CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
EPSS
Percentile
98.5%
The installed version of Firefox is earlier than 3.5.14. Such versions are potentially affected by the following security issues :
Multiple memory safety bugs could lead to memory corruption, potentially resulting in arbitrary code execution. (MFSA 2010-64)
By passing an excessively long string to ‘document.write’, it may be possible to trigger a buffer overflow condition resulting in arbitrary code execution on the remote system. (MFSA 2010-65)
A use-after-free error in nsBarProp could allow arbitrary code execution on the remote system.
(MFSA 2010-66)
A dangling pointer vulnerability in LookupGetterOrSetter could allow arbitrary code execution. (MFSA 2010-67)
The Gopher parser is affected by a cross-site scripting vulnerability. (MFSA 2010-68)
It is possible to steal information from a site in a different domain using modal calls. (MFSA 2010-69)
It is possible to establish a valid SSL connection to a remote host, provided the SSL certificate was created with a common name containing a wild card followed by partial IP address of the remote host.
(MFSA 2010-70)
A function used to load external libraries on Windows platform could allow loading of unsafe DLLs thus allowing binary planting attacks. (MFSA 2010-71)
The SSL implementation allows servers to use Diffie-Hellman Ephemeral mode (DHE) with a very short key length. Such key lengths could be easily breakable with modern hardware. (MFSA 2010-72)
#
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(50084);
script_version("1.15");
script_cvs_date("Date: 2018/11/15 20:50:27");
script_cve_id(
"CVE-2010-3170",
"CVE-2010-3173",
"CVE-2010-3174",
"CVE-2010-3176",
"CVE-2010-3177",
"CVE-2010-3178",
"CVE-2010-3179",
"CVE-2010-3180",
"CVE-2010-3181",
"CVE-2010-3183"
);
script_bugtraq_id(
42817,
44243,
44246,
44247,
44248,
44249,
44250,
44252,
44253
);
script_xref(name:"Secunia", value:"41244");
script_name(english:"Firefox < 3.5.14 Multiple Vulnerabilities");
script_summary(english:"Checks version of Firefox");
script_set_attribute(attribute:"synopsis", value:
"The remote Windows host contains a web browser that is affected by
multiple vulnerabilities.");
script_set_attribute(attribute:"description", value:
"The installed version of Firefox is earlier than 3.5.14. Such
versions are potentially affected by the following security issues :
- Multiple memory safety bugs could lead to memory
corruption, potentially resulting in arbitrary
code execution. (MFSA 2010-64)
- By passing an excessively long string to
'document.write', it may be possible to trigger a buffer
overflow condition resulting in arbitrary code execution
on the remote system. (MFSA 2010-65)
- A use-after-free error in nsBarProp could allow
arbitrary code execution on the remote system.
(MFSA 2010-66)
- A dangling pointer vulnerability in LookupGetterOrSetter
could allow arbitrary code execution. (MFSA 2010-67)
- The Gopher parser is affected by a cross-site scripting
vulnerability. (MFSA 2010-68)
- It is possible to steal information from a site in a
different domain using modal calls. (MFSA 2010-69)
- It is possible to establish a valid SSL connection
to a remote host, provided the SSL certificate was
created with a common name containing a wild card
followed by partial IP address of the remote host.
(MFSA 2010-70)
- A function used to load external libraries on Windows
platform could allow loading of unsafe DLLs thus
allowing binary planting attacks. (MFSA 2010-71)
- The SSL implementation allows servers to use
Diffie-Hellman Ephemeral mode (DHE) with a very
short key length. Such key lengths could be easily
breakable with modern hardware. (MFSA 2010-72)");
script_set_attribute(attribute:"see_also", value:"https://www.westpoint.ltd.uk/advisories/wp-10-0001.txt");
script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-10-219/");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2010-64/");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2010-65/");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2010-66/");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2010-67/");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2010-68/");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2010-69/");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2010-70/");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2010-71/");
script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2010-72/");
# http://www.mozilla.org/security/known-vulnerabilities/firefox35.html#firefox3.5.14
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?5e2e67ea");
script_set_attribute(attribute:"solution", value:"Upgrade to Firefox 3.5.14 or later.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"vuln_publication_date", value:"2010/08/14"); # MFSA 2010-70
script_set_attribute(attribute:"patch_publication_date", value:"2010/10/19");
script_set_attribute(attribute:"plugin_publication_date", value:"2010/10/21");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/a:mozilla:firefox");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Windows");
script_copyright(english:"This script is Copyright (C) 2010-2018 Tenable Network Security, Inc.");
script_dependencies("mozilla_org_installed.nasl");
script_require_keys("Mozilla/Firefox/Version");
exit(0);
}
include("mozilla_version.inc");
port = get_kb_item_or_exit("SMB/transport");
installs = get_kb_list("SMB/Mozilla/Firefox/*");
if (isnull(installs)) audit(AUDIT_NOT_INST, "Firefox");
mozilla_check_version(installs:installs, product:'firefox', esr:FALSE, fix:'3.5.14', severity:SECURITY_HOLE);
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3170
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3173
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3174
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3176
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3177
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3178
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3179
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3180
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3181
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3183
www.nessus.org/u?5e2e67ea
www.mozilla.org/en-US/security/advisories/mfsa2010-64/
www.mozilla.org/en-US/security/advisories/mfsa2010-65/
www.mozilla.org/en-US/security/advisories/mfsa2010-66/
www.mozilla.org/en-US/security/advisories/mfsa2010-67/
www.mozilla.org/en-US/security/advisories/mfsa2010-68/
www.mozilla.org/en-US/security/advisories/mfsa2010-69/
www.mozilla.org/en-US/security/advisories/mfsa2010-70/
www.mozilla.org/en-US/security/advisories/mfsa2010-71/
www.mozilla.org/en-US/security/advisories/mfsa2010-72/
www.westpoint.ltd.uk/advisories/wp-10-0001.txt
www.zerodayinitiative.com/advisories/ZDI-10-219/