Summary
This host is installed with Mozilla Firefox and is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow attackers to bypass certain security restrictions and compromise a user's system.
Impact Level: System/Application
Solution
Upgrade to Mozilla Firefox version 27.0 or later,
For updates refer to http://www.mozilla.com/en-US/firefox/all.html
Insight
Multiple flaws are due to,
- An error when handling XML Binding Language (XBL) content scopes.
- An error when handling discarded images within the 'RasterImage' class.
- An error related to the 'document.caretPositionFromPoint()' and 'document.elementFromPoint()' functions.
- An error when handling XSLT stylesheets.
- A use-after-free error related to certain content types when used with the 'imgRequestProxy()' function.
- An error when handling web workers error messages.
- An error when terminating a web worker running asm.js code after passing an object between threads.
- A race condition error when handling session tickets within libssl.
- An error when handling JavaScript native getters on window objects.
- Additionally, a weakness exists when handling the dialog for saving downloaded files.
Affected
Mozilla Firefox version before 27.0 on Mac OS X
Detection
Get the installed version with the help of detect NVT and check the version is vulnerable or not.
References
Severity
Classification
-
CVSS Base Score: 10.0
AV:N/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Adobe Acrobat Multiple Unspecified Vulnerabilities - Mac OS X
- Adobe Acrobat Multiple Vulnerabilities-01 Sep14 (Mac OS X)
- Adobe Acrobat Sandbox Bypass Vulnerability - Aug14 (Windows)
- Adobe AIR Multiple Vulnerabilities(APSB14-22)-(Mac OS X)
- Adobe Acrobat Multiple Unspecified Vulnerabilities -01 Feb13 (Mac OS X)