CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
Low
EPSS
Percentile
93.7%
The remote host is missing an update for the
# Copyright (C) 2014 Greenbone Networks GmbH
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-or-later
#
# This program is free software; you can redistribute it and/or
# modify it under the terms of the GNU General Public License
# as published by the Free Software Foundation; either version 2
# of the License, or (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.850569");
script_version("2023-11-02T05:05:26+0000");
script_tag(name:"last_modification", value:"2023-11-02 05:05:26 +0000 (Thu, 02 Nov 2023)");
script_tag(name:"creation_date", value:"2014-02-11 10:41:15 +0530 (Tue, 11 Feb 2014)");
script_cve_id("CVE-2014-1477", "CVE-2014-1478", "CVE-2014-1479", "CVE-2014-1480",
"CVE-2014-1482", "CVE-2014-1483", "CVE-2014-1484", "CVE-2014-1485",
"CVE-2014-1486", "CVE-2014-1487", "CVE-2014-1489", "CVE-2014-1488",
"CVE-2014-1490", "CVE-2014-1491", "CVE-2014-1481", "CVE-2013-1740");
script_tag(name:"cvss_base", value:"10.0");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
script_tag(name:"severity_origin", value:"NVD");
script_tag(name:"severity_date", value:"2020-08-21 18:37:00 +0000 (Fri, 21 Aug 2020)");
script_name("openSUSE: Security Advisory for Mozilla (openSUSE-SU-2014:0212-1)");
script_tag(name:"affected", value:"Mozilla on openSUSE 13.1, openSUSE 12.3");
script_tag(name:"insight", value:"Mozilla Firefox was updated to version 27. Mozilla
Seamonkey was updated to 2.24, fixing similar issues as
Firefox 27. Mozilla Thunderbird was updated to 24.3.0,
fixing similar issues as Firefox 27.
The Firefox 27 release brings TLS 1.2 support as a major
security feature.
It also fixes following security issues:
* MFSA 2014-01/CVE-2014-1477/CVE-2014-1478 Miscellaneous
memory safety hazards (rv:27.0 / rv:24.3)
* MFSA 2014-02/CVE-2014-1479 (bmo#911864) Clone protected
content with XBL scopes
* MFSA 2014-03/CVE-2014-1480 (bmo#916726) UI selection
timeout missing on download prompts
* MFSA 2014-04/CVE-2014-1482 (bmo#943803) Incorrect use
of discarded images by RasterImage
* MFSA 2014-05/CVE-2014-1483 (bmo#950427) Information
disclosure with *FromPoint on iframes
* MFSA 2014-06/CVE-2014-1484 (bmo#953993) Profile path
leaks to Android system log
* MFSA 2014-07/CVE-2014-1485 (bmo#910139) XSLT
stylesheets treated as styles in Content Security Policy
* MFSA 2014-08/CVE-2014-1486 (bmo#942164) Use-after-free
with imgRequestProxy and image processing
* MFSA 2014-09/CVE-2014-1487 (bmo#947592) Cross-origin
information leak through web workers
* MFSA 2014-10/CVE-2014-1489 (bmo#959531) Firefox default
start page UI content invocable by script
* MFSA 2014-11/CVE-2014-1488 (bmo#950604) Crash when
using web workers with asm.js
* MFSA 2014-12/CVE-2014-1490/CVE-2014-1491 (bmo#934545,
bmo#930874, bmo#930857) NSS ticket handling issues
* MFSA 2014-13/CVE-2014-1481(bmo#936056) Inconsistent
JavaScript handling of access to Window objects
Mozilla NSS was updated to 3.15.4:
* required for Firefox 27
* regular CA root store update (1.96)
* Reordered the cipher suites offered in SSL/TLS client
hello messages to match modern best practices.
* Improved SSL/TLS false start. In addition to enabling
the SSL_ENABLE_FALSE_START option, an application must
now register a callback using the
SSL_SetCanFalseStartCallback function.
