Mozilla Firefox < 22.0 Multiple Vulnerabilities

high Log Correlation Engine Plugin ID 801353

Synopsis

The remote host has a web browser installed that is vulnerable to multiple vulnerabilities.

Description

Versions of Firefox 21.x and older are potentially affected by the following security issues :

- Inaccessible updater can lead to local privilege escalation (CVE-2013-1700)

- Insufficient validation homographic characters could allow for domain spoofing (CVE-2013-1699)

- The getUserMedia permission dialog incorrectly displays its origin as that of the top level document rather than its calling page, which could result in incorrect camera or microphone permissions for the affected webpage. (CVE-2013-1698)

- XrayWrappers can be bypassed to run user defined methods in a privileged context (CVE-2013-1697)

- X-Frame-Options ignored when using server push with multi-part responses (CVE-2013-1696)

- Various memory corruption issues, including an arbitrary code execution vulnerability through onreadystatechange event (CVE-2013-1690, CVE-2013-1684, CVE-2013-1685, CVE-2013-1686)

- Data in the body of XHR HEAD requests leads to CSRF attacks (CVE-2013-1692)

- SVG filters can lead to information disclosure (CVE-2013-1693)

- SVG filters can lead to information disclosure via timing attacks (CVE-2013-1693)

- In certain cases, inconsistencies in PreserveWrapper can lead to an exploitable crash (CVE-2013-1694)

- Sandbox restrictions not applied to nested frame elements (CVE-2013-1695)

- X-Frame-Options header is ignored when server push is used in multi-part responses, which can result in clickjacking (CVE-2013-1696)

- Privileged content access and execution via XBL, which can lead to arbitrary code execution (CVE-2013-1687)

- Arbitrary code execution within Profiler (CVE-2013-1688)

- Miscellaneous memory safety issues specifically against versions 21.0 and 17.0.7 (CVE-2013-1682, CVE-2013-1683)

Solution

Upgrade to Firefox 22.0 (or Firefox 17.0.7 ESR) or later.

See Also

http://www.mozilla.org/security/announce/2013/mfsa2013-49.html

http://www.mozilla.org/security/announce/2013/mfsa2013-50.html

http://www.mozilla.org/security/announce/2013/mfsa2013-51.html

http://www.mozilla.org/security/announce/2013/mfsa2013-53.html

http://www.mozilla.org/security/announce/2013/mfsa2013-54.html

http://www.mozilla.org/security/announce/2013/mfsa2013-55.html

http://www.mozilla.org/security/announce/2013/mfsa2013-59.html

http://www.mozilla.org/security/announce/2013/mfsa2013-62.html

http://www.mozilla.org/security/announce/2013/mfsa2013-61.html

http://www.mozilla.org/security/announce/2013/mfsa2013-60.html

http://www.mozilla.org/security/announce/2013/mfsa2013-58.html

http://www.mozilla.org/security/announce/2013/mfsa2013-57.html

http://www.mozilla.org/security/announce/2013/mfsa2013-56.html

http://www.mozilla.org/security/announce/2013/mfsa2013-52.html

Plugin Details

Severity: High

ID: 801353

Family: Web Clients

Published: 6/26/2013

Risk Information

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

Patch Publication Date: 6/24/2013

Vulnerability Publication Date: 6/24/2013

Reference Information

CVE: CVE-2013-1682, CVE-2013-1683, CVE-2013-1684, CVE-2013-1685, CVE-2013-1686, CVE-2013-1687, CVE-2013-1688, CVE-2013-1690, CVE-2013-1692, CVE-2013-1693, CVE-2013-1694, CVE-2013-1695, CVE-2013-1696, CVE-2013-1697, CVE-2013-1698, CVE-2013-1699, CVE-2013-1700

BID: 60765, 60766, 60773, 60774, 60776, 60777, 60778, 60783, 60784, 60787, 60768, 60779, 60785, 60788, 60789, 60790, 60791