VID |
28824 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
A version of Mozilla Firefox which is older than 3.6.11 has been installed on the host. Mozilla is an open-source based Web browser, developed by the Mozilla project. Mozilla Firefox versions 3.6.x prior to 3.6.11 are vulnerable to multiple vulnerabilities.
- Multiple memory safety bugs could lead to memory corruption, potentially resulting in arbitrary code execution. (MFSA 2010-64) - By passing an excessively long string to 'document.write', it may be possible to trigger a buffer overflow condition resulting in arbitrary code execution on the remote system. (MFSA 2010-65) - A use-after-free error in nsBarProp could allow arbitrary code execution on the remote system.(MFSA 2010-66) - A dangling pointer vulnerability in LookupGetterOrSetter could allow arbitrary code execution. (MFSA 2010-67) - The Gopher parser is affected by a cross-site scripting vulnerability. (MFSA 2010-68) - It is possible to steal information from a site in a different domain using modal calls. (MFSA 2010-69) - It is possible to establish a valid SSL connection to a remote host, provided the SSL certificate was created with a common name containing a wild card followed by partial IP address of the remote host.(MFSA 2010-70) - A function used to load external libraries on Windows platform could allow loading of unsafe DLLs thus allowing binary planting attacks. (MFSA 2010-71) - The SSL implementation allows servers to use Diffie-Hellman Ephemeral mode (DHE) with a very short key length. Such key lengths could be easily breakable with modern hardware. (MFSA 2010-72)
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of this condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://www.westpoint.ltd.uk/advisories/wp-10-0001.txt http://www.zerodayinitiative.com/advisories/ZDI-10-219/ http://www.mozilla.org/security/announce/2010/mfsa2010-64.html http://www.mozilla.org/security/announce/2010/mfsa2010-65.html http://www.mozilla.org/security/announce/2010/mfsa2010-66.html http://www.mozilla.org/security/announce/2010/mfsa2010-67.html http://www.mozilla.org/security/announce/2010/mfsa2010-68.html http://www.mozilla.org/security/announce/2010/mfsa2010-69.html http://www.mozilla.org/security/announce/2010/mfsa2010-70.html http://www.mozilla.org/security/announce/2010/mfsa2010-71.html http://www.mozilla.org/security/announce/2010/mfsa2010-72.html http://www.mozilla.org/security/known-vulnerabilities/firefox36.html#firefox3.6.11
* Platforms Affected: Mozilla Project, Firefox versions 3.6.x prior to 3.6.11 Microsoft Windows Any version Linux Any version |
Recommendation |
Upgrade to the latest version of Firefox (3.6.11 or later), available from the Mozilla Firefox Download Web page at http://www.mozilla.org/ |
Related URL |
CVE-2010-3170,CVE-2010-3173,CVE-2010-3175,CVE-2010-3176,CVE-2010-3177,CVE-2010-3178,CVE-2010-3179,CVE-2010-3180,CVE-2010-3181 (CVE) |
Related URL |
44243,44245,44247,44248,44249,44250,44252,44253 (SecurityFocus) |
Related URL |
(ISS) |
|