Firefox 3.6 < 3.6.7 Multiple Vulnerabilities
High Nessus Plugin ID 47782
Synopsis
The remote Windows host contains a web browser that is affected by multiple vulnerabilities.
Description
The installed version of Firefox 3.6.x is earlier than 3.6.7. Such versions are potentially affected by the following security issues :
- Multiple memory safety bugs could result in memory corruption, potentially resulting in arbitrary code execution. (MFSA 2010-34)
- An error in DOM attribute cloning could result in arbitrary code execution. (MFSA 2010-35)
- An error in Mozilla's 'NodeIterator' implementation could lead to arbitrary code execution. (MFSA 2010-36)
- An error in the code to store the names and values of plugin parameters could lead arbitrary code execution.
(MFSA 2010-37)
- It may be possible to run arbitrary JavaScript with chrome privileges using SJOW and fast native function. (MFSA 2010-38)
- The array class used to store CSS values is affected by an integer overflow vulnerability. (MFSA 2010-39)
- An integer overflow vulnerability exists in the 'selection' attribute of XUL <tree> element.
(MFSA 2010-40)
- A buffer overflow vulnerability in Mozilla graphics code could lead to arbitrary code execution.
(MFSA 2010-41)
- It is possible to read and parse resources from other domains even when the content is not valid JavaScript leading to cross-domain data disclosure. (MFSA 2010-42)
- The canvas element can be used to read data from another site leading to a same-origin bypass vulnerability.
(MFSA 2010-43)
- Characters mapped to U+FFFD in 8 bit encodings could cause subsequent characters to disappear, potentially contributing to cross-site scripting issues on certain websites. (MFSA 2010-44)
- Multiple location bar spoofing vulnerabilities exist.
(MFSA 2010-45)
- It is possible to read data across domains by injecting bogus CSS selectors into a target site.
(MFSA 2010-46)
- Potentially sensitive URL parameters could be leaked across domains via script errors. (MFSA 2010-47)
Solution
Upgrade to Firefox 3.6.7 or later.