FreeBSD : mozilla -- multiple vulnerabilities (da185955-5738-11de-b857-000f20797ede)

High Nessus Plugin ID 39376

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.

VPR Score: 6.6

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

Mozilla Foundation reports :

MFSA 2009-32 JavaScript chrome privilege escalation

MFSA 2009-31 XUL scripts bypass content-policy checks

MFSA 2009-30 Incorrect principal set for file: resources loaded via location bar

MFSA 2009-29 Arbitrary code execution using event listeners attached to an element whose owner document is null

MFSA 2009-28 Race condition while accessing the private data of a NPObject JS wrapper class object

MFSA 2009-27 SSL tampering via non-200 responses to proxy CONNECT requests

MFSA 2009-26 Arbitrary domain cookie access by local file : resources

MFSA 2009-25 URL spoofing with invalid unicode characters

MFSA 2009-24 Crashes with evidence of memory corruption (rv:1.9.0.11)

Solution

Update the affected packages.

See Also

https://www.mozilla.org/en-US/security/advisories/mfsa2009-24/

https://www.mozilla.org/en-US/security/advisories/mfsa2009-25/

https://www.mozilla.org/en-US/security/advisories/mfsa2009-26/

https://www.mozilla.org/en-US/security/advisories/mfsa2009-27/

https://www.mozilla.org/en-US/security/advisories/mfsa2009-28/

https://www.mozilla.org/en-US/security/advisories/mfsa2009-29/

https://www.mozilla.org/en-US/security/advisories/mfsa2009-30/

https://www.mozilla.org/en-US/security/advisories/mfsa2009-31/

https://www.mozilla.org/en-US/security/advisories/mfsa2009-32/

http://www.nessus.org/u?3be105bf

Plugin Details

Severity: High

ID: 39376

File Name: freebsd_pkg_da185955573811deb857000f20797ede.nasl

Version: 1.21

Type: local

Published: 2009/06/15

Updated: 2019/08/02

Dependencies: 12634

Risk Information

Risk Factor: High

VPR Score: 6.6

CVSS v2.0

Base Score: 9.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:firefox, p-cpe:/a:freebsd:freebsd:linux-firefox, p-cpe:/a:freebsd:freebsd:linux-firefox-devel, p-cpe:/a:freebsd:freebsd:linux-seamonkey, p-cpe:/a:freebsd:freebsd:linux-thunderbird, p-cpe:/a:freebsd:freebsd:seamonkey, p-cpe:/a:freebsd:freebsd:thunderbird, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2009/06/12

Vulnerability Publication Date: 2009/06/11

Reference Information

CVE: CVE-2009-1392, CVE-2009-1832, CVE-2009-1833, CVE-2009-1834, CVE-2009-1835, CVE-2009-1836, CVE-2009-1837, CVE-2009-1838, CVE-2009-1839, CVE-2009-1840, CVE-2009-1841

Secunia: 35331

CWE: 20, 94, 200, 264, 287, 362