This script is Copyright (C) 2011-2015 Tenable Network Security, Inc.
The remote Mac OS X host contains a web browser that is potentially
affected by several vulnerabilities.
The installed version of Firefox 8.x is potentially affected by the
following security issues :
- An out-of-bounds memory access error exists in the
'SVG' implementation and can be triggered when 'SVG'
elements are removed during a 'DOMAttrModified' event
- Various memory safety errors exist that can lead to
memory corruption and possible code execution.
- An error exists in the 'YARR' regular expression
library that can cause application crashes when
- It is possible to detect keystrokes using 'SVG'
- An error exists related to plugins that can allow a NULL
pointer to be dereferenced when a plugin deletes its
containing DOM frame during a call from that frame. It
may be possible for a non-NULL pointer to be
dereferenced thereby opening up the potential for
further exploitation. (CVE-2011-3664)
- It is possible to crash the application when 'OGG'
'video' elements are scaled to extreme sizes.
- A use-after-free error exists related to the function
'nsHTMLSelectElement' that can allow arbitrary code
execution during operations such as removal of a
parent node of an element. (CVE-2011-3671)
See also :
Upgrade to Firefox 9.0 or later.
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 8.1
Public Exploit Available : true
Family: MacOS X Local Security Checks
Nessus Plugin ID: 57359 ()
Bugtraq ID: 51133511345113551136511375113854080
CVE ID: CVE-2011-3658CVE-2011-3660CVE-2011-3661CVE-2011-3663CVE-2011-3664CVE-2011-3665CVE-2011-3671
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.