Lucene search

K
openvasCopyright (C) 2009 Greenbone AGOPENVAS:1361412562310900843
HistorySep 11, 2009 - 12:00 a.m.

Mozilla Firefox Multiple Vulnerabilities (Sep 2009) - Windows

2009-09-1100:00:00
Copyright (C) 2009 Greenbone AG
plugins.openvas.org
21

6.5 Medium

AI Score

Confidence

High

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.723 High

EPSS

Percentile

98.0%

Firefox browser is prone to multiple vulnerabilities.

# SPDX-FileCopyrightText: 2009 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.900843");
  script_version("2024-02-08T05:05:59+0000");
  script_tag(name:"last_modification", value:"2024-02-08 05:05:59 +0000 (Thu, 08 Feb 2024)");
  script_tag(name:"creation_date", value:"2009-09-11 18:01:06 +0200 (Fri, 11 Sep 2009)");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_cve_id("CVE-2009-3072", "CVE-2009-3077", "CVE-2009-3078", "CVE-2009-3079");
  script_name("Mozilla Firefox Multiple Vulnerabilities (Sep 2009) - Windows");
  script_xref(name:"URL", value:"http://secunia.com/advisories/36671/");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/36343");
  script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2009/mfsa2009-47.html");
  script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2009/mfsa2009-49.html");
  script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2009/mfsa2009-50.html");
  script_xref(name:"URL", value:"http://www.mozilla.org/security/announce/2009/mfsa2009-51.html");

  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2009 Greenbone AG");
  script_family("Denial of Service");
  script_dependencies("gb_firefox_detect_portable_win.nasl");
  script_mandatory_keys("Firefox/Win/Ver");

  script_tag(name:"impact", value:"A remote, unauthenticated attacker could execute arbitrary code or cause a
  vulnerable application to crash.");

  script_tag(name:"affected", value:"Mozilla Firefox version prior to 3.0.14 and 3.5 before 3.5.3 on Windows.");

  script_tag(name:"insight", value:"- Multiple errors in the browser and JavaScript engines can be exploited to
  corrupt memory.

  - An error exists when processing operations performed on the columns of a
  XUL tree element. This can be exploited to dereference freed memory via a
  pointer owned by a column of the XUL tree element.

  - An error exists when displaying text in the location bar using the default
  Windows font. This can be exploited to spoof the URL of a trusted site via
  Unicode characters having a tall line-height.

  - An error in the implementation of the 'BrowserFeedWriter' object can be
  exploited to execute arbitrary JavaScript code with chrome privileges.");

  script_tag(name:"solution", value:"Upgrade to Firefox version 3.0.14 or 3.5.3 or later.");

  script_tag(name:"summary", value:"Firefox browser is prone to multiple vulnerabilities.");

  script_tag(name:"qod_type", value:"registry");
  script_tag(name:"solution_type", value:"VendorFix");

  exit(0);
}

include("version_func.inc");

ffVer = get_kb_item("Firefox/Win/Ver");
if(!ffVer)
{
  exit(0);
}

if(version_is_less(version:ffVer, test_version:"3.0.14") ||
   version_in_range(version:ffVer,test_version:"3.5", test_version2:"3.5.2")){
  security_message( port: 0, data: "The target host was found to be vulnerable" );
}

6.5 Medium

AI Score

Confidence

High

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.723 High

EPSS

Percentile

98.0%