SynopsisThe remote host has a web browser installed that is vulnerable to multiple attack vectors.
DescriptionVersions of Firefox prior to 21.0 are potentially affected by the following security issues :
- An outdated MozillaMaintenance Service registry entry can trigger a trusted path privilege escalation (CVE-2013-1673)
- An unspecified arbitrary code execution vulnerability within update service (CVE-2012-1942)
- An arbitrary code execution vulnerability in Mozilla Maintenance Service with junctions (CVE-2013-1672)
- Multiple memory corruption vulnerabilities exist that can lead to code execution (CVE-2013-0801, CVE-2013-1669)
- The Chrome Object Wrapper (COW) does not prevent acquisition of chrome privileges during calls to content level constructors, which allows remote attackers to bypass certain read-only restrictions and conduct cross-site scripting (CVE-2013-1670)
- File input control can disclose full path information, leading to information leakage that can be used for further attacks (CVE-2013-1671)
- Some DOMSVGZoomEvent functions are used without being properly initialized, which can lead to information leakage in certain cases. (CVE-2013-1675)
- A series of use-after-free, out of bounds read, and invalid write problems can be exploited for remote code execution (CVE-2013-1674, CVE-2013-1676, CVE-2013-1677, CVE-2013-1678, CVE-2013-1679, CVE-2013-1680, CVE-2013-1681)
SolutionUpgrade to Firefox 21.0 or later.