Lucene search

K
nessusTenable801342.PRM
HistoryMar 23, 2010 - 12:00 a.m.

Mozilla Firefox < 3.6.2 Multiple Vulnerabilities.

2010-03-2300:00:00
Tenable
www.tenable.com
18

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.901 High

EPSS

Percentile

98.3%

The remote host is running a version of Mozilla Firefox 3.6.x earlier than 3.6.2. Such versions are potentially affected by multiple security issues :

  • The WOFF decoder contains an integer overflow in a font decrompression routine. (MFSA 2010-08)

  • Deleted image frames are reused when handling ‘multipart/x-mixed-replace’ images. (MFSA 2010-09)

  • The ‘window.location’ object is made a normal overridable object. (MFSA 2010-10)

  • Multiple crashes can result in arbitrary code execution. (MFSA 2010-11)

  • A cross-site scripting issue when using ‘addEventListener’ and ‘setTimeout’ on a wrapped object. (MFSA 2010-12)

  • Documents fail to call certain security checks when attempting to preload images. (MFSA 2010-13)

  • It is possible to corrupt a user’s XUL cache. (MFSA 2010-14)

  • The asynchronous Authorization Prompt is not always attached to the correct window. (MFSA 2010-15)

  • Multiple crashes cna result in arbitrary code execution. (MFSA 2010-16)

  • An error exists in the way ‘<option>’ elements are inserted into a XUL tree ‘<optgroup>’. (MFSA 2010-18)

  • An error exists in the implementation of the ‘windows.navigator.plugins’ object. (MFSA 2010-19)

  • A browser applet can be used to turn a simple mouse click into a drag-and-drop action, potentially resulting in the unintended loading of resources in a user’s browser. (MFSA 2010-20)

  • Session renegotiations are not handled properly, which can be exploited to insert arbitrary plaintext by a man-in-the-middle. (MFSA 2010-22)

  • When an image points to a resource that redirects to a 'mailto: ’ URL, the external mail handler application is launched. (MFSA 2010-23)

  • XML documents fail to call certain security checks when loading new content. (MFSA 2010-24)

Binary data 801342.prm

References

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.901 High

EPSS

Percentile

98.3%