VID |
28855 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
A version of Mozilla Firefox which is older than 10.0.6 has been installed on the host. Mozilla Firefox is an open-source based Web browser, developed by the Mozilla project. Mozilla Firefox versions prior to 10.0.6 are multiple vulnerable to vulnerability. - Several memory safety issues exist, some of which could potentially allow arbitrary code execution. (CVE-2012-1948) - An error related to drag and drop can allow incorrect URLs to be displayed. (CVE-2012-1950) - Several memory safety issues exist related to the Gecko layout engine. (CVE-2012-1951, CVE-2012-1952, CVE-2012-1953, CVE-2012-1954) - An error related to JavaScript functions 'history.forward' and 'history.back' can allow incorrect URLs to be displayed. (CVE-2012-1955) - Cross-site scripting attacks are possible due to an error related to the '<embed>' tag within an RSS '<description>' element. (CVE-2012-1957) - A use-after-free error exists related to the method 'nsGlobalWindow::PageHidden'. (CVE-2012-1958) - An error when handling compartments can be exploited to bypass the same-compartment security wrappers (SCSW). (CVE-2012-1959) - An error when handling the "X-Frame-Options" headers can be exploited to conduct clickjacking attacks. (CVE-2012-1961) - A memory corruption error exists related to the method 'JSDependentString::undepend'. (CVE-2012-1962) - An error related to the 'Content Security Policy' (CSP) implementation can allow the disclosure of OAuth 2.0 access tokens and OpenID credentials. (CVE-2012-1963) - An error when handling certificate exceptions can be exploited to conduct clickjacking attacks via the about:certerror page. (CVE-2012-1964) - An error exists related to the 'feed:' URL that can allow cross-site scripting attacks. (CVE-2012-1965) - Cross-site scripting attacks are possible due to an error related to the 'data:' URL and context menus. (CVE-2012-1966) - An error exists related to the 'javascript:' URL that can allow scripts to run at elevated privileges outside the sandbox. (CVE-2012-1967)
* Note: This check requires an account with Guest or upper privileges which can access the registry of the remote host to scan. Absence of this condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://www.mozilla.org/security/announce/2012/mfsa2012-42.html http://www.mozilla.org/security/announce/2012/mfsa2012-43.html http://www.mozilla.org/security/announce/2012/mfsa2012-44.html http://www.mozilla.org/security/announce/2012/mfsa2012-45.html http://www.mozilla.org/security/announce/2012/mfsa2012-46.html http://www.mozilla.org/security/announce/2012/mfsa2012-47.html http://www.mozilla.org/security/announce/2012/mfsa2012-48.html http://www.mozilla.org/security/announce/2012/mfsa2012-49.html http://www.mozilla.org/security/announce/2012/mfsa2012-51.html http://www.mozilla.org/security/announce/2012/mfsa2012-52.html http://www.mozilla.org/security/announce/2012/mfsa2012-53.html http://www.mozilla.org/security/announce/2012/mfsa2012-54.html http://www.mozilla.org/security/announce/2012/mfsa2012-55.html http://www.mozilla.org/security/announce/2012/mfsa2012-56.html
* Platforms Affected: Mozilla Foundation, Firefox versions prior to 10.0.6 Any operating system Any version |
Recommendation |
Upgrade to the latest version of Firefox (10.0.6 or 14.0 or later), available from the Mozilla Web site at http://www.mozilla.com/firefox/ |
Related URL |
CVE-2012-1948,CVE-2012-1950,CVE-2012-1951,CVE-2012-1952,CVE-2012-1953,CVE-2012-1954,CVE-2012-1955,CVE-2012-1957,CVE-2012-1958,CVE-2012-1959 (CVE) |
Related URL |
54573,54574,54575,54576,54577,54578,54579,54581,54582,54583,54584,54585,54586 (SecurityFocus) |
Related URL |
(ISS) |
|