Firefox ESR < 38.2.1 Multiple Vulnerabilities (Mac OS X)

High Nessus Plugin ID 85686


The remote Mac OS X host contains a web browser that is affected by multiple vulnerabilities.


The version of Mozilla Firefox ESR installed on the remote Mac OS X host is prior to 38.2.1. It is, therefore, affected by the following vulnerabilities :

- A use-after-free error exists when handling restyling operations during the resizing of canvas elements due to the canvas references being recreated, thus destroying the original references. A remote, unauthenticated attacker can exploit this to deference already freed memory, resulting in a denial of service condition or the execution of arbitrary code. (CVE-2015-4497)

- A security feature bypass vulnerability exists due to a flaw that allows the manipulation of the 'data:' URL on a loaded web page without install permission prompts being displayed to the user. A remote, unauthenticated attacker can exploit this to install add-ons from a malicious source. (CVE-2015-4498)


Upgrade to Firefox ESR 38.2.1 or later.

See Also

Plugin Details

Severity: High

ID: 85686

File Name: macosx_firefox_38_2_1_esr.nasl

Version: $Revision: 1.5 $

Type: local

Agent: macosx

Published: 2015/08/28

Modified: 2015/09/26

Dependencies: 55417

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:mozilla:firefox_esr

Required KB Items: MacOSX/Firefox/Installed

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2015/08/27

Vulnerability Publication Date: 2015/08/27

Reference Information

CVE: CVE-2015-4497, CVE-2015-4498

OSVDB: 126767, 126768