Mozilla Firefox 3.6.x < 3.6.3 RCE

medium Nessus Network Monitor Plugin ID 5502

Synopsis

The remote host has a web browser installed that is vulnerable to a remote code execution attack.

Description

The remote host is running a version of Mozilla Firefox 3.6.x prior to 3.6.3. Such versions are potentially affected by a memory corruption flaw caused by the re-use of a freed object when moving DOM nodes between documents. A remote attacker, exploiting this flaw, could execute arbitrary code on the remote host subject to the privileges of the user running the affected application.

Solution

Upgrade to Firefox 3.6.3 or later.

See Also

http://www.mozilla.org/security/announce/2010/mfsa2010-25.html

Plugin Details

Severity: Medium

ID: 5502

Family: Web Clients

Published: 4/2/2010

Updated: 3/6/2019

Nessus ID: 45403

Risk Information

VPR

Risk Factor: Medium

Score: 5.8

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.6

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: Medium

Base Score: 5.6

Temporal Score: 5.2

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:mozilla:firefox

Patch Publication Date: 4/1/2010

Vulnerability Publication Date: 4/1/2010

Reference Information

CVE: CVE-2010-1121

BID: 38952