Vulnerabilities > CVE-2012-3105 - Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Mozilla products

047910
CVSS 9.3 - CRITICAL
Attack vector
NETWORK
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
mozilla
CWE-119
critical
nessus

Summary

The glBufferData function in the WebGL implementation in Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 does not properly mitigate an unspecified flaw in an NVIDIA driver, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a related issue to CVE-2011-3101.

Vulnerable Configurations

Part Description Count
Application
Mozilla
175

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Buffer Overflow via Environment Variables
    This attack pattern involves causing a buffer overflow through manipulation of environment variables. Once the attacker finds that they can modify an environment variable, they may try to overflow associated buffers. This attack leverages implicit trust often placed in environment variables.
  • Overflow Buffers
    Buffer Overflow attacks target improper or missing bounds checking on buffer operations, typically triggered by input injected by an attacker. As a consequence, an attacker is able to write past the boundaries of allocated buffer regions in memory, causing a program crash or potentially redirection of execution as per the attackers' choice.
  • Client-side Injection-induced Buffer Overflow
    This type of attack exploits a buffer overflow vulnerability in targeted client software through injection of malicious content from a custom-built hostile service.
  • Filter Failure through Buffer Overflow
    In this attack, the idea is to cause an active filter to fail by causing an oversized transaction. An attacker may try to feed overly long input strings to the program in an attempt to overwhelm the filter (by causing a buffer overflow) and hoping that the filter does not fail securely (i.e. the user input is let into the system unfiltered).
  • MIME Conversion
    An attacker exploits a weakness in the MIME conversion routine to cause a buffer overflow and gain control over the mail server machine. The MIME system is designed to allow various different information formats to be interpreted and sent via e-mail. Attack points exist when data are converted to MIME compatible format and back.

Nessus

  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2012-0715.NASL
    descriptionFrom Red Hat Security Advisory 2012:0715 : An updated thunderbird package that fixes multiple security issues is now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Mozilla Thunderbird is a standalone mail and newsgroup client. Several flaws were found in the processing of malformed content. Malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2011-3101, CVE-2012-1937, CVE-2012-1938, CVE-2012-1939, CVE-2012-1940, CVE-2012-1941, CVE-2012-1946, CVE-2012-1947) Note: CVE-2011-3101 only affected users of certain NVIDIA display drivers with graphics cards that have hardware acceleration enabled. It was found that the Content Security Policy (CSP) implementation in Thunderbird no longer blocked Thunderbird inline event handlers. Malicious content could possibly bypass intended restrictions if that content relied on CSP to protect against flaws such as cross-site scripting (XSS). (CVE-2012-1944) If a web server hosted content that is stored on a Microsoft Windows share, or a Samba share, loading such content with Thunderbird could result in Windows shortcut files (.lnk) in the same share also being loaded. An attacker could use this flaw to view the contents of local files and directories on the victim
    last seen2020-05-31
    modified2013-07-12
    plugin id68536
    published2013-07-12
    reporterThis script is Copyright (C) 2013-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/68536
    titleOracle Linux 6 : thunderbird (ELSA-2012-0715)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from Red Hat Security Advisory RHSA-2012:0715 and 
    # Oracle Linux Security Advisory ELSA-2012-0715 respectively.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(68536);
      script_version("1.10");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/05/29");
    
      script_cve_id("CVE-2011-3101", "CVE-2012-1937", "CVE-2012-1938", "CVE-2012-1939", "CVE-2012-1940", "CVE-2012-1941", "CVE-2012-1944", "CVE-2012-1945", "CVE-2012-1946", "CVE-2012-1947", "CVE-2012-3105");
      script_bugtraq_id(53540, 53791, 53792, 53793, 53794, 53796, 53797, 53799, 53800, 53801);
      script_xref(name:"RHSA", value:"2012:0715");
    
      script_name(english:"Oracle Linux 6 : thunderbird (ELSA-2012-0715)");
      script_summary(english:"Checks rpm output for the updated package");
    
      script_set_attribute(
        attribute:"synopsis",
        value:"The remote Oracle Linux host is missing a security update."
      );
      script_set_attribute(
        attribute:"description",
        value:
    "From Red Hat Security Advisory 2012:0715 :
    
    An updated thunderbird package that fixes multiple security issues is
    now available for Red Hat Enterprise Linux 5 and 6.
    
    The Red Hat Security Response Team has rated this update as having
    critical security impact. Common Vulnerability Scoring System (CVSS)
    base scores, which give detailed severity ratings, are available for
    each vulnerability from the CVE links in the References section.
    
    Mozilla Thunderbird is a standalone mail and newsgroup client.
    
    Several flaws were found in the processing of malformed content.
    Malicious content could cause Thunderbird to crash or, potentially,
    execute arbitrary code with the privileges of the user running
    Thunderbird. (CVE-2011-3101, CVE-2012-1937, CVE-2012-1938,
    CVE-2012-1939, CVE-2012-1940, CVE-2012-1941, CVE-2012-1946,
    CVE-2012-1947)
    
    Note: CVE-2011-3101 only affected users of certain NVIDIA display
    drivers with graphics cards that have hardware acceleration enabled.
    
    It was found that the Content Security Policy (CSP) implementation in
    Thunderbird no longer blocked Thunderbird inline event handlers.
    Malicious content could possibly bypass intended restrictions if that
    content relied on CSP to protect against flaws such as cross-site
    scripting (XSS). (CVE-2012-1944)
    
    If a web server hosted content that is stored on a Microsoft Windows
    share, or a Samba share, loading such content with Thunderbird could
    result in Windows shortcut files (.lnk) in the same share also being
    loaded. An attacker could use this flaw to view the contents of local
    files and directories on the victim's system. This issue also affected
    users opening content from Microsoft Windows shares, or Samba shares,
    that are mounted on their systems. (CVE-2012-1945)
    
    Red Hat would like to thank the Mozilla project for reporting these
    issues. Upstream acknowledges Ken Russell of Google as the original
    reporter of CVE-2011-3101; Igor Bukanov, Olli Pettay, Boris Zbarsky,
    and Jesse Ruderman as the original reporters of CVE-2012-1937; Jesse
    Ruderman, Igor Bukanov, Bill McCloskey, Christian Holler, Andrew
    McCreight, and Brian Bondy as the original reporters of CVE-2012-1938;
    Christian Holler as the original reporter of CVE-2012-1939; security
    researcher Abhishek Arya of Google as the original reporter of
    CVE-2012-1940, CVE-2012-1941, and CVE-2012-1947; security researcher
    Arthur Gerkis as the original reporter of CVE-2012-1946; security
    researcher Adam Barth as the original reporter of CVE-2012-1944; and
    security researcher Paul Stone as the original reporter of
    CVE-2012-1945.
    
