Firefox < 21.0 Multiple Vulnerabilities (Mac OS X)

Critical Nessus Plugin ID 66476

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.

VPR Score: 5.9

Synopsis

The remote Mac OS X host contains a web browser that is potentially affected by multiple vulnerabilities.

Description

The installed version of Firefox is earlier than 21.0 and is, therefore, potentially affected by multiple vulnerabilities :

- Various memory safety issues exist. (CVE-2013-0801, CVE-2013-1669)

- It is possible to call a content level constructor that allows for the constructor to have chrome privileged access. (CVE-2013-1670)

- An information leakage exists because the file input control has access to the full path. (CVE-2013-1671)

- A local privilege escalation issues exists in the Mozilla Maintenance Service. (CVE-2013-1672)

- The Mozilla Maintenance Service on Windows is vulnerable to a previously fixed privilege escalation attack. Note that new installations of Firefox after version 12 are not affected by this issue. (CVE-2013-1673, CVE-2012-1942)

- A use-after-free vulnerability exists when resizing video while playing. (CVE-2013-1674)

- Some 'DOMSVGZoomEvent' functions are used without being properly initialized, which could lead to information disclosure. (CVE-2013-1675)

- Multiple memory corruption issues exist. (CVE-2013-1676, CVE-2013-1677, CVE-2013-1678, CVE-2013-1679, CVE-2013-1680, CVE-2013-1681)

Solution

Upgrade to Firefox 21.0 or later.

See Also

https://www.mozilla.org/en-US/security/advisories/mfsa2013-41/

https://www.mozilla.org/en-US/security/advisories/mfsa2013-42/

https://www.mozilla.org/en-US/security/advisories/mfsa2013-43/

https://www.mozilla.org/en-US/security/advisories/mfsa2013-44/

https://www.mozilla.org/en-US/security/advisories/mfsa2013-45/

https://www.mozilla.org/en-US/security/advisories/mfsa2013-46/

https://www.mozilla.org/en-US/security/advisories/mfsa2013-47/

https://www.mozilla.org/en-US/security/advisories/mfsa2013-48/

Plugin Details

Severity: Critical

ID: 66476

File Name: macosx_firefox_21.nasl

Version: 1.11

Type: local

Agent: macosx

Published: 2013/05/16

Updated: 2019/11/27

Dependencies: 55417

Risk Information

Risk Factor: Critical

VPR Score: 5.9

CVSS Score Source: CVE-2013-1681

CVSS v2.0

Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:mozilla:firefox

Required KB Items: MacOSX/Firefox/Installed

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2013/05/14

Vulnerability Publication Date: 2013/05/14

Reference Information

CVE: CVE-2012-1942, CVE-2013-0801, CVE-2013-1669, CVE-2013-1670, CVE-2013-1671, CVE-2013-1672, CVE-2013-1673, CVE-2013-1674, CVE-2013-1675, CVE-2013-1676, CVE-2013-1677, CVE-2013-1678, CVE-2013-1679, CVE-2013-1680, CVE-2013-1681

BID: 53803, 59852, 59855, 59858, 59859, 59860, 59861, 59862, 59863, 59864, 59865, 59868, 59869, 59870, 59872, 59873