Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
Mozilla Firefox Multiple Vulnerabilities - Sep09 (Linux)
Information
Severity
Severity
Family
Family
CVSSv2 Base
CVSSv2 Base
CVSSv2 Vector
CVSSv2 Vector
Solution Type
Solution Type
Created
Created
Modified
Modified
Summary
The host is installed with Firefox browser and is prone to multiple vulnerabilities.
Insight
Insight
- Multiple errors in the browser and JavaScript engines can be exploited to corrupt memory. - An error exists when processing operations performed on the columns of a XUL tree element. This can be exploited to dereference freed memory via a pointer owned by a column of the XUL tree element. - An error exists when displaying text in the location bar using the default Windows font. This can be exploited to spoof the URL of a trusted site via Unicode characters having a tall line-height. - An error in the implementation of the 'BrowserFeedWriter' object can be exploited to execute arbitrary JavaScript code with chrome privileges.
Affected Software
Affected Software
Mozilla Firefox version prior to 3.0.14 and 3.5 before 3.5.3 on Linux.
Solution
Solution
Upgrade to Firefox version 3.0.14 or 3.5.3 or later.