    Note: None of the issues in this advisory can be exploited by a
    specially crafted HTML mail message as JavaScript is disabled by
    default for mail messages. They could be exploited another way in
    Thunderbird, for example, when viewing the full remote content of an
    RSS feed.
    
    All Thunderbird users should upgrade to this updated package, which
    contains Thunderbird version 10.0.5 ESR, which corrects these issues.
    After installing the update, Thunderbird must be restarted for the
    changes to take effect."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://oss.oracle.com/pipermail/el-errata/2012-June/002850.html"
      );
      script_set_attribute(
        attribute:"solution",
        value:"Update the affected thunderbird package."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:thunderbird");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:oracle:linux:6");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2012/05/16");
      script_set_attribute(attribute:"patch_publication_date", value:"2012/06/07");
      script_set_attribute(attribute:"plugin_publication_date", value:"2013/07/12");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2013-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Oracle Linux Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/OracleLinux", "Host/RedHat/release", "Host/RedHat/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/OracleLinux")) audit(AUDIT_OS_NOT, "Oracle Linux");
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || !pregmatch(pattern: "Oracle (?:Linux Server|Enterprise Linux)", string:release)) audit(AUDIT_OS_NOT, "Oracle Linux");
    os_ver = pregmatch(pattern: "Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\.[0-9]+)?)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Oracle Linux");
    os_ver = os_ver[1];
    if (! preg(pattern:"^6([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Oracle Linux 6", "Oracle Linux " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Oracle Linux", cpu);
    
    flag = 0;
    if (rpm_check(release:"EL6", reference:"thunderbird-10.0.5-2.0.1.el6_2", allowmaj:TRUE)) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "thunderbird");
    }
    
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2012-0715.NASL
    descriptionAn updated thunderbird package that fixes multiple security issues is now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Mozilla Thunderbird is a standalone mail and newsgroup client. Several flaws were found in the processing of malformed content. Malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2011-3101, CVE-2012-1937, CVE-2012-1938, CVE-2012-1939, CVE-2012-1940, CVE-2012-1941, CVE-2012-1946, CVE-2012-1947) Note: CVE-2011-3101 only affected users of certain NVIDIA display drivers with graphics cards that have hardware acceleration enabled. It was found that the Content Security Policy (CSP) implementation in Thunderbird no longer blocked Thunderbird inline event handlers. Malicious content could possibly bypass intended restrictions if that content relied on CSP to protect against flaws such as cross-site scripting (XSS). (CVE-2012-1944) If a web server hosted content that is stored on a Microsoft Windows share, or a Samba share, loading such content with Thunderbird could result in Windows shortcut files (.lnk) in the same share also being loaded. An attacker could use this flaw to view the contents of local files and directories on the victim
    last seen2020-05-31
    modified2012-06-07
    plugin id59392
    published2012-06-07
    reporterThis script is Copyright (C) 2012-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/59392
    titleRHEL 5 / 6 : thunderbird (RHSA-2012:0715)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Red Hat Security Advisory RHSA-2012:0715. The text 
    # itself is copyright (C) Red Hat, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(59392);
      script_version ("1.23");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/05/29");
    
      script_cve_id("CVE-2011-3101", "CVE-2012-1937", "CVE-2012-1938", "CVE-2012-1939", "CVE-2012-1940", "CVE-2012-1941", "CVE-2012-1944", "CVE-2012-1945", "CVE-2012-1946", "CVE-2012-1947", "CVE-2012-3105");
      script_bugtraq_id(53540, 53791, 53792, 53793, 53794, 53796, 53797, 53799, 53800, 53801);
      script_xref(name:"RHSA", value:"2012:0715");
    
      script_name(english:"RHEL 5 / 6 : thunderbird (RHSA-2012:0715)");
      script_summary(english:"Checks the rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis",
        value:"The remote Red Hat host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description",
        value:
    "An updated thunderbird package that fixes multiple security issues is
    now available for Red Hat Enterprise Linux 5 and 6.
    
    The Red Hat Security Response Team has rated this update as having
    critical security impact. Common Vulnerability Scoring System (CVSS)
    base scores, which give detailed severity ratings, are available for
    each vulnerability from the CVE links in the References section.
    
    Mozilla Thunderbird is a standalone mail and newsgroup client.
    
    Several flaws were found in the processing of malformed content.
    Malicious content could cause Thunderbird to crash or, potentially,
    execute arbitrary code with the privileges of the user running
    Thunderbird. (CVE-2011-3101, CVE-2012-1937, CVE-2012-1938,
    CVE-2012-1939, CVE-2012-1940, CVE-2012-1941, CVE-2012-1946,
    CVE-2012-1947)
    
    Note: CVE-2011-3101 only affected users of certain NVIDIA display
    drivers with graphics cards that have hardware acceleration enabled.
    
    It was found that the Content Security Policy (CSP) implementation in
    Thunderbird no longer blocked Thunderbird inline event handlers.
    Malicious content could possibly bypass intended restrictions if that
    content relied on CSP to protect against flaws such as cross-site
    scripting (XSS). (CVE-2012-1944)
    
    If a web server hosted content that is stored on a Microsoft Windows
    share, or a Samba share, loading such content with Thunderbird could
    result in Windows shortcut files (.lnk) in the same share also being
    loaded. An attacker could use this flaw to view the contents of local
    files and directories on the victim's system. This issue also affected
    users opening content from Microsoft Windows shares, or Samba shares,
    that are mounted on their systems. (CVE-2012-1945)
    
    Red Hat would like to thank the Mozilla project for reporting these
    issues. Upstream acknowledges Ken Russell of Google as the original
    reporter of CVE-2011-3101; Igor Bukanov, Olli Pettay, Boris Zbarsky,
    and Jesse Ruderman as the original reporters of CVE-2012-1937; Jesse
    Ruderman, Igor Bukanov, Bill McCloskey, Christian Holler, Andrew
    McCreight, and Brian Bondy as the original reporters of CVE-2012-1938;
    Christian Holler as the original reporter of CVE-2012-1939; security
    researcher Abhishek Arya of Google as the original reporter of
    CVE-2012-1940, CVE-2012-1941, and CVE-2012-1947; security researcher
    Arthur Gerkis as the original reporter of CVE-2012-1946; security
    researcher Adam Barth as the original reporter of CVE-2012-1944; and
    security researcher Paul Stone as the original reporter of
    CVE-2012-1945.
    
