Mozilla Firefox 20.x <= 20 Multiple Vulnerabilities

medium Log Correlation Engine Plugin ID 801267
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The remote host has a web browser installed that is vulnerable to multiple vulnerabilities.

Description

Versions of Firefox 20.x and older are potentially affected by the following security issues :

- An outdated MozillaMaintenance Service registry entry can trigger a trusted path privilege escalation (CVE-2013-1673)

- An unspecified arbitrary code execution vulnerability within update service (CVE-2012-1942)

- An arbitrary code execution vulnerability in Mozilla Maintenance Service with junctions (CVE-2013-1672)

- Multiple memory corruption vulnerabilities exist that can lead to code execution (CVE-2013-0801, CVE-2013-1669)

- The Chrome Object Wrapper (COW) does not prevent acquisition of chrome privileges during calls to content level constructors, which allows remote attackers to bypass certain read-only restrictions and conduct cross-site scripting (CVE-2013-1670)

- File input control can disclose full path information, leading to information leakage that can be used for further attacks (CVE-2013-1671)

- Some DOMSVGZoomEvent functions are used without being properly initialized, which can lead to information leakage in certain cases. (CVE-2013-1675)

- A series of use-after-free, out of bounds read, and invalid write problems can be exploited for remote code execution (CVE-2013-1674, CVE-2013-1676, CVE-2013-1677, CVE-2013-1678, CVE-2013-1679, CVE-2013-1680, CVE-2013-1681)

Solution

Upgrade to Firefox 21.0 or later.

See Also

http://www.mozilla.org/security/announce/2013/mfsa2013-41.html

http://www.mozilla.org/security/announce/2013/mfsa2013-42.html

http://www.mozilla.org/security/announce/2013/mfsa2013-43.html

http://www.mozilla.org/security/announce/2013/mfsa2013-44.html

http://www.mozilla.org/security/announce/2013/mfsa2013-45.html

http://www.mozilla.org/security/announce/2013/mfsa2013-46.html

http://www.mozilla.org/security/announce/2013/mfsa2013-47.html

http://www.mozilla.org/security/announce/2013/mfsa2013-48.html

Plugin Details

Severity: Medium

ID: 801267

Family: Web Clients

Published: 5/16/2013

Updated: 5/16/2013

Nessus ID: 66442, 66449, 66480, 66600, 66766

Risk Information

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 5.3

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

Patch Publication Date: 5/14/2013

Vulnerability Publication Date: 5/14/2013

Reference Information

CVE: CVE-2013-0801, CVE-2013-1669, CVE-2013-1670, CVE-2013-1671, CVE-2013-1672, CVE-2013-1673, CVE-2013-1674, CVE-2013-1675, CVE-2013-1676, CVE-2013-1677, CVE-2013-1678, CVE-2013-1679, CVE-2013-1680, CVE-2013-1681

BID: 59855, 59858, 59859, 59860, 59861, 59862, 59863, 59864, 59865, 59868, 59869, 59870, 59872, 59873