This script is Copyright (C) 2012-2014 Tenable Network Security, Inc.
The remote Mac OS X host contains a web browser that is potentially
affected by a memory corruption vulnerability.
The installed version of Firefox is earlier than 10.0.1 and is,
therefore, potentially affected by a memory corruption vulnerability.
A use-after-free error exists in the method
'nsXBLDocumentInfo::ReadPrototypeBindings' and XBL bindings are not
properly removed from a hash table in the event of failure. Clean-up
processes may then attempt to use this data and cause application
crashes. These application crashes are potentially exploitable.
See also :
Upgrade to Firefox 10.0.1 or later.
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 8.1
Public Exploit Available : false
Family: MacOS X Local Security Checks
Nessus Plugin ID: 58070 ()
Bugtraq ID: 51975
CVE ID: CVE-2012-0452
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.