    Note: None of the issues in this advisory can be exploited by a
    specially crafted HTML mail message as JavaScript is disabled by
    default for mail messages. They could be exploited another way in
    Thunderbird, for example, when viewing the full remote content of an
    RSS feed.
    
    All Thunderbird users should upgrade to this updated package, which
    contains Thunderbird version 10.0.5 ESR, which corrects these issues.
    After installing the update, Thunderbird must be restarted for the
    changes to take effect."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/errata/RHSA-2012:0715"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2012-1939"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2012-1938"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2012-1944"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2012-1945"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2012-1946"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2012-1947"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2012-1940"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2012-1941"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2012-1937"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2011-3101"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2012-3105"
      );
      script_set_attribute(
        attribute:"solution",
        value:
    "Update the affected thunderbird and / or thunderbird-debuginfo
    packages."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:thunderbird");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:thunderbird-debuginfo");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:5");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:6");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:6.2");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2012/05/16");
      script_set_attribute(attribute:"patch_publication_date", value:"2012/06/06");
      script_set_attribute(attribute:"plugin_publication_date", value:"2012/06/07");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2012-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Red Hat Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Red Hat" >!< release) audit(AUDIT_OS_NOT, "Red Hat");
    os_ver = pregmatch(pattern: "Red Hat Enterprise Linux.*release ([0-9]+(\.[0-9]+)?)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Red Hat");
    os_ver = os_ver[1];
    if (! preg(pattern:"^(5|6)([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Red Hat 5.x / 6.x", "Red Hat " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "s390" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Red Hat", cpu);
    
    yum_updateinfo = get_kb_item("Host/RedHat/yum-updateinfo");
    if (!empty_or_null(yum_updateinfo)) 
    {
      rhsa = "RHSA-2012:0715";
      yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);
      if (!empty_or_null(yum_report))
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_HOLE,
          extra      : yum_report 
        );
        exit(0);
      }
      else
      {
        audit_message = "affected by Red Hat security advisory " + rhsa;
        audit(AUDIT_OS_NOT, audit_message);
      }
    }
    else
    {
      flag = 0;
      if (rpm_check(release:"RHEL5", cpu:"i386", reference:"thunderbird-10.0.5-2.el5_8", allowmaj:TRUE)) flag++;
    
      if (rpm_check(release:"RHEL5", cpu:"x86_64", reference:"thunderbird-10.0.5-2.el5_8", allowmaj:TRUE)) flag++;
    
      if (rpm_check(release:"RHEL5", cpu:"i386", reference:"thunderbird-debuginfo-10.0.5-2.el5_8", allowmaj:TRUE)) flag++;
    
      if (rpm_check(release:"RHEL5", cpu:"x86_64", reference:"thunderbird-debuginfo-10.0.5-2.el5_8", allowmaj:TRUE)) flag++;
    
    
      if (rpm_check(release:"RHEL6", cpu:"i686", reference:"thunderbird-10.0.5-2.el6_2", allowmaj:TRUE)) flag++;
    
      if (rpm_check(release:"RHEL6", cpu:"s390x", reference:"thunderbird-10.0.5-2.el6_2", allowmaj:TRUE)) flag++;
    
      if (rpm_check(release:"RHEL6", cpu:"x86_64", reference:"thunderbird-10.0.5-2.el6_2", allowmaj:TRUE)) flag++;
    
      if (rpm_check(release:"RHEL6", cpu:"i686", reference:"thunderbird-debuginfo-10.0.5-2.el6_2", allowmaj:TRUE)) flag++;
    
      if (rpm_check(release:"RHEL6", cpu:"s390x", reference:"thunderbird-debuginfo-10.0.5-2.el6_2", allowmaj:TRUE)) flag++;
    
      if (rpm_check(release:"RHEL6", cpu:"x86_64", reference:"thunderbird-debuginfo-10.0.5-2.el6_2", allowmaj:TRUE)) flag++;
    
    
      if (flag)
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_HOLE,
          extra      : rpm_report_get() + redhat_report_package_caveat()
        );
        exit(0);
      }
      else
      {
        tested = pkg_tests_get();
        if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
        else audit(AUDIT_PACKAGE_NOT_INSTALLED, "thunderbird / thunderbird-debuginfo");
      }
    }
    
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2012-0710.NASL
    descriptionUpdated firefox packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Mozilla Firefox is an open source web browser. XULRunner provides the XUL Runtime environment for Mozilla Firefox. Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2011-3101, CVE-2012-1937, CVE-2012-1938, CVE-2012-1939, CVE-2012-1940, CVE-2012-1941, CVE-2012-1946, CVE-2012-1947) Note: CVE-2011-3101 only affected users of certain NVIDIA display drivers with graphics cards that have hardware acceleration enabled. It was found that the Content Security Policy (CSP) implementation in Firefox no longer blocked Firefox inline event handlers. A remote attacker could use this flaw to possibly bypass a web application
    last seen2020-06-01
    modified2020-06-02
    plugin id59388
    published2012-06-07
    reporterThis script is Copyright (C) 2012-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/59388
    titleCentOS 5 / 6 : firefox (CESA-2012:0710)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Red Hat Security Advisory RHSA-2012:0710 and 
    # CentOS Errata and Security Advisory 2012:0710 respectively.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(59388);
      script_version("1.14");
      script_cvs_date("Date: 2020/02/18");
    
      script_cve_id("CVE-2011-3101", "CVE-2012-1937", "CVE-2012-1938", "CVE-2012-1939", "CVE-2012-1940", "CVE-2012-1941", "CVE-2012-1944", "CVE-2012-1945", "CVE-2012-1946", "CVE-2012-1947", "CVE-2012-3105");
      script_bugtraq_id(53791, 53792, 53793, 53794, 53796, 53797, 53799, 53800, 53801, 53808);
      script_xref(name:"RHSA", value:"2012:0710");
    
      script_name(english:"CentOS 5 / 6 : firefox (CESA-2012:0710)");
      script_summary(english:"Checks rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote CentOS host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Updated firefox packages that fix multiple security issues are now
    available for Red Hat Enterprise Linux 5 and 6.
    
    The Red Hat Security Response Team has rated this update as having
    critical security impact. Common Vulnerability Scoring System (CVSS)
    base scores, which give detailed severity ratings, are available for
    each vulnerability from the CVE links in the References section.
    
    Mozilla Firefox is an open source web browser. XULRunner provides the
    XUL Runtime environment for Mozilla Firefox.
    
