Scientific Linux Security Update : firefox on SL7.x x86_64 (20201001)

high Nessus Plugin ID 141760


The remote Scientific Linux host is missing one or more security updates.


Security Fix(es) :

- Mozilla: Memory safety bugs fixed in Firefox 81 and Firefox ESR 78.3 (CVE-2020-15673)

- Mozilla: Integer overflow in nsJPEGEncoder::emptyOutputBuffer (CVE-2020-12422)

- Mozilla: X-Frame-Options bypass using object or embed tags (CVE-2020-15648)

- Mozilla: Bypassing iframe sandbox when allowing popups (CVE-2020-15653)

- Mozilla: Type confusion for special arguments in IonMonkey (CVE-2020-15656)

- Mozilla: XSS when pasting attacker-controlled data into a contenteditable element (CVE-2020-15676)

- Mozilla: Download origin spoofing via redirect (CVE-2020-15677)

- Mozilla: When recursing through layers while scrolling, an iterator may have become invalid, resulting in a potential use-after-free scenario (CVE-2020-15678)

- Mozilla: WebRTC permission prompt could have been bypassed by a compromised content process (CVE-2020-12424)

- Mozilla: Out of bound read in Date.parse() (CVE-2020-12425)

- Mozilla: Custom cursor can overlay user interface (CVE-2020-15654)

- Mozilla: Overriding file type when saving to disk (CVE-2020-15658)


Update the affected firefox and / or firefox-debuginfo packages.

See Also

Plugin Details

Severity: High

ID: 141760

File Name: sl_20201001_firefox_on_SL7_x.nasl

Version: 1.2

Type: local

Agent: unix

Published: 10/21/2020

Updated: 10/23/2020

Supported Sensors: Nessus Agent

Risk Information


Risk Factor: Medium

Score: 6.7


Risk Factor: High

Base Score: 9.3

Temporal Score: 6.9

Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: E:U/RL:OF/RC:C


Risk Factor: High

Base Score: 8.8

Temporal Score: 7.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:fermilab:scientific_linux:firefox, p-cpe:/a:fermilab:scientific_linux:firefox-debuginfo, x-cpe:/o:fermilab:scientific_linux

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/RedHat/release, Host/RedHat/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 10/1/2020

Vulnerability Publication Date: 7/9/2020

Reference Information

CVE: CVE-2020-12422, CVE-2020-12424, CVE-2020-12425, CVE-2020-15648, CVE-2020-15653, CVE-2020-15654, CVE-2020-15656, CVE-2020-15658, CVE-2020-15673, CVE-2020-15676, CVE-2020-15677, CVE-2020-15678