* When false start is enabled, libssl will sometimes
return unencrypted, unauthenticated data from PR_Recv
(CVE-2013-1740, bmo#919877)
* MFSA 2014-12/CVE-2014-1490/CVE-2014-1491 NSS ticket
handling issues New functionality
* Implemented OCSP querying using the HTTP GET method,
which is the new default, and will fall back to the
HTTP POST method.
* Implemented OCSP server functionality for testing
purposes (httpserv utility).
* Support SHA-1 signatures with TLS 1.2 client
authentication.
* Added the --empty-password command-line option to
certutil, to be used with -N: use an empty password
when creating a new database.
* Added the -w command-line option to pp: don't wrap long
output lines.");
script_tag(name:"solution", value:"Please install the updated package(s).");
script_tag(name:"vuldetect", value:"Checks if a vulnerable package version is present on the target host.");
script_tag(name:"qod_type", value:"package");
script_tag(name:"solution_type", value:"VendorFix");
script_xref(name:"openSUSE-SU", value:"2014:0212-1");
script_tag(name:"summary", value:"The remote host is missing an update for the 'Mozilla'
package(s) announced via the referenced advisory.");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2014 Greenbone Networks GmbH");
script_family("SuSE Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/suse", "ssh/login/rpms", re:"ssh/login/release=(openSUSE12\.3|openSUSE13\.1)");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-rpm.inc");
release = rpm_get_ssh_release();
if(!release)
exit(0);
res = "";
report = "";
if(release == "openSUSE12.3") {
if(!isnull(res = isrpmvuln(pkg:"MozillaFirefox", rpm:"MozillaFirefox~27.0~1.47.2", rls:"openSUSE12.3"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"MozillaFirefox-branding-upstream", rpm:"MozillaFirefox-branding-upstream~27.0~1.47.2", rls:"openSUSE12.3"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"MozillaFirefox-buildsymbols", rpm:"MozillaFirefox-buildsymbols~27.0~1.47.2", rls:"openSUSE12.3"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"MozillaFirefox-debuginfo", rpm:"MozillaFirefox-debuginfo~27.0~1.47.2", rls:"openSUSE12.3"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"MozillaFirefox-debugsource", rpm:"MozillaFirefox-debugsource~27.0~1.47.2", rls:"openSUSE12.3"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"MozillaFirefox-devel", rpm:"MozillaFirefox-devel~27.0~1.47.2", rls:"openSUSE12.3"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"MozillaFirefox-translations-common", rpm:"MozillaFirefox-translations-common~27.0~1.47.2", rls:"openSUSE12.3"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"MozillaFirefox-translations-other", rpm:"MozillaFirefox-translations-other~27.0~1.47.2", rls:"openSUSE12.3"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"MozillaThunderbird", rpm:"MozillaThunderbird~24.3.0~61.39.2", rls:"openSUSE12.3"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"MozillaThunderbird-buildsymbols", rpm:"MozillaThunderbird-buildsymbols~24.3.0~61.39.2", rls:"openSUSE12.3"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"MozillaThunderbird-debuginfo", rpm:"MozillaThunderbird-debuginfo~24.3.0~61.39.2", rls:"openSUSE12.3"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"MozillaThunderbird-debugsource", rpm:"MozillaThunderbird-debugsource~24.3.0~61.39.2", rls:"openSUSE12.3"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"MozillaThunderbird-devel", rpm:"MozillaThunderbird-devel~24.3.0~61.39.2", rls:"openSUSE12.3"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"MozillaThunderbird-translations-common", rpm:"MozillaThunderbird-translations-common~24.3.0~61.39.2", rls:"openSUSE12.3"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"MozillaThunderbird-translations-other", rpm:"MozillaThunderbird-translations-other~24.3.0~61.39.2", rls:"openSUSE12.3"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"enigmail", rpm:"enigmail~1.6.0+24.3.0~61