Firefox < 40.0.3 Multiple Vulnerabilities (Mac OS X)

This script is Copyright (C) 2015-2016 Tenable Network Security, Inc.


Synopsis :

The remote Mac OS X host contains a web browser that is affected by
multiple vulnerabilities.

Description :

The version of Mozilla Firefox installed on the remote Mac OS X host
is prior to 40.0.3. It is, therefore, affected by the following
vulnerabilities :

- A use-after-free error exists when handling restyling
operations during the resizing of canvas elements due to
the canvas references being recreated, thus destroying
the original references. A remote, unauthenticated
attacker can exploit this to deference already freed
memory, resulting in a denial of service condition or
the execution of arbitrary code. (CVE-2015-4497)

- A security feature bypass vulnerability exists due to a
flaw that allows the manipulation of the 'data:' URL on
a loaded web page without install permission prompts
being displayed to the user. A remote, unauthenticated
attacker can exploit this to install add-ons from a
malicious source. (CVE-2015-4498)

See also :

https://www.mozilla.org/en-US/security/advisories/mfsa2015-94/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-95/

Solution :

Upgrade to Firefox 40.0.3 or later.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 6.9
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: MacOS X Local Security Checks

Nessus Plugin ID: 85687 ()

Bugtraq ID:

CVE ID: CVE-2015-4497
CVE-2015-4498

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now