Firefox ESR 45.x < 45.1 Multiple Vulnerabilities (Mac OS X)

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

The remote Mac OS X host contains a web browser that is affected by
multiple vulnerabilities.

Description :

The version of Firefox ESR installed on the remote Mac OS X host is
45.x prior to 45.1. It is, therefore, affected by multiple
vulnerabilities :

- Multiple memory corruption issues exist that allow an
attacker to corrupt memory, resulting in the execution
of arbitrary code. (CVE-2016-2806, CVE-2016-2807)

- A flaw exists due to improper validation of
user-supplied input when handling the 32-bit generation
count of the underlying HashMap. A context-dependent
attacker can exploit this to cause a buffer overflow
condition, resulting in a denial of service or the
execution of arbitrary code. (CVE-2016-2808)

- A heap buffer overflow condition exists in the Google
Stagefright component due to improper validation of
user-supplied input when handling CENC offsets and the
sizes table. A context-dependent attacker can exploit
this to cause a denial of service condition or the
execution of arbitrary code. (CVE-2016-2814)

See also :

https://www.mozilla.org/en-US/security/advisories/mfsa2016-39/
https://www.mozilla.org/en-US/security/advisories/mfsa2016-44/
https://www.mozilla.org/en-US/security/advisories/mfsa2016-47/

Solution :

Upgrade to Firefox ESR version 45.1 or later.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.5
(CVSS2#E:U/RL:ND/RC:UR)
Public Exploit Available : false

Family: MacOS X Local Security Checks

Nessus Plugin ID: 90789 ()

Bugtraq ID: 88099
88100

CVE ID: CVE-2016-2806
CVE-2016-2807
CVE-2016-2808
CVE-2016-2814

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now