Firefox 3.6.x < 3.6.2 Multiple Vulnerabilities

High Nessus Plugin ID 45133


The remote Windows host contains a web browser that is affected by Multiple Vulnerabilities


The installed version of Firefox 3.6.x is earlier than 3.6.2. Such versions are potentially affected by multiple security issues :

- The WOFF decoder contains an integer overflow in a font decompression routine. (MFSA 2010-08)

- Deleted image frames are reused when handling 'multipart/x-mixed-replace' images. (MFSA 2010-09)

- The 'window.location' object is made a normal overridable object. (MFSA 2010-10)

- Multiple crashes can result in arbitrary code execution.
(MFSA 2010-11)

- A cross-site scripting issue when using 'addEventListener' and 'setTimeout' on a wrapped object. (MFSA 2010-12)

- Documents fail to call certain security checks when attempting to preload images. (MFSA 2010-13)

- It is possible to corrupt a user's XUL cache. (MFSA 2010-14)

- The asynchronous Authorization Prompt is not always attached to the correct window. (MFSA 2010-15)
- Multiple crashes can result in arbitrary code execution.
(MFSA 2010-16)

- An error exists in the way '<option>' elements are inserted into a XUL tree '<optgroup>' (MFSA 2010-18)

- An error exists in the implementation of the 'windows.navigator.plugins' object. (MFSA 2010-19)

- A browser applet can be used to turn a simple mouse click into a drag-and-drop action, potentially resulting in the unintended loading of resources in a user's browser. (MFSA 2010-20)

- Session renegotiations are not handled properly, which can be exploited to insert arbitrary plaintext by a man-in-the-middle. (MFSA 2010-22)

- When an image points to a resource that redirects to a 'mailto:' URL, the external mail handler application is launched. (MFSA 2010-23)
- XML documents fail to call certain security checks when loading new content. (MFSA 2010-024)


Upgrade to Firefox 3.6.2 or later.

See Also

Plugin Details

Severity: High

ID: 45133

File Name: mozilla_firefox_362.nasl

Version: $Revision: 1.19 $

Type: local

Agent: windows

Family: Windows

Published: 2010/03/23

Modified: 2017/06/09

Dependencies: 20862

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 7.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:mozilla:firefox

Required KB Items: Mozilla/Firefox/Version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2010/03/22

Vulnerability Publication Date: 2010/02/18

Exploitable With

Core Impact

Reference Information

CVE: CVE-2009-3555, CVE-2010-0164, CVE-2010-0165, CVE-2010-0167, CVE-2010-0168, CVE-2010-0169, CVE-2010-0170, CVE-2010-0171, CVE-2010-0172, CVE-2010-0173, CVE-2010-0174, CVE-2010-0176, CVE-2010-0177, CVE-2010-0178, CVE-2010-0181, CVE-2010-0182, CVE-2010-1028

BID: 36935, 38298, 38919, 38920, 38921, 38922, 38927, 38939, 38944, 38946, 39133, 39137, 39122, 39123, 39125, 39128, 39479

OSVDB: 59970, 62416, 63264, 63265, 63267, 63268, 63269, 63270, 63271, 63272, 63273, 63460, 63461, 63462, 63463, 63464, 63465, 63466, 63620

Secunia: 38608

CWE: 310