📄 deb_1336_1.nasl
字号:
# OpenVAS Vulnerability Test# $Id$# Description: Auto-generated from advisory DSA 1336-1## Authors:# Thomas Reinke <reinke@securityspace.com>## Copyright:# Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com# Text descriptions are largerly excerpted from the referenced# advisory, and are Copyright (c) the respective author(s)## This program is free software; you can redistribute it and/or modify# it under the terms of the GNU General Public License version 2,# as published by the Free Software Foundation## This program is distributed in the hope that it will be useful,# but WITHOUT ANY WARRANTY; without even the implied warranty of# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the# GNU General Public License for more details.## You should have received a copy of the GNU General Public License# along with this program; if not, write to the Free Software# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.#if(description){ script_id(58468); if(NASL_LEVEL>=2191) { script_cve_id("CVE-2007-1282", "CVE-2007-0994", "CVE-2007-0995", "CVE-2007-0996", "CVE-2007-0981", "CVE-2007-0008", "CVE-2007-0009", "CVE-2007-0775", "CVE-2007-0778", "CVE-2007-0045", "CVE-2006-6077"); } else { script_cve_id("CVE-2007-1282", "CVE-2007-0994", "CVE-2007-0995", "CVE-2007-0996", "CVE-2007-0981", "CVE-2007-0008", "CVE-2007-0009", "CVE-2007-0775"); }; script_version ("$"); name["english"] = "Debian Security Advisory DSA 1336-1 (mozilla-firefox)"; script_name(english:name["english"]); desc["english"] = "The remote host is missing an update to mozilla-firefoxannounced via advisory DSA 1336-1.Several remote vulnerabilities have been discovered in Mozilla Firefox.This will be the last security update of Mozilla-based products forthe oldstable (sarge) distribution of Debian. We recommend to upgradeto stable (etch) as soon as possible.The Common Vulnerabilities and Exposures project identifies the followingvulnerabilities:CVE-2007-1282It was discovered that an integer overflow in text/enhanced messageparsing allows the execution of arbitrary code.CVE-2007-0994It was discovered that a regression in the Javascript engine allowsthe execution of Javascript with elevated privileges.CVE-2007-0995It was discovered that incorrect parsing of invalid HTML charactersallows the bypass of content filters.CVE-2007-0996It was discovered that insecure child frame handling allows cross-sitescripting.CVE-2007-0981It was discovered that Firefox handles URI withs a null byte in thehostname insecurely.CVE-2007-0008It was discovered that a buffer overflow in the NSS code allows theexecution of arbitrary code.CVE-2007-0009It was discovered that a buffer overflow in the NSS code allows theexecution of arbitrary code.CVE-2007-0775It was discovered that multiple programming errors in the layout engineallow the execution of arbitrary code.CVE-2007-0778It was discovered that the page cache calculates hashes in an insecuremanner.CVE-2006-6077It was discovered that the password manager allows the disclosure ofpasswords.For the oldstable distribution (sarge) these problems have been fixed inversion 1.0.4-2sarge17. You should upgrade to etch as soon as possible.The stable distribution (etch) isn't affected. These vulnerabilities havebeen fixed prior to the release of Debian etch.The unstable distribution (sid) no longer contains mozilla-firefox. Iceweaselis already fixed.Solution:https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201336-1Risk factor : High"; script_description(english:desc["english"]); summary["english"] = "Debian Security Advisory DSA 1336-1 (mozilla-firefox)"; script_summary(english:summary["english"]); script_category(ACT_GATHER_INFO); script_copyright(english:"Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com"); family["english"] = "Debian Local Security Checks"; script_family(english:family["english"]); script_dependencies("gather-package-list.nasl"); script_require_keys("ssh/login/packages"); exit(0);}## The script code starts here#include("revisions-lib.inc");include("pkg-lib-deb.inc");vuln = 0;if(isdpkgvuln(pkg:"mozilla-firefox", ver:"1.0.4-2sarge17", rls:"DEB3.1")) { vuln = 1;}if(isdpkgvuln(pkg:"mozilla-firefox-dom-inspector", ver:"1.0.4-2sarge17", rls:"DEB3.1")) { vuln = 1;}if(isdpkgvuln(pkg:"mozilla-firefox-gnome-support", ver:"1.0.4-2sarge17", rls:"DEB3.1")) { vuln = 1;}if(vuln) { security_hole(0);}
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -