https://www.mozilla.org/en-US/security/known-
https://bugzilla.redhat.com/show_bug.cgi?id=497447
http://www.nessus.org/u?4e236031
http://www.nessus.org/u?debd626c
http://www.nessus.org/u?5b92eafa
http://www.nessus.org/u?edfc00ba
http://www.nessus.org/u?58b96841
http://www.nessus.org/u?6f89911a
http://www.nessus.org/u?67ff97fe
http://www.nessus.org/u?64537ca1
http://www.nessus.org/u?fd7615df
http://www.nessus.org/u?d6821722
http://www.nessus.org/u?d5cdda96
http://www.nessus.org/u?31dc6bac
http://www.nessus.org/u?21bf2f52
http://www.nessus.org/u?9e996865
http://www.nessus.org/u?bfed81b8
http://www.nessus.org/u?7c54f2a2
http://www.nessus.org/u?b7d14153
http://www.nessus.org/u?7aa829ed
Severity: High
ID: 38188
File Name: fedora_2009-4078.nasl
Version: 1.21
Type: local
Agent: unix
Family: Fedora Local Security Checks
Published: 4/28/2009
Updated: 1/11/2021
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus
Risk Factor: Medium
Score: 6.7
Risk Factor: High
Base Score: 9.3
Temporal Score: 7.3
Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C
CPE: p-cpe:/a:fedoraproject:fedora:totem, p-cpe:/a:fedoraproject:fedora:epiphany-extensions, p-cpe:/a:fedoraproject:fedora:blam, p-cpe:/a:fedoraproject:fedora:chmsee, p-cpe:/a:fedoraproject:fedora:yelp, p-cpe:/a:fedoraproject:fedora:miro, p-cpe:/a:fedoraproject:fedora:xulrunner, p-cpe:/a:fedoraproject:fedora:evolution-rss, p-cpe:/a:fedoraproject:fedora:devhelp, p-cpe:/a:fedoraproject:fedora:gtkmozembedmm, p-cpe:/a:fedoraproject:fedora:galeon, p-cpe:/a:fedoraproject:fedora:mugshot, p-cpe:/a:fedoraproject:fedora:gnome-python2-extras, p-cpe:/a:fedoraproject:fedora:epiphany, p-cpe:/a:fedoraproject:fedora:ruby-gnome2, p-cpe:/a:fedoraproject:fedora:google-gadgets, cpe:/o:fedoraproject:fedora:9, p-cpe:/a:fedoraproject:fedora:kazehakase, p-cpe:/a:fedoraproject:fedora:gnome-web-photo, p-cpe:/a:fedoraproject:fedora:mozvoikko, p-cpe:/a:fedoraproject:fedora:firefox
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 4/28/2009
Vulnerability Publication Date: 4/30/2009
CVE: CVE-2009-1313
BID: 34743