This script is Copyright (C) 2014-2016 Tenable Network Security, Inc.
The remote Mac OS X host contains a web browser that is affected by
The version of Firefox ESR 24.x installed on the remote host is prior
to 24.7. It is, therefore, affected by the following vulnerabilities :
- When a pair of NSSCertificate structures are added to a
trust domain and then one of them is removed during use,
a use-after-free error occurs which may cause the
application to crash. This crash is potentially
- There are multiple memory safety hazards within the
browser engine. These hazards may lead to memory
corruption vulnerabilities, which may allow attackers
to execute arbitrary code. (CVE-2014-1547,
- Triggering the FireOnStateChange event has the
potential to crash the application. This may lead to
a use-after-free and an exploitable crash.
WebGL content, the application may crash. This crash
is potentially exploitable. (CVE-2014-1556)
- There is a flaw in the Skia library when scaling images
of high quality. If the image data is discarded while
being processed, the library may crash. This crash
is potentially exploitable. (CVE-2014-1557)
See also :
Upgrade to Firefox ESR 24.7 or later.
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 6.9
Public Exploit Available : false
Family: MacOS X Local Security Checks
Nessus Plugin ID: 76758 ()
Bugtraq ID: 688116881468816688186882268824
CVE ID: CVE-2014-1544CVE-2014-1547CVE-2014-1548CVE-2014-1555CVE-2014-1556CVE-2014-1557
Upgrade to Nessus Professional today!
Start your free Nessus Cloud trial now!
Begin Free Trial
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.