Synopsis
The remote SUSE host is missing one or more security updates.
Description
The remote SUSE Linux SLED15 / SLED_SAP15 / SLES15 / SLES_SAP15 / openSUSE 15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2024:0229-1 advisory.
  - An out of bounds write in ANGLE could have allowed an attacker to corrupt memory leading to a potentially     exploitable crash. This vulnerability affects Firefox < 122, Firefox ESR < 115.7, and Thunderbird < 115.7.
    (CVE-2024-0741)
  - It was possible for certain browser prompts and dialogs to be activated or dismissed unintentionally by     the user due to an incorrect timestamp used to prevent input after page load. This vulnerability affects     Firefox < 122, Firefox ESR < 115.7, and Thunderbird < 115.7. (CVE-2024-0742)
  - A Linux user opening the print preview dialog could have caused the browser to crash. This vulnerability     affects Firefox < 122, Firefox ESR < 115.7, and Thunderbird < 115.7. (CVE-2024-0746)
  - When a parent page loaded a child in an iframe with `unsafe-inline`, the parent Content Security Policy     could have overridden the child Content Security Policy. This vulnerability affects Firefox < 122, Firefox     ESR < 115.7, and Thunderbird < 115.7. (CVE-2024-0747)
  - A phishing site could have repurposed an `about:` dialog to show phishing content with an incorrect origin     in the address bar. This vulnerability affects Firefox < 122, Firefox ESR < 115.7, and Thunderbird <     115.7. (CVE-2024-0749)
  - A bug in popup notifications delay calculation could have made it possible for an attacker to trick a user     into granting permissions. This vulnerability affects Firefox < 122, Firefox ESR < 115.7, and Thunderbird     < 115.7. (CVE-2024-0750)
  - A malicious devtools extension could have been used to escalate privileges. This vulnerability affects     Firefox < 122, Firefox ESR < 115.7, and Thunderbird < 115.7. (CVE-2024-0751)
  - In specific HSTS configurations an attacker could have bypassed HSTS on a subdomain. This vulnerability     affects Firefox < 122, Firefox ESR < 115.7, and Thunderbird < 115.7. (CVE-2024-0753)
  - Memory safety bugs present in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6. Some of these bugs     showed evidence of memory corruption and we presume that with enough effort some of these could have been     exploited to run arbitrary code. This vulnerability affects Firefox < 122, Firefox ESR < 115.7, and     Thunderbird < 115.7. (CVE-2024-0755)
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
Solution
Update the affected packages.
Plugin Details
File Name: suse_SU-2024-0229-1.nasl
Agent: unix
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
Risk Information
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
Vulnerability Information
CPE: p-cpe:/a:novell:suse_linux:mozillafirefox-translations-common, cpe:/o:novell:suse_linux:15, p-cpe:/a:novell:suse_linux:mozillafirefox, p-cpe:/a:novell:suse_linux:mozillafirefox-devel, p-cpe:/a:novell:suse_linux:mozillafirefox-translations-other
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Exploit Ease: No known exploits are available
Patch Publication Date: 1/25/2024
Vulnerability Publication Date: 1/23/2024