Vulnerabilities > CVE-2005-2871 - Unspecified vulnerability in Mozilla Firefox

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
mozilla
nessus
exploit available

Summary

Buffer overflow in the International Domain Name (IDN) support in Mozilla Firefox 1.0.6 and earlier, and Netscape 8.0.3.3 and 7.2, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a hostname with all "soft" hyphens (character 0xAD), which is not properly handled by the NormalizeIDN call in nsStandardURL::BuildNormalizedSpec.

Exploit-Db

descriptionMozilla Browsers 0xAD (HOST:) Remote Heap Buffer Overrun Exploit (v2). CVE-2005-2871. Remote exploit for windows platform
idEDB-ID:1224
last seen2016-01-31
modified2005-09-22
published2005-09-22
reporterSkylined
sourcehttps://www.exploit-db.com/download/1224/
titleMozilla Browsers 0xAD HOST: Remote Heap Buffer Overrun Exploit 2

Nessus

  • NASL familyMandriva Local Security Checks
    NASL idMANDRAKE_MDKSA-2005-169.NASL
    descriptionA number of vulnerabilities have been discovered in Mozilla Firefox that have been corrected in version 1.0.7: A bug in the way Firefox processes XBM images could be used to execute arbitrary code via a specially crafted XBM image file (CVE-2005-2701). A bug in the way Firefox handles certain Unicode sequences could be used to execute arbitrary code via viewing a specially crafted Unicode sequence (CVE-2005-2702). A bug in the way Firefox makes XMLHttp requests could be abused by a malicious web page to exploit other proxy or server flaws from the victim's machine; however, the default behaviour of the browser is to disallow this (CVE-2005-2703). A bug in the way Firefox implemented its XBL interface could be abused by a malicious web page to create an XBL binding in such a way as to allow arbitrary JavaScript execution with chrome permissions (CVE-2005-2704). An integer overflow in Firefox's JavaScript engine could be manipulated in certain conditions to allow a malicious web page to execute arbitrary code (CVE-2005-2705). A bug in the way Firefox displays about: pages could be used to execute JavaScript with chrome privileges (CVE-2005-2706). A bug in the way Firefox opens new windows could be used by a malicious web page to construct a new window without any user interface elements (such as address bar and status bar) that could be used to potentially mislead the user (CVE-2005-2707). A bug in the way Firefox proceesed URLs on the command line could be used to execute arbitary commands as the user running Firefox; this could be abused by clicking on a supplied link, such as from an instant messaging client (CVE-2005-2968). Tom Ferris reported that Firefox would crash when processing a domain name consisting solely of soft-hyphen characters due to a heap overflow when IDN processing results in an empty string after removing non- wrapping chracters, such as soft-hyphens. This could be exploited to run or or install malware on the user's computer (CVE-2005-2871). The updated packages have been patched to address these issues and all users are urged to upgrade immediately.
    last seen2017-10-29
    modified2012-09-07
    plugin id20425
    published2006-01-15
    reporterTenable
    sourcehttps://www.tenable.com/plugins/index.php?view=single&id=20425
    titleMDKSA-2005:169 : mozilla-firefox
    code
    #%NASL_MIN_LEVEL 999999
    
    # @DEPRECATED@
    #
    # This script has been deprecated as the associated update is not
    # for a supported release of Mandrake / Mandriva Linux.
    #
    # Disabled on 2012/09/06.
    #
    
    #
    # (C) Tenable Network Security, Inc.
    #
    # This script was automatically generated from
    # Mandrake Linux Security Advisory MDKSA-2005:169.
    #
    
    if (!defined_func("bn_random")) exit(0);
    
    include("compat.inc");
    
    if (description)
    {
      script_id(20425);
      script_version ("1.12");
      script_cvs_date("Date: 2018/07/20  0:18:52");
    
      script_cve_id("CVE-2005-2701", "CVE-2005-2702", "CVE-2005-2703", "CVE-2005-2704", "CVE-2005-2705", "CVE-2005-2706", "CVE-2005-2707", "CVE-2005-2871", "CVE-2005-2968");
    
      script_name(english:"MDKSA-2005:169 : mozilla-firefox");
      script_summary(english:"Checks for patch(es) in 'rpm -qa' output");
    
      script_set_attribute(attribute:"synopsis", value: 
    "The remote Mandrake host is missing one or more security-related
    patches.");
      script_set_attribute(attribute:"description", value:
    "A number of vulnerabilities have been discovered in Mozilla Firefox
    that have been corrected in version 1.0.7:
    
    A bug in the way Firefox processes XBM images could be used to
    execute arbitrary code via a specially crafted XBM image file
    (CVE-2005-2701).
    
    A bug in the way Firefox handles certain Unicode sequences could be
    used to execute arbitrary code via viewing a specially crafted
    Unicode sequence (CVE-2005-2702).
    
    A bug in the way Firefox makes XMLHttp requests could be abused by a
    malicious web page to exploit other proxy or server flaws from the
    victim's machine; however, the default behaviour of the browser is to
    disallow this (CVE-2005-2703).
    
    A bug in the way Firefox implemented its XBL interface could be
    abused by a malicious web page to create an XBL binding in such a way
    as to allow arbitrary JavaScript execution with chrome permissions
    (CVE-2005-2704).
    
    An integer overflow in Firefox's JavaScript engine could be
    manipulated in certain conditions to allow a malicious web page to
    execute arbitrary code (CVE-2005-2705).
    
    A bug in the way Firefox displays about: pages could be used to
    execute JavaScript with chrome privileges (CVE-2005-2706).
    
    A bug in the way Firefox opens new windows could be used by a
    malicious web page to construct a new window without any user
    interface elements (such as address bar and status bar) that could be
    used to potentially mislead the user (CVE-2005-2707).
    
    A bug in the way Firefox proceesed URLs on the command line could be
    used to execute arbitary commands as the user running Firefox; this
    could be abused by clicking on a supplied link, such as from an
    instant messaging client (CVE-2005-2968).
    
    Tom Ferris reported that Firefox would crash when processing a domain
    name consisting solely of soft-hyphen characters due to a heap
    overflow when IDN processing results in an empty string after
    removing non- wrapping chracters, such as soft-hyphens. This could be
    exploited to run or or install malware on the user's computer
    (CVE-2005-2871).
    
    The updated packages have been patched to address these issues and
    all users are urged to upgrade immediately.");
      script_set_attribute(attribute:"see_also", value:"http://www.mandriva.com/security/advisories?name=MDKSA-2005:169");
      script_set_attribute(attribute:"solution", value:"Update the affected package(s).");
     script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
     script_cwe_id(94);
      script_set_attribute(attribute:"patch_publication_date", value:"2005/09/26");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:mandriva:linux");
      script_set_attribute(attribute:"plugin_type", value:"local");
     script_set_attribute(attribute:"plugin_publication_date", value: "2006/01/15");
      script_end_attributes();
     
      script_category(ACT_GATHER_INFO);
      script_family(english:"Mandriva Local Security Checks");
     
      script_copyright(english:"This script is Copyright (C) 2006-2018 Tenable Network Security, Inc.");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/Mandrake/release", "Host/Mandrake/rpm-list");
    
      exit(0);
    }
    
    # Deprecated.
    exit(0, "The associated update is not currently for a supported release of Mandrake / Mandriva Linux.");
    
    
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) exit(0, "Local checks are not enabled.");
    if (!get_kb_item("Host/Mandrake/release")) exit(0, "The host is not running Mandrake Linux.");
    if (!get_kb_item("Host/Mandrake/rpm-list")) exit(1, "Could not get the list of packages.");
    
    flag = 0;
    
    if (rpm_check(reference:"libnspr4-1.0.2-9.1.102mdk", release:"MDK10.2", cpu:"i386", yank:"mdk")) flag++;
    if (rpm_check(reference:"libnspr4-devel-1.0.2-9.1.102mdk", release:"MDK10.2", cpu:"i386", yank:"mdk")) flag++;
    if (rpm_check(reference:"libnss3-1.0.2-9.1.102mdk", release:"MDK10.2", cpu:"i386", yank:"mdk")) flag++;
    if (rpm_check(reference:"libnss3-devel-1.0.2-9.1.102mdk", release:"MDK10.2", cpu:"i386", yank:"mdk")) flag++;
    if (rpm_check(reference:"mozilla-firefox-1.0.2-9.1.102mdk", release:"MDK10.2", cpu:"i386", yank:"mdk")) flag++;
    if (rpm_check(reference:"mozilla-firefox-devel-1.0.2-9.1.102mdk", release:"MDK10.2", cpu:"i386", yank:"mdk")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else 
    {
      if (rpm_exists(rpm:"mozilla-firefox-", release:"MDK10.2"))
      {
        set_kb_item(name:"CVE-2005-2701", value:TRUE);
        set_kb_item(name:"CVE-2005-2702", value:TRUE);
        set_kb_item(name:"CVE-2005-2703", value:TRUE);
        set_kb_item(name:"CVE-2005-2704", value:TRUE);
        set_kb_item(name:"CVE-2005-2705", value:TRUE);
        set_kb_item(name:"CVE-2005-2706", value:TRUE);
        set_kb_item(name:"CVE-2005-2707", value:TRUE);
        set_kb_item(name:"CVE-2005-2871", value:TRUE);
        set_kb_item(name:"CVE-2005-2968", value:TRUE);
      }
    
      exit(0, "The host is not affected.");
    }
    
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2005-873.NASL
    descriptionAn updated mozilla package that fixes a security bug is now available for Fedora Core 4. This update has been rated as having critical security impact by the Fedora Security Response Team. Mozilla is an open source Web browser, advanced email and newsgroup client, IRC chat client, and HTML editor. A bug was found in the way Mozilla processes certain international domain names. An attacker could create a specially crafted HTML file, which when viewed by the victim would cause Mozilla to crash or possibly execute arbitrary code. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-2871 to this issue. Users of Mozilla are advised to upgrade to this updated package that contains a backported patch and is not vulnerable to this issue. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id19735
    published2005-09-17
    reporterThis script is Copyright (C) 2005-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/19735
    titleFedora Core 4 : mozilla-1.7.10-1.5.2 (2005-873)
    code
    #%NASL_MIN_LEVEL 80502
    
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Fedora Security Advisory 2005-873.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(19735);
      script_version ("1.14");
      script_cvs_date("Date: 2019/08/02 13:32:24");
    
      script_cve_id("CVE-2005-2871");
      script_xref(name:"FEDORA", value:"2005-873");
    
      script_name(english:"Fedora Core 4 : mozilla-1.7.10-1.5.2 (2005-873)");
      script_summary(english:"Checks rpm output for the updated packages.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Fedora Core host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "An updated mozilla package that fixes a security bug is now available
    for Fedora Core 4.
    
