VID |
28815 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
A version of Mozilla Firefox which is older than 3.6.7 has been installed on the host. Mozilla is an open-source based Web browser, developed by the Mozilla project. Mozilla Firefox versions 3.6.x prior to 3.6.7 are vulnerable to multiple vulnerabilities.
- Multiple memory safety bugs could result in memory corruption, potentially resulting in arbitrary code execution. (MFSA 2010-34) - An error in DOM attribute cloning could result in arbitrary code execution. (MFSA 2010-35) - An error in Mozilla's 'NodeIterator' implementation could lead to arbitrary code execution. (MFSA 2010-36) - An error in the code to store the names and values of plugin parameters could lead arbitrary code execution.(MFSA 2010-37) - It may be possible to run arbitrary JavaScript with chrome privileges using SJOW and fast native function. (MFSA 2010-38) - The array class used to store CSS values is affected by an integer overflow vulnerability. (MFSA 2010-39) - An integer overflow vulnerability exists in the 'selection' attribute of XUL <tree> element.(MFSA 2010-40) - A buffer overflow vulnerability in Mozilla graphics code could lead to arbitrary code execution. (MFSA 2010-41) - It is possible to read and parse resources from other domains even when the content is not valid javascript leading to cross-domain data disclosure. (MFSA 2010-42) - The canvas element can be used to read data from another site leading to a same-origin bypass vulnerability.(MFSA 2010-43) - Characters mapped to U+FFFD in 8 bit encodings could cause subsequent characters to disappear, potentially contributing to cross-site scripting issues on certain websites. (MFSA 2010-44) - Multiple location bar spoofing vulnerabilities exist.(MFSA 2010-45) - It is possible to read data acrosss domains by injecting bogus CSS selectors into a target site.(MFSA 2010-46) - Potentially sensitive URL parameters could be leaked across domains via script errors. (MFSA 2010-47)
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of this condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://www.mozilla.org/security/announce/2010/mfsa2010-34.html http://www.mozilla.org/security/announce/2010/mfsa2010-35.html http://www.mozilla.org/security/announce/2010/mfsa2010-36.html http://www.mozilla.org/security/announce/2010/mfsa2010-37.html http://www.mozilla.org/security/announce/2010/mfsa2010-38.html http://www.mozilla.org/security/announce/2010/mfsa2010-39.html http://www.mozilla.org/security/announce/2010/mfsa2010-40.html http://www.mozilla.org/security/announce/2010/mfsa2010-41.html http://www.mozilla.org/security/announce/2010/mfsa2010-42.html http://www.mozilla.org/security/announce/2010/mfsa2010-43.html http://www.mozilla.org/security/announce/2010/mfsa2010-44.html http://www.mozilla.org/security/announce/2010/mfsa2010-45.html http://www.mozilla.org/security/announce/2010/mfsa2010-46.html http://www.mozilla.org/security/announce/2010/mfsa2010-47.html
* Platforms Affected: Mozilla Project, Firefox versions 3.6.x prior to 3.6.7 Microsoft Windows Any version |
Recommendation |
Upgrade to the latest version of Firefox (3.6.7 or later), available from the Mozilla Firefox Download Web page at http://www.mozilla.org/ |
Related URL |
CVE-2010-0654,CVE-2010-1206,CVE-2010-1207,CVE-2010-1208,CVE-2010-1209,CVE-2010-1210,CVE-2010-1211,CVE-2010-1212,CVE-2010-1213 (CVE) |
Related URL |
41842,41845,41849,41852,41853,41859,41860,41865,41866,41868,41871,41872,41878,41968 (SecurityFocus) |
Related URL |
(ISS) |
|