Rapid7 Vulnerability & Exploit Database

Multiple Mozilla Firefox Vulnerabilities Fixed in version 2.0.0.15

Free InsightVM Trial No credit card necessary
Watch Demo See how it all works
Back to Search

Multiple Mozilla Firefox Vulnerabilities Fixed in version 2.0.0.15

Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
07/07/2008
Created
07/25/2018
Added
03/23/2009
Modified
02/13/2015

Description

Firefox before 2.0.0.15 is affected by the vulnerabilities described in the above links.

Multiple unspecified vulnerabilities in Mozilla Firefox before 2.0.0.15 allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via unknown vectors related to the layout engine. (CVE-2008-2798)

Multiple unspecified vulnerabilities in Mozilla Firefox before 2.0.0.15 allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via unknown vectors related to the JavaScript engine. (CVE-2008-2799)

Mozilla Firefox before 2.0.0.15 does not properly implement JAR signing, which allows remote attackers to execute arbitrary code via (1) injection of JavaScript into documents within a JAR archive or (2) a JAR archive that uses relative URLs to JavaScript files. (CVE-2008-2801)

Mozilla Firefox before 2.0.0.15 allows remote attackers to execute arbitrary code via an XUL document that includes a script from a chrome: URI that points to a fastload file, related to this file's "privilege level." (CVE-2008-2802)

The mozIJSSubScriptLoader.LoadScript function in Mozilla Firefox before 2.0.0.15 does not apply XPCNativeWrappers to scripts loaded from (1) file: URIs, (2) data: URIs, or (3) certain non-canonical chrome: URIs, which allows remote attackers to execute arbitrary code via vectors involving third-party add-ons. (CVE-2008-2803)

Mozilla Firefox before 2.0.0.15 allows remote attackers to force the upload of arbitrary local files from a client computer via vectors involving originalTarget and DOM Range. (CVE-2008-2805)

Mozilla Firefox before 2.0.0.15 allows remote attackers to bypass the Same Origin Policy and create arbitrary socket connections via a crafted Java applet, related to the Java Embedding Plugin (JEP) and Java LiveConnect. (CVE-2008-2806)

Mozilla Firefox before 2.0.0.15 does not properly handle an invalid .properties file for an add-on, which allows remote attackers to read uninitialized memory, as demonstrated by use of ISO 8859 encoding instead of UTF-8 encoding in a French .properties file. (CVE-2008-2807)

Mozilla Firefox before 2.0.0.15 does not properly escape HTML in file:// URLs in directory listings, which allows remote attackers to conduct cross-site scripting (XSS) attacks or have unspecified other impact via a crafted filename. (CVE-2008-2808)

Mozilla Firefox 2 before 2.0.0.15 and other versions before 1.1.10, when a user accepts an SSL server certificate on the basis of the CN domain name in the DN field, regard the certificate as also accepted for all domain names in subjectAltName:dNSName fields, which makes it easier for remote attackers to trick a user into accepting an invalid certificate for a spoofed web site. (CVE-2008-2809)

Mozilla Firefox before 2.0.0.15 does not properly identify the context of Windows shortcut files, which allows user-assisted remote attackers to bypass the Same Origin Policy via a crafted web site for which the user has previously saved a shortcut. (CVE-2008-2810)

The block reflow implementation in Mozilla Firefox before 2.0.0.15 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via an image whose display requires more pixels than nscoord_MAX, related to nsBlockFrame::DrainOverflowLines. (CVE-2008-2811)

Solution(s)

  • mozilla-firefox-upgrade-2_0_0_15

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;