    Several flaws were found in the processing of malformed web content. A
    web page containing malicious content could cause Firefox to crash or,
    potentially, execute arbitrary code with the privileges of the user
    running Firefox. (CVE-2011-3101, CVE-2012-1937, CVE-2012-1938,
    CVE-2012-1939, CVE-2012-1940, CVE-2012-1941, CVE-2012-1946,
    CVE-2012-1947)
    
    Note: CVE-2011-3101 only affected users of certain NVIDIA display
    drivers with graphics cards that have hardware acceleration enabled.
    
    It was found that the Content Security Policy (CSP) implementation in
    Firefox no longer blocked Firefox inline event handlers. A remote
    attacker could use this flaw to possibly bypass a web application's
    intended restrictions, if that application relied on CSP to protect
    against flaws such as cross-site scripting (XSS). (CVE-2012-1944)
    
    If a web server hosted HTML files that are stored on a Microsoft
    Windows share, or a Samba share, loading such files with Firefox could
    result in Windows shortcut files (.lnk) in the same share also being
    loaded. An attacker could use this flaw to view the contents of local
    files and directories on the victim's system. This issue also affected
    users opening HTML files from Microsoft Windows shares, or Samba
    shares, that are mounted on their systems. (CVE-2012-1945)
    
    For technical details regarding these flaws, refer to the Mozilla
    security advisories for Firefox 10.0.5 ESR. You can find a link to the
    Mozilla advisories in the References section of this erratum.
    
    Red Hat would like to thank the Mozilla project for reporting these
    issues. Upstream acknowledges Ken Russell of Google as the original
    reporter of CVE-2011-3101; Igor Bukanov, Olli Pettay, Boris Zbarsky,
    and Jesse Ruderman as the original reporters of CVE-2012-1937; Jesse
    Ruderman, Igor Bukanov, Bill McCloskey, Christian Holler, Andrew
    McCreight, and Brian Bondy as the original reporters of CVE-2012-1938;
    Christian Holler as the original reporter of CVE-2012-1939; security
    researcher Abhishek Arya of Google as the original reporter of
    CVE-2012-1940, CVE-2012-1941, and CVE-2012-1947; security researcher
    Arthur Gerkis as the original reporter of CVE-2012-1946; security
    researcher Adam Barth as the original reporter of CVE-2012-1944; and
    security researcher Paul Stone as the original reporter of
    CVE-2012-1945.
    
    All Firefox users should upgrade to these updated packages, which
    contain Firefox version 10.0.5 ESR, which corrects these issues. After
    installing the update, Firefox must be restarted for the changes to
    take effect."
      );
      # https://lists.centos.org/pipermail/centos-announce/2012-June/018668.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?fd867104"
      );
      # https://lists.centos.org/pipermail/centos-announce/2012-June/018669.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?534a5cc1"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected firefox packages."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2011-3101");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:firefox");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:xulrunner");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:xulrunner-devel");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:centos:centos:5");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:centos:centos:6");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2012/05/16");
      script_set_attribute(attribute:"patch_publication_date", value:"2012/06/06");
      script_set_attribute(attribute:"plugin_publication_date", value:"2012/06/07");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2012-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"CentOS Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/CentOS/release", "Host/CentOS/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/CentOS/release");
    if (isnull(release) || "CentOS" >!< release) audit(AUDIT_OS_NOT, "CentOS");
    os_ver = pregmatch(pattern: "CentOS(?: Linux)? release ([0-9]+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "CentOS");
    os_ver = os_ver[1];
    if (! preg(pattern:"^(5|6)([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "CentOS 5.x / 6.x", "CentOS " + os_ver);
    
    if (!get_kb_item("Host/CentOS/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "CentOS", cpu);
    
    
    flag = 0;
    if (rpm_check(release:"CentOS-5", reference:"firefox-10.0.5-1.el5.centos", allowmaj:TRUE)) flag++;
    if (rpm_check(release:"CentOS-5", reference:"xulrunner-10.0.5-1.el5_8", allowmaj:TRUE)) flag++;
    if (rpm_check(release:"CentOS-5", reference:"xulrunner-devel-10.0.5-1.el5_8", allowmaj:TRUE)) flag++;
    
    if (rpm_check(release:"CentOS-6", reference:"firefox-10.0.5-1.el6.centos", allowmaj:TRUE)) flag++;
    if (rpm_check(release:"CentOS-6", reference:"xulrunner-10.0.5-1.el6.centos", allowmaj:TRUE)) flag++;
    if (rpm_check(release:"CentOS-6", reference:"xulrunner-devel-10.0.5-1.el6.centos", allowmaj:TRUE)) flag++;
    
    
    if (flag)
    {
      security_report_v4(
        port       : 0,
        severity   : SECURITY_HOLE,
        extra      : rpm_report_get()
      );
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "firefox / xulrunner / xulrunner-devel");
    }
    
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2012-0715.NASL
    descriptionAn updated thunderbird package that fixes multiple security issues is now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Mozilla Thunderbird is a standalone mail and newsgroup client. Several flaws were found in the processing of malformed content. Malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2011-3101, CVE-2012-1937, CVE-2012-1938, CVE-2012-1939, CVE-2012-1940, CVE-2012-1941, CVE-2012-1946, CVE-2012-1947) Note: CVE-2011-3101 only affected users of certain NVIDIA display drivers with graphics cards that have hardware acceleration enabled. It was found that the Content Security Policy (CSP) implementation in Thunderbird no longer blocked Thunderbird inline event handlers. Malicious content could possibly bypass intended restrictions if that content relied on CSP to protect against flaws such as cross-site scripting (XSS). (CVE-2012-1944) If a web server hosted content that is stored on a Microsoft Windows share, or a Samba share, loading such content with Thunderbird could result in Windows shortcut files (.lnk) in the same share also being loaded. An attacker could use this flaw to view the contents of local files and directories on the victim
    last seen2020-05-31
    modified2012-06-08
    plugin id59412
    published2012-06-08
    reporterThis script is Copyright (C) 2012-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/59412
    titleCentOS 5 / 6 : thunderbird (CESA-2012:0715)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Red Hat Security Advisory RHSA-2012:0715 and 
    # CentOS Errata and Security Advisory 2012:0715 respectively.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(59412);
      script_version("1.14");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/05/29");
    
      script_cve_id("CVE-2011-3101", "CVE-2012-1937", "CVE-2012-1938", "CVE-2012-1939", "CVE-2012-1940", "CVE-2012-1941", "CVE-2012-1944", "CVE-2012-1945", "CVE-2012-1946", "CVE-2012-1947", "CVE-2012-3105");
      script_bugtraq_id(53540, 53791, 53792, 53793, 53794, 53796, 53797, 53799, 53800, 53801);
      script_xref(name:"RHSA", value:"2012:0715");
    
      script_name(english:"CentOS 5 / 6 : thunderbird (CESA-2012:0715)");
      script_summary(english:"Checks rpm output for the updated package");
    
      script_set_attribute(
        attribute:"synopsis",
        value:"The remote CentOS host is missing a security update."
      );
      script_set_attribute(
        attribute:"description",
        value:
    "An updated thunderbird package that fixes multiple security issues is
    now available for Red Hat Enterprise Linux 5 and 6.
    
