Lucene search

K
nessusThis script is Copyright (C) 2020-2024 and is owned by Tenable, Inc. or an Affiliate thereof.MOZILLA_FIREFOX_75_0.NASL
HistoryApr 07, 2020 - 12:00 a.m.

Mozilla Firefox < 75.0 (mfsa2020-12)

2020-04-0700:00:00
This script is Copyright (C) 2020-2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
27

9.6 High

AI Score

Confidence

Low

The version of Firefox installed on the remote Windows host is prior to 75.0. It is, therefore, affected by multiple vulnerabilities as referenced in the mfsa2020-12 advisory.

  • Mozilla developers and community members Tyson Smith and Christian Holler reported memory safety bugs present in Firefox 74 and Firefox ESR 68.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. (CVE-2020-6825)

  • When reading from areas partially or fully outside the source resource with WebGL’s copyTexSubImage method, the specification requires the returned values be zero. Previously, this memory was uninitialized, leading to potentially sensitive data disclosure. (CVE-2020-6821)

  • On 32-bit builds, an out of bounds write could have occurred when processing an image larger than 4 GB in GMPDecodeData. It is possible that with enough effort this could have been exploited to run arbitrary code. (CVE-2020-6822)

  • A malicious extension could have called browser.identity.launchWebAuthFlow, controlling the redirect_uri, and through the Promise returned, obtain the Auth code and gain access to the user’s account at the service provider. (CVE-2020-6823)

  • Initially, a user opens a Private Browsing Window and generates a password for a site, then closes the Private Browsing Window but leaves Firefox open. Subsequently, if the user had opened a new Private Browsing Window, revisited the same site, and generated a new password - the generated passwords would have been identical, rather than independent. (CVE-2020-6824)

  • Mozilla developers Tyson Smith, Bob Clary, and Alexandru Michis reported memory safety bugs present in Firefox 74. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. (CVE-2020-6826)

Note that Nessus has not tested for this issue but has instead relied only on the application’s self-reported version number.

#
# (C) Tenable Network Security, Inc.
#


# The descriptive text and package checks in this plugin were
# extracted from Mozilla Foundation Security Advisory mfsa2020-12.
# The text itself is copyright (C) Mozilla Foundation.

include('compat.inc');

if (description)
{
  script_id(135276);
  script_version("1.3");
  script_set_attribute(attribute:"plugin_modification_date", value:"2024/03/19");

  script_cve_id(
    "CVE-2020-6821",
    "CVE-2020-6822",
    "CVE-2020-6823",
    "CVE-2020-6824",
    "CVE-2020-6825",
    "CVE-2020-6826"
  );
  script_xref(name:"MFSA", value:"2020-12");

  script_name(english:"Mozilla Firefox < 75.0 (mfsa2020-12)");

  script_set_attribute(attribute:"synopsis", value:
"A web browser installed on the remote Windows host is affected by multiple vulnerabilities.");
  script_set_attribute(attribute:"description", value:
"The version of Firefox installed on the remote Windows host is prior to 75.0. It is, therefore, affected by multiple
vulnerabilities as referenced in the mfsa2020-12 advisory. 

  - Mozilla developers and community members Tyson Smith and Christian Holler reported 
    memory safety bugs present in Firefox 74 and Firefox ESR 68.6. Some of these bugs 
    showed evidence of memory corruption and we presume that with enough effort some of 
    these could have been exploited to run arbitrary code. (CVE-2020-6825) 

  - When reading from areas partially or fully outside the source resource with WebGL's 
    copyTexSubImage method, the specification requires the returned values be zero. 
    Previously, this memory was uninitialized, leading to potentially sensitive data 
    disclosure. (CVE-2020-6821)

  - On 32-bit builds, an out of bounds write could have occurred when processing an image
    larger than 4 GB in GMPDecodeData. It is possible that with enough effort this could 
    have been exploited to run arbitrary code. (CVE-2020-6822) 

  - A malicious extension could have called browser.identity.launchWebAuthFlow, 
    controlling the redirect_uri, and through the Promise returned, obtain the Auth 
    code and gain access to the user's account at the service provider. (CVE-2020-6823)

  - Initially, a user opens a Private Browsing Window and generates a password for a site,
    then closes the Private Browsing Window but leaves Firefox open. Subsequently, if the
    user had opened a new Private Browsing Window, revisited the same site, and generated
    a new password - the generated passwords would have been identical, rather than
    independent. (CVE-2020-6824) 

  - Mozilla developers Tyson Smith, Bob Clary, and Alexandru Michis reported memory 
    safety bugs present in Firefox 74. Some of these bugs showed evidence of memory 
    corruption and we presume that with enough effort some of these could have been 
    exploited to run arbitrary code. (CVE-2020-6826)

Note that Nessus has not tested for this issue but has
instead relied only on the application's self-reported version number.");
  script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2020-12/");
  script_set_attribute(attribute:"solution", value:
"Upgrade to Mozilla Firefox version 75.0 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2020-6826");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2020/04/07");
  script_set_attribute(attribute:"patch_publication_date", value:"2020/04/07");
  script_set_attribute(attribute:"plugin_publication_date", value:"2020/04/07");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:mozilla:firefox");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");

  script_copyright(english:"This script is Copyright (C) 2020-2024 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("mozilla_org_installed.nasl");
  script_require_keys("Mozilla/Firefox/Version");

  exit(0);
}

include('mozilla_version.inc');

port = get_kb_item("SMB/transport");
if (!port) port = 445;

installs = get_kb_list("SMB/Mozilla/Firefox/*");
if (isnull(installs)) audit(AUDIT_NOT_INST, "Firefox");

mozilla_check_version(installs:installs, product:'firefox', esr:FALSE, fix:'75.0', severity:SECURITY_HOLE);
VendorProductVersionCPE
mozillafirefoxcpe:/a:mozilla:firefox