Firefox ESR < 38.2.1 Multiple Vulnerabilities (Mac OS X)

This script is Copyright (C) 2015 Tenable Network Security, Inc.

Synopsis :

The remote Mac OS X host contains a web browser that is affected by
multiple vulnerabilities.

Description :

The version of Mozilla Firefox ESR installed on the remote Mac OS X
host is prior to 38.2.1. It is, therefore, affected by the following
vulnerabilities :

- A use-after-free error exists when handling restyling
operations during the resizing of canvas elements due to
the canvas references being recreated, thus destroying
the original references. A remote, unauthenticated
attacker can exploit this to deference already freed
memory, resulting in a denial of service condition or
the execution of arbitrary code. (CVE-2015-4497)

- A security feature bypass vulnerability exists due to a
flaw that allows the manipulation of the 'data:' URL on
a loaded web page without install permission prompts
being displayed to the user. A remote, unauthenticated
attacker can exploit this to install add-ons from a
malicious source. (CVE-2015-4498)

See also :

Solution :

Upgrade to Firefox ESR 38.2.1 or later.

Risk factor :

High / CVSS Base Score : 9.3
CVSS Temporal Score : 6.9
Public Exploit Available : false

Family: MacOS X Local Security Checks

Nessus Plugin ID: 85686 ()

Bugtraq ID:

CVE ID: CVE-2015-4497

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now