    The Red Hat Security Response Team has rated this update as having
    critical security impact. Common Vulnerability Scoring System (CVSS)
    base scores, which give detailed severity ratings, are available for
    each vulnerability from the CVE links in the References section.
    
    Mozilla Thunderbird is a standalone mail and newsgroup client.
    
    Several flaws were found in the processing of malformed content.
    Malicious content could cause Thunderbird to crash or, potentially,
    execute arbitrary code with the privileges of the user running
    Thunderbird. (CVE-2011-3101, CVE-2012-1937, CVE-2012-1938,
    CVE-2012-1939, CVE-2012-1940, CVE-2012-1941, CVE-2012-1946,
    CVE-2012-1947)
    
    Note: CVE-2011-3101 only affected users of certain NVIDIA display
    drivers with graphics cards that have hardware acceleration enabled.
    
    It was found that the Content Security Policy (CSP) implementation in
    Thunderbird no longer blocked Thunderbird inline event handlers.
    Malicious content could possibly bypass intended restrictions if that
    content relied on CSP to protect against flaws such as cross-site
    scripting (XSS). (CVE-2012-1944)
    
    If a web server hosted content that is stored on a Microsoft Windows
    share, or a Samba share, loading such content with Thunderbird could
    result in Windows shortcut files (.lnk) in the same share also being
    loaded. An attacker could use this flaw to view the contents of local
    files and directories on the victim's system. This issue also affected
    users opening content from Microsoft Windows shares, or Samba shares,
    that are mounted on their systems. (CVE-2012-1945)
    
    Red Hat would like to thank the Mozilla project for reporting these
    issues. Upstream acknowledges Ken Russell of Google as the original
    reporter of CVE-2011-3101; Igor Bukanov, Olli Pettay, Boris Zbarsky,
    and Jesse Ruderman as the original reporters of CVE-2012-1937; Jesse
    Ruderman, Igor Bukanov, Bill McCloskey, Christian Holler, Andrew
    McCreight, and Brian Bondy as the original reporters of CVE-2012-1938;
    Christian Holler as the original reporter of CVE-2012-1939; security
    researcher Abhishek Arya of Google as the original reporter of
    CVE-2012-1940, CVE-2012-1941, and CVE-2012-1947; security researcher
    Arthur Gerkis as the original reporter of CVE-2012-1946; security
    researcher Adam Barth as the original reporter of CVE-2012-1944; and
    security researcher Paul Stone as the original reporter of
    CVE-2012-1945.
    
    Note: None of the issues in this advisory can be exploited by a
    specially crafted HTML mail message as JavaScript is disabled by
    default for mail messages. They could be exploited another way in
    Thunderbird, for example, when viewing the full remote content of an
    RSS feed.
    
    All Thunderbird users should upgrade to this updated package, which
    contains Thunderbird version 10.0.5 ESR, which corrects these issues.
    After installing the update, Thunderbird must be restarted for the
    changes to take effect."
      );
      # https://lists.centos.org/pipermail/centos-announce/2012-June/018671.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?997b9445"
      );
      # https://lists.centos.org/pipermail/centos-announce/2012-June/018672.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?55610e87"
      );
      script_set_attribute(
        attribute:"solution",
        value:"Update the affected thunderbird package."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2011-3101");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:thunderbird");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:centos:centos:5");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:centos:centos:6");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2012/05/16");
      script_set_attribute(attribute:"patch_publication_date", value:"2012/06/07");
      script_set_attribute(attribute:"plugin_publication_date", value:"2012/06/08");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2012-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"CentOS Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/CentOS/release", "Host/CentOS/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/CentOS/release");
    if (isnull(release) || "CentOS" >!< release) audit(AUDIT_OS_NOT, "CentOS");
    os_ver = pregmatch(pattern: "CentOS(?: Linux)? release ([0-9]+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "CentOS");
    os_ver = os_ver[1];
    if (! preg(pattern:"^(5|6)([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "CentOS 5.x / 6.x", "CentOS " + os_ver);
    
    if (!get_kb_item("Host/CentOS/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "CentOS", cpu);
    
    
    flag = 0;
    if (rpm_check(release:"CentOS-5", reference:"thunderbird-10.0.5-2.el5.centos", allowmaj:TRUE)) flag++;
    
    if (rpm_check(release:"CentOS-6", reference:"thunderbird-10.0.5-2.el6.centos", allowmaj:TRUE)) flag++;
    
    
    if (flag)
    {
      security_report_v4(
        port       : 0,
        severity   : SECURITY_HOLE,
        extra      : rpm_report_get()
      );
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "thunderbird");
    }
    
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2012-0710.NASL
    descriptionFrom Red Hat Security Advisory 2012:0710 : Updated firefox packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Mozilla Firefox is an open source web browser. XULRunner provides the XUL Runtime environment for Mozilla Firefox. Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2011-3101, CVE-2012-1937, CVE-2012-1938, CVE-2012-1939, CVE-2012-1940, CVE-2012-1941, CVE-2012-1946, CVE-2012-1947) Note: CVE-2011-3101 only affected users of certain NVIDIA display drivers with graphics cards that have hardware acceleration enabled. It was found that the Content Security Policy (CSP) implementation in Firefox no longer blocked Firefox inline event handlers. A remote attacker could use this flaw to possibly bypass a web application
    last seen2020-05-31
    modified2013-07-12
    plugin id68535
    published2013-07-12
    reporterThis script is Copyright (C) 2013-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/68535
    titleOracle Linux 5 / 6 : firefox (ELSA-2012-0710)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from Red Hat Security Advisory RHSA-2012:0710 and 
    # Oracle Linux Security Advisory ELSA-2012-0710 respectively.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(68535);
      script_version("1.11");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/05/29");
    
      script_cve_id("CVE-2011-3101", "CVE-2012-1937", "CVE-2012-1938", "CVE-2012-1939", "CVE-2012-1940", "CVE-2012-1941", "CVE-2012-1944", "CVE-2012-1945", "CVE-2012-1946", "CVE-2012-1947", "CVE-2012-3105");
      script_bugtraq_id(53791, 53792, 53793, 53794, 53796, 53797, 53799, 53800, 53801, 53808);
      script_xref(name:"RHSA", value:"2012:0710");
    
      script_name(english:"Oracle Linux 5 / 6 : firefox (ELSA-2012-0710)");
      script_summary(english:"Checks rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis",
        value:"The remote Oracle Linux host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description",
        value:
    "From Red Hat Security Advisory 2012:0710 :
    
    Updated firefox packages that fix multiple security issues are now
    available for Red Hat Enterprise Linux 5 and 6.
    
