Mozilla Firefox ESR < 24.2 Multiple Vulnerabilities

critical Nessus Network Monitor Plugin ID 701241
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The remote host has a web browser installed that is vulnerable to multiple attack vectors.

Description

Versions of Mozilla Firefox ESR prior to 24.2 are prone to the following vulnerabilities :

- Miscellaneous memory safety hazards (CVE-2013-5609, CVE-2013-5610)
- Application Installation doorhanger does not get properly dismissed, which can be leveraged to trick a user into installing an application from one site while thinking it originated from another (CVE-2013-5611)
- Potential XSS vulnerability via cross-domain inheritance of charset (CVE-2013-5612)
- Sandbox restrictions are not properly applied to nested object elements, which could be leveraged to bypass restrictions (CVE-2013-5614)
- Use-after-free in event listeners, table editing user interface, synthetic mouse movement can lead to a potentially exploitable crash (CVE-2013-5616, CVE-2013-5613, CVE-2013-5618)
- Binary search algorithms in the Javascript engine contain potential out-of-bounds array access, though these are not directly exploitable (CVE-2013-5619)
- Segmentation violation when replacing ordered list elements in a document via script can lead to a potentially exploitable crash (CVE-2013-6671)
- On Linux systems, clipboard content may be made accessible to web content when a user pastes a selection with a middle-click, which can lead to information disclosure (CVE-2013-6672)
- Extended validation root certificates remain trusted even if the user has explicitly removes the trust. (CVE-2013-6673)
- GetElementIC typed arrays can be generated outside observed typesets, with unknown security impact (CVE-2013-5615)
- Issues in the JPEG image processing library can allow arbitrary memory to be read, as well as cross-domain theft (CVE-2013-6629, CVE-2013-6630)
- An intermediary CA that is chained up to a root within Mozilla's root store was revoked for supplying an intermediate certificate that allowed a man-in-the-middle proxy to perform traffic management of domain names and IP addresses the certificate holder did not own or control.

Solution

Upgrade to Firefox ESR version, or later.

See Also

http://www.mozilla.org/security/announce/2013/mfsa2013-104.html

http://www.mozilla.org/security/announce/2013/mfsa2013-108.html

http://www.mozilla.org/security/announce/2013/mfsa2013-109.html

http://www.mozilla.org/security/announce/2013/mfsa2013-111.html

http://www.mozilla.org/security/announce/2013/mfsa2013-113.html

http://www.mozilla.org/security/announce/2013/mfsa2013-114.html

http://www.mozilla.org/security/announce/2013/mfsa2013-115.html

http://www.mozilla.org/security/announce/2013/mfsa2013-116.html

http://www.mozilla.org/security/announce/2013/mfsa2013-117.html

http://www.mozilla.org/security/announce/2013/mfsa2013-105.html

http://www.mozilla.org/security/announce/2013/mfsa2013-106.html

http://www.mozilla.org/security/announce/2013/mfsa2013-107.html

http://www.mozilla.org/security/announce/2013/mfsa2013-110.html

http://www.mozilla.org/security/announce/2013/mfsa2013-112.html

Plugin Details

Severity: Critical

ID: 701241

Family: Web Clients

Published: 11/6/2019

Updated: 11/6/2019

Dependencies: 9131

Nessus ID: 71349

Risk Information

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 9.4

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:X/RL:O/RC:C

Vulnerability Information

CPE: cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*

Patch Publication Date: 12/10/2012

Vulnerability Publication Date: 12/10/2012

Reference Information

CVE: CVE-2013-5609, CVE-2013-5612, CVE-2013-5613, CVE-2013-5614, CVE-2013-5616, CVE-2013-5618, CVE-2013-6671, CVE-2013-5615, CVE-2013-6673, CVE-2013-5610, CVE-2013-5611, CVE-2013-5619, CVE-2013-6672

BID: 64203, 64204, 64209, 64211, 64216, 64205, 64206, 64207, 64210, 64212, 64213, 64214, 64215