    This update has been rated as having critical security impact by the
    Fedora Security Response Team.
    
    Mozilla is an open source Web browser, advanced email and newsgroup
    client, IRC chat client, and HTML editor.
    
    A bug was found in the way Mozilla processes certain international
    domain names. An attacker could create a specially crafted HTML file,
    which when viewed by the victim would cause Mozilla to crash or
    possibly execute arbitrary code. The Common Vulnerabilities and
    Exposures project (cve.mitre.org) has assigned the name CVE-2005-2871
    to this issue.
    
    Users of Mozilla are advised to upgrade to this updated package that
    contains a backported patch and is not vulnerable to this issue.
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the Fedora security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues."
      );
      # https://lists.fedoraproject.org/pipermail/announce/2005-September/001358.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?0224aee9"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:mozilla");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:mozilla-chat");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:mozilla-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:mozilla-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:mozilla-dom-inspector");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:mozilla-js-debugger");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:mozilla-mail");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:mozilla-nspr");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:mozilla-nspr-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:mozilla-nss");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:mozilla-nss-devel");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora_core:4");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2005/09/10");
      script_set_attribute(attribute:"plugin_publication_date", value:"2005/09/17");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2005-2019 Tenable Network Security, Inc.");
      script_family(english:"Fedora Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
    os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
    os_ver = os_ver[1];
    if (! ereg(pattern:"^4([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 4.x", "Fedora " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
    
    flag = 0;
    if (rpm_check(release:"FC4", reference:"mozilla-1.7.10-1.5.2")) flag++;
    if (rpm_check(release:"FC4", reference:"mozilla-chat-1.7.10-1.5.2")) flag++;
    if (rpm_check(release:"FC4", reference:"mozilla-debuginfo-1.7.10-1.5.2")) flag++;
    if (rpm_check(release:"FC4", reference:"mozilla-devel-1.7.10-1.5.2")) flag++;
    if (rpm_check(release:"FC4", reference:"mozilla-dom-inspector-1.7.10-1.5.2")) flag++;
    if (rpm_check(release:"FC4", reference:"mozilla-js-debugger-1.7.10-1.5.2")) flag++;
    if (rpm_check(release:"FC4", reference:"mozilla-mail-1.7.10-1.5.2")) flag++;
    if (rpm_check(release:"FC4", reference:"mozilla-nspr-1.7.10-1.5.2")) flag++;
    if (rpm_check(release:"FC4", reference:"mozilla-nspr-devel-1.7.10-1.5.2")) flag++;
    if (rpm_check(release:"FC4", reference:"mozilla-nss-1.7.10-1.5.2")) flag++;
    if (rpm_check(release:"FC4", reference:"mozilla-nss-devel-1.7.10-1.5.2")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "mozilla / mozilla-chat / mozilla-debuginfo / mozilla-devel / etc");
    }
    
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2005-872.NASL
    descriptionAn updated firefox package that fixes as security bug is now available for Fedora Core 3 and Fedora Core 4. This update has been rated as having critical security impact by the Fedora Security Response Team. Mozilla Firefox is an open source Web browser. A bug was found in the way Firefox processes certain international domain names. An attacker could create a specially crafted HTML file, which when viewed by the victim would cause Firefox to crash or possibly execute arbitrary code. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-2871 to this issue. Users of Firefox are advised to upgrade to this updated package that contains a backported patch and is not vulnerable to this issue. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id19734
    published2005-09-17
    reporterThis script is Copyright (C) 2005-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/19734
    titleFedora Core 3 : firefox-1.0.6-1.2.fc3 (2005-872)
    code
    #%NASL_MIN_LEVEL 80502
    
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Fedora Security Advisory 2005-872.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(19734);
      script_version ("1.14");
      script_cvs_date("Date: 2019/08/02 13:32:24");
    
      script_cve_id("CVE-2005-2871");
      script_xref(name:"FEDORA", value:"2005-872");
    
      script_name(english:"Fedora Core 3 : firefox-1.0.6-1.2.fc3 (2005-872)");
      script_summary(english:"Checks rpm output for the updated packages.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Fedora Core host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "An updated firefox package that fixes as security bug is now available
    for Fedora Core 3 and Fedora Core 4.
    
    This update has been rated as having critical security impact by the
    Fedora Security Response Team.
    
    Mozilla Firefox is an open source Web browser.
    
    A bug was found in the way Firefox processes certain international
    domain names. An attacker could create a specially crafted HTML file,
    which when viewed by the victim would cause Firefox to crash or
    possibly execute arbitrary code. The Common Vulnerabilities and
    Exposures project (cve.mitre.org) has assigned the name CVE-2005-2871
    to this issue.
    
    Users of Firefox are advised to upgrade to this updated package that
    contains a backported patch and is not vulnerable to this issue.
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the Fedora security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues."
      );
      # https://lists.fedoraproject.org/pipermail/announce/2005-September/001357.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?0d2a49f4"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected firefox and / or firefox-debuginfo packages."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:firefox");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:firefox-debuginfo");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora_core:3");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2005/09/10");
      script_set_attribute(attribute:"plugin_publication_date", value:"2005/09/17");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2005-2019 Tenable Network Security, Inc.");
      script_family(english:"Fedora Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
    os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
    os_ver = os_ver[1];
    if (! ereg(pattern:"^3([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 3.x", "Fedora " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
    
    flag = 0;
    if (rpm_check(release:"FC3", reference:"firefox-1.0.6-1.2.fc3")) flag++;
    if (rpm_check(release:"FC3", reference:"firefox-debuginfo-1.0.6-1.2.fc3")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "firefox / firefox-debuginfo");
    }
    
  • NASL familyWindows
    NASL idMOZILLA_FIREFOX_106.NASL
    descriptionThe remote host is using Firefox, an alternative web browser. The installed version of Firefox contains various security issues, several of which are critical as they can be easily exploited to execute arbitrary shell code on the remote host.
    last seen2020-06-01
    modified2020-06-02
    plugin id19719
    published2005-09-17
    reporterThis script is Copyright (C) 2005-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/19719
    titleFirefox < 1.0.7 Multiple Vulnerabilities
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    
    
    include("compat.inc");
    
    if (description) {
      script_id(19719);
      script_version("1.31");
    
      script_cve_id(
        "CVE-2005-2602", 
        "CVE-2005-2701", 
        "CVE-2005-2702", 
        "CVE-2005-2703", 
        "CVE-2005-2704",
        "CVE-2005-2705", 
        "CVE-2005-2706", 
        "CVE-2005-2707", 
        "CVE-2005-2871", 
        "CVE-2005-3089"
      );
      script_bugtraq_id(
        14526, 
        14784, 
        14916, 
        14917, 
        14918, 
        14919, 
        14920, 
        14921, 
        14923, 
        14924
      );
    
      script_name(english:"Firefox < 1.0.7 Multiple Vulnerabilities");
    
     script_set_attribute(attribute:"synopsis", value:
    "A web browser on the remote host is prone to multiple flaws, including
    arbitrary code execution." );
     script_set_attribute(attribute:"description", value:
    "The remote host is using Firefox, an alternative web browser. 
    
    The installed version of Firefox contains various security issues,
    several of which are critical as they can be easily exploited to
    execute arbitrary shell code on the remote host." );
     script_set_attribute(attribute:"see_also", value:"https://www.securityfocus.com/archive/1/407704");
     script_set_attribute(attribute:"see_also", value:"http://security-protocols.com/advisory/sp-x17-advisory.txt");
     # http://web.archive.org/web/20100329062735/http://www.mozilla.org/security/idn.html
     script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?11c09cbe");
     script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2005-58/");
     script_set_attribute(attribute:"solution", value:
    "Upgrade to Firefox 1.0.7 or later." );
     script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
     script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
     script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
     script_set_attribute(attribute:"exploit_available", value:"true");
     script_cwe_id(94);
    
     script_set_attribute(attribute:"plugin_publication_date", value: "2005/09/17");
     script_set_attribute(attribute:"vuln_publication_date", value: "2005/08/09");
     script_set_attribute(attribute:"patch_publication_date", value: "2005/09/09");
     script_cvs_date("Date: 2018/11/15 20:50:27");
    script_set_attribute(attribute:"plugin_type", value:"local");
    script_set_attribute(attribute:"cpe", value:"cpe:/a:mozilla:firefox");
    script_end_attributes();
    
      script_summary(english:"Determines the version of Firefox");
      script_category(ACT_GATHER_INFO);
      script_family(english:"Windows");
      script_copyright(english:"This script is Copyright (C) 2005-2018 Tenable Network Security, Inc.");
      script_dependencies("mozilla_org_installed.nasl");
      script_require_keys("Mozilla/Firefox/Version");
      exit(0);
    }
    
    include("mozilla_version.inc");
    port = get_kb_item_or_exit("SMB/transport"); 
    
    installs = get_kb_list("SMB/Mozilla/Firefox/*");
    if (isnull(installs)) audit(AUDIT_NOT_INST, "Firefox");
    
    mozilla_check_version(installs:installs, product:'firefox', esr:FALSE, fix:'1.0.7', severity:SECURITY_HOLE);
  • NASL familyMandriva Local Security Checks
    NASL idMANDRAKE_MDKSA-2005-170.NASL
    descriptionA number of vulnerabilities have been discovered in Mozilla that have been corrected in version 1.7.12 : A bug in the way Mozilla processes XBM images could be used to execute arbitrary code via a specially crafted XBM image file (CVE-2005-2701). A bug in the way Mozilla handles certain Unicode sequences could be used to execute arbitrary code via viewing a specially crafted Unicode sequence (CVE-2005-2702). A bug in the way Mozilla makes XMLHttp requests could be abused by a malicious web page to exploit other proxy or server flaws from the victim
    last seen2020-06-01
    modified2020-06-02
    plugin id19923
    published2005-10-05
    reporterThis script is Copyright (C) 2005-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/19923
    titleMandrake Linux Security Advisory : mozilla (MDKSA-2005:170)
    code
    #%NASL_MIN_LEVEL 80502
    
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Mandrake Linux Security Advisory MDKSA-2005:170. 
    # The text itself is copyright (C) Mandriva S.A.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(19923);
      script_version ("1.17");
      script_cvs_date("Date: 2019/08/02 13:32:48");
    
      script_cve_id("CVE-2005-2701", "CVE-2005-2702", "CVE-2005-2703", "CVE-2005-2704", "CVE-2005-2705", "CVE-2005-2706", "CVE-2005-2707", "CVE-2005-2871");
      script_xref(name:"MDKSA", value:"2005:170");
    
      script_name(english:"Mandrake Linux Security Advisory : mozilla (MDKSA-2005:170)");
      script_summary(english:"Checks rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:
    "The remote Mandrake Linux host is missing one or more security
    updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "A number of vulnerabilities have been discovered in Mozilla that have
    been corrected in version 1.7.12 :
    
    A bug in the way Mozilla processes XBM images could be used to execute
    arbitrary code via a specially crafted XBM image file (CVE-2005-2701).
    
