CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
EPSS
Percentile
99.9%
MozillaFirefox, mozilla-nspr, and mozilla-nss were updated to fix 17 security issues.
For more details please check the changelogs.
These security issues were fixed :
CVE-2015-2724/CVE-2015-2725/CVE-2015-2726: Miscellaneous memory safety hazards (bsc#935979).
CVE-2015-2728: Type confusion in Indexed Database Manager (bsc#935979).
CVE-2015-2730: ECDSA signature validation fails to handle some signatures correctly (bsc#935979).
CVE-2015-2722/CVE-2015-2733: Use-after-free in workers while using XMLHttpRequest (bsc#935979).
CVE-2015-2734/CVE-2015-2735/CVE-2015-2736/CVE-2015-2737/ CVE-2015-2738/CVE-2 015-2739/CVE-2015-2740:
Vulnerabilities found through code inspection (bsc#935979).
CVE-2015-2743: Privilege escalation in PDF.js (bsc#935979).
CVE-2015-4000: NSS accepts export-length DHE keys with regular DHE cipher suites (bsc#935033).
CVE-2015-2721: NSS incorrectly permits skipping of ServerKeyExchange (bsc#935979).
This non-security issue was fixed :
Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from SUSE update advisory SUSE-SU-2015:1268-2.
# The text itself is copyright (C) SUSE.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(84898);
script_version("2.12");
script_set_attribute(attribute:"plugin_modification_date", value:"2022/12/05");
script_cve_id(
"CVE-2015-2721",
"CVE-2015-2722",
"CVE-2015-2724",
"CVE-2015-2725",
"CVE-2015-2726",
"CVE-2015-2728",
"CVE-2015-2730",
"CVE-2015-2733",
"CVE-2015-2734",
"CVE-2015-2735",
"CVE-2015-2736",
"CVE-2015-2737",
"CVE-2015-2738",
"CVE-2015-2739",
"CVE-2015-2740",
"CVE-2015-2743",
"CVE-2015-4000"
);
script_bugtraq_id(74733, 75541);
script_xref(name:"CEA-ID", value:"CEA-2021-0004");
script_name(english:"SUSE SLED11 / SLES11 Security Update : MozillaFirefox, mozilla-nspr, mozilla-nss (SUSE-SU-2015:1268-2)");
script_set_attribute(attribute:"synopsis", value:
"The remote SUSE host is missing one or more security updates.");
script_set_attribute(attribute:"description", value:
"MozillaFirefox, mozilla-nspr, and mozilla-nss were updated to fix 17
security issues.
For more details please check the changelogs.
These security issues were fixed :
- CVE-2015-2724/CVE-2015-2725/CVE-2015-2726: Miscellaneous
memory safety hazards (bsc#935979).
- CVE-2015-2728: Type confusion in Indexed Database
Manager (bsc#935979).
- CVE-2015-2730: ECDSA signature validation fails to
handle some signatures correctly (bsc#935979).
- CVE-2015-2722/CVE-2015-2733: Use-after-free in workers
while using XMLHttpRequest (bsc#935979).
- CVE-2015-2734/CVE-2015-2735/CVE-2015-2736/CVE-2015-2737/
CVE-2015-2738/CVE-2 015-2739/CVE-2015-2740:
Vulnerabilities found through code inspection
(bsc#935979).
- CVE-2015-2743: Privilege escalation in PDF.js
(bsc#935979).
- CVE-2015-4000: NSS accepts export-length DHE keys with
regular DHE cipher suites (bsc#935033).
- CVE-2015-2721: NSS incorrectly permits skipping of
ServerKeyExchange (bsc#935979).
This non-security issue was fixed :
- bsc#908275: Firefox did not print in landscape
orientation.
Note that Tenable Network Security has extracted the preceding
description block directly from the SUSE security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/908275");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/935033");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/935979");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2015-2721.html");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2015-2722.html");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2015-2724.html");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2015-2725.html");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2015-2726.html");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2015-2728.html");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2015-2730.html");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2015-2733.html");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2015-2734.html");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2015-2735.html");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2015-2736.html");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2015-2737.html");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2015-2738.html");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2015-2739.html");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2015-2740.html");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2015-2743.html");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2015-4000.html");
# https://www.suse.com/support/update/announcement/2015/suse-su-20151268-2.html
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?8363396b");
script_set_attribute(attribute:"solution", value:
"To install this SUSE Security Update use YaST online_update.