.39.2", rls:"openSUSE12.3"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"enigmail-debuginfo", rpm:"enigmail-debuginfo~1.6.0+24.3.0~61.39.2", rls:"openSUSE12.3"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"libfreebl3", rpm:"libfreebl3~3.15.4~1.28.1", rls:"openSUSE12.3"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"libfreebl3-debuginfo", rpm:"libfreebl3-debuginfo~3.15.4~1.28.1", rls:"openSUSE12.3"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"libsoftokn3", rpm:"libsoftokn3~3.15.4~1.28.1", rls:"openSUSE12.3"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"libsoftokn3-debuginfo", rpm:"libsoftokn3-debuginfo~3.15.4~1.28.1", rls:"openSUSE12.3"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"mozilla-nss", rpm:"mozilla-nss~3.15.4~1.28.1", rls:"openSUSE12.3"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"mozilla-nss-certs", rpm:"mozilla-nss-certs~3.15.4~1.28.1", rls:"openSUSE12.3"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"mozilla-nss-certs-debuginfo", rpm:"mozilla-nss-certs-debuginfo~3.15.4~1.28.1", rls:"openSUSE12.3"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"mozilla-nss-debuginfo", rpm:"mozilla-nss-debuginfo~3.15.4~1.28.1", rls:"openSUSE12.3"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"mozilla-nss-debugsource", rpm:"mozilla-nss-debugsource~3.15.4~1.28.1", rls:"openSUSE12.3"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"mozilla-nss-devel", rpm:"mozilla-nss-devel~3.15.4~1.28.1", rls:"openSUSE12.3"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"mozilla-nss-sysinit", rpm:"mozilla-nss-sysinit~3.15.4~1.28.1", rls:"openSUSE12.3"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"mozilla-nss-sysinit-debuginfo", rpm:"mozilla-nss-sysinit-debuginfo~3.15.4~1.28.1", rls:"openSUSE12.3"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"mozilla-nss-tools", rpm:"mozilla-nss-tools~3.15.4~1.28.1", rls:"openSUSE12.3"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"mozilla-nss-tools-debuginfo", rpm:"mozilla-nss-tools-debuginfo~3.15.4~1.28.1", rls:"openSUSE12.3"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"seamonkey", rpm:"seamonkey~2.24~1.33.2", rls:"openSUSE12.3"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"seamonkey-debuginfo", rpm:"seamonkey-debuginfo~2.24~1.33.2", rls:"openSUSE12.3"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"seamonkey-debugsource", rpm:"seamonkey-debugsource~2.24~1.33.2", rls:"openSUSE12.3"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"seamonkey-dom-inspector", rpm:"seamonkey-dom-inspector~2.24~1.33.2", rls:"openSUSE12.3"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"seamonkey-irc", rpm:"seamonkey-irc~2.24~1.33.2", rls:"openSUSE12.3"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"seamonkey-translations-common", rpm:"seamonkey-translations-common~2.24~1.33.2", rls:"openSUSE12.3"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"seamonkey-translations-other", rpm:"seamonkey-translations-other~2.24~1.33.2", rls:"openSUSE12.3"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"seamonkey-venkman", rpm:"seamonkey-venkman~2.24~1.33.2", rls:"openSUSE12.3"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"libfreebl3-32bit", rpm:"libfreebl3-32bit~3.15.4~1.28.1", rls:"openSUSE12.3"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"libfreebl3-debuginfo-32bit", rpm:"libfreebl3-debuginfo-32bit~3.15.4~1.28.1", rls:"openSUSE12.3"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"libsoftokn3-32bit", rpm:"libsoftokn3-32bit~3.15.4~1.28.1", rls:"openSUSE12.3"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"libsoftokn3-debuginfo-32bit", rpm:"libsoftokn3-debuginfo-32bit~3.15.4~1.28.1", rls:"openSUSE12.3"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"mozilla-nss-32bit", rpm:"mozilla-nss-32bit~3.15.4~1.28.1", rls:"openSUSE12.3"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"mozilla-nss-certs-32bit", rpm:"mozilla-nss-certs-32bit