Firefox < 2.0.0.17 Multiple Vulnerabilities

high Nessus Plugin ID 34268

Synopsis

The remote Windows host contains a web browser that is affected by multiple vulnerabilities.

Description

The installed version of Firefox is affected by various security issues :

- Using a specially crafted UTF-8 URL in a hyperlink, an attacker might be able to exploit a stack buffer overflow in the Mozilla URL parsing routes to execute arbitrary code (MFSA 2008-37).

- It is possible to bypass the same-origin check in 'nsXMLDocument::OnChannelRedirect()' (MFSA 2008-38).

- There are a series of vulnerabilities in 'feedWriter' that allow scripts from page content to run with chrome privileges (MFSA 2008-39).

- An attacker can cause the content window to move while the mouse is being clicked, causing an item to be dragged rather than clicked-on (MFSA 2008-40).

- Privilege escalation is possible via 'XPCnativeWrapper' pollution (MFSA 2008-41).

- There are several stability bugs in the browser engine that may lead to crashes with evidence of memory corruption (MFSA 2008-42).

- Certain BOM characters and low surrogate characters, if HTML-escaped, are stripped from JavaScript code before it is executed, which could allow for cross- site scripting attacks (MFSA 2008-43).

- The 'resource:' protocol allows directory traversal on Linux when using URL-encoded slashes, and it can by used to bypass restrictions on local HTML files (MFSA 2008-44).

- A bug in the XBM decoder allows random small chunks of uninitialized memory to be read (MFSA 2008-45).

Solution

Upgrade to Firefox 2.0.0.17 or later.

See Also

https://www.mozilla.org/en-US/security/advisories/mfsa2008-37/

https://www.mozilla.org/en-US/security/advisories/mfsa2008-38/

https://www.mozilla.org/en-US/security/advisories/mfsa2008-39/

https://www.mozilla.org/en-US/security/advisories/mfsa2008-40/

https://www.mozilla.org/en-US/security/advisories/mfsa2008-41/

https://www.mozilla.org/en-US/security/advisories/mfsa2008-42/

https://www.mozilla.org/en-US/security/advisories/mfsa2008-43/

https://www.mozilla.org/en-US/security/advisories/mfsa2008-44/

https://www.mozilla.org/en-US/security/advisories/mfsa2008-45/

Plugin Details

Severity: High

ID: 34268

File Name: mozilla_firefox_20017.nasl

Version: 1.19

Type: local

Agent: windows

Family: Windows

Published: 9/24/2008

Updated: 7/16/2018

Supported Sensors: Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 7.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:mozilla:firefox

Required KB Items: Mozilla/Firefox/Version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 9/23/2008

Exploitable With

CANVAS (CANVAS)

Core Impact

Reference Information

CVE: CVE-2008-0016, CVE-2008-3835, CVE-2008-3836, CVE-2008-3837, CVE-2008-4058, CVE-2008-4059, CVE-2008-4060, CVE-2008-4061, CVE-2008-4062, CVE-2008-4063, CVE-2008-4064, CVE-2008-4065, CVE-2008-4066, CVE-2008-4067, CVE-2008-4068, CVE-2008-4069

BID: 31346, 31397

CWE: 119, 189, 200, 22, 264, 399, 79

Secunia: 31984