Alternatively, you can run the command listed for your product :
SUSE Linux Enterprise Software Development Kit 11-SP4 :
zypper in -t patch sdksp4-MozillaFirefox-201507-12001=1
SUSE Linux Enterprise Software Development Kit 11-SP3 :
zypper in -t patch sdksp3-MozillaFirefox-201507-12001=1
SUSE Linux Enterprise Server for VMWare 11-SP3 :
zypper in -t patch slessp3-MozillaFirefox-201507-12001=1
SUSE Linux Enterprise Server 11-SP4 :
zypper in -t patch slessp4-MozillaFirefox-201507-12001=1
SUSE Linux Enterprise Server 11-SP3 :
zypper in -t patch slessp3-MozillaFirefox-201507-12001=1
SUSE Linux Enterprise Desktop 11-SP4 :
zypper in -t patch sledsp4-MozillaFirefox-201507-12001=1
SUSE Linux Enterprise Desktop 11-SP3 :
zypper in -t patch sledsp3-MozillaFirefox-201507-12001=1
SUSE Linux Enterprise Debuginfo 11-SP4 :
zypper in -t patch dbgsp4-MozillaFirefox-201507-12001=1
SUSE Linux Enterprise Debuginfo 11-SP3 :
zypper in -t patch dbgsp3-MozillaFirefox-201507-12001=1
To bring your system up-to-date, use 'zypper patch'.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"patch_publication_date", value:"2015/07/15");
script_set_attribute(attribute:"plugin_publication_date", value:"2015/07/21");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:MozillaFirefox");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:MozillaFirefox-translations");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libfreebl3");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libsoftokn3");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:mozilla-nspr");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:mozilla-nss");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:mozilla-nss-tools");
script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:suse_linux:11");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"SuSE Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2015-2022 Tenable Network Security, Inc.");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/SuSE/release");
if (isnull(release) || release !~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "SUSE");
os_ver = eregmatch(pattern: "^(SLE(S|D)\d+)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "SUSE");
os_ver = os_ver[1];
if (! ereg(pattern:"^(SLED11|SLES11)$", string:os_ver)) audit(AUDIT_OS_NOT, "SUSE SLED11 / SLES11", "SUSE " + os_ver);
rpm_list =get_kb_item("Host/SuSE/rpm-list");
if (!rpm_list) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if (cpu !~ "^i[3-6]86$" && "x86_64" >!< cpu && "s390x" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "SUSE " + os_ver, cpu);
sp = get_kb_item("Host/SuSE/patchlevel");
if (isnull(sp)) sp = "0";
if (os_ver == "SLES11" && (! ereg(pattern:"^4|3$", string:sp))) audit(AUDIT_OS_NOT, "SLES11 SP4/3", os_ver + " SP" + sp);
if (os_ver == "SLED11" && (! ereg(pattern:"^4|3$", string:sp))) audit(AUDIT_OS_NOT, "SLED11 SP4/3", os_ver + " SP" + sp);
rpm_fixed = ereg_replace(string:rpm_list, pattern:"_CKBI_1\.98-", replace:"-");
flag = 0;
if (rpm_check(release:"SLES11", sp:"4", cpu:"x86_64", reference:"libfreebl3-32bit-3.19.2-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLES11", sp:"4", cpu:"x86_64", reference:"libsoftokn3-32bit-3.19.2-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLES11", sp:"4", cpu:"x86_64", reference:"mozilla-nspr-32bit-4.10.8-0.5.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLES11", sp:"4", cpu:"x86_64", reference:"mozilla-nss-32bit-3.19.2-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLES11", sp:"4", cpu:"s390x", reference:"libfreebl3-32bit-3.19.2-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLES11", sp:"4", cpu:"s390x", reference:"libsoftokn3-32bit-3.19.2-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLES11", sp:"4", cpu:"s390x", reference:"mozilla-nspr-32bit-4.10.8-0.5.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLES11", sp:"4", cpu:"s390x", reference:"mozilla-nss-32bit-3.19.2-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLES11", sp:"4", reference:"MozillaFirefox-31.8.0esr-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLES11", sp:"4", reference:"MozillaFirefox-debuginfo-31.8.0esr-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLES11", sp:"4", reference:"MozillaFirefox-debugsource-31.8.0esr-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLES11", sp:"4", reference:"MozillaFirefox-devel-31.8.0esr-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLES11", sp:"4", reference:"MozillaFirefox-translations-31.8.0esr-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLES11", sp:"4", reference:"libfreebl3-3.19.2-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLES11", sp:"4", reference:"libsoftokn3-3.19.2-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLES11", sp:"4", reference:"mozilla-nspr-4.10.8-0.5.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLES11", sp:"4", reference:"mozilla-nspr-debuginfo-4.10.8-0.5.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLES11", sp:"4", reference:"mozilla-nspr-debugsource-4.10.8-0.5.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLES11", sp:"4", reference:"mozilla-nspr-devel-4.10.8-0.5.