Firefox 3.6 < 3.6.3 Remote Code Execution

high Nessus Plugin ID 45403

Synopsis

The remote Windows host contains a web browser that is affected by a remote code execution vulnerability.

Description

The installed version of Firefox 3.6.x is earlier than 3.6.3. Such versions are potentially affected by a memory corruption flaw caused by the re-use of an object that has been freed when moving DOM nodes between documents.

A remote attacker, exploiting this flaw, can leverage this issue to execute arbitrary code on the remote host subject to the privileges of the user running the affected application.

Solution

Upgrade to Firefox 3.6.3 or later.

See Also

https://www.mozilla.org/en-US/security/advisories/mfsa2010-25/

Plugin Details

Severity: High

ID: 45403

File Name: mozilla_firefox_363.nasl

Version: 1.15

Type: local

Agent: windows

Family: Windows

Published: 4/2/2010

Updated: 7/16/2018

Supported Sensors: Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.8

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:mozilla:firefox

Required KB Items: Mozilla/Firefox/Version

Exploit Ease: No known exploits are available

Patch Publication Date: 4/1/2010

Vulnerability Publication Date: 3/24/2010

Reference Information

CVE: CVE-2010-1121

BID: 38952

Secunia: 39175