Lucene search

K
openvasCopyright (C) 2023 Greenbone AGOPENVAS:1361412562310832350
HistoryAug 03, 2023 - 12:00 a.m.

Mozilla Firefox Security Advisories (MFSA2023-26, MFSA2023-31) - Windows

2023-08-0300:00:00
Copyright (C) 2023 Greenbone AG
plugins.openvas.org
3
mozilla firefox
use-after-free vulnerabilities
workers
offscreen canvas
cross-origin restrictions
wasm compilation
clickjacking
domparser
out-of-memory
storagemanager
file deletion
privilege escalation
sensitive information disclosure
arbitrary code execution
denial of service
windows
upgrade.

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.8 High

AI Score

Confidence

Low

0.002 Low

EPSS

Percentile

52.8%

Mozilla Firefox is prone to multiple
use-after-free vulnerabilities.

# SPDX-FileCopyrightText: 2023 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

CPE = "cpe:/a:mozilla:firefox";

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.832350");
  script_version("2024-02-15T05:05:40+0000");
  script_cve_id("CVE-2023-4045", "CVE-2023-4046", "CVE-2023-4047", "CVE-2023-4048",
                "CVE-2023-4049", "CVE-2023-4050", "CVE-2023-4051", "CVE-2023-4052",
                "CVE-2023-4053", "CVE-2023-4054", "CVE-2023-4055", "CVE-2023-4056",
                "CVE-2023-4057", "CVE-2023-4058", "CVE-2023-3600");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_tag(name:"last_modification", value:"2024-02-15 05:05:40 +0000 (Thu, 15 Feb 2024)");
  script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2023-08-04 17:50:00 +0000 (Fri, 04 Aug 2023)");
  script_tag(name:"creation_date", value:"2023-08-03 17:25:12 +0530 (Thu, 03 Aug 2023)");
  script_name("Mozilla Firefox Security Advisories (MFSA2023-26, MFSA2023-31) - Windows");

  script_tag(name:"summary", value:"Mozilla Firefox is prone to multiple
  use-after-free vulnerabilities.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present
  on the target host.");

  script_tag(name:"insight", value:"Multiple flaws exist due to,

  - Use-after-free in workers.

  - Offscreen Canvas could have bypassed cross-origin restrictions.

  - Incorrect value used during WASM compilation.

  - Potential permissions request bypass via clickjacking.

  - Crash in DOMParser due to out-of-memory conditions.

  - Stack buffer overflow in StorageManager.

  - Full screen notification obscured by file open dialog.

  - File deletion and privilege escalation through Firefox uninstaller.

  - Full screen notification obscured by external program.

  - Cookie jar overflow caused unexpected cookie jar state.");

  script_tag(name:"impact", value:"Successful exploitation allow attackers to
  disclose sensitive information, execute arbitrary code and cause denial of service
  condition.");

  script_tag(name:"affected", value:"Mozilla Firefox version before
  116 on Windows.");

  script_tag(name:"solution", value:"Upgrade to version 116
  or later, Please see the references for more information.");

  script_tag(name:"solution_type", value:"VendorFix");
  script_tag(name:"qod_type", value:"registry");
  script_xref(name:"URL", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2023-29/");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2023 Greenbone AG");
  script_family("General");
  script_dependencies("gb_firefox_detect_win.nasl");
  script_mandatory_keys("Firefox/Win/Ver");
  exit(0);
}

include("host_details.inc");
include("version_func.inc");

if(!infos = get_app_version_and_location( cpe:CPE, exit_no_version:TRUE))
  exit(0);

vers = infos["version"];
path = infos["location"];

if(version_is_less(version:vers, test_version:"116")) {
  report = report_fixed_ver(installed_version:vers, fixed_version:"116", install_path:path);

  security_message(port:0, data:report);
  exit(0);
}

exit(99);

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.8 High

AI Score

Confidence

Low

0.002 Low

EPSS

Percentile

52.8%