Synopsis
The remote host has a web browser installed that is vulnerable to multiple attack vectors.
Description
The remote host has a web browser installed that is vulnerable to multiple attack vectors.
Versions of Firefox greater than 4.0 and earlier than 5.0 are potentially affected by multiple vulnerabilities :
- Multiple memory safety issues can lead to application crashes and possibly remote code execution. (CVE-2011-2374, CVE-2011-2375, CVE-2011-2605)
- A use-after-free issue when viewing XUL documents with scripts disabled could lead to code execution. (CVE-2011-2373)
- A memory corruption issue due to multipart/x-mixed-replace images could lead to memory corruption. (CVE-2011-2377)
- When a JavaScript Array object has its length set to an extremely large value, the iteration of array elements that occurs when its reduceRight method is called could result in code execution due to an invalid index value being used. (CVE-2011-2371)
- It is possible for an image from a different domain to be loaded into a WebGL texture which could be used to steal image data from a different site. (CVE-2011-2366)
- An out-of-bounds read issue and an invalid write issue could cause the application to crash. (CVE-2011-2367, CVE-2011-2368)
- HTML-encoded entities are improperly decoded when displayed inside SVG elements which could lead to cross-site scripting attacks. (CVE-2011-2369)
- It is possible for a non-whitelisted site to trigger an install dialog for add-ons and themes. (CVE-2011-2370)
Solution
Upgrade to Firefox 5.0 or later.
Plugin Details
Nessus ID: 55288, 55419
Vulnerability Information
Patch Publication Date: 6/21/2011
Vulnerability Publication Date: 6/21/2011
Exploitable With
CANVAS (CANVAS)
Metasploit (windows/browser/mozilla_reduceright.rb)
Reference Information
CVE: CVE-2011-2366, CVE-2011-2367, CVE-2011-2368, CVE-2011-2369, CVE-2011-2370, CVE-2011-2371, CVE-2011-2373, CVE-2011-2374, CVE-2011-2375, CVE-2011-2377, CVE-2011-2605
BID: 48319, 48361, 48365, 48369, 48371, 48372, 48373, 48376, 48379, 48380, 48696