Firefox < 3.0.11 Multiple Vulnerabilities

high Log Correlation Engine Plugin ID 800755

Synopsis

The remote host contains a web browser that is susceptible to multiple attack vectors.

Description

The installed version of Firefox is earlier than 3.0.11. Such versions are potentially affected by the following security issues :

- Multiple memory corruption vulnerabilities could potentially be exploited to execute arbitrary code. (MFSA 2009-24)

- Certain invalid Unicode characters, when used as a part of IDN, can be displayed as a whitespace in the location bar. An attacker can exploit this vulnerability to spoof the location bar. (MFSA 2009-25)

- It may be possible for local resources loaded via 'file: ' protocol to access any domain's cookies saved on a user's system. (MFSA 2009-26)

- It may be possible to tamper with SSL date via non-200 responses to proxy CONNECT requests. (MFSA 2009-27)

- A race condition exists in 'NPObjWrapper_NewResolve' when accessing the properties of a NPObject, a wrapped JSObject. (MFSA 2009-28)

- If the owner document of an element becomes a null after garbage collection, then it may be possible to execute the event listeners within the wrong JavaScript context. An attacker can potentially exploit this vulnerability to execute arbitrary JavaScript with chrome privileges. (MFSA 2009-29)

- When the 'file: ' resource is loaded from the location bar, the resource inherits principal of the previously loaded document. This could potentially allow unauthorized access to local files. (MFSA-2009-30)

- While loading external scripts into XUL documents content-loading policies are not checked. (MFSA 2009-31)

- It may also be possible for scripts from page content to run with elevated privileges. (MFSA 2009-32)

Solution

Upgrade to Firefox 3.0.11 or later.

See Also

research.microsoft.com/apps/pubs/default.aspx?id=79323

http://www.mozilla.org/security/announce/2009/mfsa2009-25.html

http://www.mozilla.org/security/announce/2009/mfsa2009-26.html

http://www.mozilla.org/security/announce/2009/mfsa2009-27.html

http://www.mozilla.org/security/announce/2009/mfsa2009-28.html

http://www.mozilla.org/security/announce/2009/mfsa2009-29.html

http://www.mozilla.org/security/announce/2009/mfsa2009-30.html

http://www.mozilla.org/security/announce/2009/mfsa2009-31.html

http://www.mozilla.org/security/announce/2009/mfsa2009-32.html

http://www.mozilla.org/security/announce/2009/mfsa2009-24.html