Firefox 3.6.x < 3.6.2 Multiple Vulnerabilities

High Nessus Plugin ID 45133

Synopsis

The remote Windows host contains a web browser that is affected by Multiple Vulnerabilities

Description

The installed version of Firefox 3.6.x is earlier than 3.6.2. Such versions are potentially affected by multiple security issues :

- The WOFF decoder contains an integer overflow in a font decompression routine. (MFSA 2010-08)

- Deleted image frames are reused when handling 'multipart/x-mixed-replace' images. (MFSA 2010-09)

- The 'window.location' object is made a normal overridable object. (MFSA 2010-10)

- Multiple crashes can result in arbitrary code execution.
(MFSA 2010-11)

- A cross-site scripting issue when using 'addEventListener' and 'setTimeout' on a wrapped object. (MFSA 2010-12)

- Documents fail to call certain security checks when attempting to preload images. (MFSA 2010-13)

- It is possible to corrupt a user's XUL cache. (MFSA 2010-14)

- The asynchronous Authorization Prompt is not always attached to the correct window. (MFSA 2010-15)
- Multiple crashes can result in arbitrary code execution.
(MFSA 2010-16)

- An error exists in the way '<option>' elements are inserted into a XUL tree '<optgroup>' (MFSA 2010-18)

- An error exists in the implementation of the 'windows.navigator.plugins' object. (MFSA 2010-19)

- A browser applet can be used to turn a simple mouse click into a drag-and-drop action, potentially resulting in the unintended loading of resources in a user's browser. (MFSA 2010-20)

- Session renegotiations are not handled properly, which can be exploited to insert arbitrary plaintext by a man-in-the-middle. (MFSA 2010-22)

- When an image points to a resource that redirects to a 'mailto:' URL, the external mail handler application is launched. (MFSA 2010-23)
- XML documents fail to call certain security checks when loading new content. (MFSA 2010-024)

Solution

Upgrade to Firefox 3.6.2 or later.

See Also

https://www.mozilla.org/en-US/security/advisories/mfsa2010-08/

https://www.mozilla.org/en-US/security/advisories/mfsa2010-09/

https://www.mozilla.org/en-US/security/advisories/mfsa2010-10/

https://www.mozilla.org/en-US/security/advisories/mfsa2010-11/

https://www.mozilla.org/en-US/security/advisories/mfsa2010-12/

https://www.mozilla.org/en-US/security/advisories/mfsa2010-13/

https://www.mozilla.org/en-US/security/advisories/mfsa2010-14/

https://www.mozilla.org/en-US/security/advisories/mfsa2010-15/

https://www.mozilla.org/en-US/security/advisories/mfsa2010-16/

https://www.mozilla.org/en-US/security/advisories/mfsa2010-18/

https://www.mozilla.org/en-US/security/advisories/mfsa2010-19/

https://www.mozilla.org/en-US/security/advisories/mfsa2010-20/

https://www.mozilla.org/en-US/security/advisories/mfsa2010-22/

https://www.mozilla.org/en-US/security/advisories/mfsa2010-23/

https://www.mozilla.org/en-US/security/advisories/mfsa2010-24/

http://www.nessus.org/u?9a64eb33

Plugin Details

Severity: High

ID: 45133

File Name: mozilla_firefox_362.nasl

Version: 1.21

Type: local

Agent: windows

Family: Windows

Published: 2010/03/23

Updated: 2018/11/15

Dependencies: 20862

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 9.3

Temporal Score: 7.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:mozilla:firefox

Required KB Items: Mozilla/Firefox/Version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2010/03/22

Vulnerability Publication Date: 2010/02/18

Exploitable With

Core Impact

Reference Information

CVE: CVE-2009-3555, CVE-2010-0164, CVE-2010-0165, CVE-2010-0167, CVE-2010-0168, CVE-2010-0169, CVE-2010-0170, CVE-2010-0171, CVE-2010-0172, CVE-2010-0173, CVE-2010-0174, CVE-2010-0176, CVE-2010-0177, CVE-2010-0178, CVE-2010-0181, CVE-2010-0182, CVE-2010-1028

BID: 36935, 38298, 38919, 38920, 38921, 38922, 38927, 38939, 38944, 38946, 39133, 39137, 39122, 39123, 39125, 39128, 39479

Secunia: 38608

CWE: 310