Firefox < 10.0 Multiple Vulnerabilities (Mac OS X)

High Nessus Plugin ID 57773

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.

VPR Score: 8.9

Synopsis

The remote Mac OS X host contains a web browser that is potentially affected by several vulnerabilities.

Description

The installed version of Firefox 9.x is potentially affected by the following security issues :

- A use-after-free error exists related to removed nsDOMAttribute child nodes.(CVE-2011-3659)

- Various memory safety issues exist. (CVE-2012-0442, CVE-2012-0443)

- Memory corruption errors exist related to the decoding of Ogg Vorbis files and processing of malformed XSLT stylesheets. (CVE-2012-0444, CVE-2012-0449)

- The HTML5 frame navigation policy can be violated by allowing an attacker to replace a sub-frame in another domain's document. (CVE-2012-0445)

- Scripts in frames are able to bypass security restrictions in XPConnect. This bypass can allow malicious websites to carry out cross-site scripting attacks. (CVE-2012-0446)

- An information disclosure issue exists when uninitialized memory is used as padding when encoding icon images. (CVE-2012-0447)

- Exported 'Firefox Sync' key permissions are not correct. (CVE-2012-0450)

Solution

Upgrade to Firefox 10.0 or later.

See Also

http://dev.w3.org/html5/spec/browsers.html#security-nav

https://www.mozilla.org/en-US/security/advisories/mfsa2012-01/

https://www.mozilla.org/en-US/security/advisories/mfsa2012-03/

https://www.mozilla.org/en-US/security/advisories/mfsa2012-04/

https://www.mozilla.org/en-US/security/advisories/mfsa2012-05/

https://www.mozilla.org/en-US/security/advisories/mfsa2012-06/

https://www.mozilla.org/en-US/security/advisories/mfsa2012-07/

https://www.mozilla.org/en-US/security/advisories/mfsa2012-08/

https://www.mozilla.org/en-US/security/advisories/mfsa2012-09/

http://www.zerodayinitiative.com/advisories/ZDI-12-110/

Plugin Details

Severity: High

ID: 57773

File Name: macosx_firefox_10_0.nasl

Version: 1.24

Type: local

Agent: macosx

Published: 2012/02/01

Updated: 2018/07/14

Dependencies: 55417

Risk Information

Risk Factor: High

VPR Score: 8.9

CVSS v2.0

Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:H/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:mozilla:firefox

Required KB Items: MacOSX/Firefox/Installed

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2012/01/31

Vulnerability Publication Date: 2012/01/31

Exploitable With

CANVAS (White_Phosphorus)

Metasploit (Firefox 8/9 AttributeChildRemoved() Use-After-Free)

Reference Information

CVE: CVE-2011-3659, CVE-2012-0442, CVE-2012-0443, CVE-2012-0444, CVE-2012-0445, CVE-2012-0446, CVE-2012-0447, CVE-2012-0449, CVE-2012-0450

BID: 51752, 51753, 51754, 51755, 51756, 51757, 51765, 51787

CWE: 20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990