    A bug in the way Mozilla handles certain Unicode sequences could be
    used to execute arbitrary code via viewing a specially crafted Unicode
    sequence (CVE-2005-2702).
    
    A bug in the way Mozilla makes XMLHttp requests could be abused by a
    malicious web page to exploit other proxy or server flaws from the
    victim's machine; however, the default behaviour of the browser is to
    disallow this (CVE-2005-2703).
    
    A bug in the way Mozilla implemented its XBL interface could be abused
    by a malicious web page to create an XBL binding in such a way as to
    allow arbitrary JavaScript execution with chrome permissions
    (CVE-2005-2704).
    
    An integer overflow in Mozilla's JavaScript engine could be
    manipulated in certain conditions to allow a malicious web page to
    execute arbitrary code (CVE-2005-2705).
    
    A bug in the way Mozilla displays about: pages could be used to
    execute JavaScript with chrome privileges (CVE-2005-2706).
    
    A bug in the way Mozilla opens new windows could be used by a
    malicious web page to construct a new window without any user
    interface elements (such as address bar and status bar) that could be
    used to potentially mislead the user (CVE-2005-2707).
    
    Tom Ferris reported that Firefox would crash when processing a domain
    name consisting solely of soft-hyphen characters due to a heap
    overflow when IDN processing results in an empty string after removing
    non- wrapping chracters, such as soft-hyphens. This could be exploited
    to run or or install malware on the user's computer (CVE-2005-2871).
    
    The updated packages have been patched to address these issues and all
    users are urged to upgrade immediately."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.mozilla.org/security/announce/mfsa2005-57.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.mozilla.org/security/announce/mfsa2005-58.html"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
      script_cwe_id(94);
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64nspr4");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64nspr4-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64nss3");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64nss3-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libnspr4");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libnspr4-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libnss3");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libnss3-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:mozilla");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:mozilla-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:mozilla-dom-inspector");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:mozilla-enigmail");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:mozilla-enigmime");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:mozilla-irc");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:mozilla-js-debugger");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:mozilla-mail");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:mozilla-spellchecker");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:mandrakesoft:mandrake_linux:10.1");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2005/09/26");
      script_set_attribute(attribute:"plugin_publication_date", value:"2005/10/05");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2005-2019 Tenable Network Security, Inc.");
      script_family(english:"Mandriva Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/Mandrake/release", "Host/Mandrake/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/Mandrake/release")) audit(AUDIT_OS_NOT, "Mandriva / Mandake Linux");
    if (!get_kb_item("Host/Mandrake/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if (cpu !~ "^(amd64|i[3-6]86|x86_64)$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Mandriva / Mandrake Linux", cpu);
    
    
    flag = 0;
    if (rpm_check(release:"MDK10.1", cpu:"x86_64", reference:"lib64nspr4-1.7.8-0.3.101mdk", yank:"mdk")) flag++;
    if (rpm_check(release:"MDK10.1", cpu:"x86_64", reference:"lib64nspr4-devel-1.7.8-0.3.101mdk", yank:"mdk")) flag++;
    if (rpm_check(release:"MDK10.1", cpu:"x86_64", reference:"lib64nss3-1.7.8-0.3.101mdk", yank:"mdk")) flag++;
    if (rpm_check(release:"MDK10.1", cpu:"x86_64", reference:"lib64nss3-devel-1.7.8-0.3.101mdk", yank:"mdk")) flag++;
    if (rpm_check(release:"MDK10.1", cpu:"i386", reference:"libnspr4-1.7.8-0.3.101mdk", yank:"mdk")) flag++;
    if (rpm_check(release:"MDK10.1", cpu:"i386", reference:"libnspr4-devel-1.7.8-0.3.101mdk", yank:"mdk")) flag++;
    if (rpm_check(release:"MDK10.1", cpu:"i386", reference:"libnss3-1.7.8-0.3.101mdk", yank:"mdk")) flag++;
    if (rpm_check(release:"MDK10.1", cpu:"i386", reference:"libnss3-devel-1.7.8-0.3.101mdk", yank:"mdk")) flag++;
    if (rpm_check(release:"MDK10.1", reference:"mozilla-1.7.8-0.3.101mdk", yank:"mdk")) flag++;
    if (rpm_check(release:"MDK10.1", reference:"mozilla-devel-1.7.8-0.3.101mdk", yank:"mdk")) flag++;
    if (rpm_check(release:"MDK10.1", reference:"mozilla-dom-inspector-1.7.8-0.3.101mdk", yank:"mdk")) flag++;
    if (rpm_check(release:"MDK10.1", reference:"mozilla-enigmail-1.7.8-0.3.101mdk", yank:"mdk")) flag++;
    if (rpm_check(release:"MDK10.1", reference:"mozilla-enigmime-1.7.8-0.3.101mdk", yank:"mdk")) flag++;
    if (rpm_check(release:"MDK10.1", reference:"mozilla-irc-1.7.8-0.3.101mdk", yank:"mdk")) flag++;
    if (rpm_check(release:"MDK10.1", reference:"mozilla-js-debugger-1.7.8-0.3.101mdk", yank:"mdk")) flag++;
    if (rpm_check(release:"MDK10.1", reference:"mozilla-mail-1.7.8-0.3.101mdk", yank:"mdk")) flag++;
    if (rpm_check(release:"MDK10.1", reference:"mozilla-spellchecker-1.7.8-0.3.101mdk", yank:"mdk")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PKG_8665EBB9223711DA978E0001020EED82.NASL
    descriptionTom Ferris reports : A buffer overflow vulnerability exists within Firefox version 1.0.6 and all other prior versions which allows for an attacker to remotely execute arbitrary code on an affected host. The problem seems to be when a hostname which has all dashes causes the NormalizeIDN call in nsStandardURL::BuildNormalizedSpec to return true, but is sets encHost to an empty string. Meaning, Firefox appends 0 to approxLen and then appends the long string of dashes to the buffer instead. Note: It is possible to disable IDN support as a workaround to protect against this buffer overflow. How to do this is described on the What Firefox and Mozilla users should know about the IDN buffer overflow security issue web page.
    last seen2020-06-01
    modified2020-06-02
    plugin id21463
    published2006-05-13
    reporterThis script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/21463
    titleFreeBSD : firefox & mozilla -- buffer overflow vulnerability (8665ebb9-2237-11da-978e-0001020eed82)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from the FreeBSD VuXML database :
    #
    # Copyright 2003-2018 Jacques Vidrine and contributors
    #
    # Redistribution and use in source (VuXML) and 'compiled' forms (SGML,
    # HTML, PDF, PostScript, RTF and so forth) with or without modification,
    # are permitted provided that the following conditions are met:
    # 1. Redistributions of source code (VuXML) must retain the above
    #    copyright notice, this list of conditions and the following
    #    disclaimer as the first lines of this file unmodified.
    # 2. Redistributions in compiled form (transformed to other DTDs,
    #    published online in any format, converted to PDF, PostScript,
    #    RTF and other formats) must reproduce the above copyright
    #    notice, this list of conditions and the following disclaimer
    #    in the documentation and/or other materials provided with the
    #    distribution.
    # 
    # THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS "AS IS"
    # AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
    # THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
    # PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS
    # BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,
    # OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT
    # OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
    # BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
    # WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
    # OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,
    # EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(21463);
      script_version("1.19");
      script_cvs_date("Date: 2019/08/02 13:32:37");
    
      script_cve_id("CVE-2005-2871");
      script_bugtraq_id(14784);
      script_xref(name:"CERT", value:"573857");
    
      script_name(english:"FreeBSD : firefox & mozilla -- buffer overflow vulnerability (8665ebb9-2237-11da-978e-0001020eed82)");
      script_summary(english:"Checks for updated packages in pkg_info output");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:
    "The remote FreeBSD host is missing one or more security-related
    updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Tom Ferris reports :
    
    A buffer overflow vulnerability exists within Firefox version 1.0.6
    and all other prior versions which allows for an attacker to remotely
    execute arbitrary code on an affected host.
    
    The problem seems to be when a hostname which has all dashes causes
    the NormalizeIDN call in nsStandardURL::BuildNormalizedSpec to return
    true, but is sets encHost to an empty string. Meaning, Firefox appends
    0 to approxLen and then appends the long string of dashes to the
    buffer instead.
    
