Firefox 8.x Multiple Vulnerabilities (Mac OS X)

This script is Copyright (C) 2011-2017 Tenable Network Security, Inc.

Synopsis :

The remote Mac OS X host contains a web browser that is potentially
affected by several vulnerabilities.

Description :

The installed version of Firefox 8.x is potentially affected by the
following security issues :

- An out-of-bounds memory access error exists in the
'SVG' implementation and can be triggered when 'SVG'
elements are removed during a 'DOMAttrModified' event
handler. (CVE-2011-3658)

- Various memory safety errors exist that can lead to
memory corruption and possible code execution.

- An error exists in the 'YARR' regular expression
library that can cause application crashes when
handling certain JavaScript statements. (CVE-2011-3661)

- It is possible to detect keystrokes using 'SVG'
animation 'accesskey' events even when JavaScript is
disabled. (CVE-2011-3663)

- An error exists related to plugins that can allow a NULL
pointer to be dereferenced when a plugin deletes its
containing DOM frame during a call from that frame. It
may be possible for a non-NULL pointer to be
dereferenced thereby opening up the potential for
further exploitation. (CVE-2011-3664)

- It is possible to crash the application when 'OGG'
'video' elements are scaled to extreme sizes.

- A use-after-free error exists related to the function
'nsHTMLSelectElement' that can allow arbitrary code
execution during operations such as removal of a
parent node of an element. (CVE-2011-3671)

See also :

Solution :

Upgrade to Firefox 9.0 or later.

Risk factor :

High / CVSS Base Score : 9.3
CVSS Temporal Score : 7.7
Public Exploit Available : true

Family: MacOS X Local Security Checks

Nessus Plugin ID: 57359 ()

Bugtraq ID: 51133

CVE ID: CVE-2011-3658

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now