Mozilla Firefox 3.6.x < 3.6.7 Multiple Vulnerabilities

medium Nessus Network Monitor Plugin ID 5607

Synopsis

The remote host has a web browser installed that is vulnerable to multiple attack vectors.

Description

Versions of Firefox 3.6.x prior to 3.6.7 are potentially affected by multiple vulnerabilities :

- Multiple memory safety bugs could result in memory corruption, potentially resulting in arbitrary code execution. (MFSA 2010-34)
- An error in DOM attribute cloning could result in arbitrary code execution. (MFSA 2010-35)
- An error in Mozilla's 'NodeIterator' implementation could lead to arbitrary code execution. (MFSA 2010-36)
- An error in the code to store the names and values of plugin parameters could lead to arbitrary code execution. (MFSA 2010-37)
- It may be possible to run arbitrary JavaScript with chrome privileges using SJOW and fast native function. (MFSA 2010-38)
- The array class used to store CSS values is affected by an integer overflow vulnerability. (MFSA 2010-39)
- An integer overflow vulnerability exists in the 'selection' attribute of the XUL tree element. (MFSA 2010-40)
- A buffer overflow exists in Mozilla graphics code could lead to arbitrary code execution. (MFSA 2010-41)
- It is possible to read and parse resources from other domains even when the content is not valid javascript leading to cross-domain data disclosure. (MFSA 2010-42)
- The canvas element can be used to read data from another site leading to a same-origin bypass vulnerability. (MFSA 2010-43)
- Characters mapped to U+FFFD in 8 bit encodings cause subsequent characteres to dissapear, potentially contributing to cross-site scripting issues on certain websites. (MFSA 2010-44)
- Multiple location bar spoofing vulnerabilities exist. (MFSA 2010-45)
- It is possible to read data across domains by injecting bogus CSS selectors into a target site. (MFSA 2010-46)
- Potentially sensitive URL parameters could be leaked across domains via script errors. (MFSA 2010-47)

Solution

Upgrade to Mozilla Firefox 3.6.7 or later.

See Also

http://www.mozilla.org/security/announce/2010/mfsa2010-34.html

http://www.mozilla.org/security/announce/2010/mfsa2010-35.html

http://www.mozilla.org/security/announce/2010/mfsa2010-36.html

http://www.mozilla.org/security/announce/2010/mfsa2010-37.html

http://www.mozilla.org/security/announce/2010/mfsa2010-39.html

http://www.mozilla.org/security/announce/2010/mfsa2010-40.html

http://www.mozilla.org/security/announce/2010/mfsa2010-41.html

http://www.mozilla.org/security/announce/2010/mfsa2010-42.html

http://www.mozilla.org/security/announce/2010/mfsa2010-45.html

http://www.mozilla.org/security/announce/2010/mfsa2010-46.html

http://www.mozilla.org/security/announce/2010/mfsa2010-47.html

http://www.mozilla.org/security/announce/2010/mfsa2010-38.html

http://www.mozilla.org/security/announce/2010/mfsa2010-43.html

http://www.mozilla.org/security/announce/2010/mfsa2010-44.html

http://www.mozilla.org/security/known-vulnerabilities/firefox36.html#firefox3.6.7

Plugin Details

Severity: Medium

ID: 5607

Family: Web Clients

Published: 7/21/2010

Updated: 3/6/2019

Nessus ID: 47782

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.6

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: Medium

Base Score: 5.6

Temporal Score: 5.2

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:mozilla:firefox

Patch Publication Date: 7/20/2010

Vulnerability Publication Date: 7/20/2010

Reference Information

CVE: CVE-2010-0654, CVE-2010-1205, CVE-2010-1206, CVE-2010-1207, CVE-2010-1208, CVE-2010-1209, CVE-2010-1210, CVE-2010-1211, CVE-2010-1212, CVE-2010-1213, CVE-2010-1214, CVE-2010-1215, CVE-2010-2751, CVE-2010-2752, CVE-2010-2753, CVE-2010-2754

BID: 41824, 41842, 41845, 41849, 41852, 41853, 41859, 41860, 41866, 41871, 41872, 41878, 41865, 41868, 41968