    Note: It is possible to disable IDN support as a workaround to protect
    against this buffer overflow. How to do this is described on the What
    Firefox and Mozilla users should know about the IDN buffer overflow
    security issue web page."
      );
      # http://marc.theaimsgroup.com/?l=full-disclosure&m=112624614008387
      script_set_attribute(
        attribute:"see_also",
        value:"https://marc.info/?l=full-disclosure&m=112624614008387"
      );
      # http://www.mozilla.org/security/idn.html
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.mozilla.org/en-US/security/idn.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.mozilla.org/show_bug.cgi?id=307259"
      );
      # http://www.mozilla.org/security/announce/mfsa2005-57.html
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.mozilla.org/en-US/security/advisories/mfsa2005-57/"
      );
      # https://vuxml.freebsd.org/freebsd/8665ebb9-2237-11da-978e-0001020eed82.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?bf3b87c1"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:de-linux-mozillafirebird");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:de-linux-netscape");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:de-netscape7");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:el-linux-mozillafirebird");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:firefox");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:fr-linux-netscape");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:fr-netscape7");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:ja-linux-mozillafirebird-gtk1");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:ja-linux-netscape");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:ja-mozillafirebird-gtk2");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:ja-netscape7");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:linux-firefox");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:linux-mozilla");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:linux-mozilla-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:linux-mozillafirebird");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:linux-netscape");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:linux-phoenix");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:mozilla");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:mozilla+ipv6");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:mozilla-embedded");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:mozilla-firebird");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:mozilla-gtk");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:mozilla-gtk1");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:mozilla-gtk2");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:mozilla-thunderbird");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:netscape7");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:phoenix");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:pt_BR-netscape7");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:ru-linux-mozillafirebird");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:zhCN-linux-mozillafirebird");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:zhTW-linux-mozillafirebird");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:freebsd:freebsd");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2005/09/08");
      script_set_attribute(attribute:"patch_publication_date", value:"2005/09/10");
      script_set_attribute(attribute:"plugin_publication_date", value:"2006/05/13");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"FreeBSD Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/FreeBSD/release", "Host/FreeBSD/pkg_info");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("freebsd_package.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/FreeBSD/release")) audit(AUDIT_OS_NOT, "FreeBSD");
    if (!get_kb_item("Host/FreeBSD/pkg_info")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    
    if (pkg_test(save_report:TRUE, pkg:"firefox<1.0.6_5,1")) flag++;
    if (pkg_test(save_report:TRUE, pkg:"linux-firefox<1.0.7")) flag++;
    if (pkg_test(save_report:TRUE, pkg:"mozilla<1.7.11_1,2")) flag++;
    if (pkg_test(save_report:TRUE, pkg:"mozilla>=1.8.*,2<1.8.b1_5,2")) flag++;
    if (pkg_test(save_report:TRUE, pkg:"linux-mozilla<1.7.12")) flag++;
    if (pkg_test(save_report:TRUE, pkg:"linux-mozilla-devel>0")) flag++;
    if (pkg_test(save_report:TRUE, pkg:"netscape7>=0")) flag++;
    if (pkg_test(save_report:TRUE, pkg:"de-linux-mozillafirebird>=0")) flag++;
    if (pkg_test(save_report:TRUE, pkg:"el-linux-mozillafirebird>=0")) flag++;
    if (pkg_test(save_report:TRUE, pkg:"ja-linux-mozillafirebird-gtk1>=0")) flag++;
    if (pkg_test(save_report:TRUE, pkg:"ja-mozillafirebird-gtk2>=0")) flag++;
    if (pkg_test(save_report:TRUE, pkg:"linux-mozillafirebird>=0")) flag++;
    if (pkg_test(save_report:TRUE, pkg:"ru-linux-mozillafirebird>=0")) flag++;
    if (pkg_test(save_report:TRUE, pkg:"zhCN-linux-mozillafirebird>=0")) flag++;
    if (pkg_test(save_report:TRUE, pkg:"zhTW-linux-mozillafirebird>=0")) flag++;
    if (pkg_test(save_report:TRUE, pkg:"de-linux-netscape>=0")) flag++;
    if (pkg_test(save_report:TRUE, pkg:"de-netscape7>=0")) flag++;
    if (pkg_test(save_report:TRUE, pkg:"fr-linux-netscape>=0")) flag++;
    if (pkg_test(save_report:TRUE, pkg:"fr-netscape7>=0")) flag++;
    if (pkg_test(save_report:TRUE, pkg:"ja-linux-netscape>=0")) flag++;
    if (pkg_test(save_report:TRUE, pkg:"ja-netscape7>=0")) flag++;
    if (pkg_test(save_report:TRUE, pkg:"linux-netscape>=0")) flag++;
    if (pkg_test(save_report:TRUE, pkg:"linux-phoenix>=0")) flag++;
    if (pkg_test(save_report:TRUE, pkg:"mozilla+ipv6>=0")) flag++;
    if (pkg_test(save_report:TRUE, pkg:"mozilla-embedded>=0")) flag++;
    if (pkg_test(save_report:TRUE, pkg:"mozilla-firebird>=0")) flag++;
    if (pkg_test(save_report:TRUE, pkg:"mozilla-gtk1>=0")) flag++;
    if (pkg_test(save_report:TRUE, pkg:"mozilla-gtk2>=0")) flag++;
    if (pkg_test(save_report:TRUE, pkg:"mozilla-gtk>=0")) flag++;
    if (pkg_test(save_report:TRUE, pkg:"mozilla-thunderbird>=0")) flag++;
    if (pkg_test(save_report:TRUE, pkg:"phoenix>=0")) flag++;
    if (pkg_test(save_report:TRUE, pkg:"pt_BR-netscape7>=0")) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:pkg_report_get());
      else security_hole(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2005-871.NASL
    descriptionAn updated firefox package that fixes as security bug is now available for Fedora Core 4. This update has been rated as having critical security impact by the Fedora Security Response Team. Mozilla Firefox is an open source Web browser. A bug was found in the way Firefox processes certain international domain names. An attacker could create a specially crafted HTML file, which when viewed by the victim would cause Firefox to crash or possibly execute arbitrary code. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-2871 to this issue. Users of Firefox are advised to upgrade to this updated package that contains a backported patch and is not vulnerable to this issue. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id19733
    published2005-09-17
    reporterThis script is Copyright (C) 2005-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/19733
    titleFedora Core 4 : firefox-1.0.6-1.2.fc4 (2005-871)
    code
    #%NASL_MIN_LEVEL 80502
    
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Fedora Security Advisory 2005-871.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(19733);
      script_version ("1.14");
      script_cvs_date("Date: 2019/08/02 13:32:24");
    
      script_cve_id("CVE-2005-2871");
      script_xref(name:"FEDORA", value:"2005-871");
    
      script_name(english:"Fedora Core 4 : firefox-1.0.6-1.2.fc4 (2005-871)");
      script_summary(english:"Checks rpm output for the updated packages.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Fedora Core host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "An updated firefox package that fixes as security bug is now available
    for Fedora Core 4.
    
    This update has been rated as having critical security impact by the
    Fedora Security Response Team.
    
    Mozilla Firefox is an open source Web browser.
    
    A bug was found in the way Firefox processes certain international
    domain names. An attacker could create a specially crafted HTML file,
    which when viewed by the victim would cause Firefox to crash or
    possibly execute arbitrary code. The Common Vulnerabilities and
    Exposures project (cve.mitre.org) has assigned the name CVE-2005-2871
    to this issue.
    
    Users of Firefox are advised to upgrade to this updated package that
    contains a backported patch and is not vulnerable to this issue.
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the Fedora security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues."
      );
      # https://lists.fedoraproject.org/pipermail/announce/2005-September/001356.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?67a376e2"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected firefox and / or firefox-debuginfo packages."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:firefox");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:firefox-debuginfo");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora_core:4");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2005/09/10");
      script_set_attribute(attribute:"plugin_publication_date", value:"2005/09/17");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2005-2019 Tenable Network Security, Inc.");
      script_family(english:"Fedora Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
    os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
    os_ver = os_ver[1];
    if (! ereg(pattern:"^4([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 4.x", "Fedora " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
    
    flag = 0;
    if (rpm_check(release:"FC4", reference:"firefox-1.0.6-1.2.fc4")) flag++;
    if (rpm_check(release:"FC4", reference:"firefox-debuginfo-1.0.6-1.2.fc4")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "firefox / firefox-debuginfo");
    }
    
  • NASL familyMandriva Local Security Checks
    NASL idMANDRAKE_MDKSA-2005-174.NASL
    descriptionUpdated Mozilla Thunderbird packages fix various vulnerabilities : The run-mozilla.sh script, with debugging enabled, would allow local users to create or overwrite arbitrary files via a symlink attack on temporary files (CVE-2005-2353). A bug in the way Thunderbird processes XBM images could be used to execute arbitrary code via a specially crafted XBM image file (CVE-2005-2701). A bug in the way Thunderbird handles certain Unicode sequences could be used to execute arbitrary code via viewing a specially crafted Unicode sequence (CVE-2005-2702). A bug in the way Thunderbird makes XMLHttp requests could be abused by a malicious web page to exploit other proxy or server flaws from the victim
    last seen2020-06-01
    modified2020-06-02
    plugin id20428
    published2006-01-15
    reporterThis script is Copyright (C) 2006-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/20428
    titleMandrake Linux Security Advisory : mozilla-thunderbird (MDKSA-2005:174)
    code
    #%NASL_MIN_LEVEL 80502
    
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Mandrake Linux Security Advisory MDKSA-2005:174. 
    # The text itself is copyright (C) Mandriva S.A.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(20428);
      script_version ("1.15");
      script_cvs_date("Date: 2019/08/02 13:32:48");
    
      script_cve_id("CVE-2005-2353", "CVE-2005-2701", "CVE-2005-2702", "CVE-2005-2703", "CVE-2005-2704", "CVE-2005-2705", "CVE-2005-2706", "CVE-2005-2707", "CVE-2005-2871", "CVE-2005-2968");
      script_xref(name:"MDKSA", value:"2005:174");
    
      script_name(english:"Mandrake Linux Security Advisory : mozilla-thunderbird (MDKSA-2005:174)");
      script_summary(english:"Checks rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:
    "The remote Mandrake Linux host is missing one or more security
    updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Updated Mozilla Thunderbird packages fix various vulnerabilities :
    
    The run-mozilla.sh script, with debugging enabled, would allow local
    users to create or overwrite arbitrary files via a symlink attack on
    temporary files (CVE-2005-2353).
    
    A bug in the way Thunderbird processes XBM images could be used to
    execute arbitrary code via a specially crafted XBM image file
    (CVE-2005-2701).
    
    A bug in the way Thunderbird handles certain Unicode sequences could
    be used to execute arbitrary code via viewing a specially crafted
    Unicode sequence (CVE-2005-2702).
    
    A bug in the way Thunderbird makes XMLHttp requests could be abused by
    a malicious web page to exploit other proxy or server flaws from the
    victim's machine; however, the default behaviour of the browser is to
    disallow this (CVE-2005-2703).
    
    A bug in the way Thunderbird implemented its XBL interface could be
    abused by a malicious web page to create an XBL binding in such a way
    as to allow arbitrary JavaScript execution with chrome permissions
    (CVE-2005-2704).
    
    An integer overflow in Thunderbird's JavaScript engine could be
    manipulated in certain conditions to allow a malicious web page to
    execute arbitrary code (CVE-2005-2705).
    
    A bug in the way Thunderbird displays about: pages could be used to
    execute JavaScript with chrome privileges (CVE-2005-2706).
    
