Firefox < 3.0.13 Multiple Vulnerabilities

High Nessus Plugin ID 40478


The remote Windows host contains a web browser that is affected by multiple flaws.


The installed version of Firefox is earlier than 3.0.13. Such versions are potentially affected by the following security issues :

- The browser can be fooled into trusting a malicious SSL server certificate with a null character in the host name.
(MFSA 2009-42)

- A heap overflow in the code that handles regular expressions in certificate names can lead to arbitrary code execution. (MFSA 2009-43)

- The location bar and SSL indicators can be spoofed by calling on an invalid URL. A remote attacker could use this to perform a phishing attack.
(MFSA 2009-44)

- Unspecified JavaScript-related vulnerabilities can lead to memory corruption, and possibly arbitrary execution of code. (MFSA 2009-45)


Upgrade to Firefox 3.0.13 or later.

See Also

Plugin Details

Severity: High

ID: 40478

File Name: mozilla_firefox_3013.nasl

Version: $Revision: 1.19 $

Type: local

Agent: windows

Family: Windows

Published: 2009/08/04

Modified: 2017/06/09

Dependencies: 20862

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:mozilla:firefox

Required KB Items: Mozilla/Firefox/Version

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2009/08/01

Reference Information

CVE: CVE-2009-2404, CVE-2009-2408, CVE-2009-2654, CVE-2009-2662, CVE-2009-2663, CVE-2009-2664

BID: 35803, 35888, 35891, 35927, 36018

OSVDB: 56717, 56719, 56720, 56721, 56722, 56723, 56724, 64070

Secunia: 36001, 36088

CWE: 20, 119, 310, 399