Mozilla Firefox < 22.0 Multiple Vulnerabilities

critical Nessus Network Monitor Plugin ID 6886


The remote host has a web browser installed that is vulnerable to multiple attack vectors.


Versions of Firefox 21.x and older are potentially affected by the following security issues :

- Inaccessible updater can lead to local privilege escalation (CVE-2013-1700)
- Insufficient validation homographic characters could allow for domain spoofing (CVE-2013-1699)
- The getUserMedia permission dialog incorrectly displays its origin as that of the top level document rather than its calling page, which could result in incorrect camera or microphone permissions for the affected webpage. (CVE-2013-1698)
- XrayWrappers can be bypassed to run user defined methods in a privileged context (CVE-2013-1697)
- X-Frame-Options ignored when using server push with multi-part responses (CVE-2013-1696)
- Various memory corruption issues, including an arbitrary code execution vulnerability through onreadystatechange event (CVE-2013-1690, CVE-2013-1684, CVE-2013-1685, CVE-2013-1686)
- Data in the body of XHR HEAD requests leads to CSRF attacks (CVE-2013-1692)
- SVG filters can lead to information disclosure (CVE-2013-1693)
- SVG filters can lead to information disclosure via timing attacks (CVE-2013-1693)
- In certain cases, inconsistencies in PreserveWrapper can lead to an exploitable crash (CVE-2013-1694)
- Sandbox restrictions not applied to nested frame elements (CVE-2013-1695)
- X-Frame-Options header is ignored when server push is used in multi-part responses, which can result in clickjacking (CVE-2013-1696)
- Privileged content access and execution via XBL, which can lead to arbitrary code execution (CVE-2013-1687)
- Arbitrary code execution within Profiler (CVE-2013-1688)
- Miscellaneous memory safety issues specifically against versions 21.0 and 17.0.7 (CVE-2013-1682, CVE-2013-1683)


Upgrade to Firefox 22.0 (or Firefox 17.0.7 ESR) or later.

See Also

Plugin Details

Severity: Critical

ID: 6886

Family: Web Clients

Published: 6/26/2013

Updated: 3/6/2019

Risk Information


Risk Factor: Critical

Score: 9.5


Risk Factor: Critical

Base Score: 10

Temporal Score: 8.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C


Risk Factor: Critical

Base Score: 9.8

Temporal Score: 9.4

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:X/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:mozilla:firefox

Patch Publication Date: 6/24/2013

Vulnerability Publication Date: 6/24/2013

Exploitable With

Metasploit (Firefox onreadystatechange Event DocumentViewerImpl Use After Free)

Reference Information

CVE: CVE-2013-1682, CVE-2013-1683, CVE-2013-1684, CVE-2013-1685, CVE-2013-1686, CVE-2013-1687, CVE-2013-1688, CVE-2013-1690, CVE-2013-1692, CVE-2013-1693, CVE-2013-1694, CVE-2013-1695, CVE-2013-1696, CVE-2013-1697, CVE-2013-1698, CVE-2013-1699, CVE-2013-1700

BID: 60765, 60766, 60773, 60774, 60776, 60777, 60778, 60783, 60784, 60787, 60768, 60779, 60785, 60788, 60789, 60790, 60791