Fedora 9 : Miro-1.2.7-3.fc9 / blam-1.8.5-4.fc9.1 / cairo-dock-1.6.3.1-1.fc9.2 / chmsee-1.0.1-7.fc9 / etc (2008-11598)

critical Nessus Plugin ID 35238
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The remote Fedora host is missing one or more security updates.

Description

Update to the new upstream Firefox 3.0.5 / XULRunner 1.9.0.5 fixing multiple security issues: http://www.mozilla.org/security/known- vulnerabilities/firefox30.html#firefox3.0.5 This update also contains new builds of all applications depending on Gecko libraries, built against thenew version. Note: after the updated packages are installed, Firefox must be restarted for the update to take effect.

Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.

Solution

Update the affected packages.

See Also

https://www.mozilla.org/en-US/security/known-

https://bugzilla.redhat.com/show_bug.cgi?id=476266

https://bugzilla.redhat.com/show_bug.cgi?id=476267

https://bugzilla.redhat.com/show_bug.cgi?id=476269

https://bugzilla.redhat.com/show_bug.cgi?id=476274

https://bugzilla.redhat.com/show_bug.cgi?id=476278

https://bugzilla.redhat.com/show_bug.cgi?id=476280

https://bugzilla.redhat.com/show_bug.cgi?id=476281

https://bugzilla.redhat.com/show_bug.cgi?id=476283

https://bugzilla.redhat.com/show_bug.cgi?id=476285

https://bugzilla.redhat.com/show_bug.cgi?id=476287

https://bugzilla.redhat.com/show_bug.cgi?id=476289

http://www.nessus.org/u?77ab19ad

http://www.nessus.org/u?df3d2ba8

http://www.nessus.org/u?e754e938

http://www.nessus.org/u?47512081

http://www.nessus.org/u?eeca82ff

http://www.nessus.org/u?f34716f5

http://www.nessus.org/u?0eefa5ed

http://www.nessus.org/u?5ed21dec

http://www.nessus.org/u?1a0abae5

http://www.nessus.org/u?d64c4960

http://www.nessus.org/u?5971f84b

http://www.nessus.org/u?2a8d224a

http://www.nessus.org/u?4162e726

http://www.nessus.org/u?1fda1407

http://www.nessus.org/u?4b6f7939

http://www.nessus.org/u?60222e06

http://www.nessus.org/u?cdfcb8bb

http://www.nessus.org/u?f4cce8b2

http://www.nessus.org/u?61c030a4

http://www.nessus.org/u?3b696380

http://www.nessus.org/u?4d2d207c

Plugin Details

Severity: Critical

ID: 35238

File Name: fedora_2008-11598.nasl

Version: 1.21

Type: local

Agent: unix

Published: 12/21/2008

Updated: 1/11/2021

Dependencies: ssh_get_info.nasl

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: E:U/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:fedoraproject:fedora:Miro, p-cpe:/a:fedoraproject:fedora:blam, p-cpe:/a:fedoraproject:fedora:cairo-dock, p-cpe:/a:fedoraproject:fedora:chmsee, p-cpe:/a:fedoraproject:fedora:devhelp, p-cpe:/a:fedoraproject:fedora:epiphany, p-cpe:/a:fedoraproject:fedora:epiphany-extensions, p-cpe:/a:fedoraproject:fedora:evolution-rss, p-cpe:/a:fedoraproject:fedora:firefox, p-cpe:/a:fedoraproject:fedora:galeon, p-cpe:/a:fedoraproject:fedora:gnome-python2-extras, p-cpe:/a:fedoraproject:fedora:gnome-web-photo, p-cpe:/a:fedoraproject:fedora:google-gadgets, p-cpe:/a:fedoraproject:fedora:gtkmozembedmm, p-cpe:/a:fedoraproject:fedora:kazehakase, p-cpe:/a:fedoraproject:fedora:mozvoikko, p-cpe:/a:fedoraproject:fedora:mugshot, p-cpe:/a:fedoraproject:fedora:ruby-gnome2, p-cpe:/a:fedoraproject:fedora:totem, p-cpe:/a:fedoraproject:fedora:xulrunner, p-cpe:/a:fedoraproject:fedora:yelp, cpe:/o:fedoraproject:fedora:9

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 12/21/2008

Vulnerability Publication Date: 12/17/2008

Reference Information

CVE: CVE-2008-5500, CVE-2008-5501, CVE-2008-5502, CVE-2008-5505, CVE-2008-5506, CVE-2008-5507, CVE-2008-5508, CVE-2008-5510, CVE-2008-5511, CVE-2008-5512, CVE-2008-5513

BID: 32882

FEDORA: 2008-11598

CWE: 20, 79, 200, 264, 399