Synopsis
The remote host has a web browser installed that is vulnerable to multiple attack vectors.
Description
The remote host has a version of Mozilla Firefox earlier than 3.0.15 / 3.5.4 installed. Such versions are potentially affected by multiple vulnerabilities :
- A user's form history, both from web content as well as the smart location bar, was vulnerable to theft. (MFSA 2009-52)
- The file naming scheme used for downloading a file which already exists in the download folder is predictable. An attacker with local access could exploit this to trick the browser into opening the incorrect downloaded file. (MFSA 2009-53)
- Recursive creation of JavaScript web-workers can be used to create a set of objects whose memory could be freed prior to their use. Note that this only affects Firefox 3.5.x. (MFSA 2009-54)
- A flaw exists in the parsing of regular expressions used in Proxy Auto-configuration (PAC) files. (MFSA 2009-55)
- A heap-based overflow exists in Mozilla's GIF image parser. (MFSA 2009-56)
- The XPCOM utility 'XPCVariant: : VariantDataToJS' unwrapped doubly-wrapped objects before returning them to chrome callers which could lead to chrome privileged code calling methods on an object which had previously been created or modified by web content. (MFSA 2009-57)
- A heap-based overflow exists in Mozilla's string to floating point number conversion routines. (MFSA 2009-59)
- The text within a selection on a web page can be read by JavaScript in a different domain using the 'document.getSelection' function, violating the same-origin policy. (MFSA 2009-61)
- When downloading a file containing a right-to-left override character (RTL) in the filename, the name displayed in the dialog title bar conflicts with the name of the file shown in the dialog body. (MFSA 2009-62)
- Multiple memory safety and stability bugs exist in the 'liboggz', 'libvorbis', and 'liboggplay' libraries. Note that this issue only affects Firefox 3.5.x. (MFSA 2009-63)
- Several memory corruption issues exist in the browser engine. (MFSA 2009-64)
Solution
Upgrade to Mozilla Firefox 3.0.15, 3.5.4, or later.
Plugin Details
Nessus ID: 42305, 42306
Vulnerability Information
Patch Publication Date: 10/27/2009
Vulnerability Publication Date: 10/28/2009
Reference Information
CVE: CVE-2009-3274, CVE-2009-3370, CVE-2009-3371, CVE-2009-3372, CVE-2009-3373, CVE-2009-3374, CVE-2009-3375, CVE-2009-3376, CVE-2009-3378, CVE-2009-3380, CVE-2009-3381, CVE-2009-3382, CVE-2009-3383
BID: 36851, 36852, 36867, 36871, 36875, 36853, 36854, 36855, 36856, 36857, 36858, 36866, 36869, 36870, 36872, 36873