    A bug in the way Thunderbird opens new windows could be used by a
    malicious web page to construct a new window without any user
    interface elements (such as address bar and status bar) that could be
    used to potentially mislead the user (CVE-2005-2707).
    
    A bug in the way Thunderbird proceesed URLs on the command line could
    be used to execute arbitary commands as the user running Thunderbird;
    this could be abused by clicking on a supplied link, such as from an
    instant messaging client (CVE-2005-2968).
    
    Tom Ferris reported that Thunderbird would crash when processing a
    domain name consisting solely of soft-hyphen characters due to a heap
    overflow when IDN processing results in an empty string after removing
    non-wrapping chracters, such as soft-hyphens. This could be exploited
    to run or or install malware on the user's computer (CVE-2005-2871).
    
    The updated packages have been patched to correct these issues."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.mozilla.org/security/announce/mfsa2005-57.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.mozilla.org/security/announce/mfsa2005-58.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.mozilla.org/security/announce/mfsa2005-59.html"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
      script_cwe_id(94);
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:mozilla-thunderbird");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:mozilla-thunderbird-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmail");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:mozilla-thunderbird-enigmime");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:mandriva:linux:2006");
      script_set_attribute(attribute:"cpe", value:"x-cpe:/o:mandrakesoft:mandrake_linux:le2005");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2005/10/06");
      script_set_attribute(attribute:"plugin_publication_date", value:"2006/01/15");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2006-2019 Tenable Network Security, Inc.");
      script_family(english:"Mandriva Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/Mandrake/release", "Host/Mandrake/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/Mandrake/release")) audit(AUDIT_OS_NOT, "Mandriva / Mandake Linux");
    if (!get_kb_item("Host/Mandrake/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if (cpu !~ "^(amd64|i[3-6]86|x86_64)$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Mandriva / Mandrake Linux", cpu);
    
    
    flag = 0;
    if (rpm_check(release:"MDK10.2", reference:"mozilla-thunderbird-1.0.2-5.1.102mdk", yank:"mdk")) flag++;
    if (rpm_check(release:"MDK10.2", reference:"mozilla-thunderbird-devel-1.0.2-5.1.102mdk", yank:"mdk")) flag++;
    if (rpm_check(release:"MDK10.2", reference:"mozilla-thunderbird-enigmail-1.0.2-5.1.102mdk", yank:"mdk")) flag++;
    if (rpm_check(release:"MDK10.2", reference:"mozilla-thunderbird-enigmime-1.0.2-5.1.102mdk", yank:"mdk")) flag++;
    
    if (rpm_check(release:"MDK2006.0", reference:"mozilla-thunderbird-1.0.6-7.1.20060mdk", yank:"mdk")) flag++;
    if (rpm_check(release:"MDK2006.0", reference:"mozilla-thunderbird-enigmail-1.0.6-7.1.20060mdk", yank:"mdk")) flag++;
    if (rpm_check(release:"MDK2006.0", reference:"mozilla-thunderbird-enigmime-1.0.6-7.1.20060mdk", yank:"mdk")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2005-768.NASL
    descriptionAn updated firefox package that fixes as security bug is now available for Red Hat Enterprise Linux 4. This update has been rated as having critical security impact by the Red Hat Security Response Team. Mozilla Firefox is an open source Web browser. A bug was found in the way Firefox processes certain international domain names. An attacker could create a specially crafted HTML file, which when viewed by the victim would cause Firefox to crash or possibly execute arbitrary code. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-2871 to this issue. Users of Firefox are advised to upgrade to this updated package that contains a backported patch and is not vulnerable to this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id19676
    published2005-09-12
    reporterThis script is Copyright (C) 2005-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/19676
    titleRHEL 4 : firefox (RHSA-2005:768)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Red Hat Security Advisory RHSA-2005:768. The text 
    # itself is copyright (C) Red Hat, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(19676);
      script_version ("1.23");
      script_cvs_date("Date: 2019/10/25 13:36:11");
    
      script_cve_id("CVE-2005-2871");
      script_xref(name:"RHSA", value:"2005:768");
    
      script_name(english:"RHEL 4 : firefox (RHSA-2005:768)");
      script_summary(english:"Checks the rpm output for the updated package");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Red Hat host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "An updated firefox package that fixes as security bug is now available
    for Red Hat Enterprise Linux 4.
    
    This update has been rated as having critical security impact by the
    Red Hat Security Response Team.
    
    Mozilla Firefox is an open source Web browser.
    
    A bug was found in the way Firefox processes certain international
    domain names. An attacker could create a specially crafted HTML file,
    which when viewed by the victim would cause Firefox to crash or
    possibly execute arbitrary code. The Common Vulnerabilities and
    Exposures project (cve.mitre.org) has assigned the name CVE-2005-2871
    to this issue.
    
    Users of Firefox are advised to upgrade to this updated package that
    contains a backported patch and is not vulnerable to this issue."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2005-2871"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/errata/RHSA-2005:768"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected firefox package."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:firefox");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:4");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2005/09/09");
      script_set_attribute(attribute:"patch_publication_date", value:"2005/09/09");
      script_set_attribute(attribute:"plugin_publication_date", value:"2005/09/12");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2005-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Red Hat Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Red Hat" >!< release) audit(AUDIT_OS_NOT, "Red Hat");
    os_ver = pregmatch(pattern: "Red Hat Enterprise Linux.*release ([0-9]+(\.[0-9]+)?)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Red Hat");
    os_ver = os_ver[1];
    if (! preg(pattern:"^4([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Red Hat 4.x", "Red Hat " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "s390" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Red Hat", cpu);
    
    yum_updateinfo = get_kb_item("Host/RedHat/yum-updateinfo");
    if (!empty_or_null(yum_updateinfo)) 
    {
      rhsa = "RHSA-2005:768";
      yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);
      if (!empty_or_null(yum_report))
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_HOLE,
          extra      : yum_report 
        );
        exit(0);
      }
      else
      {
        audit_message = "affected by Red Hat security advisory " + rhsa;
        audit(AUDIT_OS_NOT, audit_message);
      }
    }
    else
    {
      flag = 0;
      if (rpm_check(release:"RHEL4", reference:"firefox-1.0.6-1.4.2")) flag++;
    
      if (flag)
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_HOLE,
          extra      : rpm_report_get() + redhat_report_package_caveat()
        );
        exit(0);
      }
      else
      {
        tested = pkg_tests_get();
        if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
        else audit(AUDIT_PACKAGE_NOT_INSTALLED, "firefox");
      }
    }
    
  • NASL familyWindows
    NASL idMOZILLA_THUNDERBIRD_107.NASL
    descriptionThe remote host is using Mozilla Thunderbird, an email client. The remote version of this software contains various security issues that could allow an attacker to execute arbitrary code on the remote host and to disguise URLs.
    last seen2020-06-01
    modified2020-06-02
    plugin id19694
    published2005-09-14
    reporterThis script is Copyright (C) 2005-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/19694
    titleMozilla Thunderbird < 1.0.7 IDN URL Domain Name Overflow
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    
    
    include("compat.inc");
    
    if (description) {
      script_id(19694);
      script_version("1.24");
    
      script_cve_id("CVE-2005-2871");
      script_bugtraq_id(14784);
    
      script_name(english:"Mozilla Thunderbird < 1.0.7 IDN URL Domain Name Overflow ");
    
     script_set_attribute(attribute:"synopsis", value:
    "The remote version of Mozilla Thunderbird suffers from several flaws." );
     script_set_attribute(attribute:"description", value:
    "The remote host is using Mozilla Thunderbird, an email client. 
    
    The remote version of this software contains various security issues
    that could allow an attacker to execute arbitrary code on the remote
    host and to disguise URLs." );
     script_set_attribute(attribute:"see_also", value:"https://www.securityfocus.com/archive/1/407704" );
     script_set_attribute(attribute:"see_also", value:"http://security-protocols.com/advisory/sp-x17-advisory.txt" );
     # http://web.archive.org/web/20100329062735/http://www.mozilla.org/security/idn.html
     script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?11c09cbe" );
     script_set_attribute(attribute:"solution", value:
    "Upgrade to Thunderbird 1.0.7 or disable IDN support in the browser
    following the instructions in the vendor's advisory." );
     script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
     script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
     script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
     script_set_attribute(attribute:"exploit_available", value:"true");
    
     script_set_attribute(attribute:"plugin_publication_date", value: "2005/09/14");
     script_set_attribute(attribute:"vuln_publication_date", value: "2005/09/08");
     script_set_attribute(attribute:"patch_publication_date", value: "2005/09/21");
     script_cvs_date("Date: 2018/11/15 20:50:27");
    script_set_attribute(attribute:"plugin_type", value:"local");
    script_set_attribute(attribute:"cpe", value:"cpe:/a:mozilla:thunderbird");
    script_end_attributes();
    
      script_summary(english:"Determines the version of Thunderbird");
      script_category(ACT_GATHER_INFO);
      script_family(english:"Windows");
      script_copyright(english:"This script is Copyright (C) 2005-2018 Tenable Network Security, Inc.");
      script_dependencies("mozilla_org_installed.nasl");
      script_require_keys("Mozilla/Thunderbird/Version");
      exit(0);
    }
    
    #
    
    include("misc_func.inc");
    
    
    ver = read_version_in_kb("Mozilla/Thunderbird/Version");
    if (isnull(ver)) exit(0);
    
    if (
      ver[0] < 1 ||
      (ver[0] == 1 && ver[1] == 0 && ver[2] < 7)
    ) security_hole(get_kb_item("SMB/transport"));
    
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2005-768.NASL
    descriptionAn updated firefox package that fixes as security bug is now available for Red Hat Enterprise Linux 4. This update has been rated as having critical security impact by the Red Hat Security Response Team. Mozilla Firefox is an open source Web browser. A bug was found in the way Firefox processes certain international domain names. An attacker could create a specially crafted HTML file, which when viewed by the victim would cause Firefox to crash or possibly execute arbitrary code. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-2871 to this issue. Users of Firefox are advised to upgrade to this updated package that contains a backported patch and is not vulnerable to this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id21962
    published2006-07-05
    reporterThis script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/21962
    titleCentOS 4 : firefox (CESA-2005:768)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Red Hat Security Advisory RHSA-2005:768 and 
    # CentOS Errata and Security Advisory 2005:768 respectively.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(21962);
      script_version("1.16");
      script_cvs_date("Date: 2019/10/25 13:36:02");
    
      script_cve_id("CVE-2005-2871");
      script_xref(name:"RHSA", value:"2005:768");
    
      script_name(english:"CentOS 4 : firefox (CESA-2005:768)");
      script_summary(english:"Checks rpm output for the updated package");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote CentOS host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "An updated firefox package that fixes as security bug is now available
    for Red Hat Enterprise Linux 4.
    
