Firefox < 12.0 Multiple Vulnerabilities (Mac OS X)

This script is Copyright (C) 2012-2014 Tenable Network Security, Inc.


Synopsis :

The remote Mac OS X host contains a web browser that is affected by
multiple vulnerabilities.

Description :

The installed version of Firefox is earlier than 12.0 and thus, is
potentially affected by the following security issues :

- An error exists with handling JavaScript errors that
can lead to information disclosure. (CVE-2011-1187)

- An off-by-one error exists in the 'OpenType Sanitizer'
which can lead to out-bounds-reads and possible code
execution. (CVE-2011-3062)

- Memory safety issues exist that could lead
to arbitrary code execution. (CVE-2012-0467,
CVE-2012-0468)

- A use-after-free error exists related to 'IDBKeyRange'
of 'indexedDB'. (CVE-2012-0469)

- Heap-corruption errors exist related to
'gfxImageSurface' which can lead to possible code
execution. (CVE-2012-0470)

- A multi-octet encoding issue exists which could allow
cross-site scripting attacks as certain octets in
multibyte character sets can destroy following octets.
(CVE-2012-0471)

- An error exists in 'WebGLBuffer' that can lead to the
reading of illegal video memory. (CVE-2012-0473)

- An unspecified error can allow URL bar spoofing.
(CVE-2012-0474)

- IPv6 addresses and cross-site 'XHR' or 'WebSocket'
connections on non-standard ports can allow this
application to send ambiguous origin headers.
(CVE-2012-0475)

- A decoding issue exists related to 'ISO-2022-KR' and
'ISO-2022-CN' character sets which can lead to cross-
site scripting attacks. (CVE-2012-0477)

- An error exists related to 'WebGL' and 'texImage2D'
that can allow application crashes and possibly code
execution when 'JSVAL_TO_OBJECT' is used on ordinary
objects. (CVE-2012-0478)

- Address bar spoofing is possible when 'Atom XML' or
'RSS' data is loaded over HTTPS leading to phishing
attacks. (CVE-2012-0479)

See also :

http://www.mozilla.org/security/announce/2012/mfsa2012-20.html
http://www.mozilla.org/security/announce/2012/mfsa2012-22.html
http://www.mozilla.org/security/announce/2012/mfsa2012-23.html
http://www.mozilla.org/security/announce/2012/mfsa2012-24.html
http://www.mozilla.org/security/announce/2012/mfsa2012-26.html
http://www.mozilla.org/security/announce/2012/mfsa2012-27.html
http://www.mozilla.org/security/announce/2012/mfsa2012-28.html
http://www.mozilla.org/security/announce/2012/mfsa2012-29.html
http://www.mozilla.org/security/announce/2012/mfsa2012-30.html
http://www.mozilla.org/security/announce/2012/mfsa2012-31.html
http://www.mozilla.org/security/announce/2012/mfsa2012-32.html
http://www.mozilla.org/security/announce/2012/mfsa2012-33.html

Solution :

Upgrade to Firefox 12.0 or later.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.3
(CVSS2#E:POC/RL:OF/RC:C)
Public Exploit Available : true