This script is Copyright (C) 2008-2016 Tenable Network Security, Inc.
The remote openSUSE host is missing a security update.
Mozilla Firefox was updated to version 22.214.171.124, fixing various bugs
including following security bugs :
CVE-2008-2798 CVE-2008-2799 MFSA-2008-21: Mozilla developers
identified and fixed several stability bugs in the browser engine used
in Firefox and other Mozilla-based products. Some of these crashes
showed evidence of memory corruption under certain circumstances and
we presume that with enough effort at least some of these could be
exploited to run arbitrary code.
CVE-2008-2800 MFSA-2008-22: Mozilla contributor moz_bug_r_a4 submitted
a set of vulnerabilities which allow scripts from one document to be
executed in the context of a different document. These vulnerabilities
could be used by an attacker to violate the same-origin policy and
perform an XSS attack.
CVE-2008-2801 MFSA-2008-23: Security researcher Collin Jackson
injected into signed JARs and executed under the context of the JAR's
browser with the privileges of a different website, provided the
attacker possesses a JAR signed by the other website.
CVE-2008-2802 MFSA-2008-24: Mozilla contributor moz_bug_r_a4 reported
a vulnerability that allowed non-priviliged XUL documents to load
chrome scripts from the fastload file. This could allow an attacker to
CVE-2008-2803 MFSA-2008-25: Mozilla contributor moz_bug_r_a4 reported
chrome privileges. The privilege escalation was possible because
using XPCNativeWrappers when accessing content. This could allow an
attacker to overwrite trusted objects with arbitrary code which would
be executed with chrome privileges when the trusted objects were
called by the browser.
CVE-2008-2805 MFSA-2008-27: Opera developer Claudio Santambrogio
reported a vulnerability which allows malicious content to force the
browser into uploading local files to the remote server. This could be
used by an attacker to steal arbitrary files from a victim's computer.
CVE-2008-2806 MFSA-2008-28: Security researcher Gregory Fleischer
reported a vulnerability in the way Mozilla indicates the origin of a
document to the Java plugin. This vulnerability could allow a
malicious Java applet to bypass the same-origin policy and create
arbitrary socket connections to other domains.
CVE-2008-2807 MFSA-2008-29: Mozilla developer Daniel Glazman
demonstrated that an improperly encoded .properties file in an add-on
can result in uninitialized memory being used. This could potentially
result in small chunks of data from other programs being exposed in
CVE-2008-2808 MFSA-2008-30: Mozilla contributor Masahiro Yamada
reported that file URLs in directory listings were not being HTML
escaped properly when the filenames contained particular characters.
This resulted in files from directory listings being opened in
unintended ways or files not being able to be opened by the browser
CVE-2008-2809 MFSA-2008-31: Mozilla developer John G. Myers reported a
weakness in the trust model used by Mozilla regarding alternate names
on self-signed certificates. A user could be prompted to accept a
self-signed certificate from a website which includes alt-name
entries. If the user accepted the certificate, they would also extend
trust to any alternate domains listed in the certificate, despite not
being prompted about the additional domains. This technique could be
used by an attacker to impersonate another server.
CVE-2008-2810 MFSA-2008-32: Mozilla community member Geoff reported a
vulnerability in the way Mozilla opens URL files sent directly to the
browser. He demonstrated that such files were opened with local file
privileges, giving the remote content access to read from the local
filesystem. If a user opened a bookmark to a malicious page in this
manner, the page could potentially read from other local files on the
CVE-2008-2811 MFSA 2008-33: Security research firm Astabis, via the
iSIGHT Partners GVP Program, reported a vulnerability in Mozilla's
block reflow code. This vulnerablitity could be used by an attacker to
crash the browser and run arbitrary code on the victim's computer.
Update the affected MozillaFirefox packages.
Risk factor :
Critical / CVSS Base Score : 10.0
Public Exploit Available : true
Family: SuSE Local Security Checks
Nessus Plugin ID: 33499 ()
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now