Korean
<< Back
VID 28815
Severity 40
Port 139,445
Protocol TCP
Class SMB
Detailed Description A version of Mozilla Firefox which is older than 3.6.7 has been installed on the host. Mozilla is an open-source based Web browser, developed by the Mozilla project. Mozilla Firefox versions 3.6.x prior to 3.6.7 are vulnerable to multiple vulnerabilities.

- Multiple memory safety bugs could result in memory corruption, potentially resulting in arbitrary code execution. (MFSA 2010-34)
- An error in DOM attribute cloning could result in arbitrary code execution. (MFSA 2010-35)
- An error in Mozilla's 'NodeIterator' implementation could lead to arbitrary code execution. (MFSA 2010-36)
- An error in the code to store the names and values of plugin parameters could lead arbitrary code execution.(MFSA 2010-37)
- It may be possible to run arbitrary JavaScript with chrome privileges using SJOW and fast native function. (MFSA 2010-38)
- The array class used to store CSS values is affected by an integer overflow vulnerability. (MFSA 2010-39)
- An integer overflow vulnerability exists in the 'selection' attribute of XUL <tree> element.(MFSA 2010-40)
- A buffer overflow vulnerability in Mozilla graphics code could lead to arbitrary code execution. (MFSA 2010-41)
- It is possible to read and parse resources from other domains even when the content is not valid javascript leading to cross-domain data disclosure. (MFSA 2010-42)
- The canvas element can be used to read data from another site leading to a same-origin bypass vulnerability.(MFSA 2010-43)
- Characters mapped to U+FFFD in 8 bit encodings could cause subsequent characters to disappear, potentially contributing to cross-site scripting issues on certain websites. (MFSA 2010-44)
- Multiple location bar spoofing vulnerabilities exist.(MFSA 2010-45)
- It is possible to read data acrosss domains by injecting bogus CSS selectors into a target site.(MFSA 2010-46)
- Potentially sensitive URL parameters could be leaked across domains via script errors. (MFSA 2010-47)

* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of this condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* References:
http://www.mozilla.org/security/announce/2010/mfsa2010-34.html
http://www.mozilla.org/security/announce/2010/mfsa2010-35.html
http://www.mozilla.org/security/announce/2010/mfsa2010-36.html
http://www.mozilla.org/security/announce/2010/mfsa2010-37.html
http://www.mozilla.org/security/announce/2010/mfsa2010-38.html
http://www.mozilla.org/security/announce/2010/mfsa2010-39.html
http://www.mozilla.org/security/announce/2010/mfsa2010-40.html
http://www.mozilla.org/security/announce/2010/mfsa2010-41.html
http://www.mozilla.org/security/announce/2010/mfsa2010-42.html
http://www.mozilla.org/security/announce/2010/mfsa2010-43.html
http://www.mozilla.org/security/announce/2010/mfsa2010-44.html
http://www.mozilla.org/security/announce/2010/mfsa2010-45.html
http://www.mozilla.org/security/announce/2010/mfsa2010-46.html
http://www.mozilla.org/security/announce/2010/mfsa2010-47.html

* Platforms Affected:
Mozilla Project, Firefox versions 3.6.x prior to 3.6.7
Microsoft Windows Any version
Recommendation Upgrade to the latest version of Firefox (3.6.7 or later), available from the Mozilla Firefox Download Web page at http://www.mozilla.org/
Related URL CVE-2010-0654,CVE-2010-1206,CVE-2010-1207,CVE-2010-1208,CVE-2010-1209,CVE-2010-1210,CVE-2010-1211,CVE-2010-1212,CVE-2010-1213 (CVE)
Related URL 41842,41845,41849,41852,41853,41859,41860,41865,41866,41868,41871,41872,41878,41968 (SecurityFocus)
Related URL (ISS)