Mozilla Firefox < 3.0.11 Multiple Vulnerabilities

medium Nessus Network Monitor Plugin ID 5072

Synopsis

The remote host has a web browser installed that is vulnerable to multiple attack vectors.

Description

Versions of Firefox prior to 3.0.11 are affected by the following security issues :

- Multiple memory corruption vulnerabilities could potentially be exploited to execute arbitrary code. (MFSA 2009-24)
- Certain invalid Unicode characters, when used as a part of IDN, can be displayed as a whitespace in the location bar. An attacker can exploit this vulnerability to spoof the location bar. (MFSA 2009-25)
- It may be possible for local resources loaded via 'file: ' protocol to access any domain's cookies saved on a user's system. (MFSA 2009-26)
- It may be possible to tamper with SSL date via non-200 responses to proxy CONNECT requests. (MFSA 2009-27)
- A race condition exists in 'NPObjWrapper_NewResolve' when accessing the properties of a NPObject, a wrapped JSObject. (MFSA 2009-28)
- If the owner document of an element becomes a null after garbage collection, then it may be possible to execute the event listeners within the wrong JavaScript context. An attacker can potentially exploit this vulnerability to execute arbitrary JavaScript with chrome privileges. (MFSA 2009-29)
- When the 'file: ' resource is loaded from the location bar, the resource inherits principal of the previously loaded document. This could potentially allow unauthorized access to local files. (MFSA-2009-30)
- While loading external scripts into XUL documents content-loading policies are not checked. (MFSA 2009-31)
- It may also be possible for scripts from page content to run with elevated privileges. (MFSA 2009-32)

Solution

Upgrade to Firefox 3.0.11 or later.

See Also

http://www.mozilla.org/security/announce/2009/mfsa2009-25.html

http://www.mozilla.org/security/announce/2009/mfsa2009-26.html

http://www.mozilla.org/security/announce/2009/mfsa2009-27.html

http://www.mozilla.org/security/announce/2009/mfsa2009-28.html

http://www.mozilla.org/security/announce/2009/mfsa2009-29.html

http://www.mozilla.org/security/announce/2009/mfsa2009-30.html

http://www.mozilla.org/security/announce/2009/mfsa2009-31.html

http://www.mozilla.org/security/announce/2009/mfsa2009-32.html

http://www.mozilla.org/security/announce/2009/mfsa2009-24.html

http://research.microsoft.com/apps/pubs/default.aspx?id=79323

Plugin Details

Severity: Medium

ID: 5072

Family: Web Clients

Published: 8/18/2004

Updated: 3/6/2019

Nessus ID: 39372

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.6

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: Medium

Base Score: 5.6

Temporal Score: 5.2

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:mozilla:firefox

Reference Information

CVE: CVE-2009-1392, CVE-2009-1832, CVE-2009-1833, CVE-2009-1834, CVE-2009-1835, CVE-2009-1836, CVE-2009-1837, CVE-2009-1838, CVE-2009-1839, CVE-2009-1840, CVE-2009-1841

BID: 35370, 35372, 35383, 35380, 35326, 35371, 35373, 35377, 35388, 35360, 35386, 35391