icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons_061

Mozilla Firefox 3.6 < 3.6.23 Multiple Vulnerabilities

High

Synopsis

The remote host has a web browser installed that is vulnerable to multiple attack vectors.

Description

The remote host has a web browser installed that is vulnerable to multiple attack vectors.

Versions of Firefox 3.6 earlier than 3.6.23 are potentially affected by the following security issues : - An integer underflow exists when handling a large JavaScript 'RegExp' expression that can allow a potentially exploitable crash. (Issue 684815) - If an attacker could trick a user into holding down the 'Enter' key, via a malicious game for example, a malicious application or extension could be downloaded and executed. (CVE-2011-2372) - Unspecified error exist that can be exploited to corrupt memory. No additional information is available at this time. (CVE-2011-2995, CVE-2011-2996) - There is an error in the implementation of the 'window.location' JavaScript object when creating named frames. This can be exploited to bypass the same-origin policy and potentially conduct cross-site scripting attacks. (CVE-2011-2999) - A weakness exists when handling the 'Location' header. This can lead to response splitting attacks when visiting a vulnerable web server. The same fix has been applied to the headers 'Content-Length' and 'Content-Disposition'. (CVE-2011-3000)

Solution

Upgrade to Firefox 3.6.23 or later.