Synopsis
The remote host has a web browser installed that is vulnerable to multiple attack vectors.
Description
Versions of Firefox 10.x earlier than 10.0.3 are potentially affected by the following security issues :
- Multiple memory corruption issues. By tricking a user into visiting a specially crafted page, these issues may allow an attacker to execute arbitrary code in the context of the affected application. (CVE-2012-0454, CVE-2012-0457, CVE-2012-0459, CVE-2012-0461, CVE-2012-0462, CVE-2012-0463, CVE-2012-0464)
- Ah HTTP Header security bypass vulnerability that can be leveraged by attackers to bypass certain security restrictions and conduct cross-site scripting attacks. (CVE-2012-0451)
- A security bypass vulnerability that can be exploited by an attacker if the victim can be tricked into setting a new home page by dragging a specially crafted link to the 'home' button URL, which will set the user's home page to a 'javascript:' URL. (CVE-2012-0458)
- An information disclosure vulnerability due to an out of bounds read in SVG filters. (CVE-2012-0456)
- A cross-site scripting vulnerability that can be triggered by dragging and dropping 'javascript:' links onto a frame. (CVE-2012-0455)
- 'window.fullScreen' is writeable by untrusted content, allowing attackers to perform UI spoofing attacks. (CVE-2012-0460)
Solution
Upgrade to Firefox 10.0.3 ESR or later.
Plugin Details
Nessus ID: 58348, 58353
Vulnerability Information
Patch Publication Date: 3/13/2012
Vulnerability Publication Date: 3/13/2012
Reference Information
CVE: CVE-2012-0451, CVE-2012-0454, CVE-2012-0455, CVE-2012-0456, CVE-2012-0457, CVE-2012-0458, CVE-2012-0459, CVE-2012-0460, CVE-2012-0461, CVE-2012-0462, CVE-2012-0463, CVE-2012-0464
BID: 52455, 52456, 52457, 52458, 52459, 52460, 52461, 52463, 52464, 52465, 52466, 52467, 52462