Firefox 3.0.x < 3.0.7 Multiple Vulnerabilities

This script is Copyright (C) 2009-2017 Tenable Network Security, Inc.


Synopsis :

The remote Windows host contains a web browser that is affected by
multiple vulnerabilities.

Description :

The installed version of Firefox 3.0.x is earlier than 3.0.7. Such
versions are potentially affected by the following security issues :

- By exploiting stability bugs in the browser engine, it
might be possible for an attacker to execute arbitrary
code on the remote system under certain conditions.
(MFSA 2009-07)

- A vulnerability in Mozilla's garbage collection process
could be exploited to run arbitrary code on the remote
system. (MFSA 2009-08)

- It may be possible for a website to read arbitrary XML
data from another domain by using nsIRDFService and a
cross-domain redirect. (MFSA 2009-09)

- Vulnerabilities in the PNG libraries used by Mozilla
could be exploited to execute arbitrary code on the
remote system. (MFSA 2009-10)

- Certain invisible characters are decoded before being
displayed on the location bar. An attacker may be able
to exploit this flaw to spoof the location bar and
display a link to a malicious URL. (MFSA 2009-11)

See also :

https://www.mozilla.org/en-US/security/advisories/mfsa2009-07/
https://www.mozilla.org/en-US/security/advisories/mfsa2009-08/
https://www.mozilla.org/en-US/security/advisories/mfsa2009-09/
https://www.mozilla.org/en-US/security/advisories/mfsa2009-10/
https://www.mozilla.org/en-US/security/advisories/mfsa2009-11/

Solution :

Upgrade to Firefox 3.0.7 or later.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.1
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now