Firefox < 36.0 Multiple Vulnerabilities (Mac OS X)

This script is Copyright (C) 2015-2016 Tenable Network Security, Inc.


Synopsis :

The remote Mac OS X host contains a web browser that is affected by
multiple vulnerabilities.

Description :

The version of Firefox installed on the remote Mac OS X host is prior
to 36.0. It is, therefore, affected by the following vulnerabilities :

- An issue exists that allows whitelisted Mozilla domains
to make 'UITour' API calls while UI Tour pages are
present in background tabs. This allows an attacker, via
a compromised Mozilla domain, to engage in spoofing and
clickjacking in any foreground tab. (CVE-2015-0819)

- An issue exists related to sandbox libraries, including
the Caja Compiler, which allows JavaScript objects to be
marked as extensible even though the objects were
initially marked as non-extensible. (CVE-2015-0820)

- An issue exists when opening hyperlinks on a page with
the mouse and specific keyboard key combinations that
allows a Chrome privileged URL to be opened without
context restrictions being preserved. Additionally, the
issue allows the opening of local files and resources
from a known location to be opened with local
privileges, bypassing security protections.
(CVE-2015-0821)

- An information disclosure vulnerability exists related
to the autocomplete feature that allows an attacker to
read arbitrary files. (CVE-2015-0822)

- A use-after-free error exists with the OpenType
Sanitiser (OTS) when expanding macros. (CVE-2015-0823)

- An issue exists in the DrawTarget() function of the
Cairo graphics library that allows an attacker cause a
segmentation fault, resulting in a denial of service.
(CVE-2015-0824)

- A buffer underflow issue exists during audio playback of
invalid MP3 audio files. (CVE-2015-0825)

- An out-of-bounds read issue exists while restyling and
reflowing changes of web content with CSS, resulting in
a denial of service condition or arbitrary code
execution. (CVE-2015-0826)

- An out-of-bounds read and write issue exists when
processing invalid SVG graphic files. This allows an
attacker to disclose sensitive information.
(CVE-2015-0827)

- A double-free issue exists when sending a zero-length
XmlHttpRequest (XHR) object due to errors in memory
allocation when using different memory allocator
libraries than 'jemalloc'. This allows an attacker to
crash the application. (CVE-2015-0828)

- A buffer overflow issue exists in the 'libstagefright'
library when processing invalid MP4 video files,
resulting in a denial of service condition or arbitrary
code execution. (CVE-2015-0829)

- An unspecified issue exists that allows an attacker, via
specially crafted WebGL content, to cause a denial of
service condition. (CVE-2015-0830)

- A use-after-free issue exists when running specific web
content with 'IndexedDB' to create an index, resulting
in a denial of service condition or arbitrary code
execution. (CVE-2015-0831)

- An issue exists when a period is appended to a hostname
that results in a bypass of the Public Key Pinning
Extension for HTTP (HPKP) and HTTP Strict Transport
Security (HSTS) when certificate pinning is set to
strict mode. An attacker can exploit this issue to
perform man-in-the-middle attacks if the attacker has a
security certificate for a domain with the added period.
(CVE-2015-0832)

- An information disclosure vulnerability exists due to
the lack of TLS support for connections to TURN and STUN
servers, resulting in cleartext connections.
(CVE-2015-0834)

- Multiple unspecified memory safety issues exist within
the browser engine. (CVE-2015-0835, CVE-2015-0836)

See also :

https://www.mozilla.org/en-US/security/advisories/mfsa2015-11/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-13/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-14/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-15/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-16/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-17/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-18/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-19/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-20/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-21/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-22/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-23/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-24/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-25/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-26/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-27/

Solution :

Upgrade to Firefox 36.0 or later.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 6.9
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false