Firefox < 34.0 Multiple Vulnerabilities (Mac OS X)

This script is Copyright (C) 2014-2016 Tenable Network Security, Inc.


Synopsis :

The remote Mac OS X host contains a web browser that is affected by
multiple vulnerabilities.

Description :

The version of Firefox installed on the remote Mac OS X host is a
version prior to 34.0. It is, therefore, affected by the following
vulnerabilities :

- A security bypass vulnerability exists due to the
'XrayWrappers' filter not properly validating object
properties. This allows a remote attacker to bypass
security protection mechanisms to access protected
objects. (CVE-2014-8631)

- A security bypass vulnerability exists due to Chrome
Object Wrappers (COW) being passed as native interfaces.
This allows a remote attacker to access normally
protected objects. (CVE-2014-8632)

- A remote code execution vulnerability exists in Mozilla
Network Security Services (NSS) due to a flaw in
'quickder.c' that is triggered when handling PKCS#1
signatures during the decoding of ASN.1 DER.
(CVE-2014-1569)

- Multiple memory safety flaws exist within the browser
engine. Exploiting these, an attacker can cause a denial
of service or execute arbitrary code. (CVE-2014-1587,
CVE-2014-1588)

- A security bypass vulnerability exists due improper
declaration of chrome accessible CSS primary namespaces
allowing for XML Binding Language (XBL) bindings to be
triggered remotely. (CVE-2014-1589)

- A denial of service vulnerability exists due to
improper parsing of a JavaScript object to the
XMLHttpRequest API which can result in a crash.
(CVE-2014-1590)

- An information disclosure vulnerability exists due to
Content Security Policy (CSP) violation reports
triggered by a redirect not properly removing path
information which can reveal sensitive information.
Note that this only affects Firefox 33. (CVE-2014-1591)

- A use-after-free error exists due the creation of a
second XML root element when parsing HTML written to a
document created with 'document.open()' function which
can result in arbitrary code execution. (CVE-2014-1592)

- A buffer overflow vulnerability exists in the
'mozilla::FileBlockCache::Read' function when parsing
media which can result in arbitrary code execution.
(CVE-2014-1593)

- A casting error exists when casting from the
'BasicThebesLayer' layer to the 'BasicContainerLayer'
layer which can result in arbitrary code execution.
(CVE-2014-1594)

- An information disclosure vulnerability exists due to
the CoreGraphic framework creating log files containing
sensitive information in the '/tmp' directory.
(CVE-2014-1595)

See also :

https://www.mozilla.org/en-US/security/advisories/mfsa2014-83/
https://www.mozilla.org/en-US/security/advisories/mfsa2014-84/
https://www.mozilla.org/en-US/security/advisories/mfsa2014-85/
https://www.mozilla.org/en-US/security/advisories/mfsa2014-86/
https://www.mozilla.org/en-US/security/advisories/mfsa2014-87/
https://www.mozilla.org/en-US/security/advisories/mfsa2014-88/
https://www.mozilla.org/en-US/security/advisories/mfsa2014-89/
https://www.mozilla.org/en-US/security/advisories/mfsa2014-90/
https://www.mozilla.org/en-US/security/advisories/mfsa2014-91/

Solution :

Upgrade to Firefox 34.0 or later.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 6.9
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now