http://www.nessus.org/u?c5892c8e
http://www.nessus.org/u?4125ee3f
http://www.nessus.org/u?7dbcd608
http://www.nessus.org/u?eee125d3
http://www.nessus.org/u?099355bd
http://www.nessus.org/u?aa7e1869
http://www.nessus.org/u?188401d2
http://www.nessus.org/u?7f89eae2
http://www.nessus.org/u?f5a3b49c
https://www.mozilla.org/en-US/security/known-
https://bugzilla.redhat.com/show_bug.cgi?id=511228
http://www.nessus.org/u?c4dd5e68
http://www.nessus.org/u?c39626ea
http://www.nessus.org/u?516373f1
http://www.nessus.org/u?35f8f173
http://www.nessus.org/u?1c9cf6fc
http://www.nessus.org/u?5868543c
http://www.nessus.org/u?3d7aa3f7
http://www.nessus.org/u?6c17131d
http://www.nessus.org/u?39187779
Severity: High
ID: 40347
File Name: fedora_2009-7898.nasl
Version: 1.27
Type: local
Agent: unix
Family: Fedora Local Security Checks
Published: 7/23/2009
Updated: 1/11/2021
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus
Risk Factor: High
Score: 8.9
Risk Factor: High
Base Score: 9.3
Temporal Score: 7.3
Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C
CPE: p-cpe:/a:fedoraproject:fedora:epiphany-extensions, p-cpe:/a:fedoraproject:fedora:blam, p-cpe:/a:fedoraproject:fedora:chmsee, p-cpe:/a:fedoraproject:fedora:yelp, p-cpe:/a:fedoraproject:fedora:miro, p-cpe:/a:fedoraproject:fedora:xulrunner, p-cpe:/a:fedoraproject:fedora:evolution-rss, cpe:/o:fedoraproject:fedora:11, p-cpe:/a:fedoraproject:fedora:eclipse, p-cpe:/a:fedoraproject:fedora:hulahop, p-cpe:/a:fedoraproject:fedora:perl-gtk2-mozembed, p-cpe:/a:fedoraproject:fedora:galeon, p-cpe:/a:fedoraproject:fedora:java-1.6.0-openjdk, p-cpe:/a:fedoraproject:fedora:gnome-python2-extras, p-cpe:/a:fedoraproject:fedora:epiphany, p-cpe:/a:fedoraproject:fedora:ruby-gnome2, p-cpe:/a:fedoraproject:fedora:google-gadgets, p-cpe:/a:fedoraproject:fedora:kazehakase, p-cpe:/a:fedoraproject:fedora:gnome-web-photo, p-cpe:/a:fedoraproject:fedora:mozvoikko, p-cpe:/a:fedoraproject:fedora:firefox
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 7/22/2009
Vulnerability Publication Date: 7/15/2009
CANVAS (CANVAS)
Core Impact
Metasploit (Firefox 3.5 escape() Return Value Memory Corruption)