Lucene search

K
openvasCopyright (C) 2013 SecPodOPENVAS:903214
HistoryJun 26, 2013 - 12:00 a.m.

Mozilla Firefox Multiple Vulnerabilities - June 13 (Windows)

2013-06-2600:00:00
Copyright (C) 2013 SecPod
plugins.openvas.org
10

0.13 Low

EPSS

Percentile

95.6%

The host is installed with Mozilla Firefox and is prone to multiple
vulnerabilities.

###############################################################################
# OpenVAS Vulnerability Test
# $Id: secpod_mozilla_firefox_mult_vuln_jun13_win.nasl 6086 2017-05-09 09:03:30Z teissa $
#
# Mozilla Firefox Multiple Vulnerabilities - June 13 (Windows)
#
# Authors:
# Arun Kallavi <[email protected]>
#
# Copyright:
# Copyright (c) 2013 SecPod, http://www.secpod.com
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################

tag_impact = "Successful exploitation will allow attackers to execute arbitrary code,
  obtain potentially sensitive information, gain escalated privileges, bypass
  security restrictions, and perform unauthorized actions. Other attacks may
  also be possible.
  Impact Level: System/Application";

tag_affected = "Mozilla Firefox versions before 22.0 on Windows";
tag_insight = "Multiple flaws due to,
  - PreserveWrapper does not handle lack of wrapper.
  - Error in processing of SVG format images with filters to read pixel values.
  - Does not prevent inclusion of body data in XMLHttpRequest HEAD request.
  - Does not properly handle onreadystatechange events in conjunction with
    page reloading.
  - Profiler parses untrusted data during UI rendering.
  - System Only Wrapper (SOW) and Chrome Object Wrapper (COW), does not
    restrict XBL user-defined functions.
  - Use-after-free vulnerability in 'nsIDocument::GetRootElement' and
    'mozilla::dom::HTMLMediaElement::LookupMediaElementURITable' functions.
  - Maintenance Service does not properly handle inability to launch the
    Mozilla Updater executable file.
  - Multiple unspecified vulnerabilities in the browser engine.
  - Internationalized Domain Name (IDN) does not properly handle the .com,
    .name, and .net top-level domains.
  - Does not properly implement DocShell inheritance behavior for sandbox
    attribute of an IFRAME element.
  - 'getUserMedia' permission references the URL of top-level document instead
    of a specific page.
  - XrayWrapper does not properly restrict use of DefaultValue for method calls.
  - Does not properly enforce the X-Frame-Options protection mechanism.";
tag_solution = "Upgrade to Mozilla Firefox version 22.0 or later
  For updates refer to http://www.mozilla.com/en-US/firefox/all.html";
tag_summary = "The host is installed with Mozilla Firefox and is prone to multiple
  vulnerabilities.";

if(description)
{
  script_id(903214);
  script_version("$Revision: 6086 $");
  script_cve_id("CVE-2013-1683", "CVE-2013-1684", "CVE-2013-1685", "CVE-2013-1686",
                "CVE-2013-1687", "CVE-2013-1688", "CVE-2013-1690", "CVE-2013-1692",
                "CVE-2013-1693", "CVE-2013-1694", "CVE-2013-1695", "CVE-2013-1696",
                "CVE-2013-1697", "CVE-2013-1698", "CVE-2013-1699", "CVE-2013-1700",
                "CVE-2013-1682");
  script_bugtraq_id(60765,60768, 60766, 60773, 60774, 60777, 60779, 60778, 60783, 60787,
                    60776, 60789, 60788, 60784, 60790, 60785, 60791);
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_tag(name:"last_modification", value:"$Date: 2017-05-09 11:03:30 +0200 (Tue, 09 May 2017) $");
  script_tag(name:"creation_date", value:"2013-06-26 16:34:51 +0530 (Wed, 26 Jun 2013)");
  script_name("Mozilla Firefox Multiple Vulnerabilities - June 13 (Windows)");
  script_xref(name : "URL" , value : "http://secunia.com/advisories/53970");
  script_xref(name : "URL" , value : "http://www.securitytracker.com/id/1028702");
  script_xref(name : "URL" , value : "http://www.mozilla.org/security/announce/2013/mfsa2013-50.html");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2013 SecPod");
  script_family("General");
  script_dependencies("gb_firefox_detect_win.nasl");
  script_mandatory_keys("Firefox/Win/Ver");
  script_tag(name : "impact" , value : tag_impact);
  script_tag(name : "affected" , value : tag_affected);
  script_tag(name : "insight" , value : tag_insight);
  script_tag(name : "solution" , value : tag_solution);
  script_tag(name : "summary" , value : tag_summary);
  script_tag(name:"qod_type", value:"registry");
  script_tag(name:"solution_type", value:"VendorFix");
  exit(0);
}


include("version_func.inc");

# Variable Initialization
ffVer = "";

# Firefox Check
ffVer = get_kb_item("Firefox/Win/Ver");
if(ffVer)
{
  # Grep for Firefox version
  if(version_is_less(version:ffVer, test_version:"22.0"))
  {
    security_message(0);
    exit(0);
  }
}