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLES11", sp:"4", reference:"mozilla-nss-3.19.2-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLES11", sp:"4", reference:"mozilla-nss-debuginfo-3.19.2-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLES11", sp:"4", reference:"mozilla-nss-debugsource-3.19.2-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLES11", sp:"4", reference:"mozilla-nss-devel-3.19.2-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLES11", sp:"4", reference:"mozilla-nss-tools-3.19.2-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLES11", sp:"3", cpu:"x86_64", reference:"libfreebl3-32bit-3.19.2-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLES11", sp:"3", cpu:"x86_64", reference:"libsoftokn3-32bit-3.19.2-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLES11", sp:"3", cpu:"x86_64", reference:"mozilla-nspr-32bit-4.10.8-0.5.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLES11", sp:"3", cpu:"x86_64", reference:"mozilla-nss-32bit-3.19.2-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLES11", sp:"3", cpu:"s390x", reference:"libfreebl3-32bit-3.19.2-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLES11", sp:"3", cpu:"s390x", reference:"libsoftokn3-32bit-3.19.2-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLES11", sp:"3", cpu:"s390x", reference:"mozilla-nspr-32bit-4.10.8-0.5.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLES11", sp:"3", cpu:"s390x", reference:"mozilla-nss-32bit-3.19.2-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLES11", sp:"3", reference:"MozillaFirefox-31.8.0esr-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLES11", sp:"3", reference:"MozillaFirefox-debuginfo-31.8.0esr-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLES11", sp:"3", reference:"MozillaFirefox-debugsource-31.8.0esr-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLES11", sp:"3", reference:"MozillaFirefox-devel-31.8.0esr-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLES11", sp:"3", reference:"MozillaFirefox-translations-31.8.0esr-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLES11", sp:"3", reference:"libfreebl3-3.19.2-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLES11", sp:"3", reference:"libsoftokn3-3.19.2-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLES11", sp:"3", reference:"mozilla-nspr-4.10.8-0.5.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLES11", sp:"3", reference:"mozilla-nspr-debuginfo-4.10.8-0.5.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLES11", sp:"3", reference:"mozilla-nspr-debugsource-4.10.8-0.5.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLES11", sp:"3", reference:"mozilla-nspr-devel-4.10.8-0.5.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLES11", sp:"3", reference:"mozilla-nss-3.19.2-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLES11", sp:"3", reference:"mozilla-nss-debuginfo-3.19.2-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLES11", sp:"3", reference:"mozilla-nss-debugsource-3.19.2-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLES11", sp:"3", reference:"mozilla-nss-devel-3.19.2-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLES11", sp:"3", reference:"mozilla-nss-tools-3.19.2-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLED11", sp:"4", cpu:"x86_64", reference:"MozillaFirefox-31.8.0esr-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLED11", sp:"4", cpu:"x86_64", reference:"MozillaFirefox-translations-31.8.0esr-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLED11", sp:"4", cpu:"x86_64", reference:"libfreebl3-3.19.2-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLED11", sp:"4", cpu:"x86_64", reference:"libsoftokn3-3.19.2-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLED11", sp:"4", cpu:"x86_64", reference:"mozilla-nspr-4.10.8-0.5.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLED11", sp:"4", cpu:"x86_64", reference:"mozilla-nss-3.19.2-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLED11", sp:"4", cpu:"x86_64", reference:"mozilla-nss-tools-3.19.2-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLED11", sp:"4", cpu:"x86_64", reference:"libfreebl3-32bit-3.19.2-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLED11", sp:"4", cpu:"x86_64", reference:"libsoftokn3-32bit-3.19.2-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLED11", sp:"4", cpu:"x86_64", reference:"mozilla-nspr-32bit-4.10.8-0.5.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLED11", sp:"4", cpu:"x86_64", reference:"mozilla-nss-32bit-3.19.2-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLED11", sp:"4", cpu:"i586", reference:"MozillaFirefox-31.8.0esr-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLED11", sp:"4", cpu:"i586", reference:"MozillaFirefox-translations-31.8.0esr-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLED11", sp:"4", cpu:"i586", reference:"libfreebl3-3.19.2-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLED11", sp:"4", cpu:"i586", reference:"libsoftokn3-3.19.2-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLED11", sp:"4", cpu:"i586", reference:"mozilla-nspr-4.10.8-0.5.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLED11", sp:"4", cpu:"i586", reference:"mozilla-nss-3.19.2-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLED11", sp:"4", cpu:"i586", reference:"mozilla-nss-tools-3.19.2-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLED11", sp:"4", reference:"MozillaFirefox-debuginfo-31.8.0esr-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLED11", sp:"4", reference:"MozillaFirefox-debugsource-31.8.0esr-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLED11", sp:"4", reference:"MozillaFirefox-devel-31.8.0esr-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLED11", sp:"4", reference:"mozilla-nspr-debuginfo-4.10.8-0.5.