Mozilla Firefox for Android < 28.0.1 Multiple Vulnerabilities

Medium Nessus Network Monitor Plugin ID 8175

Synopsis

The remote host has a web browser installed that is vulnerable to multiple attack vectors.

Description

Versions of Mozilla Firefox older than 28.0.1 are unpatched for the following two vulnerabilities:

- A local file disclosure vulnerability due to the way the 'file' protocol is handled. Of specific concern is that files in the Firefox profile directory can be copied to the SD card, which is world-readable, when hyperlinked using the 'file:' protocol, resulting in sensitive information disclosure. (CVE-2014-1515)

- The 'Math.random()' function used by 'saltProfileName' function is cryptographically weak; an attacker could leverage this to predict profile directory name to aid in further attacks in conjunction with other vulnerabilities. (CVE-2014-1516)

Solution

Upgrade to Mozilla Firefox 28.0.1 for Android (or later) from the Google Play app store.

See Also

http://www.mozilla.org/security/announce

http://www.mozilla.org/security/announce/2014/mfsa2014-33.html

Plugin Details

Severity: Medium

ID: 8175

File Name: 8175.prm

Family: Web Clients

Published: 2014/03/26

Modified: 2016/12/06

Dependencies: 6534

Risk Information

Risk Factor: Medium

CVSSv2

Base Score: 5.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:P

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

CVSSv3

Base Score: 4.8

Temporal Score: 4.6

Vector: CVSS3#AV:N/AC:H/PR:N/UI:N/S:U/C:P/I:N/A:L

Temporal Vector: CVSS3#E:X/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:mozilla:firefox_mobile

Patch Publication Date: 2014/03/24

Vulnerability Publication Date: 2014/03/24

Reference Information

CVE: CVE-2014-1515, CVE-2014-1516

BID: 66393, 66479