    The Red Hat Security Response Team has rated this update as having
    critical security impact. Common Vulnerability Scoring System (CVSS)
    base scores, which give detailed severity ratings, are available for
    each vulnerability from the CVE links in the References section.
    
    Mozilla Firefox is an open source web browser. XULRunner provides the
    XUL Runtime environment for Mozilla Firefox.
    
    Several flaws were found in the processing of malformed web content. A
    web page containing malicious content could cause Firefox to crash or,
    potentially, execute arbitrary code with the privileges of the user
    running Firefox. (CVE-2011-3101, CVE-2012-1937, CVE-2012-1938,
    CVE-2012-1939, CVE-2012-1940, CVE-2012-1941, CVE-2012-1946,
    CVE-2012-1947)
    
    Note: CVE-2011-3101 only affected users of certain NVIDIA display
    drivers with graphics cards that have hardware acceleration enabled.
    
    It was found that the Content Security Policy (CSP) implementation in
    Firefox no longer blocked Firefox inline event handlers. A remote
    attacker could use this flaw to possibly bypass a web application's
    intended restrictions, if that application relied on CSP to protect
    against flaws such as cross-site scripting (XSS). (CVE-2012-1944)
    
    If a web server hosted HTML files that are stored on a Microsoft
    Windows share, or a Samba share, loading such files with Firefox could
    result in Windows shortcut files (.lnk) in the same share also being
    loaded. An attacker could use this flaw to view the contents of local
    files and directories on the victim's system. This issue also affected
    users opening HTML files from Microsoft Windows shares, or Samba
    shares, that are mounted on their systems. (CVE-2012-1945)
    
    For technical details regarding these flaws, refer to the Mozilla
    security advisories for Firefox 10.0.5 ESR. You can find a link to the
    Mozilla advisories in the References section of this erratum.
    
    Red Hat would like to thank the Mozilla project for reporting these
    issues. Upstream acknowledges Ken Russell of Google as the original
    reporter of CVE-2011-3101; Igor Bukanov, Olli Pettay, Boris Zbarsky,
    and Jesse Ruderman as the original reporters of CVE-2012-1937; Jesse
    Ruderman, Igor Bukanov, Bill McCloskey, Christian Holler, Andrew
    McCreight, and Brian Bondy as the original reporters of CVE-2012-1938;
    Christian Holler as the original reporter of CVE-2012-1939; security
    researcher Abhishek Arya of Google as the original reporter of
    CVE-2012-1940, CVE-2012-1941, and CVE-2012-1947; security researcher
    Arthur Gerkis as the original reporter of CVE-2012-1946; security
    researcher Adam Barth as the original reporter of CVE-2012-1944; and
    security researcher Paul Stone as the original reporter of
    CVE-2012-1945.
    
    All Firefox users should upgrade to these updated packages, which
    contain Firefox version 10.0.5 ESR, which corrects these issues. After
    installing the update, Firefox must be restarted for the changes to
    take effect."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://oss.oracle.com/pipermail/el-errata/2012-June/002847.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://oss.oracle.com/pipermail/el-errata/2012-June/002848.html"
      );
      script_set_attribute(
        attribute:"solution",
        value:"Update the affected firefox packages."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:firefox");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:xulrunner");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:xulrunner-devel");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:oracle:linux:5");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:oracle:linux:6");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2012/05/16");
      script_set_attribute(attribute:"patch_publication_date", value:"2012/06/06");
      script_set_attribute(attribute:"plugin_publication_date", value:"2013/07/12");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2013-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Oracle Linux Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/OracleLinux", "Host/RedHat/release", "Host/RedHat/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/OracleLinux")) audit(AUDIT_OS_NOT, "Oracle Linux");
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || !pregmatch(pattern: "Oracle (?:Linux Server|Enterprise Linux)", string:release)) audit(AUDIT_OS_NOT, "Oracle Linux");
    os_ver = pregmatch(pattern: "Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\.[0-9]+)?)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Oracle Linux");
    os_ver = os_ver[1];
    if (! preg(pattern:"^(5|6)([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Oracle Linux 5 / 6", "Oracle Linux " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && "ia64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Oracle Linux", cpu);
    
    flag = 0;
    if (rpm_check(release:"EL5", reference:"firefox-10.0.5-1.0.1.el5_8", allowmaj:TRUE)) flag++;
    if (rpm_check(release:"EL5", reference:"xulrunner-10.0.5-1.0.1.el5_8")) flag++;
    if (rpm_check(release:"EL5", reference:"xulrunner-devel-10.0.5-1.0.1.el5_8")) flag++;
    
    if (rpm_check(release:"EL6", reference:"firefox-10.0.5-1.0.1.el6_2", allowmaj:TRUE)) flag++;
    if (rpm_check(release:"EL6", reference:"xulrunner-10.0.5-1.0.1.el6_2")) flag++;
    if (rpm_check(release:"EL6", reference:"xulrunner-devel-10.0.5-1.0.1.el6_2")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "firefox / xulrunner / xulrunner-devel");
    }
    
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2012-0710.NASL
    descriptionUpdated firefox packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Mozilla Firefox is an open source web browser. XULRunner provides the XUL Runtime environment for Mozilla Firefox. Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2011-3101, CVE-2012-1937, CVE-2012-1938, CVE-2012-1939, CVE-2012-1940, CVE-2012-1941, CVE-2012-1946, CVE-2012-1947) Note: CVE-2011-3101 only affected users of certain NVIDIA display drivers with graphics cards that have hardware acceleration enabled. It was found that the Content Security Policy (CSP) implementation in Firefox no longer blocked Firefox inline event handlers. A remote attacker could use this flaw to possibly bypass a web application
    last seen2020-05-31
    modified2012-06-06
    plugin id59383
    published2012-06-06
    reporterThis script is Copyright (C) 2012-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/59383
    titleRHEL 5 / 6 : firefox (RHSA-2012:0710)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Red Hat Security Advisory RHSA-2012:0710. The text 
    # itself is copyright (C) Red Hat, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(59383);
      script_version ("1.23");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/05/29");
    
      script_cve_id("CVE-2011-3101", "CVE-2012-1937", "CVE-2012-1938", "CVE-2012-1939", "CVE-2012-1940", "CVE-2012-1941", "CVE-2012-1944", "CVE-2012-1945", "CVE-2012-1946", "CVE-2012-1947", "CVE-2012-3105");
      script_bugtraq_id(53791, 53792, 53793, 53794, 53796, 53797, 53799, 53800, 53801, 53808);
      script_xref(name:"RHSA", value:"2012:0710");
    
      script_name(english:"RHEL 5 / 6 : firefox (RHSA-2012:0710)");
      script_summary(english:"Checks the rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis",
        value:"The remote Red Hat host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description",
        value:
    "Updated firefox packages that fix multiple security issues are now
    available for Red Hat Enterprise Linux 5 and 6.
    
