Mozilla Firefox < 35.0 / Firefox ESR < 31.4 Multiple Vulnerabilities

High Nessus Network Monitor Plugin ID 8624

Synopsis

The remote host has a web browser installed that is vulnerable to multiple attack vectors.

Description

Versions of Mozilla Firefox earlier than 35.0 (or ESR version 31.4) are unpatched for the following vulnerabilities :

- Multiple unspecified memory safety issues exist within the browser engine. (CVE-2014-8634, CVE-2014-8635)
- A flaw exists where DOM objects with some specific properties can bypass XrayWrappers. This can allow web content to confuse privileged code, potentially enabling privilege escalation. (CVE-2014-8636)
- A flaw exists in the rendering of bitmap images. When rending a malformed bitmap image, memory may not always be properly initialized, which can result in a leakage of data to web content. (CVE-2014-8637)
- A flaw exists in 'navigator.sendBeacon()' in which it does not follow the cross-origin resource sharing specification. This results in requests from 'sendBeacon()' lacking an 'origin' header, which allows malicious sites to perform XSRF attacks. (CVE-2014-8638)
- A flaw exists when receiving 407 Proxy Authentication responses with a 'set-cookie' header. This can allow a session-fixation attack. (CVE-2014-8639)
- A flaw exists in Web Audio that can allow a small block of memory to be read. (CVE-2014-8640)
- A read-after-free flaw exists in WebRTC due to the way tracks are handled, which can result in a potentially exploitable crash or incorrect WebRTC behavior. (CVE-2014-8641)
- A flaw exists where delegated Online Certificate Status Protocol responder certificates fail to recognize the id-pkix-ocsp-nocheck extension. This can result in a user connecting to a site with a revoked certificate. (CVE-2014-8642)
- A flaw exists in the Gecko Media Plugin which can allow an attacker to break out of the sandbox. (CVE-2014-8643)

Solution

Upgrade to Firefox 35.0 (or Firefox ESR version 31.4, as appropriate), or later.

See Also

https://www.mozilla.org/security/announce/2014/mfsa2015-09.html

https://www.mozilla.org/security/announce/2014/mfsa2015-08.html

https://www.mozilla.org/security/announce/2014/mfsa2015-07.html

https://www.mozilla.org/security/announce/2014/mfsa2015-06.html

https://www.mozilla.org/security/announce/2014/mfsa2015-05.html

https://www.mozilla.org/security/announce/2014/mfsa2015-04.html

https://www.mozilla.org/security/announce/2014/mfsa2015-03.html

https://www.mozilla.org/security/announce/2014/mfsa2015-02.html

https://www.mozilla.org/security/announce/2014/mfsa2015-01.html

Plugin Details

Severity: High

ID: 8624

Family: Web Clients

Published: 2015/01/16

Modified: 2016/03/10

Dependencies: 9131

Nessus ID: 80519, 80520, 80522, 80523

Risk Information

Risk Factor: High

CVSSv2

Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

CVSSv3

Base Score: 8.1

Temporal Score: 7.7

Vector: CVSS3#AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS3#E:X/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:mozilla:firefox

Patch Publication Date: 2015/01/13

Vulnerability Publication Date: 2015/01/13

Exploitable With

Metasploit (Firefox Proxy Prototype Privileged Javascript Injection)

Reference Information

CVE: CVE-2014-8635, CVE-2014-8634, CVE-2014-8637, CVE-2014-8638, CVE-2014-8639, CVE-2014-8640, CVE-2014-8641, CVE-2014-8643, CVE-2014-8642, CVE-2014-8636

BID: 72050, 72049, 72048, 72047, 72046, 72045, 72044, 72043, 72042, 72041