Firefox 3.5.x < 3.5.1 Multiple Vulnerabilities

high Nessus Plugin ID 39853

Synopsis

The remote Windows host contains a web browser that is affected by multiple flaws.

Description

Firefox 3.5 is installed on the remote host. This version is potentially affected by multiple flaws :

- It may be possible to crash the browser or potentially execute arbitrary code by using a flash object that presents a slow script dialog. (MFSA 2009-35)

- In certain cases after a return from a native function, such as escape(), the Just-in-Time (JIT) compiler could get into a corrupt state. An attacker who is able to trick a user of the affected software into visiting a malicious link may be able to leverage this issue to run arbitrary code subject to the user's privileges.
(MFSA 2009-41)

Solution

Upgrade to Firefox 3.5.1 or later.

See Also

https://www.mozilla.org/en-US/security/advisories/mfsa2009-35/

https://www.mozilla.org/en-US/security/advisories/mfsa2009-41/

Plugin Details

Severity: High

ID: 39853

File Name: mozilla_firefox_351.nasl

Version: 1.20

Type: local

Agent: windows

Family: Windows

Published: 7/17/2009

Updated: 7/16/2018

Supported Sensors: Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.9

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:mozilla:firefox

Required KB Items: Mozilla/Firefox/Version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 7/16/2009

Vulnerability Publication Date: 7/13/2009

Exploitable With

CANVAS (CANVAS)

Core Impact

Metasploit (Firefox 3.5 escape() Return Value Memory Corruption)

Reference Information

CVE: CVE-2009-2467, CVE-2009-2477

BID: 35660, 35767

CWE: 94