Firefox < 16.0.2 Multiple Vulnerabilities

Medium Nessus Plugin ID 62744


The remote Windows host contains a web browser that is affected by multiple vulnerabilities.


The installed version of Firefox is earlier than 16.0.2 and is, therefore, potentially affected by the following security issues :

- The true value of 'window.location' can be shadowed by user content through the use of the 'valueOf' method, which can be combined with some plugins to perform cross-site scripting attacks. (CVE-2012-4194)

- The 'CheckURL' function of 'window.location' can be forced to return the wrong calling document and principal, allowing a cross-site scripting attack.

- It is possible to use property injection by prototype to bypass security wrapper protections on the 'Location' object, allowing the cross-origin reading of the 'Location' object. (CVE-2012-4196)


Upgrade to Firefox 16.0.2 or later.

See Also

Plugin Details

Severity: Medium

ID: 62744

File Name: mozilla_firefox_1602.nasl

Version: $Revision: 1.11 $

Type: local

Agent: windows

Family: Windows

Published: 2012/10/29

Modified: 2017/06/06

Dependencies: 20862

Risk Information

Risk Factor: Medium


Base Score: 4.3

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:mozilla:firefox

Required KB Items: Mozilla/Firefox/Version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2012/10/26

Vulnerability Publication Date: 2012/10/26

Reference Information

CVE: CVE-2012-4194, CVE-2012-4195, CVE-2012-4196

BID: 56301, 56302, 56306

OSVDB: 86773, 86774, 86775

CWE: 20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990