Firefox < 2.0.0.12 Multiple Vulnerabilities

High Nessus Plugin ID 30209

Synopsis

The remote Windows host contains a web browser that is affected by multiple vulnerabilities.

Description

The installed version of Firefox is affected by various security issues :

- Several stability bugs leading to crashes which, in some cases, show traces of memory corruption

- Several file input focus stealing vulnerabilities that could result in uploading of arbitrary files provided their full path and file names are known.

- Several issues that allow scripts from page content to escape from their sandboxed context and/or run with chrome privileges, resulting in privilege escalation, XSS, and/or remote code execution.

- An issue that could allow a malicious site to inject newlines into the application's password store when a user saves his password, resulting in corruption of saved passwords for other sites.

- A directory traversal vulnerability via the 'chrome:' URI.

- A vulnerability involving 'designMode' frames that may result in web browsing history and forward navigation stealing.

- An information disclosure issue in the BMP decoder.

- A file action dialog tampering vulnerability involving timer-enabled security dialogs.

- Mis-handling of locally-saved plaintext files.

- Possible disclosure of sensitive URL parameters, such as session tokens, via the .href property of stylesheet DOM nodes reflecting the final URI of the stylesheet after following any 302 redirects.

- A failure to display a web forgery warning dialog in cases where the entire contents of a page are enclosed in a '<div>' with absolute positioning.

- Multiple cross-site scripting vulnerabilities related to character encoding.

Solution

Upgrade to Firefox 2.0.0.12 or later.

See Also

https://www.mozilla.org/en-US/security/advisories/mfsa2008-01/

https://www.mozilla.org/en-US/security/advisories/mfsa2008-02/

https://www.mozilla.org/en-US/security/advisories/mfsa2008-03/

https://www.mozilla.org/en-US/security/advisories/mfsa2008-04/

https://www.mozilla.org/en-US/security/advisories/mfsa2008-05/

https://www.mozilla.org/en-US/security/advisories/mfsa2008-06/

https://www.mozilla.org/en-US/security/advisories/mfsa2008-07/

https://www.mozilla.org/en-US/security/advisories/mfsa2008-08/

https://www.mozilla.org/en-US/security/advisories/mfsa2008-09/

https://www.mozilla.org/en-US/security/advisories/mfsa2008-10/

https://www.mozilla.org/en-US/security/advisories/mfsa2008-11/

https://www.mozilla.org/en-US/security/advisories/mfsa2008-13/

Plugin Details

Severity: High

ID: 30209

File Name: mozilla_firefox_20012.nasl

Version: 1.21

Type: local

Agent: windows

Family: Windows

Published: 2008/02/08

Updated: 2018/07/16

Dependencies: 20862

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 9.3

Temporal Score: 7.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:mozilla:firefox

Required KB Items: Mozilla/Firefox/Version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2008/02/07

Reference Information

CVE: CVE-2008-0412, CVE-2008-0413, CVE-2008-0414, CVE-2008-0415, CVE-2008-0416, CVE-2008-0417, CVE-2008-0418, CVE-2008-0419, CVE-2008-0420, CVE-2008-0591, CVE-2008-0592, CVE-2008-0593, CVE-2008-0594

BID: 24293, 27406, 27683, 27826, 29303

CWE: 20, 22, 79, 94, 200, 399