Fedora 9 : Miro-1.2.7-3.fc9 / blam-1.8.5-4.fc9.1 / cairo-dock-1.6.3.1-1.fc9.2 / chmsee-1.0.1-7.fc9 / etc (2008-11598)

Critical Nessus Plugin ID 35238

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.

VPR Score: 5.9

Synopsis

The remote Fedora host is missing one or more security updates.

Description

Update to the new upstream Firefox 3.0.5 / XULRunner 1.9.0.5 fixing multiple security issues: http://www.mozilla.org/security/known- vulnerabilities/firefox30.html#firefox3.0.5 This update also contains new builds of all applications depending on Gecko libraries, built against thenew version. Note: after the updated packages are installed, Firefox must be restarted for the update to take effect.

Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.

Solution

Update the affected packages.

See Also

https://www.mozilla.org/en-US/security/known-

https://bugzilla.redhat.com/show_bug.cgi?id=476266

https://bugzilla.redhat.com/show_bug.cgi?id=476267

https://bugzilla.redhat.com/show_bug.cgi?id=476269

https://bugzilla.redhat.com/show_bug.cgi?id=476274

https://bugzilla.redhat.com/show_bug.cgi?id=476278

https://bugzilla.redhat.com/show_bug.cgi?id=476280

https://bugzilla.redhat.com/show_bug.cgi?id=476281

https://bugzilla.redhat.com/show_bug.cgi?id=476283

https://bugzilla.redhat.com/show_bug.cgi?id=476285

https://bugzilla.redhat.com/show_bug.cgi?id=476287

https://bugzilla.redhat.com/show_bug.cgi?id=476289

http://www.nessus.org/u?77ab19ad

http://www.nessus.org/u?df3d2ba8

http://www.nessus.org/u?e754e938

http://www.nessus.org/u?47512081

http://www.nessus.org/u?eeca82ff

http://www.nessus.org/u?f34716f5

http://www.nessus.org/u?0eefa5ed

http://www.nessus.org/u?5ed21dec

http://www.nessus.org/u?1a0abae5

http://www.nessus.org/u?d64c4960

http://www.nessus.org/u?5971f84b

http://www.nessus.org/u?2a8d224a

http://www.nessus.org/u?4162e726

http://www.nessus.org/u?1fda1407

http://www.nessus.org/u?4b6f7939

http://www.nessus.org/u?60222e06

http://www.nessus.org/u?cdfcb8bb

http://www.nessus.org/u?f4cce8b2

http://www.nessus.org/u?61c030a4

http://www.nessus.org/u?3b696380

http://www.nessus.org/u?4d2d207c

Plugin Details

Severity: Critical

ID: 35238

File Name: fedora_2008-11598.nasl

Version: 1.20

Type: local

Agent: unix

Published: 2008/12/21

Updated: 2019/08/02

Dependencies: 12634

Risk Information

Risk Factor: Critical

VPR Score: 5.9

CVSS v2.0

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:fedoraproject:fedora:Miro, p-cpe:/a:fedoraproject:fedora:blam, p-cpe:/a:fedoraproject:fedora:cairo-dock, p-cpe:/a:fedoraproject:fedora:chmsee, p-cpe:/a:fedoraproject:fedora:devhelp, p-cpe:/a:fedoraproject:fedora:epiphany, p-cpe:/a:fedoraproject:fedora:epiphany-extensions, p-cpe:/a:fedoraproject:fedora:evolution-rss, p-cpe:/a:fedoraproject:fedora:firefox, p-cpe:/a:fedoraproject:fedora:galeon, p-cpe:/a:fedoraproject:fedora:gnome-python2-extras, p-cpe:/a:fedoraproject:fedora:gnome-web-photo, p-cpe:/a:fedoraproject:fedora:google-gadgets, p-cpe:/a:fedoraproject:fedora:gtkmozembedmm, p-cpe:/a:fedoraproject:fedora:kazehakase, p-cpe:/a:fedoraproject:fedora:mozvoikko, p-cpe:/a:fedoraproject:fedora:mugshot, p-cpe:/a:fedoraproject:fedora:ruby-gnome2, p-cpe:/a:fedoraproject:fedora:totem, p-cpe:/a:fedoraproject:fedora:xulrunner, p-cpe:/a:fedoraproject:fedora:yelp, cpe:/o:fedoraproject:fedora:9

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2008/12/21

Vulnerability Publication Date: 2008/12/17

Reference Information

CVE: CVE-2008-5500, CVE-2008-5501, CVE-2008-5502, CVE-2008-5505, CVE-2008-5506, CVE-2008-5507, CVE-2008-5508, CVE-2008-5510, CVE-2008-5511, CVE-2008-5512, CVE-2008-5513

BID: 32882

FEDORA: 2008-11598

CWE: 20, 79, 200, 264, 399