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLED11", sp:"4", reference:"mozilla-nspr-debugsource-4.10.8-0.5.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLED11", sp:"4", reference:"mozilla-nspr-devel-4.10.8-0.5.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLED11", sp:"4", reference:"mozilla-nss-debuginfo-3.19.2-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLED11", sp:"4", reference:"mozilla-nss-debugsource-3.19.2-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLED11", sp:"4", reference:"mozilla-nss-devel-3.19.2-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLED11", sp:"3", cpu:"x86_64", reference:"MozillaFirefox-31.8.0esr-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLED11", sp:"3", cpu:"x86_64", reference:"MozillaFirefox-translations-31.8.0esr-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLED11", sp:"3", cpu:"x86_64", reference:"libfreebl3-3.19.2-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLED11", sp:"3", cpu:"x86_64", reference:"libsoftokn3-3.19.2-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLED11", sp:"3", cpu:"x86_64", reference:"mozilla-nspr-4.10.8-0.5.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLED11", sp:"3", cpu:"x86_64", reference:"mozilla-nss-3.19.2-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLED11", sp:"3", cpu:"x86_64", reference:"mozilla-nss-tools-3.19.2-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLED11", sp:"3", cpu:"x86_64", reference:"libfreebl3-32bit-3.19.2-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLED11", sp:"3", cpu:"x86_64", reference:"libsoftokn3-32bit-3.19.2-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLED11", sp:"3", cpu:"x86_64", reference:"mozilla-nspr-32bit-4.10.8-0.5.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLED11", sp:"3", cpu:"x86_64", reference:"mozilla-nss-32bit-3.19.2-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLED11", sp:"3", cpu:"i586", reference:"MozillaFirefox-31.8.0esr-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLED11", sp:"3", cpu:"i586", reference:"MozillaFirefox-translations-31.8.0esr-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLED11", sp:"3", cpu:"i586", reference:"libfreebl3-3.19.2-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLED11", sp:"3", cpu:"i586", reference:"libsoftokn3-3.19.2-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLED11", sp:"3", cpu:"i586", reference:"mozilla-nspr-4.10.8-0.5.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLED11", sp:"3", cpu:"i586", reference:"mozilla-nss-3.19.2-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLED11", sp:"3", cpu:"i586", reference:"mozilla-nss-tools-3.19.2-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLED11", sp:"3", reference:"MozillaFirefox-debuginfo-31.8.0esr-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLED11", sp:"3", reference:"MozillaFirefox-debugsource-31.8.0esr-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLED11", sp:"3", reference:"MozillaFirefox-devel-31.8.0esr-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLED11", sp:"3", reference:"mozilla-nspr-debuginfo-4.10.8-0.5.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLED11", sp:"3", reference:"mozilla-nspr-debugsource-4.10.8-0.5.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLED11", sp:"3", reference:"mozilla-nspr-devel-4.10.8-0.5.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLED11", sp:"3", reference:"mozilla-nss-debuginfo-3.19.2-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLED11", sp:"3", reference:"mozilla-nss-debugsource-3.19.2-0.10.1", rpm_list:rpm_fixed)) flag++;
if (rpm_check(release:"SLED11", sp:"3", reference:"mozilla-nss-devel-3.19.2-0.10.1", rpm_list:rpm_fixed)) flag++;
if (flag)
{
if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
else security_hole(0);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "MozillaFirefox / mozilla-nspr / mozilla-nss");
}
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2722
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2725
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2726
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2730
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2733
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
www.nessus.org/u?8363396b
bugzilla.suse.com/908275
bugzilla.suse.com/935033
bugzilla.suse.com/935979
www.suse.com/security/cve/CVE-2015-2721.html
www.suse.com/security/cve/CVE-2015-2722.html
www.suse.com/security/cve/CVE-2015-2724.html
www.suse.com/security/cve/CVE-2015-2725.html
www.suse.com/security/cve/CVE-2015-2726.html
www.suse.com/security/cve/CVE-2015-2728.html
www.suse.com/security/cve/CVE-2015-2730.html
www.suse.com/security/cve/CVE-2015-2733.html
www.suse.com/security/cve/CVE-2015-2734.html
www.suse.com/security/cve/CVE-2015-2735.html
www.suse.com/security/cve/CVE-2015-2736.html
www.suse.com/security/cve/CVE-2015-2737.html
www.suse.com/security/cve/CVE-2015-2738.html
www.suse.com/security/cve/CVE-2015-2739.html
www.suse.com/security/cve/CVE-2015-2740.html
www.suse.com/security/cve/CVE-2015-2743.html
www.suse.com/security/cve/CVE-2015-4000.html
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
EPSS
Percentile
99.9%