Lucene search

K
openvasCopyright (C) 2019 Greenbone AGOPENVAS:1361412562310814897
HistoryMay 22, 2019 - 12:00 a.m.

Mozilla Firefox ESR Security Advisories (MFSA2019-09, MFSA2019-14) - Windows

2019-05-2200:00:00
Copyright (C) 2019 Greenbone AG
plugins.openvas.org
24
mozilla firefox esr
security advisories
mfsa2019-09
mfsa2019-14
windows
vulnerabilities
type confusion
cross-domain theft
use-after-free errors
buffer overflow
memory safety
javascript mismatch
remote exploitation
security restrictions bypass
sensitive data read
application crash
arbitrary code execution
update required

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

8.3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H

AI Score

8

Confidence

Low

EPSS

0.536

Percentile

97.7%

Mozilla Firefox ESR is prone to multiple vulnerabilities.

# SPDX-FileCopyrightText: 2019 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

CPE = "cpe:/a:mozilla:firefox_esr";

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.814897");
  script_version("2024-02-15T05:05:40+0000");
  script_cve_id("CVE-2019-9815", "CVE-2019-9816", "CVE-2019-9817", "CVE-2019-9818",
                "CVE-2019-9819", "CVE-2019-9820", "CVE-2019-11691", "CVE-2019-11692",
                "CVE-2019-7317", "CVE-2019-11693", "CVE-2018-18511", "CVE-2019-9797",
                "CVE-2019-11694", "CVE-2019-11698", "CVE-2019-5798", "CVE-2019-9800");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_tag(name:"last_modification", value:"2024-02-15 05:05:40 +0000 (Thu, 15 Feb 2024)");
  script_tag(name:"severity_vector", value:"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2019-07-26 16:17:00 +0000 (Fri, 26 Jul 2019)");
  script_tag(name:"creation_date", value:"2019-05-22 12:29:43 +0530 (Wed, 22 May 2019)");
  script_name("Mozilla Firefox ESR Security Advisories (MFSA2019-09, MFSA2019-14) - Windows");

  script_tag(name:"summary", value:"Mozilla Firefox ESR is prone to multiple vulnerabilities.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");

  script_tag(name:"insight", value:"Multiple flaws exist due to:

  - A type confusion error with object groups and UnboxedObjects.

  - A cross-domain theft of images using canvas.

  - Multiple use-after-free errors in crash generation server, ChromeEventHandler,
    XMLHttpRequest, libpng library.

  - A buffer overflow error in WebGL bufferdata.

  - Cross-origin theft of images with createImageBitmap, ImageBitmapRenderingContext.

  - An out-of-bounds read error in Skia.

  - Memory Safety bugs.

  - JavaScript compartment mismatch with fetch API.");

  script_tag(name:"impact", value:"Successful exploitation of this vulnerability
  will allow remote attackers to bypass security restrictions, read sensitive data
  and browser history, crash the application and execute arbitrary code.");

  script_tag(name:"affected", value:"Mozilla Firefox ESR version before 60.7 on Windows.");

  script_tag(name:"solution", value:"Update to Mozilla Firefox ESR version 60.7
  or later. Please see the references for more information.");

  script_tag(name:"solution_type", value:"VendorFix");
  script_tag(name:"qod_type", value:"registry");
  script_xref(name:"URL", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2019-14/");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2019 Greenbone AG");
  script_family("General");
  script_dependencies("gb_firefox_detect_win.nasl", "gb_firefox_detect_portable_win.nasl");
  script_mandatory_keys("Firefox-ESR/Win/Ver");
  exit(0);
}

include("host_details.inc");
include("version_func.inc");

if(!infos = get_app_version_and_location(cpe:CPE, exit_no_version:TRUE))
  exit(0);

vers = infos["version"];
path = infos["location"];

if(version_is_less(version:vers, test_version:"60.7")) {
  report = report_fixed_ver(installed_version:vers, fixed_version:"60.7", install_path:path);
  security_message(port:0, data:report);
  exit(0);
}

exit(99);

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

8.3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H

AI Score

8

Confidence

Low

EPSS

0.536

Percentile

97.7%