Firefox ESR 31.x < 31.3 Multiple Vulnerabilities (Mac OS X)

This script is Copyright (C) 2014-2016 Tenable Network Security, Inc.

Synopsis :

The remote Mac OS X host contains a web browser that is affected by
multiple vulnerabilities.

Description :

The version of Firefox ESR 31.x installed on the remote Mac OS X host
is prior to 31.3. It is, therefore, affected by the following
vulnerabilities :

- Multiple memory safety flaws exist within the browser
engine. Exploiting these, an attacker can cause a denial
of service or execute arbitrary code. (CVE-2014-1587,

- A denial of service vulnerability exists due to
improper parsing of a JavaScript object to the
XMLHttpRequest API which can result in a crash.

- A use-after-free error exists due the creation of a
second XML root element when parsing HTML written to a
document created with '' function which
can result in arbitrary code execution. (CVE-2014-1592)

- A buffer overflow vulnerability exists in the
'mozilla::FileBlockCache::Read' function when parsing
media which can result in arbitrary code execution.

- A casting error exists when casting from the
'BasicThebesLayer' layer to the 'BasicContainerLayer'
layer which can result in arbitrary code execution.

- An information disclosure vulnerability exists due to
the CoreGraphic framework creating log files containing
sensitive information in the '/tmp' directory.

See also :

Solution :

Upgrade to Firefox ESR 31.3 or later.

Risk factor :

High / CVSS Base Score : 9.3
CVSS Temporal Score : 6.9
Public Exploit Available : false

Family: MacOS X Local Security Checks

Nessus Plugin ID: 79661 ()

Bugtraq ID: 71391

CVE ID: CVE-2014-1587

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now