    The Red Hat Security Response Team has rated this update as having
    critical security impact. Common Vulnerability Scoring System (CVSS)
    base scores, which give detailed severity ratings, are available for
    each vulnerability from the CVE links in the References section.
    
    Mozilla Firefox is an open source web browser. XULRunner provides the
    XUL Runtime environment for Mozilla Firefox.
    
    Several flaws were found in the processing of malformed web content. A
    web page containing malicious content could cause Firefox to crash or,
    potentially, execute arbitrary code with the privileges of the user
    running Firefox. (CVE-2011-3101, CVE-2012-1937, CVE-2012-1938,
    CVE-2012-1939, CVE-2012-1940, CVE-2012-1941, CVE-2012-1946,
    CVE-2012-1947)
    
    Note: CVE-2011-3101 only affected users of certain NVIDIA display
    drivers with graphics cards that have hardware acceleration enabled.
    
    It was found that the Content Security Policy (CSP) implementation in
    Firefox no longer blocked Firefox inline event handlers. A remote
    attacker could use this flaw to possibly bypass a web application's
    intended restrictions, if that application relied on CSP to protect
    against flaws such as cross-site scripting (XSS). (CVE-2012-1944)
    
    If a web server hosted HTML files that are stored on a Microsoft
    Windows share, or a Samba share, loading such files with Firefox could
    result in Windows shortcut files (.lnk) in the same share also being
    loaded. An attacker could use this flaw to view the contents of local
    files and directories on the victim's system. This issue also affected
    users opening HTML files from Microsoft Windows shares, or Samba
    shares, that are mounted on their systems. (CVE-2012-1945)
    
    For technical details regarding these flaws, refer to the Mozilla
    security advisories for Firefox 10.0.5 ESR. You can find a link to the
    Mozilla advisories in the References section of this erratum.
    
    Red Hat would like to thank the Mozilla project for reporting these
    issues. Upstream acknowledges Ken Russell of Google as the original
    reporter of CVE-2011-3101; Igor Bukanov, Olli Pettay, Boris Zbarsky,
    and Jesse Ruderman as the original reporters of CVE-2012-1937; Jesse
    Ruderman, Igor Bukanov, Bill McCloskey, Christian Holler, Andrew
    McCreight, and Brian Bondy as the original reporters of CVE-2012-1938;
    Christian Holler as the original reporter of CVE-2012-1939; security
    researcher Abhishek Arya of Google as the original reporter of
    CVE-2012-1940, CVE-2012-1941, and CVE-2012-1947; security researcher
    Arthur Gerkis as the original reporter of CVE-2012-1946; security
    researcher Adam Barth as the original reporter of CVE-2012-1944; and
    security researcher Paul Stone as the original reporter of
    CVE-2012-1945.
    
    All Firefox users should upgrade to these updated packages, which
    contain Firefox version 10.0.5 ESR, which corrects these issues. After
    installing the update, Firefox must be restarted for the changes to
    take effect."
      );
      # http://www.mozilla.org/security/known-vulnerabilities/firefoxESR.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?a134523f"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/errata/RHSA-2012:0710"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2012-1939"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2012-1938"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2012-1944"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2012-1945"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2012-1946"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2012-1947"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2012-1940"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2012-1941"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2012-1937"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2011-3101"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2012-3105"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:firefox");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:firefox-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:xulrunner");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:xulrunner-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:xulrunner-devel");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:5");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:6");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:6.2");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2012/05/16");
      script_set_attribute(attribute:"patch_publication_date", value:"2012/06/05");
      script_set_attribute(attribute:"plugin_publication_date", value:"2012/06/06");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2012-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Red Hat Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Red Hat" >!< release) audit(AUDIT_OS_NOT, "Red Hat");
    os_ver = pregmatch(pattern: "Red Hat Enterprise Linux.*release ([0-9]+(\.[0-9]+)?)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Red Hat");
    os_ver = os_ver[1];
    if (! preg(pattern:"^(5|6)([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Red Hat 5.x / 6.x", "Red Hat " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "s390" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Red Hat", cpu);
    
    yum_updateinfo = get_kb_item("Host/RedHat/yum-updateinfo");
    if (!empty_or_null(yum_updateinfo)) 
    {
      rhsa = "RHSA-2012:0710";
      yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);
      if (!empty_or_null(yum_report))
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_HOLE,
          extra      : yum_report 
        );
        exit(0);
      }
      else
      {
        audit_message = "affected by Red Hat security advisory " + rhsa;
        audit(AUDIT_OS_NOT, audit_message);
      }
    }
    else
    {
      flag = 0;
      if (rpm_check(release:"RHEL5", reference:"firefox-10.0.5-1.el5_8", allowmaj:TRUE)) flag++;
    
      if (rpm_check(release:"RHEL5", reference:"firefox-debuginfo-10.0.5-1.el5_8", allowmaj:TRUE)) flag++;
    
      if (rpm_check(release:"RHEL5", reference:"xulrunner-10.0.5-1.el5_8")) flag++;
    
      if (rpm_check(release:"RHEL5", reference:"xulrunner-debuginfo-10.0.5-1.el5_8")) flag++;
    
      if (rpm_check(release:"RHEL5", reference:"xulrunner-devel-10.0.5-1.el5_8")) flag++;
    
    
      if (rpm_check(release:"RHEL6", reference:"firefox-10.0.5-1.el6_2", allowmaj:TRUE)) flag++;
    
      if (rpm_check(release:"RHEL6", reference:"firefox-debuginfo-10.0.5-1.el6_2", allowmaj:TRUE)) flag++;
    
      if (rpm_check(release:"RHEL6", reference:"xulrunner-10.0.5-1.el6_2")) flag++;
    
      if (rpm_check(release:"RHEL6", reference:"xulrunner-debuginfo-10.0.5-1.el6_2")) flag++;
    
      if (rpm_check(release:"RHEL6", reference:"xulrunner-devel-10.0.5-1.el6_2")) flag++;
    
    
      if (flag)
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_HOLE,
          extra      : rpm_report_get() + redhat_report_package_caveat()
        );
        exit(0);
      }
      else
      {
        tested = pkg_tests_get();
        if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
        else audit(AUDIT_PACKAGE_NOT_INSTALLED, "firefox / firefox-debuginfo / xulrunner / xulrunner-debuginfo / etc");
      }
    }
    

