Firefox 3.6.x < 3.6.2 Multiple Vulnerabilities

This script is Copyright (C) 2010-2017 Tenable Network Security, Inc.


Synopsis :

The remote Windows host contains a web browser that is affected by
Multiple Vulnerabilities

Description :

The installed version of Firefox 3.6.x is earlier than 3.6.2. Such
versions are potentially affected by multiple security issues :

- The WOFF decoder contains an integer overflow in a font
decompression routine. (MFSA 2010-08)

- Deleted image frames are reused when handling
'multipart/x-mixed-replace' images. (MFSA 2010-09)

- The 'window.location' object is made a normal
overridable object. (MFSA 2010-10)

- Multiple crashes can result in arbitrary code execution.
(MFSA 2010-11)

- A cross-site scripting issue when using
'addEventListener' and 'setTimeout' on a wrapped object.
(MFSA 2010-12)

- Documents fail to call certain security checks when
attempting to preload images. (MFSA 2010-13)

- It is possible to corrupt a user's XUL cache.
(MFSA 2010-14)

- The asynchronous Authorization Prompt is not always
attached to the correct window. (MFSA 2010-15)

- Multiple crashes can result in arbitrary code execution.
(MFSA 2010-16)

- An error exists in the way '<option>' elements are
inserted into a XUL tree '<optgroup>' (MFSA 2010-18)

- An error exists in the implementation of the
'windows.navigator.plugins' object. (MFSA 2010-19)

- A browser applet can be used to turn a simple mouse
click into a drag-and-drop action, potentially resulting
in the unintended loading of resources in a user's
browser. (MFSA 2010-20)

- Session renegotiations are not handled properly, which
can be exploited to insert arbitrary plaintext by a
man-in-the-middle. (MFSA 2010-22)

- When an image points to a resource that redirects to a
'mailto:' URL, the external mail handler application is
launched. (MFSA 2010-23)

- XML documents fail to call certain security checks when
loading new content. (MFSA 2010-024)

See also :

https://www.mozilla.org/en-US/security/advisories/mfsa2010-08/
https://www.mozilla.org/en-US/security/advisories/mfsa2010-09/
https://www.mozilla.org/en-US/security/advisories/mfsa2010-10/
https://www.mozilla.org/en-US/security/advisories/mfsa2010-11/
https://www.mozilla.org/en-US/security/advisories/mfsa2010-12/
https://www.mozilla.org/en-US/security/advisories/mfsa2010-13/
https://www.mozilla.org/en-US/security/advisories/mfsa2010-14/
https://www.mozilla.org/en-US/security/advisories/mfsa2010-15/
https://www.mozilla.org/en-US/security/advisories/mfsa2010-16/
https://www.mozilla.org/en-US/security/advisories/mfsa2010-18/
https://www.mozilla.org/en-US/security/advisories/mfsa2010-19/
https://www.mozilla.org/en-US/security/advisories/mfsa2010-20/
https://www.mozilla.org/en-US/security/advisories/mfsa2010-22/
https://www.mozilla.org/en-US/security/advisories/mfsa2010-23/
https://www.mozilla.org/en-US/security/advisories/mfsa2010-24/
http://www.nessus.org/u?49ec0d80

Solution :

Upgrade to Firefox 3.6.2 or later.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.7
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true