Ubuntu Security Notice (C) 2015-2016 Canonical, Inc. / NASL script (C) 2015-2016 Tenable Network Security, Inc.
The remote Ubuntu host is missing a security-related patch.
A use-after-free was discovered when resizing a canvas element during
restyling in some circumstances. If a user were tricked in to opening
a specially crafted website, an attacker could potentially exploit
this to cause a denial of service via application crash, or execute
arbitrary code with the privileges of the user invoking Firefox.
Bas Venis discovered that the addon install permission prompt could be
bypassed using data: URLs in some circumstances. It was also
discovered that the installation notification could be made to appear
over another site. If a user were tricked in to opening a specially
crafted website, an attacker could potentially exploit this to install
a malicious addon. (CVE-2015-4498).
Note that Tenable Network Security has extracted the preceding
description block directly from the Ubuntu security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.
Update the affected firefox package.
Risk factor :
Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 7.4
Public Exploit Available : false