Korean
<< Back
VID 28842
Severity 40
Port 139,445
Protocol TCP
Class SMB
Detailed Description A version of Mozilla Firefox which is older than 5 has been installed on the host. Mozilla is an open-source based Web browser, developed by the Mozilla project. Mozilla Firefox versions prior to 5 are vulnerable to multiple vulnerabilities.

- A dangling pointer vulnerability exists in an SVG text manipulation routine. (CVE-2011-0084)
- Several memory safety bugs exist in the browser engine that may permit remote code execution. (CVE-2011-2985,CVE-2011-2989, CVE-2011-2991, CVE-2011-2992)
- A cross-origin data theft vulnerability exists when using canvas and Windows D2D hardware acceleration.(CVE-2011-2986)
- A heap overflow vulnerability exists in WebGL's ANGLE library. (CVE-2011-2987)
- A buffer overflow vulnerability exists in WebGL when using an overly long shader program. (CVE-2011-2988)
- Two errors exist related to Content Security Policy that can lead to information disclosure. (CVE-2011-2990)
- An unspecified error exists that can allow unsigned JavaScript to call into a signed JAR and inherit the signed JAR's permissions and identity. (CVE-2011-2993)

* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of this condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* References:
http://www.mozilla.org/security/announce/2011/mfsa2011-29.html
http://www.zerodayinitiative.com/advisories/ZDI-11-270/

* Platforms Affected:
Mozilla Project, Firefox versions prior to 5
Microsoft Windows Any version
Linux Any version
Recommendation Upgrade to the latest version of Firefox (5 or later), available from the Mozilla Firefox Download Web page at http://www.mozilla.org/
Related URL CVE-2011-0084,CVE-2011-2985,CVE-2011-2986,CVE-2011-2987,CVE-2011-2988,CVE-2011-2989,CVE-2011-2990,CVE-2011-2991,CVE-2011-2992,CVE-2011-2993 (CVE)
Related URL 49213,49224,49226,49227,49349,49242,49243,49245,49246,49248 (SecurityFocus)
Related URL (ISS)