.novell.com/security/cve/CVE-2013-0782.html
support.novell.com/security/cve/CVE-2013-0783.html
support.novell.com/security/cve/CVE-2013-0787.html
www.mozilla.org/en-US/security/advisories/mfsa2013-21/
www.mozilla.org/en-US/security/advisories/mfsa2013-22/
www.mozilla.org/en-US/security/advisories/mfsa2013-23/
www.mozilla.org/en-US/security/advisories/mfsa2013-24/
www.mozilla.org/en-US/security/advisories/mfsa2013-25/
www.mozilla.org/en-US/security/advisories/mfsa2013-26/
www.mozilla.org/en-US/security/advisories/mfsa2013-27/
www.mozilla.org/en-US/security/advisories/mfsa2013-28/
www.mozilla.org/en-US/security/advisories/mfsa2013-29/