    This update has been rated as having critical security impact by the
    Red Hat Security Response Team.
    
    Mozilla Firefox is an open source Web browser.
    
    A bug was found in the way Firefox processes certain international
    domain names. An attacker could create a specially crafted HTML file,
    which when viewed by the victim would cause Firefox to crash or
    possibly execute arbitrary code. The Common Vulnerabilities and
    Exposures project (cve.mitre.org) has assigned the name CVE-2005-2871
    to this issue.
    
    Users of Firefox are advised to upgrade to this updated package that
    contains a backported patch and is not vulnerable to this issue."
      );
      # https://lists.centos.org/pipermail/centos-announce/2005-September/012144.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?fe7fe770"
      );
      # https://lists.centos.org/pipermail/centos-announce/2005-September/012148.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?aab96c1e"
      );
      # https://lists.centos.org/pipermail/centos-announce/2005-September/012149.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?f4cb1f07"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected firefox package."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:firefox");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:centos:centos:4");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2005/09/09");
      script_set_attribute(attribute:"patch_publication_date", value:"2005/09/10");
      script_set_attribute(attribute:"plugin_publication_date", value:"2006/07/05");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"CentOS Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/CentOS/release", "Host/CentOS/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/CentOS/release");
    if (isnull(release) || "CentOS" >!< release) audit(AUDIT_OS_NOT, "CentOS");
    os_ver = pregmatch(pattern: "CentOS(?: Linux)? release ([0-9]+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "CentOS");
    os_ver = os_ver[1];
    if (! preg(pattern:"^4([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "CentOS 4.x", "CentOS " + os_ver);
    
    if (!get_kb_item("Host/CentOS/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && "ia64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "CentOS", cpu);
    
    
    flag = 0;
    if (rpm_check(release:"CentOS-4", reference:"firefox-1.0.6-1.4.2.centos4")) flag++;
    
    
    if (flag)
    {
      security_report_v4(
        port       : 0,
        severity   : SECURITY_HOLE,
        extra      : rpm_report_get()
      );
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "firefox");
    }
    
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2005-791.NASL
    descriptionAn updated thunderbird package that fixes various bugs is now available for Red Hat Enterprise Linux 4. This update has been rated as having important security impact by the Red Hat Security Response Team. Mozilla Thunderbird is a standalone mail and newsgroup client. A bug was found in the way Thunderbird processes certain international domain names. An attacker could create a specially crafted HTML mail, which when viewed by the victim would cause Thunderbird to crash or possibly execute arbitrary code. Thunderbird as shipped with Red Hat Enterprise Linux 4 must have international domain names enabled by the user in order to be vulnerable to this issue. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-2871 to this issue. A bug was found in the way Thunderbird processes certain Unicode sequences. It may be possible to execute arbitrary code as the user running Thunderbird if the user views a specially crafted HTML mail containing Unicode sequences. (CVE-2005-2702) A bug was found in the way Thunderbird makes XMLHttp requests. It is possible that a malicious HTML mail could leverage this flaw to exploit other proxy or server flaws from the victim
    last seen2020-06-01
    modified2020-06-02
    plugin id21964
    published2006-07-05
    reporterThis script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/21964
    titleCentOS 4 : thunderbird (CESA-2005:791)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Red Hat Security Advisory RHSA-2005:791 and 
    # CentOS Errata and Security Advisory 2005:791 respectively.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(21964);
      script_version("1.18");
      script_cvs_date("Date: 2019/10/25 13:36:02");
    
      script_cve_id("CVE-2005-2702", "CVE-2005-2703", "CVE-2005-2704", "CVE-2005-2705", "CVE-2005-2706", "CVE-2005-2707", "CVE-2005-2871", "CVE-2005-2968");
      script_xref(name:"RHSA", value:"2005:791");
    
      script_name(english:"CentOS 4 : thunderbird (CESA-2005:791)");
      script_summary(english:"Checks rpm output for the updated package");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote CentOS host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "An updated thunderbird package that fixes various bugs is now
    available for Red Hat Enterprise Linux 4.
    
    This update has been rated as having important security impact by the
    Red Hat Security Response Team.
    
    Mozilla Thunderbird is a standalone mail and newsgroup client.
    
    A bug was found in the way Thunderbird processes certain international
    domain names. An attacker could create a specially crafted HTML mail,
    which when viewed by the victim would cause Thunderbird to crash or
    possibly execute arbitrary code. Thunderbird as shipped with Red Hat
    Enterprise Linux 4 must have international domain names enabled by the
    user in order to be vulnerable to this issue. The Common
    Vulnerabilities and Exposures project (cve.mitre.org) has assigned the
    name CVE-2005-2871 to this issue.
    
    A bug was found in the way Thunderbird processes certain Unicode
    sequences. It may be possible to execute arbitrary code as the user
    running Thunderbird if the user views a specially crafted HTML mail
    containing Unicode sequences. (CVE-2005-2702)
    
    A bug was found in the way Thunderbird makes XMLHttp requests. It is
    possible that a malicious HTML mail could leverage this flaw to
    exploit other proxy or server flaws from the victim's machine. It is
    also possible that this flaw could be leveraged to send XMLHttp
    requests to hosts other than the originator; the default behavior of
    Thunderbird is to disallow such actions. (CVE-2005-2703)
    
    A bug was found in the way Thunderbird implemented its XBL interface.
    It may be possible for a malicious HTML mail to create an XBL binding
    in such a way that would allow arbitrary JavaScript execution with
    chrome permissions. Please note that in Thunderbird 1.0.6 this issue
    is not directly exploitable and will need to leverage other unknown
    exploits. (CVE-2005-2704)
    
    An integer overflow bug was found in Thunderbird's JavaScript engine.
    Under favorable conditions, it may be possible for a malicious mail
    message to execute arbitrary code as the user running Thunderbird.
    Please note that JavaScript support is disabled by default in
    Thunderbird. (CVE-2005-2705)
    
    A bug was found in the way Thunderbird displays about: pages. It is
    possible for a malicious HTML mail to open an about: page, such as
    about:mozilla, in such a way that it becomes possible to execute
    JavaScript with chrome privileges. (CVE-2005-2706)
    
    A bug was found in the way Thunderbird opens new windows. It is
    possible for a malicious HTML mail to construct a new window without
    any user interface components, such as the address bar and the status
    bar. This window could then be used to mislead the user for malicious
    purposes. (CVE-2005-2707)
    
    A bug was found in the way Thunderbird processes URLs passed to it on
    the command line. If a user passes a malformed URL to Thunderbird,
    such as clicking on a link in an instant messaging program, it is
    possible to execute arbitrary commands as the user running
    Thunderbird. (CVE-2005-2968)
    
    Users of Thunderbird are advised to upgrade to this updated package,
    which contains Thunderbird version 1.0.7 and is not vulnerable to
    these issues."
      );
      # https://lists.centos.org/pipermail/centos-announce/2005-October/012255.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?fb39f53f"
      );
      # https://lists.centos.org/pipermail/centos-announce/2005-October/012257.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?2edff648"
      );
      # https://lists.centos.org/pipermail/centos-announce/2005-October/012258.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?42864d65"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected thunderbird package."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
      script_cwe_id(94);
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:thunderbird");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:centos:centos:4");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2005/09/09");
      script_set_attribute(attribute:"patch_publication_date", value:"2005/10/06");
      script_set_attribute(attribute:"plugin_publication_date", value:"2006/07/05");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"CentOS Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/CentOS/release", "Host/CentOS/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/CentOS/release");
    if (isnull(release) || "CentOS" >!< release) audit(AUDIT_OS_NOT, "CentOS");
    os_ver = pregmatch(pattern: "CentOS(?: Linux)? release ([0-9]+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "CentOS");
    os_ver = os_ver[1];
    if (! preg(pattern:"^4([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "CentOS 4.x", "CentOS " + os_ver);
    
    if (!get_kb_item("Host/CentOS/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && "ia64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "CentOS", cpu);
    
    
    flag = 0;
    if (rpm_check(release:"CentOS-4", reference:"thunderbird-1.0.7-1.4.1.centos4")) flag++;
    
    
    if (flag)
    {
      security_report_v4(
        port       : 0,
        severity   : SECURITY_HOLE,
        extra      : rpm_report_get()
      );
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "thunderbird");
    }
    
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-200509-11.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-200509-11 (Mozilla Suite, Mozilla Firefox: Multiple vulnerabilities) The Mozilla Suite and Firefox are both vulnerable to the following issues: Tom Ferris reported a heap overflow in IDN-enabled browsers with malicious Host: headers (CAN-2005-2871).
    last seen2020-06-01
    modified2020-06-02
    plugin id19810
    published2005-10-05
    reporterThis script is Copyright (C) 2005-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/19810
    titleGLSA-200509-11 : Mozilla Suite, Mozilla Firefox: Multiple vulnerabilities
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from Gentoo Linux Security Advisory GLSA 200509-11.
    #
    # The advisory text is Copyright (C) 2001-2018 Gentoo Foundation, Inc.
    # and licensed under the Creative Commons - Attribution / Share Alike 
    # license. See http://creativecommons.org/licenses/by-sa/3.0/
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(19810);
      script_version("1.17");
      script_cvs_date("Date: 2019/08/02 13:32:42");
    
      script_cve_id("CVE-2005-2701", "CVE-2005-2702", "CVE-2005-2703", "CVE-2005-2704", "CVE-2005-2705", "CVE-2005-2706", "CVE-2005-2707", "CVE-2005-2871");
      script_xref(name:"GLSA", value:"200509-11");
    
      script_name(english:"GLSA-200509-11 : Mozilla Suite, Mozilla Firefox: Multiple vulnerabilities");
      script_summary(english:"Checks for updated package(s) in /var/db/pkg");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:
    "The remote Gentoo host is missing one or more security-related
    patches."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "The remote host is affected by the vulnerability described in GLSA-200509-11
    (Mozilla Suite, Mozilla Firefox: Multiple vulnerabilities)
    
        The Mozilla Suite and Firefox are both vulnerable to the following
        issues:
        Tom Ferris reported a heap overflow in IDN-enabled browsers with
        malicious Host: headers (CAN-2005-2871).
        'jackerror' discovered a heap overrun in XBM image processing
        (CAN-2005-2701).
        Mats Palmgren reported a potentially exploitable stack corruption
        using specific Unicode sequences (CAN-2005-2702).
        Georgi Guninski discovered an integer overflow in the JavaScript
        engine (CAN-2005-2705)
        Other issues ranging from DOM object spoofing to request header
        spoofing were also found and fixed in the latest versions
        (CAN-2005-2703, CAN-2005-2704, CAN-2005-2706, CAN-2005-2707).
        The Gecko engine in itself is also affected by some of these issues and
        has been updated as well.
      
