Firefox < 46 Multiple Vulnerabilities (Mac OS X)

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

The remote Mac OS X host contains a web browser that is affected by
multiple vulnerabilities.

Description :

The version of Firefox installed on the remote Mac OS X host is prior
to 46. It is, therefore, affected by multiple vulnerabilities :

- Multiple memory corruption issues exist that allow an
attacker to corrupt memory, resulting in the execution
of arbitrary code. (CVE-2016-2804, CVE-2016-2806,
CVE-2016-2807)

- A flaw exists due to improper validation of
user-supplied input when handling the 32-bit generation
count of the underlying HashMap. A context-dependent
attacker can exploit this to cause a buffer overflow
condition, resulting in a denial of service or the
execution of arbitrary code. (CVE-2016-2808)

- A remote code execution vulnerability exists due to a
use-after-free error in the BeginReading() function. A
context-dependent attacker can exploit this to
dereference already freed memory, resulting in the
execution of arbitrary code. (CVE-2016-2811)

- A remote code execution vulnerability exists due to a
race condition in ServiceWorkerManager in the get()
function. A context-dependent attacker can exploit this
to execute arbitrary code. (CVE-2016-2812)

- A heap buffer overflow condition exists in the Google
Stagefright component due to improper validation of
user-supplied input when handling CENC offsets and the
sizes table. A context-dependent attacker can exploit
this to cause a denial of service condition or the
execution of arbitrary code. (CVE-2016-2814)

- A security bypass vulnerability exists due to the
Content Security Policy (CSP) not being properly applied
to web content sent with the 'multipart/x-mixed-replace'
MIME-type. A context-dependent attacker can exploit this
to bypass CSP protection. (CVE-2016-2816)

- A cross-site scripting (XSS) vulnerability exists due to
improper restriction of unprivileged 'javascript: URL'
navigation. A context-dependent attacker can exploit
this, via a specially crafted request, to execute
arbitrary script code in the context of a user's browser
session. (CVE-2016-2817)

- A flaw exists in the Firefox Health Report that is
triggered when it accepts any content document events
that are presented in its iframe. A context-dependent
attacker can exploit this to manipulate sharing
preferences. (CVE-2016-2820)

See also :

https://www.mozilla.org/en-US/security/advisories/mfsa2016-39/
https://www.mozilla.org/en-US/security/advisories/mfsa2016-42/
https://www.mozilla.org/en-US/security/advisories/mfsa2016-44/
https://www.mozilla.org/en-US/security/advisories/mfsa2016-45/
https://www.mozilla.org/en-US/security/advisories/mfsa2016-46/
https://www.mozilla.org/en-US/security/advisories/mfsa2016-47/
https://www.mozilla.org/en-US/security/advisories/mfsa2016-48/

Solution :

Upgrade to Firefox version 46 or later.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.5
(CVSS2#E:U/RL:ND/RC:UR)
Public Exploit Available : false

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now