⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 gb_firefox_mult_vuln_july08_win.nasl

📁 漏洞扫描源码,可以扫描linux,windows,交换机路由器
💻 NASL
字号:
################################################################################ OpenVAS Vulnerability Test# $Id: gb_firefox_mult_vuln_july08_win.nasl 302 2008-10-03 12:37:36Z oct $## Mozilla Firefox Multiple Vulnerability July-08 (Win)## Authors:# Chandan S <schandan@secpod.com>## Copyright:# Copyright (c) 2008 Intevation GmbH, http://www.intevation.net## This program is free software; you can redistribute it and/or modify# it under the terms of the GNU General Public License version 2# (or any later version), as published by the Free Software Foundation.## This program is distributed in the hope that it will be useful,# but WITHOUT ANY WARRANTY; without even the implied warranty of# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the# GNU General Public License for more details.## You should have received a copy of the GNU General Public License# along with this program; if not, write to the Free Software# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.###############################################################################if(description){  script_id(800011);  script_version("$Revision: 1.1 $");  script_cve_id("CVE-2008-2798", "CVE-2008-2799", "CVE-2008-2800", "CVE-2008-2801",                "CVE-2008-2802", "CVE-2008-2803", "CVE-2008-2805", "CVE-2008-2806",                "CVE-2008-2807", "CVE-2008-2808", "CVE-2008-2809", "CVE-2008-2810",                "CVE-2008-2811");  script_bugtraq_id(30038);  script_xref(name:"CB-A", value:"08-0109");  script_name(english:"Mozilla Firefox Multiple Vulnerability July-08 (Win)");  desc["english"] = "  Overview : The host is installed with Mozilla Firefox browser, that is prone  to multiple vulnerabilities.  Vulnerability Insight:  Issues in browser are due to,  - multiple errors in the layout and JavaScript engines that can corrupt    memory.  - error while handling unprivileged XUL documents that can be exploited to    load chrome scripts from a fastload file via <script> elements.  - error in mozIJSSubScriptLoader.LoadScript function can bypass    XPCNativeWrappers.  - error in block re-flow process, which can potentially lead to crash.  - error in processing file URLs contained within local directory listings.  - errors in the implementation of the Javascript same origin policy  - errors in the verification of signed JAR files.  - improper implementation of file upload forms result in uploading specially    crafted DOM Range and originalTarget elements.  - error in Java LiveConnect implementation.  - error in processing of Alt Names provided by peer.  - error in processing of windows URL shortcuts.  Impact:  Successful exploitation could result in remote arbitrary code execution,  spoofing attacks, sensitive information disclosure, and JavaScript code can  be executed with the privileges of JAR's signer.    Impact Level: System  Affected Software/OS:  Firefox version prior to 2.0.0.15 on Windows.  Fix: Upgrade to Firefox version 2.0.0.15  http://www.mozilla.com/en-US/firefox/all-older.html  References :  http://www.mozilla.org/security/announce/2008/mfsa2008-21.html  http://www.mozilla.org/security/announce/2008/mfsa2008-22.html  http://www.mozilla.org/security/announce/2008/mfsa2008-23.html  http://www.mozilla.org/security/announce/2008/mfsa2008-24.html  http://www.mozilla.org/security/announce/2008/mfsa2008-25.html  http://www.mozilla.org/security/announce/2008/mfsa2008-27.html  http://www.mozilla.org/security/announce/2008/mfsa2008-28.html  http://www.mozilla.org/security/announce/2008/mfsa2008-29.html  http://www.mozilla.org/security/announce/2008/mfsa2008-30.html  http://www.mozilla.org/security/announce/2008/mfsa2008-31.html  http://www.mozilla.org/security/announce/2008/mfsa2008-32.html  http://www.mozilla.org/security/announce/2008/mfsa2008-33.html  CVSS Score:    CVSS Base Score     : 9.3 (AV:N/AC:M/Au:NR/C:C/I:C/A:C)    CVSS Temporal Score : 6.9  Risk factor : High";  script_description(english:desc["english"]);  script_summary(english:"Check for the version of Firefox");  script_category(ACT_GATHER_INFO);  script_copyright(english:"Copyright (C) 2008 Intevation GmbH");  script_family(english:"Misc.");  script_dependencies("gb_firefox_detect_win.nasl");  exit(0);}# Grep for firefox version < 2.0.0.15if(egrep(pattern:"^([01]\..*|2\.0(\.0\.(0?[0-9]|1[0-4]))?)$",         string:get_kb_item("Firefox/Win/Ver"))){  security_hole(0);}

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -