Mozilla Firefox for Android < 28.0.1 Multiple Vulnerabilities

Medium Nessus Network Monitor Plugin ID 8175


The remote host has a web browser installed that is vulnerable to multiple attack vectors.


Versions of Mozilla Firefox older than 28.0.1 are unpatched for the following two vulnerabilities:

- A local file disclosure vulnerability due to the way the 'file' protocol is handled. Of specific concern is that files in the Firefox profile directory can be copied to the SD card, which is world-readable, when hyperlinked using the 'file:' protocol, resulting in sensitive information disclosure. (CVE-2014-1515)

- The 'Math.random()' function used by 'saltProfileName' function is cryptographically weak; an attacker could leverage this to predict profile directory name to aid in further attacks in conjunction with other vulnerabilities. (CVE-2014-1516)


Upgrade to Mozilla Firefox 28.0.1 for Android (or later) from the Google Play app store.

See Also

Plugin Details

Severity: Medium

ID: 8175

File Name: 8175.prm

Family: Web Clients

Published: 2014/03/26

Modified: 2016/12/06

Dependencies: 6534

Risk Information

Risk Factor: Medium


Base Score: 5.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:P

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C


Base Score: 4.8

Temporal Score: 4.6


Temporal Vector: CVSS3#E:X/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:mozilla:firefox_mobile

Patch Publication Date: 2014/03/24

Vulnerability Publication Date: 2014/03/24

Reference Information

CVE: CVE-2014-1515, CVE-2014-1516

BID: 66393, 66479