Synopsis
The remote SuSE 11 host is missing one or more security updates.
Description
Mozilla Firefox has been updated to the 17.0.5ESR release fixing bugs and security issues.
Also Mozilla NSS has been updated to version 3.14.3 and Mozilla NSPR to 4.9.6.
  - Mozilla developers identified and fixed several memory     safety bugs in the browser engine used in Firefox and     other Mozilla-based products. Some of these bugs showed     evidence of memory corruption under certain     circumstances, and we presume that with enough effort at     least some of these could be exploited to run arbitrary     code. (MFSA 2013-30)
    Olli Pettay, Jesse Ruderman, Boris Zbarsky, Christian     Holler, Milan Sreckovic, and Joe Drew reported memory     safety problems and crashes that affect Firefox ESR 17,     and Firefox 19. (CVE-2013-0788)
    Andrew McCreight, Randell Jesup, Gary Kwong, Jesse     Ruderman, Christian Holler, and Mats Palmgren reported     memory safety problems and crashes that affect Firefox     19. (CVE-2013-0789)
    Jim Chen reported a memory safety problem that affects     Firefox for Android
    -. (CVE-2013-0790)
  - Security researcher Abhishek Arya (Inferno) of the     Google Chrome Security Team used the Address Sanitizer     tool to discover an out-of-bounds write in Cairo     graphics library. When certain values are passed to it     during rendering, Cairo attempts to use negative     boundaries or sizes for boxes, leading to a potentially     exploitable crash in some instances. (MFSA 2013-31 /     CVE-2013-0800)
  - Security researcher Frederic Hoguin discovered that the     Mozilla Maintenance Service on Windows was vulnerable to     a buffer overflow. This system is used to update     software without invoking the User Account Control (UAC)     prompt. The Mozilla Maintenance Service is configured to     allow unprivileged users to start it with arbitrary     arguments. By manipulating the data passed in these     arguments, an attacker can execute arbitrary code with     the system privileges used by the service. This issue     requires local file system access to be exploitable.
    (MFSA 2013-32 / CVE-2013-0799)
  - Security researcher Shuichiro Suzuki of the     Fourteenforty Research Institute reported the app_tmp     directory is set to be world readable and writeable by     Firefox for Android. This potentially allows for     third-party applications to replace or alter Firefox     add-ons when downloaded because they are temporarily     stored in the app_tmp directory before installation.
    (MFSA 2013-33 / CVE-2013-0798)
    This vulnerability only affects Firefox for Android.
  - Security researcher Ash reported an issue with the     Mozilla Updater. The Mozilla Updater can be made to load     a malicious local DLL file in a privileged context     through either the Mozilla Maintenance Service or     independently on systems that do not use the service.
    This occurs when the DLL file is placed in a specific     location on the local system before the Mozilla Updater     is run. Local file system access is necessary in order     for this issue to be exploitable. (MFSA 2013-34 /     CVE-2013-0797)
  - Security researcher miaubiz used the Address Sanitizer     tool to discover a crash in WebGL rendering when memory     is freed that has not previously been allocated. This     issue only affects Linux users who have Intel Mesa     graphics drivers. The resulting crash could be     potentially exploitable. (MFSA 2013-35 / CVE-2013-0796)
  - Security researcher Cody Crews reported a mechanism to     use the cloneNode method to bypass System Only Wrappers     (SOW) and clone a protected node. This allows violation     of the browser's same origin policy and could also lead     to privilege escalation and the execution of arbitrary     code. (MFSA 2013-36 / CVE-2013-0795)
  - Security researcher shutdown reported a method for     removing the origin indication on tab-modal dialog boxes     in combination with browser navigation. This could allow     an attacker's dialog to overlay a page and show another     site's content. This can be used for phishing by     allowing users to enter data into a modal prompt dialog     on an attacking, site while appearing to be from the     displayed site. (MFSA 2013-37 / CVE-2013-0794)
  - / CVE-2013-079: Security researcher Mariusz Mlynski     reported a method to use browser navigations through     history to load an arbitrary website with that page's     baseURI property pointing to another site instead of the     seemingly loaded one. The user will continue to see the     incorrect site in the addressbar of the browser. This     allows for a cross-site scripting (XSS) attack or the     theft of data through a phishing attack. (MFSA 2013-38)
  - Mozilla community member Tobias Schula reported that if     gfx.color_management.enablev4 preference is enabled     manually in about:config, some grayscale PNG images will     be rendered incorrectly and cause memory corruption     during PNG decoding when certain color profiles are in     use. A crafted PNG image could use this flaw to leak     data through rendered images drawing from random memory.
    By default, this preference is not enabled. (MFSA     2013-39 / CVE-2013-0792)
  - Mozilla community member Ambroz Bizjak reported an     out-of-bounds array read in the CERT_DecodeCertPackage     function of the Network Security Services (NSS) libary     when decoding a certificate. When this occurs, it will     lead to memory corruption and a non-exploitable crash.
    (MFSA 2013-40 / CVE-2013-0791)
Solution
Apply SAT patch number 7599.
Plugin Details
File Name: suse_11_firefox-20130404-130404.nasl
Agent: unix
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
Risk Information
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
Vulnerability Information
CPE: p-cpe:/a:novell:suse_linux:11:libfreebl3, p-cpe:/a:novell:suse_linux:11:mozilla-nspr-32bit, p-cpe:/a:novell:suse_linux:11:mozillafirefox-branding-sled, p-cpe:/a:novell:suse_linux:11:mozillafirefox, p-cpe:/a:novell:suse_linux:11:mozillafirefox-translations, p-cpe:/a:novell:suse_linux:11:libfreebl3-32bit, cpe:/o:novell:suse_linux:11, p-cpe:/a:novell:suse_linux:11:mozilla-nss-tools, p-cpe:/a:novell:suse_linux:11:mozilla-nspr, p-cpe:/a:novell:suse_linux:11:mozilla-nss-32bit, p-cpe:/a:novell:suse_linux:11:mozilla-nss
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Patch Publication Date: 4/4/2013
Reference Information
CVE: CVE-2013-0788, CVE-2013-0789, CVE-2013-0790, CVE-2013-0791, CVE-2013-0792, CVE-2013-0794, CVE-2013-0795, CVE-2013-0796, CVE-2013-0797, CVE-2013-0798, CVE-2013-0799, CVE-2013-0800