10 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
7.2 High
AI Score
Confidence
High
0.97 High
EPSS
Percentile
99.8%
Mozilla Firefox browser is prone to multiple vulnerabilities.
# SPDX-FileCopyrightText: 2009 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.801130");
script_version("2024-02-16T05:06:55+0000");
script_tag(name:"last_modification", value:"2024-02-16 05:06:55 +0000 (Fri, 16 Feb 2024)");
script_tag(name:"creation_date", value:"2009-11-02 14:39:30 +0100 (Mon, 02 Nov 2009)");
script_tag(name:"cvss_base", value:"10.0");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_cve_id("CVE-2009-3370", "CVE-2009-3373", "CVE-2009-3372", "CVE-2009-0689",
"CVE-2009-3374", "CVE-2009-3375", "CVE-2009-3376", "CVE-2009-3380");
script_name("Mozilla Firefox Multiple Vulnerabilities (Nov 2009) - Windows");
script_xref(name:"URL", value:"http://secunia.com/secunia_research/2009-35/");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/36851");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/36853");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/36855");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/36856");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/36857");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/36858");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/36867");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/36871");
script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2009/mfsa2009-52.html");
script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2009/mfsa2009-55.html");
script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2009/mfsa2009-56.html");
script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2009/mfsa2009-57.html");
script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2009/mfsa2009-59.html");
script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2009/mfsa2009-61.html");
script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2009/mfsa2009-62.html");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2009 Greenbone AG");
script_family("Buffer overflow");
script_dependencies("gb_firefox_detect_portable_win.nasl");
script_mandatory_keys("Firefox/Win/Ver");
script_tag(name:"impact", value:"Successful exploitation will let attacker to disclose sensitive information,
bypass certain security restrictions, manipulate certain data, or compromise a user's system.");
script_tag(name:"affected", value:"Firefox version 3.0 before 3.0.15 and 3.5 before 3.5.4 on Windows.");
script_tag(name:"insight", value:"Multiple flaws are due to following errors:
- An array indexing error exists when allocating space for floating point
numbers. This can be exploited to trigger a memory corruption when a
specially crafted floating point number is processed.
- An error in the form history functionality can be exploited to disclose
history entries via a specially crafted web page that triggers the automatic
filling of form fields.
- When parsing regular expressions used in Proxy Auto-configuration. This can
be exploited to cause a crash or potentially execute arbitrary code via
specially crafted configured PAC files.
- When processing GIF, color maps can be exploited to cause a heap based
buffer overflow and potentially execute arbitrary code via a specially
crafted GIF file.
- An error in the 'XPCVariant::VariantDataToJS()' XPCOM utility, which can be
exploited to execute arbitrary JavaScript code with chrome privileges.
- An error in the implementation of the JavaScript 'document.getSelection()'
can be exploited to read text selected on a web page in a different domain.
- An error when downloading files can be exploited to display different file
names in the download dialog title bar and download dialog body. This can
be exploited to obfuscate file names via a right-to-left override character
and potentially trick a user into running an executable file.
- Multiple unspecified errors in the browser engines can be exploited to cause
crash or potentially execute arbitrary code.");
script_tag(name:"solution", value:"Upgrade to Firefox version 3.0.15 or 3.5.4.");
script_tag(name:"summary", value:"Mozilla Firefox browser is prone to multiple vulnerabilities.");
script_tag(name:"qod_type", value:"registry");
script_tag(name:"solution_type", value:"VendorFix");
exit(0);
}
include("version_func.inc");
ffVer = get_kb_item("Firefox/Win/Ver");
if(!ffVer){
exit(0);
}
if(version_in_range(version:ffVer, test_version:"3.0", test_version2:"3.0.14")||
version_in_range(version:ffVer, test_version:"3.5", test_version2:"3.5.3")) {
security_message( port: 0, data: "The target host was found to be vulnerable" );
}
secunia.com/secunia_research/2009-35/
www.mozilla.org/security/announce/2009/mfsa2009-52.html
www.mozilla.org/security/announce/2009/mfsa2009-55.html
www.mozilla.org/security/announce/2009/mfsa2009-56.html
www.mozilla.org/security/announce/2009/mfsa2009-57.html
www.mozilla.org/security/announce/2009/mfsa2009-59.html
www.mozilla.org/security/announce/2009/mfsa2009-61.html
www.mozilla.org/security/announce/2009/mfsa2009-62.html
www.securityfocus.com/bid/36851
www.securityfocus.com/bid/36853
www.securityfocus.com/bid/36855
www.securityfocus.com/bid/36856
www.securityfocus.com/bid/36857
www.securityfocus.com/bid/36858
www.securityfocus.com/bid/36867
www.securityfocus.com/bid/36871