Mozilla Firefox < 22.0 Multiple Vulnerabilities

critical Nessus Network Monitor Plugin ID 6886

Synopsis

The remote host has a web browser installed that is vulnerable to multiple attack vectors.

Description

Versions of Firefox 21.x and older are potentially affected by the following security issues :

- Inaccessible updater can lead to local privilege escalation (CVE-2013-1700)
- Insufficient validation homographic characters could allow for domain spoofing (CVE-2013-1699)
- The getUserMedia permission dialog incorrectly displays its origin as that of the top level document rather than its calling page, which could result in incorrect camera or microphone permissions for the affected webpage. (CVE-2013-1698)
- XrayWrappers can be bypassed to run user defined methods in a privileged context (CVE-2013-1697)
- X-Frame-Options ignored when using server push with multi-part responses (CVE-2013-1696)
- Various memory corruption issues, including an arbitrary code execution vulnerability through onreadystatechange event (CVE-2013-1690, CVE-2013-1684, CVE-2013-1685, CVE-2013-1686)
- Data in the body of XHR HEAD requests leads to CSRF attacks (CVE-2013-1692)
- SVG filters can lead to information disclosure (CVE-2013-1693)
- SVG filters can lead to information disclosure via timing attacks (CVE-2013-1693)
- In certain cases, inconsistencies in PreserveWrapper can lead to an exploitable crash (CVE-2013-1694)
- Sandbox restrictions not applied to nested frame elements (CVE-2013-1695)
- X-Frame-Options header is ignored when server push is used in multi-part responses, which can result in clickjacking (CVE-2013-1696)
- Privileged content access and execution via XBL, which can lead to arbitrary code execution (CVE-2013-1687)
- Arbitrary code execution within Profiler (CVE-2013-1688)
- Miscellaneous memory safety issues specifically against versions 21.0 and 17.0.7 (CVE-2013-1682, CVE-2013-1683)

Solution

Upgrade to Firefox 22.0 (or Firefox 17.0.7 ESR) or later.

See Also

http://www.mozilla.org/security/announce/2013/mfsa2013-62.html

http://www.mozilla.org/security/announce/2013/mfsa2013-61.html

http://www.mozilla.org/security/announce/2013/mfsa2013-60.html

http://www.mozilla.org/security/announce/2013/mfsa2013-59.html

http://www.mozilla.org/security/announce/2013/mfsa2013-58.html

http://www.mozilla.org/security/announce/2013/mfsa2013-57.html

http://www.mozilla.org/security/announce/2013/mfsa2013-56.html

http://www.mozilla.org/security/announce/2013/mfsa2013-55.html

http://www.mozilla.org/security/announce/2013/mfsa2013-54.html

http://www.mozilla.org/security/announce/2013/mfsa2013-53.html

http://www.mozilla.org/security/announce/2013/mfsa2013-52.html

http://www.mozilla.org/security/announce/2013/mfsa2013-51.html

http://www.mozilla.org/security/announce/2013/mfsa2013-50.html

http://www.mozilla.org/security/announce/2013/mfsa2013-49.html

Plugin Details

Severity: Critical

ID: 6886

Family: Web Clients

Published: 6/26/2013

Updated: 3/6/2019

Risk Information

VPR

Risk Factor: Critical

Score: 9.5

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 9.4

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:X/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:mozilla:firefox

Patch Publication Date: 6/24/2013

Vulnerability Publication Date: 6/24/2013

Exploitable With

Metasploit (Firefox onreadystatechange Event DocumentViewerImpl Use After Free)

Reference Information

CVE: CVE-2013-1682, CVE-2013-1683, CVE-2013-1684, CVE-2013-1685, CVE-2013-1686, CVE-2013-1687, CVE-2013-1688, CVE-2013-1690, CVE-2013-1692, CVE-2013-1693, CVE-2013-1694, CVE-2013-1695, CVE-2013-1696, CVE-2013-1697, CVE-2013-1698, CVE-2013-1699, CVE-2013-1700

BID: 60765, 60766, 60768, 60773, 60774, 60776, 60777, 60778, 60779, 60783, 60784, 60785, 60787, 60788, 60789, 60790, 60791