This script is Copyright (C) 2014-2016 Tenable Network Security, Inc.
The remote Mac OS X host contains a web browser that is potentially
affected by multiple vulnerabilities.
The installed version of Firefox is a version prior to version 28.0.
It is, therefore, potentially affected by multiple vulnerabilities :
- Memory issues exist that could lead to arbitrary code
execution. (CVE-2014-1493, CVE-2014-1494)
- An issue exists where extracted files for updates are
not read-only while updating. An attacker may be able
to modify these extracted files resulting in privilege
- An out-of-bounds read error exists when decoding WAV
format audio files that could lead to a denial of
service attack or information disclosure.
- An issue exists in the 'crypto.generateCRFMRequest'
method due to improper validation of the KeyParams
argument when generating 'ec-dual-use' requests. This
could lead to a denial of service attack.
- An issue exists that could allow for spoofing attacks to
occur during a WebRTC session. Exploitation of this
issue could allow an attacker to gain access to the
user's webcam or microphone. (CVE-2014-1499)
that could lead to denial of service attacks.
- An issue exists where WebGL context from one website
can be injected into the WebGL context of another
website, which could result in arbitrary content being
rendered from the second website. (CVE-2014-1502)
- A cross-site scripting issue exists due to the Content
Security Policy (CSP) of 'data:' documents not being
saved for a session restore. Under certain
circumstances, an attacker may be able to evade the CSP
of a remote website resulting in a cross-scripting
- An out-of-bounds read error exists when polygons are
rendered in 'MathML' that could lead to information
- A memory corruption issue exists in the Cairo graphics
library when rendering a PDF file that could lead to
arbitrary code execution or a denial of service attack.
- An issue exists in the SVG filters and the
feDisplacementMap element that could lead to
information disclosure via timing attacks.
- An issue exists that could allow malicious websites to
implemented WebIDL calls the 'window.open()' function,
which may result in arbitrary code execution.
- An issue exists that could allow a malicious website to
bypass the pop-up blocker. (CVE-2014-1511)
- A use-after-free memory issue exists in 'TypeObjects'
that could lead to arbitrary code execution.
- An out-of-bounds write error exists due to
'TypedArrayObject' improperly handling 'ArrayBuffer'
objects that could result in arbitrary code execution.
- An out-of-bounds write error exists when copying values
from one array to another that could result in arbitrary
code execution. (CVE-2014-1514)
See also :
Upgrade to Firefox 28.0 or later.
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 7.3
Public Exploit Available : true
Family: MacOS X Local Security Checks
Nessus Plugin ID: 73096 ()
Bugtraq ID: 6620366206662076620966240664126641666417664186641966421664226642366425664266642866429
CVE ID: CVE-2014-1493CVE-2014-1494CVE-2014-1496CVE-2014-1497CVE-2014-1498CVE-2014-1499CVE-2014-1500CVE-2014-1502CVE-2014-1504CVE-2014-1505CVE-2014-1508CVE-2014-1509CVE-2014-1510CVE-2014-1511CVE-2014-1512CVE-2014-1513CVE-2014-1514
Upgrade to Nessus Professional today!
Start your free Nessus Cloud trial now!
Begin Free Trial
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.