Firefox 3.5.x < 3.5.1 Multiple Vulnerabilities

High Nessus Plugin ID 39853

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.

VPR Score: 8.9


The remote Windows host contains a web browser that is affected by multiple flaws.


Firefox 3.5 is installed on the remote host. This version is potentially affected by multiple flaws :

- It may be possible to crash the browser or potentially execute arbitrary code by using a flash object that presents a slow script dialog. (MFSA 2009-35)

- In certain cases after a return from a native function, such as escape(), the Just-in-Time (JIT) compiler could get into a corrupt state. An attacker who is able to trick a user of the affected software into visiting a malicious link may be able to leverage this issue to run arbitrary code subject to the user's privileges.
(MFSA 2009-41)


Upgrade to Firefox 3.5.1 or later.

See Also

Plugin Details

Severity: High

ID: 39853

File Name: mozilla_firefox_351.nasl

Version: 1.20

Type: local

Agent: windows

Family: Windows

Published: 2009/07/17

Updated: 2018/07/16

Dependencies: 20862

Risk Information

Risk Factor: High

VPR Score: 8.9

CVSS v2.0

Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:H/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:mozilla:firefox

Required KB Items: Mozilla/Firefox/Version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2009/07/16

Vulnerability Publication Date: 2009/07/13

Exploitable With


Core Impact

Metasploit (Firefox 3.5 escape() Return Value Memory Corruption)

Reference Information

CVE: CVE-2009-2467, CVE-2009-2477

BID: 35660, 35767

CWE: 94