Firefox < 44.0.2 Service Workers Security Bypass (Mac OS X)

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

The remote Mac OS X host contains a web browser that is affected by
a security bypass vulnerability.

Description :

The version of Mozilla Firefox installed on the remote Mac OS X host
is prior to 44.0.2. It is, therefore, affected by a security bypass
vulnerability due to improper restriction of interaction between
service workers and plugins. An unauthenticated, remote attacker can
exploit this, via a crafted web site that triggers spoofed responses
to requests that use NPAPI, to bypass the same-origin policy.

See also :

https://www.mozilla.org/en-US/security/advisories/mfsa2016-13/

Solution :

Upgrade to Mozilla Firefox version 44.0.2 or later.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVSS Temporal Score : 3.2
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: MacOS X Local Security Checks

Nessus Plugin ID: 88752 ()

Bugtraq ID:

CVE ID: CVE-2016-1949

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now