Firefox 3.0.x < 3.0.4 Multiple Vulnerabilities

high Nessus Plugin ID 34767

Synopsis

The remote Windows host contains a web browser that is affected by multiple vulnerabilities.

Description

The installed version of Firefox 3.0 is earlier than 3.0.4. Such versions are potentially affected by the following security issues :

- Locally saved '.url' shortcut files can be used to read information stored in the local cache. (MFSA 2008-47)

- 'file:' URIs are given chrome privileges when opened in the same tab as a chrome page or privileged 'about:' page, which could allow an attacker to run arbitrary JavaScript with chrome privileges. (MFSA 2008-51)

- There are several stability bugs in the browser engine that could lead to crashes with evidence of memory corruption. (MFSA 2008-52)

- The browser's session restore feature can be used to violate the same-origin policy and run JavaScript in the context of another site. (MFSA 2008-53)

- There is a buffer overflow that can be triggered by sending a specially crafted 200 header line in the HTTP index response. (MFSA 2008-54)

- Crashes and remote code execution in nsFrameManager are possible by modifying certain properties of a file input element before it has finished initializing.
(MFSA 2008-55)

- The same-origin check in 'nsXMLHttpRequest::NotifyEventListeners()' can be bypassed. (MFSA 2008-56)

- The '-moz-binding' CSS property can be used to bypass security checks which validate codebase principals.
(MFSA 2008-57)

- There is an error in the method used to parse the default namespace in an E4X document caused by quote characters in the namespace not being properly escaped.
(MFSA 2008-58)

Solution

Upgrade to Firefox 3.0.4 or later.

See Also

https://www.mozilla.org/en-US/security/advisories/mfsa2008-47/

https://www.mozilla.org/en-US/security/advisories/mfsa2008-51/

https://www.mozilla.org/en-US/security/advisories/mfsa2008-52/

https://www.mozilla.org/en-US/security/advisories/mfsa2008-53/

https://www.mozilla.org/en-US/security/advisories/mfsa2008-54/

https://www.mozilla.org/en-US/security/advisories/mfsa2008-55/

https://www.mozilla.org/en-US/security/advisories/mfsa2008-56/

https://www.mozilla.org/en-US/security/advisories/mfsa2008-57/

https://www.mozilla.org/en-US/security/advisories/mfsa2008-58/

Plugin Details

Severity: High

ID: 34767

File Name: mozilla_firefox_304.nasl

Version: 1.18

Type: local

Agent: windows

Family: Windows

Published: 11/13/2008

Updated: 7/16/2018

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.1

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 7.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:mozilla:firefox

Required KB Items: Mozilla/Firefox/Version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 11/12/2008

Reference Information

CVE: CVE-2008-0017, CVE-2008-4582, CVE-2008-5015, CVE-2008-5016, CVE-2008-5017, CVE-2008-5018, CVE-2008-5019, CVE-2008-5021, CVE-2008-5022, CVE-2008-5023, CVE-2008-5024

BID: 31747, 32281

CWE: 119, 189, 20, 264, 287, 399, 79, 94

Secunia: 32713