~3.15.4~1.28.1", rls:"openSUSE12.3"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"mozilla-nss-certs-debuginfo-32bit", rpm:"mozilla-nss-certs-debuginfo-32bit~3.15.4~1.28.1", rls:"openSUSE12.3"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"mozilla-nss-debuginfo-32bit", rpm:"mozilla-nss-debuginfo-32bit~3.15.4~1.28.1", rls:"openSUSE12.3"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"mozilla-nss-sysinit-32bit", rpm:"mozilla-nss-sysinit-32bit~3.15.4~1.28.1", rls:"openSUSE12.3"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"mozilla-nss-sysinit-debuginfo-32bit", rpm:"mozilla-nss-sysinit-debuginfo-32bit~3.15.4~1.28.1", rls:"openSUSE12.3"))) {
report += res;
}
if(report != "") {
security_message(data:report);
} else if(__pkg_match) {
exit(99);
}
exit(0);
}
if(release == "openSUSE13.1") {
if(!isnull(res = isrpmvuln(pkg:"MozillaFirefox", rpm:"MozillaFirefox~27.0~8.1", rls:"openSUSE13.1"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"MozillaFirefox-branding-upstream", rpm:"MozillaFirefox-branding-upstream~27.0~8.1", rls:"openSUSE13.1"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"MozillaFirefox-buildsymbols", rpm:"MozillaFirefox-buildsymbols~27.0~8.1", rls:"openSUSE13.1"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"MozillaFirefox-debuginfo", rpm:"MozillaFirefox-debuginfo~27.0~8.1", rls:"openSUSE13.1"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"MozillaFirefox-debugsource", rpm:"MozillaFirefox-debugsource~27.0~8.1", rls:"openSUSE13.1"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"MozillaFirefox-devel", rpm:"MozillaFirefox-devel~27.0~8.1", rls:"openSUSE13.1"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"MozillaFirefox-translations-common", rpm:"MozillaFirefox-translations-common~27.0~8.1", rls:"openSUSE13.1"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"MozillaFirefox-translations-other", rpm:"MozillaFirefox-translations-other~27.0~8.1", rls:"openSUSE13.1"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"MozillaThunderbird", rpm:"MozillaThunderbird~24.3.0~70.11.1", rls:"openSUSE13.1"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"MozillaThunderbird-buildsymbols", rpm:"MozillaThunderbird-buildsymbols~24.3.0~70.11.1", rls:"openSUSE13.1"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"MozillaThunderbird-debuginfo", rpm:"MozillaThunderbird-debuginfo~24.3.0~70.11.1", rls:"openSUSE13.1"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"MozillaThunderbird-debugsource", rpm:"MozillaThunderbird-debugsource~24.3.0~70.11.1", rls:"openSUSE13.1"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"MozillaThunderbird-devel", rpm:"MozillaThunderbird-devel~24.3.0~70.11.1", rls:"openSUSE13.1"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"MozillaThunderbird-translations-common", rpm:"MozillaThunderbird-translations-common~24.3.0~70.11.1", rls:"openSUSE13.1"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"MozillaThunderbird-translations-other", rpm:"MozillaThunderbird-translations-other~24.3.0~70.11.1", rls:"openSUSE13.1"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"enigmail", rpm:"enigmail~1.6.0+24.3.0~70.11.1", rls:"openSUSE13.1"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"enigmail-debuginfo", rpm:"enigmail-debuginfo~1.6.0+24.3.0~70.11.1", rls:"openSUSE13.1"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"libfreebl3", rpm:"libfreebl3~3.15.4~12.1", rls:"openSUSE13.1"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"libfreebl3-debuginfo", rpm:"libfreebl3-debuginfo~3.15.4~12.1", rls:"openSUSE13.1"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"libsoftokn3", rpm:"libsoftokn3~3.15.4~12.1", rls:"openSUSE13.1"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"libsoftokn3-debuginfo", rpm:"libsoftokn3-debuginfo~3.15.4~12.1", rls:"openSUSE13.1"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"mozilla-nss", rpm:"mozilla-nss~3.15.4~12.1", rls:"openSUSE13.1"