    Impact :
    
        A remote attacker could setup a malicious site and entice a victim to
        visit it, potentially resulting in arbitrary code execution with the
        victim's privileges or facilitated spoofing of known websites.
      
    Workaround :
    
        There is no known workaround for all the issues."
      );
      # http://www.mozilla.org/projects/security/known-vulnerabilities.html
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.mozilla.org/en-US/security/known-vulnerabilities/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security.gentoo.org/glsa/200509-11"
      );
      script_set_attribute(
        attribute:"solution", 
        value:
    "All Mozilla Firefox users should upgrade to the latest version:
        # emerge --sync
        # emerge --ask --oneshot --verbose '>=www-client/mozilla-firefox-1.0.7-r2'
        All Mozilla Suite users should upgrade to the latest version:
        # emerge --sync
        # emerge --ask --oneshot --verbose '>=www-client/mozilla-1.7.12-r2'
        All Mozilla Firefox binary users should upgrade to the latest version:
        # emerge --sync
        # emerge --ask --oneshot --verbose '>=www-client/mozilla-firefox-bin-1.0.7'
        All Mozilla Suite binary users should upgrade to the latest version:
        # emerge --sync
        # emerge --ask --oneshot --verbose '>=www-client/mozilla-bin-1.7.12'
        All Gecko library users should upgrade to the latest version:
        # emerge --sync
        # emerge --ask --oneshot --verbose '>=net-libs/gecko-sdk-1.7.12'"
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
      script_cwe_id(94);
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:gecko-sdk");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:mozilla");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:mozilla-bin");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:mozilla-firefox");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:mozilla-firefox-bin");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:gentoo:linux");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2005/09/18");
      script_set_attribute(attribute:"plugin_publication_date", value:"2005/10/05");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2005-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Gentoo Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/Gentoo/release", "Host/Gentoo/qpkg-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("qpkg.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/Gentoo/release")) audit(AUDIT_OS_NOT, "Gentoo");
    if (!get_kb_item("Host/Gentoo/qpkg-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    
    if (qpkg_check(package:"net-libs/gecko-sdk", unaffected:make_list("ge 1.7.12"), vulnerable:make_list("lt 1.7.12"))) flag++;
    if (qpkg_check(package:"www-client/mozilla-firefox-bin", unaffected:make_list("ge 1.0.7"), vulnerable:make_list("lt 1.0.7"))) flag++;
    if (qpkg_check(package:"www-client/mozilla", unaffected:make_list("ge 1.7.12-r2"), vulnerable:make_list("lt 1.7.12-r2"))) flag++;
    if (qpkg_check(package:"www-client/mozilla-bin", unaffected:make_list("ge 1.7.12"), vulnerable:make_list("lt 1.7.12"))) flag++;
    if (qpkg_check(package:"www-client/mozilla-firefox", unaffected:make_list("ge 1.0.7-r2"), vulnerable:make_list("lt 1.0.7-r2"))) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());
      else security_hole(0);
      exit(0);
    }
    else
    {
      tested = qpkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "Mozilla Suite / Mozilla Firefox");
    }
    
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2005-963.NASL
    descriptionAn updated thunderbird package that fixes various bugs is now available for Fedora Core 4. This update has been rated as having important security impact by the Fedora Security Response Team. Mozilla Thunderbird is a standalone mail and newsgroup client. A bug was found in the way Thunderbird processes certain international domain names. An attacker could create a specially crafted HTML file, which when viewed by the victim would cause Thunderbird to crash or possibly execute arbitrary code. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-2871 to this issue. A bug was found in the way Thunderbird processes certain Unicode sequences. It may be possible to execute arbitrary code as the user running Thunderbird if the user views a specially crafted Unicode sequence. (CVE-2005-2702) A bug was found in the way Thunderbird makes XMLHttp requests. It is possible that a malicious web page could leverage this flaw to exploit other proxy or server flaws from the victim
    last seen2020-06-01
    modified2020-06-02
    plugin id19884
    published2005-10-05
    reporterThis script is Copyright (C) 2005-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/19884
    titleFedora Core 4 : thunderbird-1.0.7-1.1.fc4 (2005-963)
    code
    #%NASL_MIN_LEVEL 80502
    
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Fedora Security Advisory 2005-963.
    #
    
    if (NASL_LEVEL < 3000) exit(0);
    
    include("compat.inc");
    
    if (description)
    {
      script_id(19884);
      script_version ("1.16");
      script_cvs_date("Date: 2019/08/02 13:32:24");
    
      script_cve_id("CVE-2005-2871");
      script_xref(name:"FEDORA", value:"2005-963");
    
      script_name(english:"Fedora Core 4 : thunderbird-1.0.7-1.1.fc4 (2005-963)");
      script_summary(english:"Checks rpm output for the updated packages.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Fedora Core host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "An updated thunderbird package that fixes various bugs is now
    available for Fedora Core 4.
    
    This update has been rated as having important security impact by the
    Fedora Security Response Team.
    
    Mozilla Thunderbird is a standalone mail and newsgroup client.
    
    A bug was found in the way Thunderbird processes certain international
    domain names. An attacker could create a specially crafted HTML file,
    which when viewed by the victim would cause Thunderbird to crash or
    possibly execute arbitrary code. The Common Vulnerabilities and
    Exposures project (cve.mitre.org) has assigned the name CVE-2005-2871
    to this issue.
    
    A bug was found in the way Thunderbird processes certain Unicode
    sequences. It may be possible to execute arbitrary code as the user
    running Thunderbird if the user views a specially crafted Unicode
    sequence. (CVE-2005-2702)
    
    A bug was found in the way Thunderbird makes XMLHttp requests. It is
    possible that a malicious web page could leverage this flaw to exploit
    other proxy or server flaws from the victim's machine. It is also
    possible that this flaw could be leveraged to send XMLHttp requests to
    hosts other than the originator; the default behavior of the browser
    is to disallow this. (CVE-2005-2703)
    
    A bug was found in the way Thunderbird implemented its XBL interface.
    It may be possible for a malicious web page to create an XBL binding
    in such a way that would allow arbitrary JavaScript execution with
    chrome permissions. Please note that in Thunderbird 1.0.6 this issue
    is not directly exploitable and will need to leverage other unknown
    exploits. (CVE-2005-2704)
    
    An integer overflow bug was found in Thunderbird's JavaScript engine.
    Under favorable conditions, it may be possible for a malicious mail
    message to execute arbitrary code as the user running Thunderbird.
    Please note that JavaScript support is disabled by default in
    Thunderbird. (CVE-2005-2705)
    
    A bug was found in the way Thunderbird displays about: pages. It is
    possible for a malicious web page to open an about: page, such as
    about:mozilla, in such a way that it becomes possible to execute
    JavaScript with chrome privileges. (CVE-2005-2706)
    
    A bug was found in the way Thunderbird opens new windows. It is
    possible for a malicious website to construct a new window without any
    user interface components, such as the address bar and the status bar.
    This window could then be used to mislead the user for malicious
    purposes. (CVE-2005-2707)
    
    A bug was found in the way Thunderbird processes URLs passed to it on
    the command line. If a user passes a malformed URL to Thunderbird,
    such as clicking on a link in an instant messaging program, it is
    possible to execute arbitrary commands as the user running
    Thunderbird. (CVE-2005-2968) 
    
    Users of Thunderbird are advised to upgrade to this updated package
    that contains Thunderbird version 1.0.7 and is not vulnerable to these
    issues.
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the Fedora security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues."
      );
      # https://lists.fedoraproject.org/pipermail/announce/2005-September/001444.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?804de22d"
      );
      script_set_attribute(
        attribute:"solution", 
        value:
    "Update the affected thunderbird and / or thunderbird-debuginfo
    packages."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:thunderbird");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:thunderbird-debuginfo");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora_core:4");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2005/09/30");
      script_set_attribute(attribute:"plugin_publication_date", value:"2005/10/05");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2005-2019 Tenable Network Security, Inc.");
      script_family(english:"Fedora Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
    os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
    os_ver = os_ver[1];
    if (! ereg(pattern:"^4([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 4.x", "Fedora " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
    
    flag = 0;
    if (rpm_check(release:"FC4", reference:"thunderbird-1.0.7-1.1.fc4")) flag++;
    if (rpm_check(release:"FC4", reference:"thunderbird-debuginfo-1.0.7-1.1.fc4")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "thunderbird / thunderbird-debuginfo");
    }
    
