vendor:
Firefox
by:
SBerry aka Simon Berry-Byrne
9,3
CVSS
HIGH
Heap Spray Vulnerabilty
119
CWE
Product Name: Firefox
Affected Version From: 3.5
Affected Version To: 3.5.2
Patch Exists: YES
Related CWE: CVE-2009-3555
CPE: a:mozilla:firefox:3.5
Metasploit:
https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2010-0986/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2011-0880/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2010-0807/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2010-0865/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2010-0770/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2010-0987/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2010-0768/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2010-0786/, https://www.rapid7.com/db/vulnerabilities/sunpatch-145102/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2010-0440/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2010-0338/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2010-0130/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2010-0337/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2010-0339/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2010-0167/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2010-0162/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2010-0119/, https://www.rapid7.com/db/vulnerabilities/ibm-aix-cve-2009-3555/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2009-3555/, https://www.rapid7.com/db/vulnerabilities/vmsa-2010-0019-cve-2009-3555/, https://www.rapid7.com/db/?q=CVE-2009-3555&type=&page=2, https://www.rapid7.com/db/?q=CVE-2009-3555&type=&page=3, https://www.rapid7.com/db/?q=CVE-2009-3555&type=&page=2
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows, Linux, Mac
2009
Firefox 3.5 Vulnerability
This vulnerability is related to the Firefox 3.5 browser. It is a heap spray vulnerability which allows an attacker to execute arbitrary code on the target system. The exploit is based on a memory corruption vulnerability in the browser's JavaScript engine. The exploit is triggered by a malicious JavaScript code which is embedded in a web page. The code is executed when the user visits the page. The exploit uses a heap spray technique to inject malicious code into the browser's memory. The malicious code is then executed, allowing the attacker to gain control of the target system.
Mitigation:
The vulnerability can be mitigated by applying the latest security patches from Mozilla. Additionally, users should be aware of the risks associated with visiting untrusted websites and should avoid clicking on suspicious links.