Rapid7 Vulnerability & Exploit Database

Mozilla Firefox Multiple Vulnerabilities Fixed in 3.0.11

Free InsightVM Trial No credit card necessary
Watch Demo See how it all works
Back to Search

Mozilla Firefox Multiple Vulnerabilities Fixed in 3.0.11

Severity
9
CVSS
(AV:N/AC:M/Au:N/C:C/I:C/A:C)
Published
06/11/2009
Created
07/25/2018
Added
08/01/2009
Modified
02/13/2015

Description

Mozilla Firefox before 3.0.11 is affected by multiple vulnerabilities:

  • Crashes with evidence of memory corruption (MFSA 2009-24). Several stability bugs were identified and fixed in the browser engine used in Firefox and other Mozilla-based products. Some of these crashes showed evidence of memory corruption under certain circumstances and we presume that with enough effort at least some of these could be exploited to run arbitrary code.
  • URL spoofing with invalid unicode characters (MFSA 2009-25). Certain invalid unicode characters, when used as part of an IDN, are displayed as whitespace in the location bar. This whitespace could be used to force part of the URL out of view in the location bar. An attacker could use this vulnerability to spoof the location bar and display a misleading URL for their malicious web page.
  • Arbitrary domain cookie access by local file: resources (MFSA 2009-26). Local resources loaded via the file: protocol can access any domain's cookies which have been saved on a user's machine. Fleischer demonstrated that a local document's domain was being calculated incorrectly from its URL. If a victim could be persuaded to download a malicious file and then open that file in their browser, the malicious file could then steal arbitrary cookies from the victim's computer. Due to the interaction required for this attack, the severity of the issue was determined to be moderate.
  • SSL tampering via non-200 responses to proxy CONNECT requests (MFSA 2009-27). When a CONNECT request is sent to a proxy server and a non-200 response is returned, then the body of the response is incorrectly rendered within the context of the request Host: header. An active network attacker could use this vulnerability to intercept a CONNECT request and reply with a non-200 response containing malicious code which would be executed within the context of the victim's requested SSL-protected domain. Since this attack requires the victim to have a proxy configured, the severity of this issue was determined to be high.
  • Race condition while accessing the private data of a NPObject JS wrapper class object (MFSA 2009-28). A race condition has been reported in NPObjWrapper_NewResolve when accessing the properties of a NPObject, a wrapped JSObject. It has been demonstrated that this condition could be reached by navigating away from a web page during the loading of a Java applet. Under such conditions the Java object would be destroyed but later called into resulting in a free memory read. It might be possible for an attacker to write to the freed memory before it is reused and run arbitrary code on the victim's computer.
  • Arbitrary code execution using event listeners attached to an element whose owner document is null (MFSA 2009-29). The owner document of an element can become null after garbage collection. In such cases, event listeners may be executed within the wrong JavaScript context. An attacker could potentially use this vulnerability to have a malicious event handler execute arbitrary JavaScript with chrome privileges.
  • Incorrect principal set for file: resources loaded via location bar (MFSA 2009-30). When a file: resource is loaded via the location bar it inherits the principal of the previously loaded document. This vulnerability can potentially give the newly loaded document additional privileges to access the contents of other local files that it wouldn't otherwise have permission to read.
  • XUL scripts bypass content-policy checks (MFSA 2009-31). Content-loading policies were not checked before loading external script files into XUL documents. The severity of this problem would depend on the reasons behind the content policy check, which include privacy from "web bugs" in Thunderbird mail messages, blocking of Ads and Ad-server tracking in AdBlock Plus.
  • JavaScript chrome privilege escalation (MFSA 2009-32). A vulnerability has been reported which allows scripts from page content to run with elevated privileges. Using this vulnerability, an attacker could cause a chrome privileged object, such as the browser sidebar or the FeedWriter, to interact with web content in such a way that attacker controlled code may be executed with the object's chrome privileges.

Solution(s)

  • mozilla-firefox-upgrade-3_0_11

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;