語系:
https://bugzilla.mozilla.org/show_bug.cgi?id=476547
嚴重性: High
ID: 75671
檔案名稱: suse_11_3_mozilla-xulrunner191-101028.nasl
版本: 1.4
類型: local
代理程式: unix
已發布: 2014/6/13
已更新: 2021/1/14
支援的感應器: Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent
風險因素: Critical
分數: 9.7
風險因素: High
基本分數: 9.3
媒介: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C
CPE: p-cpe:/a:novell:opensuse:mozilla-xulrunner191, p-cpe:/a:novell:opensuse:mozilla-xulrunner191-32bit, p-cpe:/a:novell:opensuse:mozilla-xulrunner191-devel, p-cpe:/a:novell:opensuse:mozilla-xulrunner191-gnomevfs, p-cpe:/a:novell:opensuse:mozilla-xulrunner191-gnomevfs-32bit, p-cpe:/a:novell:opensuse:mozilla-xulrunner191-translations-common, p-cpe:/a:novell:opensuse:mozilla-xulrunner191-translations-other, p-cpe:/a:novell:opensuse:python-xpcom191, cpe:/o:novell:opensuse:11.3
必要的 KB 項目: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu
可被惡意程式利用: true
可輕鬆利用: Exploits are available
修補程式發佈日期: 2010/10/28
CANVAS (CANVAS)
Core Impact
Metasploit (Mozilla Firefox Interleaved document.write/appendChild Memory Corruption)
CVE: CVE-2010-2753, CVE-2010-2760, CVE-2010-2762, CVE-2010-2763, CVE-2010-2764, CVE-2010-2765, CVE-2010-2766, CVE-2010-2767, CVE-2010-2768, CVE-2010-2769, CVE-2010-2770, CVE-2010-3131, CVE-2010-3166, CVE-2010-3167, CVE-2010-3168, CVE-2010-3169, CVE-2010-3170, CVE-2010-3174, CVE-2010-3175, CVE-2010-3176, CVE-2010-3177, CVE-2010-3178, CVE-2010-3179, CVE-2010-3180, CVE-2010-3182, CVE-2010-3183, CVE-2010-3765