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-181-1.NASL
    descriptionTom Ferris discovered a buffer overflow in the Mozilla products (Mozilla browser, Firefox, Thunderbird). By tricking an user to click on a Hyperlink with a specially crafted destination URL, a remote attacker could crash the application. It might even be possible to exploit this vulnerability to execute arbitrary code, but this has not yet been confirmed. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id20592
    published2006-01-15
    reporterUbuntu Security Notice (C) 2005-2019 Canonical, Inc. / NASL script (C) 2006-2016 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/20592
    titleUbuntu 4.10 / 5.04 : mozilla, mozilla-thunderbird, mozilla-firefox vulnerabilities (USN-181-1)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2005-791.NASL
    descriptionAn updated thunderbird package that fixes various bugs is now available for Red Hat Enterprise Linux 4. This update has been rated as having important security impact by the Red Hat Security Response Team. Mozilla Thunderbird is a standalone mail and newsgroup client. A bug was found in the way Thunderbird processes certain international domain names. An attacker could create a specially crafted HTML mail, which when viewed by the victim would cause Thunderbird to crash or possibly execute arbitrary code. Thunderbird as shipped with Red Hat Enterprise Linux 4 must have international domain names enabled by the user in order to be vulnerable to this issue. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-2871 to this issue. A bug was found in the way Thunderbird processes certain Unicode sequences. It may be possible to execute arbitrary code as the user running Thunderbird if the user views a specially crafted HTML mail containing Unicode sequences. (CVE-2005-2702) A bug was found in the way Thunderbird makes XMLHttp requests. It is possible that a malicious HTML mail could leverage this flaw to exploit other proxy or server flaws from the victim
    last seen2020-06-01
    modified2020-06-02
    plugin id19995
    published2005-10-11
    reporterThis script is Copyright (C) 2005-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/19995
    titleRHEL 4 : thunderbird (RHSA-2005:791)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-866.NASL
    descriptionSeveral security-related problems have been discovered in Mozilla and derived programs. The Common Vulnerabilities and Exposures project identifies the following problems : - CAN-2005-2871 Tom Ferris discovered a bug in the IDN hostname handling of Mozilla that allows remote attackers to cause a denial of service and possibly execute arbitrary code via a hostname with dashes. - CAN-2005-2701 A buffer overflow allows remote attackers to execute arbitrary code via an XBM image file that ends in a large number of spaces instead of the expected end tag. - CAN-2005-2702 Mats Palmgren discovered a buffer overflow in the Unicode string parser that allows a specially crafted Unicode sequence to overflow a buffer and cause arbitrary code to be executed. - CAN-2005-2703 Remote attackers could spoof HTTP headers of XML HTTP requests via XMLHttpRequest and possibly use the client to exploit vulnerabilities in servers or proxies. - CAN-2005-2704 Remote attackers could spoof DOM objects via an XBL control that implements an internal XPCOM interface. - CAN-2005-2705 Georgi Guninski discovered an integer overflow in the JavaScript engine that might allow remote attackers to execute arbitrary code. - CAN-2005-2706 Remote attackers could execute JavaScript code with chrome privileges via an about: page such as about:mozilla. - CAN-2005-2707 Remote attackers could spawn windows without user interface components such as the address and status bar that could be used to conduct spoofing or phishing attacks. - CAN-2005-2968 Peter Zelezny discovered that shell metacharacters are not properly escaped when they are passed to a shell script and allow the execution of arbitrary commands, e.g. when a malicious URL is automatically copied from another program into Mozilla as default browser.
    last seen2020-06-01
    modified2020-06-02
    plugin id20063
    published2005-10-20
    reporterThis script is Copyright (C) 2005-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/20063
    titleDebian DSA-866-1 : mozilla - several vulnerabilities
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-868.NASL
    descriptionSeveral security-related problems have been discovered in Mozilla and derived programs. Some of the following problems don
    last seen2020-06-01
    modified2020-06-02
    plugin id20071
    published2005-10-24
    reporterThis script is Copyright (C) 2005-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/20071
    titleDebian DSA-868-1 : mozilla-thunderbird - several vulnerabilities
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2005-874.NASL
    descriptionAn updated mozilla package that fixes a security bug is now available for Fedora Core 3. This update has been rated as having critical security impact by the Fedora Security Response Team. Mozilla is an open source Web browser, advanced email and newsgroup client, IRC chat client, and HTML editor. A bug was found in the way Mozilla processes certain international domain names. An attacker could create a specially crafted HTML file, which when viewed by the victim would cause Mozilla to crash or possibly execute arbitrary code. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-2871 to this issue. Users of Mozilla are advised to upgrade to this updated package that contains a backported patch and is not vulnerable to this issue. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id19736
    published2005-09-17
    reporterThis script is Copyright (C) 2005-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/19736
    titleFedora Core 3 : mozilla-1.7.10-1.3.2 (2005-874)
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2005-769.NASL
    descriptionAn updated mozilla package that fixes a security bug is now available. This update has been rated as having critical security impact by the Red Hat Security Response Team. Mozilla is an open source Web browser, advanced email and newsgroup client, IRC chat client, and HTML editor. A bug was found in the way Mozilla processes certain international domain names. An attacker could create a specially crafted HTML file, which when viewed by the victim would cause Mozilla to crash or possibly execute arbitrary code. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-2871 to this issue. Users of Mozilla are advised to upgrade to this updated package that contains a backported patch and is not vulnerable to this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id21856
    published2006-07-03
    reporterThis script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/21856
    titleCentOS 3 / 4 : mozilla (CESA-2005:769)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2005-769.NASL
    descriptionAn updated mozilla package that fixes a security bug is now available. This update has been rated as having critical security impact by the Red Hat Security Response Team. Mozilla is an open source Web browser, advanced email and newsgroup client, IRC chat client, and HTML editor. A bug was found in the way Mozilla processes certain international domain names. An attacker could create a specially crafted HTML file, which when viewed by the victim would cause Mozilla to crash or possibly execute arbitrary code. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-2871 to this issue. Users of Mozilla are advised to upgrade to this updated package that contains a backported patch and is not vulnerable to this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id19677
    published2005-09-12
    reporterThis script is Copyright (C) 2005-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/19677
    titleRHEL 2.1 / 3 / 4 : mozilla (RHSA-2005:769)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2005-962.NASL
    descriptionAn updated thunderbird package that fixes various bugs is now available for Fedora Core 3. This update has been rated as having important security impact by the Fedora Security Response Team. Mozilla Thunderbird is a standalone mail and newsgroup client. A bug was found in the way Thunderbird processes certain international domain names. An attacker could create a specially crafted HTML file, which when viewed by the victim would cause Thunderbird to crash or possibly execute arbitrary code. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-2871 to this issue. A bug was found in the way Thunderbird processes certain Unicode sequences. It may be possible to execute arbitrary code as the user running Thunderbird if the user views a specially crafted Unicode sequence. (CVE-2005-2702) A bug was found in the way Thunderbird makes XMLHttp requests. It is possible that a malicious web page could leverage this flaw to exploit other proxy or server flaws from the victim
    last seen2020-06-01
    modified2020-06-02
    plugin id19883
    published2005-10-05
    reporterThis script is Copyright (C) 2005-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/19883
    titleFedora Core 3 : thunderbird-1.0.7-1.1.fc3 (2005-962)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-837.NASL
    descriptionTom Ferris discovered a bug in the IDN hostname handling of Mozilla Firefox, which is also present in the other browsers from the same family that allows remote attackers to cause a denial of service and possibly execute arbitrary code via a hostname with dashes.
    last seen2020-06-01
    modified2020-06-02
    plugin id19806
    published2005-10-05
    reporterThis script is Copyright (C) 2005-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/19806
    titleDebian DSA-837-1 : mozilla-firefox - buffer overflow

Oval

  • accepted2006-02-01T09:08:00.000-04:00
    classvulnerability
    contributors
    nameRobert L. Hollis
    organizationThreatGuard, Inc.
    descriptionBuffer overflow in the International Domain Name (IDN) support in Mozilla Firefox 1.0.6 and earlier, and Netscape 8.0.3.3 and 7.2, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a hostname with all "soft" hyphens (character 0xAD), which is not properly handled by the NormalizeIDN call in nsStandardURL::BuildNormalizedSpec.
    familyunix
    idoval:org.mitre.oval:def:1287
    statusaccepted
    submitted2005-11-30T12:00:00.000-04:00
    titleMozilla IDN heap overrun using soft-hyphens
    version36
  • accepted2007-05-09T16:11:06.815-04:00
    classvulnerability
    contributors
    • nameRobert L. Hollis
      organizationThreatGuard, Inc.
    • nameJonathan Baker
      organizationThe MITRE Corporation
    • nameJonathan Baker
      organizationThe MITRE Corporation
    • nameJonathan Baker
      organizationThe MITRE Corporation
    • nameJonathan Baker
      organizationThe MITRE Corporation
    descriptionBuffer overflow in the International Domain Name (IDN) support in Mozilla Firefox 1.0.6 and earlier, and Netscape 8.0.3.3 and 7.2, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a hostname with all "soft" hyphens (character 0xAD), which is not properly handled by the NormalizeIDN call in nsStandardURL::BuildNormalizedSpec.
    familywindows
    idoval:org.mitre.oval:def:584
    statusaccepted
    submitted2005-11-11T12:00:00.000-04:00
    titleMozilla IDN heap overrun using soft-hyphens
    version4
  • accepted2013-04-29T04:20:38.577-04:00
    classvulnerability
    contributors
    • nameAharon Chernin
      organizationSCAP.com, LLC
    • nameDragos Prisaca
      organizationG2, Inc.
    definition_extensions
    • commentThe operating system installed on the system is Red Hat Enterprise Linux 3
      ovaloval:org.mitre.oval:def:11782
    • commentCentOS Linux 3.x
      ovaloval:org.mitre.oval:def:16651
    • commentThe operating system installed on the system is Red Hat Enterprise Linux 4
      ovaloval:org.mitre.oval:def:11831
    • commentCentOS Linux 4.x
      ovaloval:org.mitre.oval:def:16636
    • commentOracle Linux 4.x
      ovaloval:org.mitre.oval:def:15990
    descriptionBuffer overflow in the International Domain Name (IDN) support in Mozilla Firefox 1.0.6 and earlier, and Netscape 8.0.3.3 and 7.2, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a hostname with all "soft" hyphens (character 0xAD), which is not properly handled by the NormalizeIDN call in nsStandardURL::BuildNormalizedSpec.
    familyunix
    idoval:org.mitre.oval:def:9608
    statusaccepted
    submitted2010-07-09T03:56:16-04:00
    titleBuffer overflow in the International Domain Name (IDN) support in Mozilla Firefox 1.0.6 and earlier, and Netscape 8.0.3.3 and 7.2, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a hostname with all "soft" hyphens (character 0xAD), which is not properly handled by the NormalizeIDN call in nsStandardURL::BuildNormalizedSpec.
    version26

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/40211/pwnzilla.txt
idPACKETSTORM:40211
last seen2016-12-05
published2005-09-23
reporterSkyLined
sourcehttps://packetstormsecurity.com/files/40211/pwnzilla.txt.html
titlepwnzilla.txt

Redhat

advisories
  • rhsa
    idRHSA-2005:768
  • rhsa
    idRHSA-2005:769
  • rhsa
    idRHSA-2005:791
rpms
  • firefox-0:1.0.6-1.4.2
  • firefox-debuginfo-0:1.0.6-1.4.2
  • thunderbird-0:1.0.7-1.4.1
  • thunderbird-debuginfo-0:1.0.7-1.4.1

References