Oval

accepted2014-10-06T04:02:16.258-04:00
classvulnerability
contributors
  • nameSergey Artykhov
    organizationALTX-SOFT
  • nameMaria Kedovskaya
    organizationALTX-SOFT
  • nameShane Shaffer
    organizationG2, Inc.
  • nameMaria Kedovskaya
    organizationALTX-SOFT
  • nameMaria Kedovskaya
    organizationALTX-SOFT
  • nameRichard Helbing
    organizationbaramundi software
  • nameEvgeniy Pavlov
    organizationALTX-SOFT
  • nameEvgeniy Pavlov
    organizationALTX-SOFT
  • nameEvgeniy Pavlov
    organizationALTX-SOFT
  • nameEvgeniy Pavlov
    organizationALTX-SOFT
  • nameEvgeniy Pavlov
    organizationALTX-SOFT
  • nameEvgeniy Pavlov
    organizationALTX-SOFT
definition_extensions
  • commentMozilla Thunderbird Mainline release is installed
    ovaloval:org.mitre.oval:def:22093
  • commentMozilla Seamonkey is installed
    ovaloval:org.mitre.oval:def:6372
  • commentMozilla Firefox Mainline release is installed
    ovaloval:org.mitre.oval:def:22259
  • commentMozilla Firefox ESR is installed
    ovaloval:org.mitre.oval:def:22414
  • commentMozilla Thunderbird ESR is installed
    ovaloval:org.mitre.oval:def:22216
descriptionThe glBufferData function in the WebGL implementation in Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 does not properly mitigate an unspecified flaw in an NVIDIA driver, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a related issue to CVE-2011-3101.
familywindows
idoval:org.mitre.oval:def:16912
statusaccepted
submitted2013-05-13T10:26:26.748+04:00
titleThe glBufferData function in the WebGL implementation in Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 does not properly mitigate an unspecified flaw in an NVIDIA driver, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a related issue to CVE-2011-3101.
version37

Redhat

advisories
  • bugzilla
    id827843
    titleCVE-2012-1940 CVE-2012-1941 CVE-2012-1947 Mozilla: Buffer overflow and use-after-free issues found using Address Sanitizer (MFSA 2012-40)
    oval
    OR
    • commentRed Hat Enterprise Linux must be installed
      ovaloval:com.redhat.rhba:tst:20070304026
    • AND
      • commentRed Hat Enterprise Linux 5 is installed
        ovaloval:com.redhat.rhba:tst:20070331005
      • OR
        • AND
          • commentxulrunner is earlier than 0:10.0.5-1.el5_8
            ovaloval:com.redhat.rhsa:tst:20120710001
          • commentxulrunner is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20080569004
        • AND
          • commentxulrunner-devel is earlier than 0:10.0.5-1.el5_8
            ovaloval:com.redhat.rhsa:tst:20120710003
          • commentxulrunner-devel is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20080569006
        • AND
          • commentfirefox is earlier than 0:10.0.5-1.el5_8
            ovaloval:com.redhat.rhsa:tst:20120710005
          • commentfirefox is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20070097008
    • AND
      • commentRed Hat Enterprise Linux 6 is installed
        ovaloval:com.redhat.rhba:tst:20111656003
      • OR
        • AND
          • commentxulrunner is earlier than 0:10.0.5-1.el6_2
            ovaloval:com.redhat.rhsa:tst:20120710008
          • commentxulrunner is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20100861002
        • AND
          • commentxulrunner-devel is earlier than 0:10.0.5-1.el6_2
            ovaloval:com.redhat.rhsa:tst:20120710010
          • commentxulrunner-devel is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20100861004
        • AND
          • commentfirefox is earlier than 0:10.0.5-1.el6_2
            ovaloval:com.redhat.rhsa:tst:20120710012
          • commentfirefox is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20100861006
    rhsa
    idRHSA-2012:0710
    released2012-06-05
    severityCritical
    titleRHSA-2012:0710: firefox security update (Critical)
  • bugzilla
    id827843
    titleCVE-2012-1940 CVE-2012-1941 CVE-2012-1947 Mozilla: Buffer overflow and use-after-free issues found using Address Sanitizer (MFSA 2012-40)
    oval
    OR
    • commentRed Hat Enterprise Linux must be installed
      ovaloval:com.redhat.rhba:tst:20070304026
    • AND
      • commentRed Hat Enterprise Linux 5 is installed
        ovaloval:com.redhat.rhba:tst:20070331005
      • commentthunderbird is earlier than 0:10.0.5-2.el5_8
        ovaloval:com.redhat.rhsa:tst:20120715001
      • commentthunderbird is signed with Red Hat redhatrelease key
        ovaloval:com.redhat.rhsa:tst:20070108002
    • AND
      • commentRed Hat Enterprise Linux 6 is installed
        ovaloval:com.redhat.rhba:tst:20111656003
      • commentthunderbird is earlier than 0:10.0.5-2.el6_2
        ovaloval:com.redhat.rhsa:tst:20120715004
      • commentthunderbird is signed with Red Hat redhatrelease2 key
        ovaloval:com.redhat.rhsa:tst:20100896002
    rhsa
    idRHSA-2012:0715
    released2012-06-06
    severityCritical
    titleRHSA-2012:0715: thunderbird security update (Critical)
rpms
  • firefox-0:10.0.5-1.el5_8
  • firefox-0:10.0.5-1.el6_2
  • firefox-debuginfo-0:10.0.5-1.el5_8
  • firefox-debuginfo-0:10.0.5-1.el6_2
  • xulrunner-0:10.0.5-1.el5_8
  • xulrunner-0:10.0.5-1.el6_2
  • xulrunner-debuginfo-0:10.0.5-1.el5_8
  • xulrunner-debuginfo-0:10.0.5-1.el6_2
  • xulrunner-devel-0:10.0.5-1.el5_8
  • xulrunner-devel-0:10.0.5-1.el6_2
  • thunderbird-0:10.0.5-2.el5_8
  • thunderbird-0:10.0.5-2.el6_2
  • thunderbird-debuginfo-0:10.0.5-2.el5_8
  • thunderbird-debuginfo-0:10.0.5-2.el6_2