VID |
28784 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
A version of Mozilla Firefox which is older than 3.5.4 has been installed on the host. Mozilla is an open-source based Web browser, developed by the Mozilla project. Mozilla Firefox versions 3.5.x prior to 3.5.4 are vulnerable to multiple vulnerabilities.
- It may be possible for a malicious web page to steal form history. (MFSA 2009-52)
- By predicting the filename of an already downloaded file in the downloads directory, a local attacker may be able to trick the browser into opening an incorrect file. (MFSA 2009-53)
- Recursive creation of JavaScript web-workers could crash the browser or allow execution of arbitrary code on the remote system.(MFSA 2009-54)
- Provided the browser is configured to use Proxy Auto-configuration it may be possible for an attacker to crash the browser or execute arbitrary code. (MFSA 2009-55)
- Mozilla's GIF image parser is affected by a heap-based buffer overflow. (MFSA 2009-56)
- A vulnerability in XPCOM utility 'XPCVariant::VariantDataToJS' could allow executing arbitrary JavaScript code with chrome privileges. (MFSA 2009-57)
- A vulnerability in Mozilla's string to floating point number conversion routine could allow arbitrary code execution on the remote system. (MFSA 2009-59)
- It may be possible to read text from a web page using JavaScript function 'document.getSelection() from a different domain. (MFSA 2009-61)
- If a file contains right-to-left override character (RTL) in the filename it may be possible for an attacker to obfuscate the filename and extension of the file being downloaded. (MFSA 2009-62)
- Multiple memory safety bugs in media libraries could potentially allow arbitrary code execution.(MFSA 2009-63)
- Multiple memory corruption vulnerabilities could potentially allow arbitrary code execution.(MFSA 2009-64)
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of this condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://www.mozilla.org/security/announce/2009/mfsa2009-52.html http://www.mozilla.org/security/announce/2009/mfsa2009-53.html http://www.mozilla.org/security/announce/2009/mfsa2009-54.html http://www.mozilla.org/security/announce/2009/mfsa2009-55.html http://www.mozilla.org/security/announce/2009/mfsa2009-56.html http://www.mozilla.org/security/announce/2009/mfsa2009-57.html http://www.mozilla.org/security/announce/2009/mfsa2009-59.html http://www.mozilla.org/security/announce/2009/mfsa2009-61.html http://www.mozilla.org/security/announce/2009/mfsa2009-62.html http://www.mozilla.org/security/announce/2009/mfsa2009-63.html http://www.mozilla.org/security/announce/2009/mfsa2009-64.html
* Platforms Affected: Mozilla Project, Firefox versions 3.5.x prior to 3.5.4 Microsoft Windows Any version Linux Any version |
Recommendation |
Upgrade to the latest version of Firefox (3.5.4 or later), available from the Mozilla Firefox Download Web page at http://www.mozilla.or.kr/ |
Related URL |
CVE-2009-1563,CVE-2009-3274,CVE-2009-3370~3383 (CVE) |
Related URL |
36851,36852,36853,36854,36855,36856,36857,36858,36866,36867,36869,36870,36871,36872,36873,36875 (SecurityFocus) |
Related URL |
(ISS) |
|