This script is Copyright (C) 2009-2017 Tenable Network Security, Inc.
The remote Windows host contains a web browser that is
affected by multiple flaws.
The installed version of Firefox is earlier than 3.0.13. Such
versions are potentially affected by the following security issues :
- The browser can be fooled into trusting a malicious SSL
server certificate with a null character in the host name.
- A heap overflow in the code that handles regular
expressions in certificate names can lead to
arbitrary code execution. (MFSA 2009-43)
- The location bar and SSL indicators can be spoofed
by calling window.open() on an invalid URL. A remote
attacker could use this to perform a phishing attack.
to memory corruption, and possibly arbitrary execution
of code. (MFSA 2009-45)
See also :
Upgrade to Firefox 3.0.13 or later.
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 8.1
Public Exploit Available : false
Nessus Plugin ID: 40478 ()
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now