Firefox < 41 Multiple Vulnerabilities

This script is Copyright (C) 2015-2016 Tenable Network Security, Inc.


Synopsis :

The remote Windows host contains a web browser that is affected by
multiple vulnerabilities.

Description :

The version of Firefox installed on the remote Windows host is prior
to 41. It is, therefore, affected by the following vulnerabilities :

- Multiple unspecified memory corruption issues exist due
to improper validation of user-supplied input. A remote
attacker can exploit these issues to corrupt memory and
execute arbitrary code. (CVE-2015-4500)

- Multiple unspecified memory corruption issues exist due
to improper validation of user-supplied input. A remote
attacker can exploit these issues to corrupt memory and
execute arbitrary code. (CVE-2015-4501)

- A flaw exists that allows scripted proxies to access the
inner window. (CVE-2015-4502)

- An out-of-bounds read issue exists in TCPSocket.js
related to the sending of strings over TCPSocket. A
remote attacker can exploit this disclose memory
contents. (CVE-2015-4503)

- An out-of-bounds read error exists in the QCMS color
management library that is triggered when manipulating
an image with specific attributes in its ICC V4 profile.
A remote attacker can exploit this to cause a denial of
service condition or to disclose sensitive information.
(CVE-2015-4504)

- A flaw exists in the Mozilla updater that allows a local
attacker to replace arbitrary files on the system,
resulting in the execution of arbitrary code.
(CVE-2015-4505)

- A buffer overflow condition exists in the libvpx
component when parsing vp9 format video. A remote
attacker can exploit this, via a specially crafted vp9
format video, to execute arbitrary code. (CVE-2015-4506)

- A flaw exists in the debugger API that is triggered when
using the debugger with SavedStacks in JavaScript. An
attacker can exploit this to cause a denial of service
condition. (CVE-2015-4507)

- A flaw exists in reader mode that allows an attacker to
spoof the URL displayed in the address bar.
(CVE-2015-4508)

- A user-after-free error exists when manipulating HTML
media elements on a page during script manipulation of
the URI table of these elements. An attacker can exploit
this to cause a denial of service condition.
(CVE-2015-4509)

- A use-after-free error exists when using a shared worker
with IndexedDB due to a race condition with the worker.
A remote attacker can exploit this, via specially
crafted content, to cause a denial of service condition.
(CVE-2015-4510)

- A buffer overflow condition exists in the nestegg
library when decoding a WebM format video with
maliciously formatted headers. An attacker can exploit
this to cause a denial of service condition or the
execution of arbitrary code. (CVE-2015-4511)

- An out-of-bounds read error exists during 2D canvas
rendering due to an issue in the cairo graphics library.
An attacker can exploit this to read random memory,
resulting in the disclosure of sensitive information.
(CVE-2015-4512)

- A security bypass vulnerability exists due to a flaw in
Gecko's implementation of the ECMAScript 5 API. An
attacker can exploit this to run web content in a
privileged context, resulting in the execution of
arbitrary code. (CVE-2015-4516)

- A memory corruption issue exists in NetworkUtils.cpp. An
attacker can potentially exploit this issue to cause a
denial of service condition or to execute arbitrary
code. (CVE-2015-4517)

- An information disclosure vulnerability exists due to a
flaw that occurs when a previously loaded image on a
page is dropped into content after a redirect, resulting
in the redirected URL being available to scripts.
(CVE-2015-4519)

- Multiple security bypass vulnerabilities exist due to
errors in the handling of CORS preflight request
headers. (CVE-2015-4520)

- A memory corruption issue exists in the
ConvertDialogOptions() function. An attacker can
potentially exploit this issue to cause a denial of
service condition or to execute arbitrary code.
(CVE-2015-4521)

- An overflow condition exists in the GetMaxLength()
function. An attacker can potentially exploit this to
cause a denial of service condition or to execute
arbitrary code. (CVE-2015-4522)

- An overflow condition exists in the GrowBy() function.
An attacker can potentially exploit this to cause a
denial of service condition or to execute arbitrary
code. (CVE-2015-7174)

- An overflow condition exists in the AddText() function.
An attacker can potentially exploit this to cause a
denial of service condition or to execute arbitrary
code. (CVE-2015-7175)

- A stack overflow condition exists in the
AnimationThread() function due to a bad sscanf
argument. An attacker can potentially exploit this to
cause a denial of service condition or to execute
arbitrary code. (CVE-2015-7176)

- A memory corruption issue exists in the InitTextures()
function. An attacker can potentially exploit this issue
to cause a denial of service condition or to execute
arbitrary code. (CVE-2015-7177)

- An out-of-bounds memory error exists in the
linkAttributes() function when manipulating shaders. An
attacker can potentially exploit this issue to cause a
denial of service condition or to execute arbitrary
code. (CVE-2015-7178)

- An overflow condition exists in the reserveVertexSpace()
function due to an insufficient allocation of memory for
a shader attribute array. An attacker can potentially
exploit this issue to cause a denial of service
condition or to execute arbitrary code. (CVE-2015-7179)

- A memory corruption issue exists in
ReadbackResultWriterD3D11::Run due to mishandling of the
return status. An attacker can potentially exploit this
issue to cause a denial of service condition or to
execute arbitrary code. (CVE-2015-7180)

- An unspecified flaw exists in the nsPerformance::Now()
function in dom/base/nsPerformance.cpp that allows an
attacker to use a side-channel attack to disclose
sensitive information. (CVE-2015-7327)

See also :

https://www.mozilla.org/en-US/security/advisories/mfsa2015-96/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-98/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-97/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-100/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-101/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-102/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-103/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-104/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-105/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-106/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-107/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-108/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-109/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-110/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-111/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-112/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-113/
https://www.mozilla.org/en-US/security/advisories/mfsa2015-114/

Solution :

Upgrade to Firefox 41 or later.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.5
(CVSS2#E:U/RL:ND/RC:UR)
Public Exploit Available : false