Summary
This host is installed with Mozilla Firefox and is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow attackers to bypass certain security restrictions and compromise a user's system.
Impact Level: System/Application
Solution
Upgrade to Mozilla Firefox version 27.0 or later,
For updates refer to http://www.mozilla.com/en-US/firefox/all.html
Insight
Multiple flaws are due to,
- An error when handling XML Binding Language (XBL) content scopes.
- An error when handling discarded images within the 'RasterImage' class.
- An error related to the 'document.caretPositionFromPoint()' and 'document.elementFromPoint()' functions.
- An error when handling XSLT stylesheets.
- A use-after-free error related to certain content types when used with the 'imgRequestProxy()' function.
- An error when handling web workers error messages.
- An error when terminating a web worker running asm.js code after passing an object between threads.
- A race condition error when handling session tickets within libssl.
- An error when handling JavaScript native getters on window objects.
- Additionally, a weakness exists when handling the dialog for saving downloaded files.
Affected
Mozilla Firefox version before 27.0 on Windows
Detection
Get the installed version with the help of detect NVT and check the version is vulnerable or not.
References
Severity
Classification
-
CVSS Base Score: 10.0
AV:N/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Adobe Captivate Insecure Library Loading Vulnerability
- Adobe Acrobat and Reader Multiple Vulnerabilities -July10 (Windows)
- Adobe Flash Player Arbitrary Code Execution Vulnerability - 01 Feb14 (Windows)
- Adobe Acrobat Multiple Unspecified Vulnerabilities-01 Sep13 (Mac OS X)
- Adobe AIR Multiple Vulnerabilities -01 April 13 (Mac OS X)