Oracle Linux 7 : firefox (ELSA-2017-0461)

critical Nessus Plugin ID 97627

Synopsis

The remote Oracle Linux host is missing one or more security updates.

Description

The remote Oracle Linux 7 host has a package installed that is affected by multiple vulnerabilities as referenced in the ELSA-2017-0461 advisory.

[52.0-4.0.1]
- Add firefox-oracle-default-prefs.js and remove the corresponding Red Hat file

[52.0-4]
- Update to 52.0 ESR (b4)

[52.0-3]
- Added fix for rhbz#1423012 - ppc64 gfx crashes

[52.0-2]
- Enable system nss

[52.0-1]
- Update to 52.0ESR (B1)
- Build RHEL7 package for Gtk3

[52.0-0.13]
- Added fix for rhbz#1414535

[52.0-0.12]
- Update to 52.0b8

[52.0-0.11]
- Readded addons patch

[52.0-0.10]
- Update to 52.0b3

[52.0-0.9]
- Update to 52.0b2

[52.0-0.8]
- Update to 52.0b1

[52.0-0.5]
- Firefox Aurora 52 testing build

Tenable has extracted the preceding description block directly from the Oracle Linux security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected firefox package.

See Also

https://linux.oracle.com/errata/ELSA-2017-0461.html

Plugin Details

Severity: Critical

ID: 97627

File Name: oraclelinux_ELSA-2017-0461.nasl

Version: 3.14

Type: local

Agent: unix

Published: 3/9/2017

Updated: 10/22/2024

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2017-5398

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

CVSS Score Source: CVE-2017-5410

Vulnerability Information

CPE: cpe:/o:oracle:linux:7, p-cpe:/a:oracle:linux:firefox

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/OracleLinux

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 3/8/2017

Vulnerability Publication Date: 6/11/2018

Reference Information

CVE: CVE-2017-5398, CVE-2017-5400, CVE-2017-5401, CVE-2017-5402, CVE-2017-5404, CVE-2017-5405, CVE-2017-5407, CVE-2017-5408, CVE-2017-5410

RHSA: 2017:0461