Firefox < 29.0 Multiple Vulnerabilities (Mac OS X)

This script is Copyright (C) 2014 Tenable Network Security, Inc.


Synopsis :

The remote Mac OS X host contains a web browser that is potentially
affected by multiple vulnerabilities.

Description :

The installed version of Firefox is a version prior to version 29.0.
It is, therefore, potentially affected by multiple vulnerabilities :

- An issue exists in the Network Security (NSS) library
due to improper handling of IDNA domain prefixes for
wildcard certificates. This issue could allow man-in-
the-middle attacks. (CVE-2014-1492)

- Memory issues exist that could lead to arbitrary code
execution. (CVE-2014-1518, CVE-2014-1519)

- An out-of-bounds read issue exists in the Web Audio
feature that could lead to information disclosure.
(CVE-2014-1522)

- An out-of-bounds read issue exists when decoding
certain JPG images that could lead to a denial of
service. (CVE-2014-1523)

- A memory corruption issue exists due to improper
validation of XBL objects that could lead to arbitrary
code execution. (CVE-2014-1524)

- A use-after-free memory issue exists in the Text Track
Manager during HTML video processing that could lead
to arbitrary code execution. (CVE-2014-1525)

- An issue exists related to the debugger bypassing
XrayWrappers that could lead to privilege escalation.
(CVE-2014-1526)

- A security bypass issue exists in the Web Notification
API that could lead to arbitrary code execution.
(CVE-2014-1529)

- A cross-site scripting issue exists that could allow an
attacker to load another website other than the URL for
the website that is shown in the address bar.
(CVE-2014-1530)

- A use-after-free issue exists due to an 'imgLoader'
object being freed when being resized. This issue
could lead to arbitrary code execution. (CVE-2014-1531)

- A use-after-free issue exists during host resolution
that could lead to arbitrary code execution.
(CVE-2014-1532)

See also :

http://www.mozilla.org/security/announce/2014/mfsa2014-34.html
http://www.mozilla.org/security/announce/2014/mfsa2014-35.html
http://www.mozilla.org/security/announce/2014/mfsa2014-36.html
http://www.mozilla.org/security/announce/2014/mfsa2014-37.html
http://www.mozilla.org/security/announce/2014/mfsa2014-38.html
http://www.mozilla.org/security/announce/2014/mfsa2014-39.html
http://www.mozilla.org/security/announce/2014/mfsa2014-42.html
http://www.mozilla.org/security/announce/2014/mfsa2014-43.html
http://www.mozilla.org/security/announce/2014/mfsa2014-44.html
http://www.mozilla.org/security/announce/2014/mfsa2014-45.html
http://www.mozilla.org/security/announce/2014/mfsa2014-46.html
http://www.mozilla.org/security/announce/2014/mfsa2014-47.html

Solution :

Upgrade to Firefox 29.0 or later.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.1
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false