Korean
<< Back
VID 28825
Severity 40
Port 139,445
Protocol TCP
Class SMB
Detailed Description A version of Mozilla Firefox which is older than 3.5.14 has been installed on the host. Mozilla is an open-source based Web browser, developed by the Mozilla project. Mozilla Firefox versions 3.5.x prior to 3.5.14 are vulnerable to multiple vulnerabilities.

- Multiple memory safety bugs could lead to memory corruption, potentially resulting in arbitrary code execution. (MFSA 2010-64)
- By passing an excessively long string to 'document.write', it may be possible to trigger a buffer overflow condition resulting in arbitrary code execution on the remote system. (MFSA 2010-65)
- A use-after-free error in nsBarProp could allow arbitrary code execution on the remote system.(MFSA 2010-66)
- A dangling pointer vulnerability in LookupGetterOrSetter could allow arbitrary code execution. (MFSA 2010-67)
- The Gopher parser is affected by a cross-site scripting vulnerability. (MFSA 2010-68)
- It is possible to steal information from a site in a different domain using modal calls. (MFSA 2010-69)
- It is possible to establish a valid SSL connection to a remote host, provided the SSL certificate was created with a common name containing a wild card followed by partial IP address of the remote host.(MFSA 2010-70)
- A function used to load external libraries on Windows platform could allow loading of unsafe DLLs thus allowing binary planting attacks. (MFSA 2010-71)
- The SSL implementation allows servers to use Diffie-Hellman Ephemeral mode (DHE) with a very short key length. Such key lengths could be easily breakable with modern hardware. (MFSA 2010-72)

* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of this condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* References:
http://www.westpoint.ltd.uk/advisories/wp-10-0001.txt
http://www.zerodayinitiative.com/advisories/ZDI-10-219/
http://www.mozilla.org/security/announce/2010/mfsa2010-64.html
http://www.mozilla.org/security/announce/2010/mfsa2010-65.html
http://www.mozilla.org/security/announce/2010/mfsa2010-66.html
http://www.mozilla.org/security/announce/2010/mfsa2010-67.html
http://www.mozilla.org/security/announce/2010/mfsa2010-68.html
http://www.mozilla.org/security/announce/2010/mfsa2010-69.html
http://www.mozilla.org/security/announce/2010/mfsa2010-70.html
http://www.mozilla.org/security/announce/2010/mfsa2010-71.html
http://www.mozilla.org/security/announce/2010/mfsa2010-72.html
http://www.mozilla.org/security/known-vulnerabilities/firefox35.html#firefox3.5.14

* Platforms Affected:
Mozilla Project, Firefox versions 3.5.x prior to 3.5.14
Microsoft Windows Any version
Linux Any version
Recommendation Upgrade to the latest version of Firefox (3.5.14 or later), available from the Mozilla Firefox Download Web page at http://www.mozilla.org/
Related URL CVE-2010-3170,CVE-2010-3173,CVE-2010-3174,CVE-2010-3176,CVE-2010-3177,CVE-2010-3178,CVE-2010-3179,CVE-2010-3180,CVE-2010-3181 (CVE)
Related URL 44243,44246,44247,44248,44249,44250,44252,44253 (SecurityFocus)
Related URL (ISS)