VID |
28779 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
A version of Mozilla Firefox which is older than 3.0.13 has been installed on the host. Mozilla is an open-source based Web browser, developed by the Mozilla project. Mozilla Firefox versions 3.0.x prior to 3.0.13 are vulnerable to multiple vulnerabilities.
-The browser can be fooled into trusting a malicious SSL server certificate with a null character in the host name.(MFSA 2009-42)
- A heap overflow in the code that handles regular expressions in certificate names can lead to arbitrary code execution. (MFSA 2009-43)
- The location bar and SSL indicators can be spoofed by calling window.open() on an invalid URL. A remote attacker could use this to perform a phishing attack. (MFSA 2009-44)
- Unspecified JavaScript-related vulnerabilities can lead to memory corruption, and possibly arbitrary execution of code. (MFSA 2009-45).
* Note: This check requires an account with Guest or upper privileges which can access the registry of the remote host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts
* References: http://www.mozilla.org/security/announce/2009/mfsa2009-42.html http://www.mozilla.org/security/announce/2009/mfsa2009-43.html http://www.mozilla.org/security/announce/2009/mfsa2009-44.html http://www.mozilla.org/security/announce/2009/mfsa2009-45.html
* Platforms Affected: Mozilla Project, Firefox versions 3.0.x prior to 3.0.13 Microsoft Windows Any version Linux Any version |
Recommendation |
Upgrade to the latest version of Firefox (3.0.13 or later), available from the Mozilla Firefox Download Web page at http://www.mozilla.org/products/firefox/ |
Related URL |
CVE-2009-2404,CVE-2009-2408,CVE-2009-2654,CVE-2009-2662,CVE-2009-2663,CVE-2009-2664 (CVE) |
Related URL |
35803,35888,35891,35927,36018 (SecurityFocus) |
Related URL |
(ISS) |
|