Korean
<< Back
VID 28832
Severity 40
Port 139,445
Protocol TCP
Class SMB
Detailed Description A version of Mozilla Firefox which is older than 3.5.17 has been installed on the host. Mozilla is an open-source based Web browser, developed by the Mozilla project. Mozilla Firefox versions 3.5.x prior to 3.5.17 are vulnerable to multiple vulnerabilities.

- Multiple memory corruption errors exist and may lead to arbitrary code execution. (MFSA 2010-74, MFSA 2011-01)
- An error exists in the processing of recursive calls to 'eval()' when the call is wrapped in a try/catch statement. This error causes dialog boxes to be displayed with no content and non-functioning buttons. Closing the dialog results in default acceptance of the dialog. (MFSA 2011-02)
- A use-after-free error exists in a method used by 'JSON.stringify' and can allow arbitrary code execution. (MFSA 2011-03)
- A buffer overflow vulnerability exists in the JavaScript engine's internal memory mapping of non-local variables and may lead to code execution. (MFSA 2011-04)
- A buffer overflow vulnerability exists in the JavaScript engine's internal mapping of string values and may lead to code execution. (MFSA 2011-05)
- A use-after-free error exists such that a JavaScript 'Worker' can be used to keep a reference to an object which can be freed during garbage collection. This
vulnerability may lead to arbitrary code execution.(MFSA 2011-06)
- A buffer overflow error exists related to the creation very long strings and the insertion of those strings into an HTML document. This vulnerability may lead to
arbitrary code execution. (MFSA 2011-07)
- An input validation error exists in the class, 'ParanoidFragmentSink', which allows inline JavaScript and 'javascript:' URLs in a chrome document. Note that
no unsafe usage occurs in Mozilla products, however community generated extensions could.(MFSA 2011-08)
- A cross-site request forgery (CSRF) vulnerability exists when an HTTP 307 redirect is received in response to a plugin's request. The request is forwarded to the new location without the plugin's knowledge and with custom headers intact, even across origins. (MFSA 2011-10)

* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of this condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* References:
http://archives.neohapsis.com/archives/bugtraq/2010-04/0204.html
http://www.mozilla.org/security/announce/2010/mfsa2010-74.html
http://www.mozilla.org/security/announce/2011/mfsa2011-01.html
http://www.mozilla.org/security/announce/2011/mfsa2011-02.html
http://www.mozilla.org/security/announce/2011/mfsa2011-03.html
http://www.mozilla.org/security/announce/2011/mfsa2011-04.html
http://www.mozilla.org/security/announce/2011/mfsa2011-05.html
http://www.mozilla.org/security/announce/2011/mfsa2011-06.html
http://www.mozilla.org/security/announce/2011/mfsa2011-07.html
http://www.mozilla.org/security/announce/2011/mfsa2011-08.html
http://www.mozilla.org/security/announce/2011/mfsa2011-10.html
http://www.mozilla.org/security/known-vulnerabilities/firefox35.html#firefox3.5.17
* Platforms Affected:
Mozilla Project, Firefox versions 3.5.x prior to 3.5.17
Microsoft Windows Any version
Linux Any version
Recommendation Upgrade to the latest version of Firefox (3.5.17 or later), available from the Mozilla Firefox Download Web page at http://www.mozilla.org/
Related URL CVE-2010-1585,CVE-2010-3777,CVE-2011-0051,CVE-2011-0053,CVE-2011-0054,CVE-2011-0055,CVE-2011-0056,CVE-2011-0057,CVE-2011-0058 (CVE)
Related URL 45348,46368,46643,46645,46648,46650,46652,46660,46661,46663 (SecurityFocus)
Related URL (ISS)