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"mozilla-nss-certs", rpm:"mozilla-nss-certs~3.15.4~12.1", rls:"openSUSE13.1"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"mozilla-nss-certs-debuginfo", rpm:"mozilla-nss-certs-debuginfo~3.15.4~12.1", rls:"openSUSE13.1"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"mozilla-nss-debuginfo", rpm:"mozilla-nss-debuginfo~3.15.4~12.1", rls:"openSUSE13.1"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"mozilla-nss-debugsource", rpm:"mozilla-nss-debugsource~3.15.4~12.1", rls:"openSUSE13.1"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"mozilla-nss-devel", rpm:"mozilla-nss-devel~3.15.4~12.1", rls:"openSUSE13.1"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"mozilla-nss-sysinit", rpm:"mozilla-nss-sysinit~3.15.4~12.1", rls:"openSUSE13.1"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"mozilla-nss-sysinit-debuginfo", rpm:"mozilla-nss-sysinit-debuginfo~3.15.4~12.1", rls:"openSUSE13.1"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"mozilla-nss-tools", rpm:"mozilla-nss-tools~3.15.4~12.1", rls:"openSUSE13.1"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"mozilla-nss-tools-debuginfo", rpm:"mozilla-nss-tools-debuginfo~3.15.4~12.1", rls:"openSUSE13.1"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"seamonkey", rpm:"seamonkey~2.24~8.1", rls:"openSUSE13.1"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"seamonkey-debuginfo", rpm:"seamonkey-debuginfo~2.24~8.1", rls:"openSUSE13.1"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"seamonkey-debugsource", rpm:"seamonkey-debugsource~2.24~8.1", rls:"openSUSE13.1"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"seamonkey-dom-inspector", rpm:"seamonkey-dom-inspector~2.24~8.1", rls:"openSUSE13.1"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"seamonkey-irc", rpm:"seamonkey-irc~2.24~8.1", rls:"openSUSE13.1"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"seamonkey-translations-common", rpm:"seamonkey-translations-common~2.24~8.1", rls:"openSUSE13.1"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"seamonkey-translations-other", rpm:"seamonkey-translations-other~2.24~8.1", rls:"openSUSE13.1"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"seamonkey-venkman", rpm:"seamonkey-venkman~2.24~8.1", rls:"openSUSE13.1"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"libfreebl3-32bit", rpm:"libfreebl3-32bit~3.15.4~12.1", rls:"openSUSE13.1"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"libfreebl3-debuginfo-32bit", rpm:"libfreebl3-debuginfo-32bit~3.15.4~12.1", rls:"openSUSE13.1"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"libsoftokn3-32bit", rpm:"libsoftokn3-32bit~3.15.4~12.1", rls:"openSUSE13.1"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"libsoftokn3-debuginfo-32bit", rpm:"libsoftokn3-debuginfo-32bit~3.15.4~12.1", rls:"openSUSE13.1"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"mozilla-nss-32bit", rpm:"mozilla-nss-32bit~3.15.4~12.1", rls:"openSUSE13.1"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"mozilla-nss-certs-32bit", rpm:"mozilla-nss-certs-32bit~3.15.4~12.1", rls:"openSUSE13.1"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"mozilla-nss-certs-debuginfo-32bit", rpm:"mozilla-nss-certs-debuginfo-32bit~3.15.4~12.1", rls:"openSUSE13.1"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"mozilla-nss-debuginfo-32bit", rpm:"mozilla-nss-debuginfo-32bit~3.15.4~12.1", rls:"openSUSE13.1"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"mozilla-nss-sysinit-32bit", rpm:"mozilla-nss-sysinit-32bit~3.15.4~12.1", rls:"openSUSE13.1"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"mozilla-nss-sysinit-debuginfo-32bit", rpm:"mozilla-nss-sysinit-debuginfo-32bit~3.15.4~12.1", rls:"openSUSE13.1"))) {
report += res;
}
if(report != "") {
security_message(data:report);
} else if(__pkg_match) {
exit(99);
}
exit(0);
}
exit(0);
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
Low
EPSS
Percentile
93.7%