This script is Copyright (C) 2013-2015 Tenable Network Security, Inc.
The remote Debian host is missing a security-related update.
Multiple security issues have been found in Iceweasel, Debian's
version of the Mozilla Firefox web browser: Multiple memory safety
errors, missing input sanitising vulnerabilities, use-after-free
vulnerabilities, buffer overflows and other programming errors may
lead to the execution of arbitrary code, privilege escalation,
information leaks or cross-site-scripting.
We're changing the approach for security updates for Iceweasel,
Icedove and Iceape in stable-security: Instead of backporting security
fixes, we now provide releases based on the Extended Support Release
branch. As such, this update introduces packages based on Firefox 17
and at some point in the future we will switch to the next ESR branch
once ESR 17 has reached it's end of life.
Some Xul extensions currently packaged in the Debian archive are not
compatible with the new browser engine. Up-to-date and compatible
versions can be retrieved from http://addons.mozilla.org as a short
term solution. A solution to keep packaged extensions compatible with
the Mozilla releases is still being sorted out.
We don't have the resources to backport security fixes to the
Iceweasel release in oldstable-security any longer. If you're up to
the task and want to help, please get in touch with
firstname.lastname@example.org. Otherwise, we'll announce the end of
security support for Iceweasel, Icedove and Iceape in Squeeze in the
next update round.
See also :
Upgrade the iceweasel packages.
For the stable distribution (wheezy), these problems have been fixed
in version 17.0.6esr-1~deb7u1.
Risk factor :
Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 8.7
Public Exploit Available : false
Family: Debian Local Security Checks
Nessus Plugin ID: 66766 ()
Bugtraq ID: 58037580415804258043580445804758391588195882558831588365883759855598585985959860598615986259863598645986559868
CVE ID: CVE-2013-0773CVE-2013-0775CVE-2013-0776CVE-2013-0780CVE-2013-0782CVE-2013-0783CVE-2013-0787CVE-2013-0788CVE-2013-0793CVE-2013-0795CVE-2013-0796CVE-2013-0800CVE-2013-0801CVE-2013-1670CVE-2013-1674CVE-2013-1675CVE-2013-1676CVE-2013-1677CVE-2013-1678CVE-2013-1679CVE-2013-1680CVE-2013-1681
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.