Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
Mozilla Firefox Multiple Vulnerabilities Nov-09 (Windows)
Information
Severity
Severity
Family
Family
CVSSv2 Base
CVSSv2 Base
CVSSv2 Vector
CVSSv2 Vector
Solution Type
Solution Type
Created
Created
Modified
Modified
Summary
This host is installed with Mozilla Firefox browser and is prone to multiple vulnerabilities.
Insight
Insight
Muliple flaw are due to following errors, - An array indexing error exists when allocating space for floating point numbers. This can be exploited to trigger a memory corruption when a specially crafted floating point number is processed. - An error in the form history functionality can be exploited to disclose history entries via a specially crafted web page that triggers the automatic filling of form fields. - When parsing regular expressions used in Proxy Auto-configuration. This can be exploited to cause a crash or potentially execute arbitrary code via specially crafted configured PAC files. - When processing GIF, color maps can be exploited to cause a heap based buffer overflow and potentially execute arbitrary code via a specially crafted GIF file. - An error in the 'XPCVariant::VariantDataToJS()' XPCOM utility, which can be exploited to execute arbitrary JavaScript code with chrome privileges. - An error in the implementation of the JavaScript 'document.getSelection()' can be exploited to read text selected on a web page in a different domain. - An error when downloading files can be exploited to display different file names in the download dialog title bar and download dialog body. This can be exploited to obfuscate file names via a right-to-left override character and potentially trick a user into running an executable file. - Multiple unspecified errors in the browser engines can be exploited to cause crash or potentially execute arbitrary code.
Affected Software
Affected Software
Firefox version 3.0 before 3.0.15 and 3.5 before 3.5.4 on Windows.
Solution
Solution
Upgrade to Firefox version 3.0.15 or 3.5.4.
Common Vulnerabilities and Exposures (CVE)
References
- http://secunia.com/secunia_research/2009-35/
- http://www.mozilla.org/security/announce/2009/mfsa2009-52.html
- http://www.mozilla.org/security/announce/2009/mfsa2009-55.html
- http://www.mozilla.org/security/announce/2009/mfsa2009-56.html
- http://www.mozilla.org/security/announce/2009/mfsa2009-57.html
- http://www.mozilla.org/security/announce/2009/mfsa2009-59.html
- http://www.mozilla.org/security/announce/2009/mfsa2009-61.html
- http://www.mozilla.org/security/announce/2009/mfsa2009-62.html